Malicious
2
/62

Threat

com.company.credit

BNM

Analyzed on 2021-10-18T10:25:43.474609

22

permissions

3

activities

10

services

7

receivers

10

domains

File sums

MD5 59939ecc0db40e4db79dd0078a829f2b
SHA1 2bfab41484c90d7988609486a3bd2d2ecaff9d0e
SHA256 c6cc383f1f6aa8b70e39ee60d95344b2f28ada02f5a47fb3d30912538738bb19
Size 1.83MB

APKiD

Information computed with APKiD.

/tmp/tmpo15o9jnd!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
  • Build.TAGS check
compiler
  • unknown (please file detection issue!)

SSdeep

Information computed with ssdeep.

APK file 49152:VAXT8oj8iG2zVZ7PklOcMozm//opFVey4Yn5pC2gbR:ViFQiF/WG/SYYk1
Manifest 384:pp5AoumcGOmIuQt9o9RhHv9sMtyOO8bCtOJEgMVTdCNKeblGqsbHbrnNWJ0p3aPq:…
classes.dex 24576:YhIpMjSo5uI21ABygPokbYvAmtNhT0v21mdteMQ0:0INUhBjokGJNhT0v21mdUMb

Dexofuzzy

Information computed with Dexofuzzy.

APK file 3072:NnXJowIP9aqrQBKr+J3Ttg3mXd+K4xlcWRKsCCASRl:NXJp5BKCJje2X34Ym
classes.dex 3072:NnXJowIP9aqrQBKr+J3Ttg3mXd+K4xlcWRKsCCASRl:NXJp5BKCJje2X34Ym

APK details

Information computed with AndroGuard and Pithus.

Package com.company.credit
App name BNM
Version name 1.9
Version code 10
SDK 23 - 29
UAID 5a73ccdd637dc661e6f1712d4d30c9ba5ef28e24
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x504b4453: Dependency metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 13324b25278c3fda624021ef2ca8787c
SHA1 ee4ebb5e34372f23bccf706fe1247d68e94e3674
SHA256 fd9d6210d08260da4c9e50f05ca0ddedd9f8ebd90b379fea2b0f9d257cf7d397
Issuer Common Name: TW, Organizational Unit: TW, Organization: TW, Locality: TW, State/Province: TW, Country: TW
Not before 2021-03-23T02:24:23+00:00
Not after 2046-03-17T02:24:23+00:00

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Activity (com.company.credit.SmsActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.company.credit.revciver.SMSBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BROADCAST_SMS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.company.credit.revciver.SMSGetBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BROADCAST_SMS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.company.credit.revciver.MMSBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BROADCAST_WAP_PUSH [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.company.credit.service.HeadlessSmsSendService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.SEND_RESPOND_VIA_MESSAGE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.company.credit.service.NotificationCollectorService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.company.credit.revciver.CallReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Medium High Intent Priority (1000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.company.credit.SmsActivity

Schemes: sms:// smsto:// mms:// mmsto://

Main Activity

Information computed with AndroGuard.

com.company.credit.MainActivity

Activities

Information computed with AndroGuard.

com.company.credit.MainActivity
com.company.credit.SmsActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.company.credit.revciver.SMSBroadcastReceiver
com.company.credit.revciver.SMSGetBroadcastReceiver
com.company.credit.revciver.MMSBroadcastReceiver
com.company.credit.revciver.CallReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver

Services

Information computed with AndroGuard.

com.company.credit.service.HeadlessSmsSendService
com.company.credit.service.LifeService
com.company.credit.service.NotificationCollectorService
com.company.credit.service.MyFirebaseMessagingService
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService

Sample timeline

Oldest file found in APK Jan. 1, 1981, 1:01 a.m.
Latest file found in APK Jan. 1, 1981, 1:01 a.m.
Certificate valid not before March 23, 2021, 2:24 a.m.
First submission on VT Oct. 18, 2021, 10:17 a.m.
Last submission on VT Oct. 18, 2021, 10:17 a.m.
Upload on Pithus Oct. 18, 2021, 10:25 a.m.
Certificate valid not after March 17, 2046, 2:24 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['call lists', 'address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 a/l/a/a.java
a/f/e/l.java
b/b/b/u/b0.java
a/e/c/c.java
a/b/k/h.java
b/b/a/b/h/f/l4.java
b/b/b/q/b0.java
b/b/b/u/u.java
a/f/g/l/a.java
a/f/f/a.java
a/e/c/b.java
b/b/b/s/r/c.java
com/company/credit/service/MyFirebaseMessagingService.java
b/b/a/b/j/b/a.java
b/b/a/b/e/n/m0.java
b/b/a/b/h/f/o3.java
b/b/a/b/h/f/f.java
b/b/b/q/e0.java
b/b/a/b/h/f/e0.java
a/f/g/k.java
b/b/a/b/i/b/i3.java
a/b/p/m0.java
b/b/a/b/h/f/f3.java
a/f/f/c/a.java
b/b/a/b/e/c0.java
b/b/a/b/d/e.java
b/b/b/u/s.java
b/b/b/c.java
a/b/o/g.java
a/f/m/a0/b.java
b/b/a/b/h/f/oa.java
a/e/b/d.java
b/b/b/u/v.java
b/b/b/u/e0.java
a/f/m/b.java
b/b/b/q/v.java
a/f/e/b.java
b/b/a/b/e/p/a.java
b/b/b/q/y.java
a/f/f/c/f.java
b/b/a/b/i/b/ga.java
a/f/n/c.java
a/f/e/i.java
a/e/c/e.java
b/b/a/b/i/b/n3.java
b/b/b/k/g.java
b/b/a/b/i/b/m9.java
b/b/a/a/j/w/a.java
b/b/b/q/x.java
b/b/a/a/j/u/k.java
a/f/g/j.java
b/b/a/b/h/f/y2.java
a/b/o/j/j.java
b/b/a/b/d/s.java
b/b/b/k/n.java
b/b/a/b/d/j.java
b/b/a/b/h/f/j3.java
b/b/b/u/f0.java
a/b/k/i.java
b/b/b/q/o.java
b/b/a/b/d/d.java
a/j/a/a.java
a/b/k/f.java
b/b/b/q/r.java
a/f/m/r.java
b/b/b/s/q/b.java
a/f/l/b.java
a/f/m/u.java
a/j/a/m.java
a/b/p/a0.java
a/j/a/d.java
b/b/a/b/e/e.java
b/a/a/f/b.java
b/b/b/u/c.java
b/b/a/b/a/a/a.java
b/b/b/q/f.java
a/n/a/b.java
a/j/a/j.java
b/b/a/b/e/n/d.java
a/b/p/a1.java
a/b/l/a/a.java
a/b/p/l0.java
b/b/a/b/e/p/d.java
b/b/a/b/e/q/o.java
a/b/p/z0.java
b/b/a/b/e/w.java
a/f/m/f.java
a/f/g/f.java
b/b/a/b/e/n/c0.java
a/f/g/g.java
b/b/a/b/h/f/m3.java
b/b/b/u/a0.java
a/f/e/e.java
b/b/a/b/e/j.java
a/j/a/l.java
b/b/a/b/d/v.java
a/f/m/s.java
b/b/a/b/h/f/m4.java
b/b/a/b/e/n/e.java
b/b/a/b/e/n/b.java
b/b/a/b/d/b.java
a/e/b/k/f.java
b/b/a/b/e/u.java
b/b/a/b/a/a/b.java
b/b/b/s/b.java
b/b/a/b/h/f/s3.java
a/f/m/h.java
b/b/a/b/k/a.java
a/f/g/e.java
a/f/g/l/e.java
a/b/p/w.java
a/f/m/z.java
a/b/o/j/i.java
a/b/p/q0.java
b/b/a/b/e/n/a.java
b/b/b/u/g.java
b/b/a/b/h/f/n3.java
b/b/a/b/e/q/g.java
a/p/a/a/h.java
a/b/k/k.java
a/f/g/c.java
b/b/a/b/e/m/m/u.java
b/b/a/b/d/i.java
b/b/a/b/e/i.java
a/b/p/j0.java
b/b/a/b/h/f/h3.java
a/b/p/c1.java
b/b/a/b/a/a/c.java
a/j/a/b.java
b/b/b/u/a.java
b/b/a/b/e/m/m/q.java
a/b/p/r0.java
b/b/a/b/h/e/o.java
a/f/f/c/b.java
b/b/a/b/i/b/ja.java
b/b/b/q/w.java
b/b/a/b/d/u.java
com/company/credit/service/LifeService.java
b/b/a/b/e/q/p.java
a/f/n/h.java
b/b/a/b/e/m/m/b.java
b/b/a/b/e/e0.java
a/e/c/d.java
a/b/p/x0.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 b/b/b/s/q/b.java
b/b/b/q/o.java
d/e0/c.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 b/b/a/b/h/f/j3.java
High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 b/b/a/b/h/f/w7.java
b/b/a/b/h/f/y5.java
b/b/a/b/h/f/p4.java
b/b/a/b/h/f/e0.java
b/b/a/b/h/f/k6.java
b/b/a/b/h/f/o8.java
b/b/a/b/h/f/r6.java
b/b/a/b/h/f/t4.java
b/b/a/b/h/f/x6.java
b/b/a/b/h/f/s7.java
b/b/a/b/h/f/o5.java
b/b/a/b/i/b/t9.java
b/b/a/b/h/f/f6.java
High
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 b/b/a/b/i/b/h3.java
b/b/a/a/j/y/k/b0.java
b/b/a/b/i/b/m9.java
b/a/a/g/b.java
b/b/a/a/j/y/k/h0.java
b/b/a/b/i/b/ja.java
b/b/a/b/i/b/k.java
b/b/a/a/j/y/k/f0.java
b/b/a/b/i/b/fa.java
b/b/a/b/i/b/j.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 b/b/a/b/i/b/t9.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 b/b/b/s/q/c.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 d/v.java
Pygal Singapore: 100 United States: 800

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US app-measurement.com 142.250.74.206
SG 6jpokd.7491394.com 139.162.61.96
US pagead2.googlesyndication.com 216.58.212.162
US plus.google.com 216.58.212.174
US google.com 142.250.184.238
US goo.gl 142.250.74.206
schemas.android.com
US www.google.com 142.250.74.196
US www.googleadservices.com 172.217.16.130
US firebase.google.com 142.250.185.142

URL analysis

Information computed with MobSF.

https://firebase.google.com/support/privacy/init-options.
Defined in b/b/b/s/f.java
https://app-measurement.com/a
Defined in b/b/a/b/i/b/a3.java
www.google.com
https://www.google.com
Defined in b/b/a/b/i/b/t6.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
https://goo.gl/NAOOOI
https://goo.gl/NAOOOI.
Defined in b/b/a/b/i/b/t9.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
https://goo.gl/NAOOOI
https://goo.gl/NAOOOI.
Defined in b/b/a/b/i/b/t9.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
https://goo.gl/NAOOOI
https://goo.gl/NAOOOI.
Defined in b/b/a/b/i/b/t9.java
https://firebase.google.com/support/guides/disable-analytics
Defined in b/b/a/b/i/b/f3.java
https://google.com/search?
Defined in b/b/a/b/i/b/s6.java
https://plus.google.com/
Defined in b/b/a/b/e/n/e0.java
https://app-measurement.com/a
Defined in b/b/a/b/h/f/p9.java
https://goo.gl/J1sWQy
Defined in b/b/a/b/h/f/e0.java
https://pagead2.googlesyndication.com/pagead/gen_204?id=gmob-apps
Defined in b/b/a/b/a/a/b.java
https://6jpokd.7491394.com/api
https://6jpokd.7491394.com/app/web/index/
Defined in b/a/a/b.java
https://6jpokd.7491394.com/api
https://6jpokd.7491394.com/app/web/index/
Defined in b/a/a/b.java
https://6jpokd.7491394.com/api
Defined in b/a/a/f/e.java
http://schemas.android.com/apk/res/android
Defined in a/f/f/c/g.java

Permissions analysis

Information computed with MobSF.

High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.PROCESS_OUTGOING_CALLS intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialled. Malicious applications may monitor, redirect or prevent outgoing calls.
High android.permission.READ_SMS read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
High android.permission.WRITE_SMS edit SMS or MMS
Allows application to write to SMS messages stored on your phone or SIM card. Malicious applications may delete your messages.
High android.permission.RECEIVE_SMS receive SMS
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
High android.permission.SEND_SMS send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.READ_CALL_LOG Allows an application to read the user's call log.
High android.permission.WRITE_CALL_LOG Allows an application to write (but not read) the user's call log data.
High android.permission.ACCESS_FINE_LOCATION fine (GPS) location
Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.
High android.permission.ACCESS_COARSE_LOCATION coarse (network-based) location
Access coarse location sources, such as the mobile network database, to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
High android.permission.READ_CONTACTS read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
High android.permission.WRITE_CONTACTS write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.REQUEST_DELETE_PACKAGES Allows an application to request deleting packages.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Medium com.google.android.c2dm.permission.RECEIVE C2DM permissions
Permission for cloud to device messaging.
Medium android.permission.CALL_PRIVILEGED directly call any phone numbers
Allows the application to call any phone number, including emergency numbers, without your intervention. Malicious applications may place unnecessary and illegal calls to emergency services.
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Unknown permission
Unknown permission from android reference

Tracking analysis

Information computed with Exodus-core.

Google Firebase Analytics https://reports.exodus-privacy.eu.org/fr/trackers/49

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Get the content of SMS and forward it to others via SMS
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Query the phone number from SMS sender
Confidence:
100%
Query the SMS service centre timestamp
Confidence:
100%
Method reflection
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Monitor data identified by a given content URI changes(SMS, MMS, etc.)
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get Location of the device and append this info to a string
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get calendar information
Confidence:
100%
Deletes media specified by a content URI(SMS, CALL_LOG, File, etc.)
Confidence:
100%
Get location of the device
Confidence:
100%
Query the IMEI number
Confidence:
100%
Method reflection
Confidence:
100%
Connect to the remote server through the given URL
Confidence:
100%
Query data from URI (SMS, CALLLOGS)
Confidence:
100%
Read file into a stream and put it into a JSON object
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Read the input stream from given URL
Confidence:
100%
Connect to a URL and set request method
Confidence:
80%
Check if the network is connected
Confidence:
80%
Check the active network type
Confidence:
80%
Connect to a URL and receive input stream from the server
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Android notifications
       b/b/a/b/e/e.java
b/b/b/u/c.java
Base64 decode
       b/b/b/s/q/b.java
b/b/a/a/j/y/k/b0.java
com/company/credit/service/MyFirebaseMessagingService.java
a/f/f/c/c.java
b/b/b/q/f.java
Base64 encode
       b/b/b/s/q/b.java
b/b/a/b/e/q/c.java
b/b/b/s/m.java
b/b/a/a/j/y/j/e.java
b/b/a/a/j/y/k/b0.java
b/a/a/f/f.java
b/b/b/q/o.java
b/b/a/a/j/y/j/a.java
a/f/j/a.java
b/b/b/n/j/e.java
b/b/a/a/j/m.java
Certificate handling
       d/a.java
b/b/a/b/i/b/t3.java
d/e0/h/l.java
d/v.java
b/b/a/b/i/b/v9.java
b/b/a/b/i/b/y6.java
Gps location
       com/company/credit/service/LifeService.java
a/b/k/k.java
Get installed applications
       a/f/n/i.java
b/b/a/b/i/b/r4.java
Get sim provider details
       b/b/a/a/i/d.java
Get system service
       a/b/o/j/l.java
a/b/p/a1.java
a/l/a/a.java
b/b/b/q/y.java
b/b/a/b/i/b/r4.java
a/b/o/d.java
b/b/a/b/e/q/r.java
a/b/k/k.java
a/f/e/c.java
com/company/credit/MainActivity.java
b/b/a/a/i/d.java
a/b/p/z0.java
a/b/p/x.java
b/b/a/b/e/i.java
b/b/a/a/j/y/j/a.java
b/b/b/u/a.java
b/a/a/e/a.java
b/b/b/u/f0.java
a/j/a/c.java
b/b/a/b/h/f/m4.java
a/f/i/a.java
a/b/k/f.java
b/b/a/b/e/r/b.java
b/b/a/a/j/y/j/m.java
a/f/m/r.java
b/b/a/a/j/y/j/e.java
b/b/a/b/i/b/t3.java
com/company/credit/service/LifeService.java
b/b/a/b/i/b/b9.java
b/b/a/b/e/e.java
b/b/b/u/c.java
a/g/a/c.java
b/b/a/b/k/a.java
Http connection
       b/b/a/b/i/b/t3.java
b/b/a/b/a/a/b.java
b/b/a/b/i/b/x6.java
b/b/b/s/r/c.java
b/b/a/b/i/b/s3.java
b/b/a/a/i/d.java
b/b/a/b/i/b/y6.java
Https connection
       b/b/a/b/i/b/t3.java
b/b/a/b/i/b/y6.java
Inter process communication
       a/l/a/a.java
a/f/e/l.java
b/b/a/b/i/b/r4.java
b/b/a/b/i/b/p8.java
a/f/e/a.java
b/b/b/q/b0.java
b/b/b/u/u.java
b/b/a/b/e/n/j.java
a/b/o/j/a.java
a/f/f/a.java
b/b/a/b/e/n/u.java
com/company/credit/service/MyFirebaseMessagingService.java
b/b/a/b/j/b/a.java
b/b/a/b/h/f/oc.java
b/b/a/b/d/f.java
b/b/a/b/h/a/e.java
b/b/a/b/h/f/rc.java
b/b/a/b/e/n/k.java
b/b/a/b/e/f.java
b/b/a/b/i/b/g4.java
b/b/b/u/h.java
b/b/b/q/e0.java
b/b/a/b/g/g.java
b/a/a/f/c.java
a/f/n/i.java
b/b/a/b/d/h.java
b/b/a/b/i/b/b9.java
b/b/a/b/e/c0.java
b/b/a/b/j/b/b.java
b/a/a/f/f.java
b/b/a/b/d/e.java
b/b/b/c.java
b/b/a/b/e/n/d0.java
a/f/e/b.java
b/b/a/b/e/p/a.java
b/b/b/q/y.java
b/b/a/b/h/b/b.java
b/b/a/b/e/q/r.java
a/f/e/i.java
b/b/a/b/f/b.java
com/company/credit/MainActivity.java
b/b/a/b/e/n/r.java
b/b/a/b/e/n/t/b.java
b/b/a/b/h/f/tc.java
b/b/a/b/g/i.java
b/b/a/b/h/f/mc.java
b/b/a/b/i/b/j8.java
b/b/a/b/e/n/h0.java
b/b/a/b/h/f/l2.java
com/company/credit/revciver/SMSGetBroadcastReceiver.java
a/b/o/j/j.java
b/b/a/b/d/s.java
b/b/a/b/d/j.java
b/b/b/u/f0.java
b/b/a/b/d/a.java
b/b/b/q/c.java
b/b/a/b/h/d/a.java
a/b/k/c.java
b/b/a/b/d/d.java
b/b/a/b/j/b/c.java
a/b/k/f.java
b/b/a/b/e/n/b0.java
b/b/b/q/r.java
b/b/a/b/i/b/t6.java
b/b/a/b/e/b.java
b/b/a/b/e/n/l.java
b/b/a/b/i/b/e4.java
a/j/a/d.java
b/b/a/b/e/e.java
b/b/a/b/a/a/a.java
b/b/b/u/f.java
b/b/b/q/f.java
b/b/a/b/e/n/i0.java
b/b/a/b/e/n/f.java
b/b/b/u/d.java
b/b/a/b/e/p/d.java
b/b/a/b/i/b/i8.java
com/company/credit/revciver/SMSBroadcastReceiver.java
b/b/a/b/i/b/v3.java
b/b/a/b/i/b/l8.java
a/f/e/g.java
a/b/o/j/g.java
com/company/credit/revciver/CallReceiver.java
b/b/a/b/e/d0.java
b/b/b/u/q.java
b/b/a/b/i/b/o8.java
a/f/e/e.java
b/b/a/b/h/a/a.java
b/b/a/b/e/a.java
a/f/e/h.java
b/b/a/b/d/v.java
com/company/credit/service/HeadlessSmsSendService.java
b/b/a/b/e/n/e.java
b/b/a/b/e/n/b.java
b/b/a/b/j/b/h.java
b/b/a/b/d/b.java
b/b/a/b/e/m/o.java
b/b/a/b/e/n/y.java
b/b/a/b/h/f/pb.java
a/b/o/j/h.java
com/company/credit/revciver/MMSBroadcastReceiver.java
b/b/a/b/i/b/b3.java
a/b/o/j/i.java
a/b/o/j/o.java
b/b/a/b/i/b/j3.java
b/b/a/b/h/d/b.java
b/b/b/u/g.java
b/b/b/q/b.java
b/b/a/b/d/o.java
b/b/a/b/h/f/l1.java
b/b/a/b/e/n/k0.java
b/b/a/b/h/f/a.java
b/b/a/b/i/b/i4.java
b/b/a/b/e/n/h.java
b/b/a/a/j/y/j/a.java
b/b/a/b/e/n/e0.java
b/b/a/b/e/m/a.java
b/b/a/b/e/s.java
b/b/a/b/d/c.java
b/b/b/u/a.java
b/b/a/b/h/b/a.java
b/b/a/b/e/n/q.java
b/b/a/b/f/a.java
b/b/a/b/e/n/l0.java
b/b/b/q/z.java
b/b/b/q/w.java
com/company/credit/service/LifeService.java
b/b/a/b/h/f/s.java
b/b/a/b/h/a/f.java
b/b/a/b/e/n/t/c.java
b/b/a/b/i/b/h4.java
Java reflection
       a/b/p/e0.java
b/b/c/w/o/c.java
b/b/c/w/n/i.java
a/b/p/l0.java
d/e0/i/c.java
a/b/k/h.java
b/b/a/b/h/f/t8.java
b/b/a/b/h/f/l4.java
a/f/g/l/a.java
a/f/m/f.java
a/f/g/f.java
b/b/c/d.java
d/e0/i/d.java
a/f/g/g.java
a/m/a.java
a/e/c/b.java
a/q/a.java
b/b/a/b/i/b/u6.java
b/b/a/b/h/f/w7.java
d/e0/f/e.java
a/j/a/o.java
a/f/g/h.java
b/b/a/b/h/f/e0.java
b/b/a/b/h/f/m4.java
b/b/a/b/e/n/b.java
b/b/a/b/h/f/m7.java
b/b/c/w/d.java
a/f/n/i.java
b/b/c/w/m.java
d/e0/j/e.java
a/b/o/g.java
b/b/a/b/h/f/u8.java
a/f/g/e.java
a/f/m/e.java
a/b/p/f0.java
a/f/g/l/e.java
b/b/a/b/h/f/u5.java
a/f/e/b.java
a/f/m/z.java
b/b/a/b/h/f/e7.java
a/f/f/c/f.java
a/f/n/c.java
a/f/e/i.java
b/b/a/b/f/b.java
b/b/c/b.java
b/b/a/b/h/f/q4.java
a/m/j.java
d/e0/i/a.java
b/b/b/k/g.java
b/b/a/b/h/f/a7.java
a/b/p/j0.java
b/b/a/a/j/u/k.java
b/b/a/b/h/f/p7.java
a/b/p/c1.java
b/b/a/b/h/f/e6.java
a/f/g/j.java
a/b/o/j/j.java
b/b/a/b/i/b/f.java
b/b/a/b/h/f/k7.java
b/b/a/b/h/f/z5.java
b/b/a/b/h/e/o.java
a/b/k/i.java
a/b/k/f.java
a/f/m/r.java
a/j/a/g.java
b/b/a/b/e/q/p.java
a/b/p/a0.java
b/b/a/b/h/f/p8.java
a/f/n/h.java
a/q/b.java
d/e0/i/b.java
b/b/c/c.java
Load and manipulate dex files
       b/b/a/b/g/e.java
Local file i/o operations
       b/b/a/b/i/b/a4.java
b/b/a/b/i/b/r4.java
b/b/b/p/g.java
b/b/a/b/h/f/e0.java
a/f/g/k.java
b/b/a/b/i/b/b4.java
b/a/a/f/e.java
b/b/b/u/c0.java
b/b/b/u/u.java
b/b/a/b/b/a/a/a/a.java
b/b/b/s/q/b.java
b/b/a/b/i/b/z3.java
b/b/a/b/i/b/c4.java
b/b/b/q/x.java
b/b/a/b/i/b/j8.java
b/b/a/b/i/b/y3.java
b/b/a/b/i/b/u6.java
b/b/a/b/i/b/x3.java
b/b/a/b/a/a/c.java
b/b/b/t/a.java
Message digest
       b/b/b/s/q/b.java
b/b/a/b/i/b/k8.java
b/b/a/b/i/b/t9.java
b/b/b/q/o.java
b/b/a/b/i/b/o9.java
b/b/a/b/i/b/f3.java
b/b/a/b/e/q/a.java
d/e0/c.java
Query database of sms, contacts etc
       b/a/a/f/f.java
b/b/a/b/h/f/y2.java
b/a/a/f/d.java
Send sms
       b/a/a/f/f.java
com/company/credit/service/HeadlessSmsSendService.java
Sending broadcast
       com/company/credit/service/LifeService.java
b/b/a/b/i/b/r4.java
b/b/a/b/d/d.java
Starting activity
       a/b/o/j/i.java
a/f/e/e.java
com/company/credit/service/LifeService.java
b/a/a/f/c.java
a/f/e/l.java
b/b/a/b/e/n/u.java
a/j/a/d.java
com/company/credit/service/MyFirebaseMessagingService.java
com/company/credit/MainActivity.java
Starting service
       a/l/a/a.java
b/b/a/b/e/p/a.java
b/b/a/b/e/p/d.java
b/b/b/q/z.java
b/b/a/b/d/d.java
b/b/b/q/w.java
com/company/credit/MainActivity.java
Tcp socket
       d/a.java
d/e0/g/e.java
d/e0/h/l.java
d/e0/i/e.java
b/b/a/b/i/b/v9.java
d/e0/f/f.java
d/e0/f/c.java
e/l.java
d/e0/i/a.java
d/e0/g/d.java
d/v.java
d/e0/c.java
b/b/a/b/i/b/u9.java
Url connection to file/http/https/ftp/jar
       b/b/a/b/i/b/t3.java
b/b/b/u/s.java
b/b/b/s/r/c.java
b/b/a/b/i/b/y6.java

Control flow graphs analysis

Information computed by Pithus.

The application probably loads JS-capable web views

The application probably gets different information regarding the telephony capabilities

The application probably gets the IMEI of the phone

The application probably gets the network connections information

The application probably uses reflection

The application probably plays sound

The application probably makes OS calls

The application probably sends SMS/MMS messages

The application probably sends data over HTTP/S

The application probably starts another application

The application probably creates an accessibility service