0/64

Threat

io.fournkoner.hdrezka

HDRezka

Analyzed on 2022-08-23T03:30:02.306813

8

permissions

2

activities

7

services

3

receivers

20

domains

File sums

MD5 828d2a4995abc095a100a8eb87003ca9
SHA1 2ed20877604a2b133dfd34d691f0aa298e1beb91
SHA256 c98e5a7c2caeeda21b655b6cddd3168b6e6a92649496fd5ac9007eca73ee71fb
Size 2.84MB

APKiD

Information computed with APKiD.

/tmp/tmpkn5zyzkw!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • Build.TAGS check
  • possible VM check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • r8 without marker (suspicious)

SSdeep

Information computed with ssdeep.

APK file 49152:pxeaOIAcXA75RCgPQdltxZlcc5vDCbOScwaaNsGeXzQl50zn67xBg5:5OIZXAKRdltxZlccVDKOdwDNsirFg5
Manifest 192:aTuLnkeDzRzety1mKYjdsGNXmO/a4FfTBTFT0lTbTcT+orT+o5T+oYT+yT+gPF4U:…
classes.dex 49152:QaAAmOLnpsxDtWd09dBZz6kn4UIMKbQCnBCu0BVzmcMyY8R8pLVE0TGs:QaAAdL…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 6144:DHvSpRMt+RHYHairCYYYevz88QAEdonvgsifsQz8W:2fdFY6i9AEdYvpifT8W
classes.dex 6144:DHvSpRMt+RHYHairCYYYevz88QAEdonvgsifsQz8W:2fdFY6i9AEdYvpifT8W

APK details

Information computed with AndroGuard and Pithus.

Package io.fournkoner.hdrezka
App name HDRezka
Version name 0.7.3 β
Version code 21
SDK 24 - 33
UAID 60034c1762a054435366250ba151ad3d053ce77e
Signature Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x504b4453: Dependency metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 98a424dd47fb3e5d15be3d07d7ddc6af
SHA1 b9e27e98dcceb9bc2aa3a8c4d7ff43e066c28098
SHA256 7e0056295d5866e2232e8db2c4271eb12d8423a55aa7eaa2236031207300ae14
Issuer Common Name: 4nk1r, Organizational Unit: 4nk1r, Organization: 4nk1r, Locality: Ekaterinburg, Country: RU
Not before 2020-12-10T09:39:59+00:00
Not after 2045-12-04T09:39:59+00:00

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Medium Application Data can be Backed up[android:allowBackup] flag is missing.
The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Broadcast Receiver (androidx.profileinstaller.ProfileInstallReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.

Main Activity

Information computed with AndroGuard.

io.fournkoner.hdrezka.MainActivity

Activities

Information computed with AndroGuard.

io.fournkoner.hdrezka.MainActivity
splitties.permissions.internal.PermissionRequestFallbackActivity

Receivers

Information computed with AndroGuard.

com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver
androidx.profileinstaller.ProfileInstallReceiver

Services

Information computed with AndroGuard.

io.fournkoner.hdrezka.DownloadService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
androidx.room.MultiInstanceInvalidationService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService

Sample timeline

Oldest file found in APK Jan. 1, 1981, 1:01 a.m.
Latest file found in APK Jan. 1, 1981, 1:01 a.m.
Certificate valid not before Dec. 10, 2020, 9:39 a.m.
First submission on VT Aug. 14, 2022, 11:01 a.m.
Last submission on VT Aug. 23, 2022, 3:01 a.m.
Upload on Pithus Aug. 23, 2022, 3:30 a.m.
Certificate valid not after Dec. 4, 2045, 9:39 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 u5/u.java
a3/a.java
k6/h0.java
m/b.java
k6/z5.java
g6/i0.java
k6/q3.java
s6/c.java
xa/h.java
j/s0.java
x5/e0.java
v6/b0.java
w6/b.java
b/b.java
g6/z0.java
g6/f0.java
g6/d4.java
v6/e.java
m3/k.java
a7/a.java
x5/x.java
ya/d.java
i5/l.java
r2/c0.java
k6/f2.java
j2/g.java
x5/m.java
u8/v.java
x7/a.java
i3/a.java
p7/c.java
h3/b0.java
x5/b.java
r2/t.java
w6/d.java
v6/e0.java
w1/q.java
m3/j.java
v6/q.java
o7/b.java
j/h0.java
g2/e.java
t5/a.java
h/c.java
y7/f.java
s3/a.java
r2/j.java
r2/v.java
t6/c.java
j2/k.java
x5/t.java
v6/a0.java
m5/a.java
i2/i.java
j2/e.java
v6/g0.java
m3/l.java
q3/c.java
v6/y.java
t5/b.java
f/g.java
m3/o.java
u5/p.java
j/g.java
u5/d.java
r3/b.java
g6/t3.java
g2/d.java
a6/i.java
q6/h.java
j/s.java
v6/m.java
u5/g.java
v6/j.java
m2/e.java
r2/a.java
v6/l.java
r6/a.java
ha/f0.java
i2/f.java
v6/x.java
v6/i0.java
g6/c4.java
u6/c.java
j/a0.java
m6/d.java
m2/d.java
c3/a.java
m3/q.java
k6/s5.java
j/i0.java
j9/b.java
v2/b.java
z6/a.java
x7/d.java
b7/b.java
j/f.java
j2/d.java
j6/a.java
w6/g.java
v6/k.java
x5/d.java
v6/n.java
n8/b.java
r2/b.java
g6/y3.java
g2/n.java
f5/b.java
v6/w.java
g6/m1.java
q6/a.java
k6/b.java
v6/o.java
j/e.java
j/c0.java
u3/a.java
k6/f6.java
u5/f.java
j2/f.java
c7/c.java
m7/b.java
m6/a.java
qa/c.java
u5/l.java
c7/d.java
r6/c.java
i2/g.java
j/d0.java
j/p0.java
z5/a.java
g6/x3.java
s6/b.java
y7/j.java
a7/b.java
g6/b4.java
x5/f0.java
fc/a.java
q0/e.java
d6/b.java
Medium
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 p5/m.java
k6/b.java
k6/k.java
p5/p.java
r3/a.java
n5/b.java
k6/l.java
p5/n.java
o2/a.java
o5/k.java
k6/y1.java
p5/l.java
k6/s5.java
p5/o.java
p5/j.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 ba/b.java
i2/g.java
ba/a.java
k6/z5.java
n6/a.java
ca/a.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 io/fournkoner/hdrezka/DownloadService.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 k6/z5.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 xa/h.java
xa/c.java
xa/g.java
xa/d.java
Medium
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 m3/q.java
o7/c.java
Medium
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 o7/b.java
v6/e.java
p7/c.java
u5/p.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 v6/e.java
f/g.java
Medium
CVSS:7.4
Files may contain hardcoded sensitive information like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 d0/b1.java
Pygal Spain: 100 United Kingdom: 100 Iceland: 100 Russian Federation: 100 United States: 1400

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

ES jsoup.org 188.114.97.3
US google.com 142.250.185.142
US img.youtube.com 216.58.212.142
US www.googleadservices.com 172.217.18.98
US goo.gle 67.199.248.13
US firebase-settings.crashlytics.com 142.250.185.131
US www.apache.org 151.101.2.132
US youtu.be 142.250.186.174
RU hdrzk.org 45.10.217.101
US www.youtube.com 142.250.185.110
US pagead2.googlesyndication.com 172.217.18.2
US issuetracker.google.com 142.250.185.142
US goo.gl 142.250.74.206
schemas.android.com
GB t.me 149.154.167.99
ns.adobe.com
US www.google.com 216.58.212.164
US app-measurement.com 142.250.185.110
US firebase.google.com 142.250.186.142
IS rezka.ag 82.221.104.145

URL analysis

Information computed with MobSF.

http://ns.adobe.com/xap/1.0/
Defined in a3/a.java
https://t.me/apphdr
Defined in b9/c.java
https://goo.gle/compose-feedback
Defined in d0/q.java
https://firebase.google.com/support/privacy/init-options.
Defined in m7/b.java
https://firebase.google.com/support/guides/disable-analytics
Defined in k6/w1.java
https://app-measurement.com/a
Defined in k6/s1.java
www.google.com
https://www.google.com
Defined in k6/g4.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
Defined in k6/x3.java
https://goo.gl/NAOOOI.
https://goo.gl/NAOOOI
Defined in k6/z5.java
https://goo.gl/NAOOOI.
https://goo.gl/NAOOOI
Defined in k6/z5.java
https://google.com/search?
Defined in k6/d4.java
https://pagead2.googlesyndication.com/pagead/gen_204?id=gmob-apps
Defined in t5/b.java
https://hdrzk.org/
https://rezka.ag/
Defined in h9/b.java
https://hdrzk.org/
https://rezka.ag/
Defined in h9/b.java
https://app-measurement.com/a
Defined in g6/e9.java
https://youtu.be/
https://img.youtube.com/vi/
Defined in c8/d.java
https://youtu.be/
https://img.youtube.com/vi/
Defined in c8/d.java
https://hdrzk.org/
Defined in b8/a.java
https://firebase-settings.crashlytics.com/spi/v2/platforms/android/gmp/%s/settings
Defined in q6/a.java
https://jsoup.org/
Defined in g9/h.java
https://www.apache.org/licenses/LICENSE-2.0
Defined in g9/a.java
https://www.youtube.com/embed/
https://youtu.be/
Defined in y7/e.java
https://www.youtube.com/embed/
https://youtu.be/
Defined in y7/e.java
https://issuetracker.google.com/issues/new?component=413106
Defined in h3/j1.java
https://issuetracker.google.com/issues/new?component=413106
Defined in h3/k1.java
https://issuetracker.google.com/issues/new?component=413106
Defined in h3/b0.java
https://issuetracker.google.com/issues/new?component=413106
Defined in h3/r0.java
http://schemas.android.com/apk/res/android
Defined in i2/i.java

Permissions analysis

Information computed with MobSF.

High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.MANAGE_EXTERNAL_STORAGE Allows an application a broad access to external storage in scoped storage
Allows an application a broad access to external storage in scoped storage. Intended to be used by few apps that need to manage files on behalf of the users.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
com.google.android.gms.permission.AD_ID Unknown permission
Unknown permission from android reference
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Unknown permission
Unknown permission from android reference

Tracking analysis

Information computed with Exodus-core.

Google CrashLytics https://reports.exodus-privacy.eu.org/fr/trackers/27
Google Firebase Analytics https://reports.exodus-privacy.eu.org/fr/trackers/49

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Load external class
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Method reflection
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Load class from given class name
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get absolute path of the file and store in string
Confidence:
100%
Create a socket connection to the proxy address
Confidence:
100%
Get calendar information
Confidence:
100%
Create a secure socket connection to the proxy address
Confidence:
100%
Method reflection
Confidence:
100%
Read file into a stream and put it into a JSON object
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Connect to a URL and set request method
Confidence:
80%
Check if the network is connected
Confidence:
80%
Create a socket connection to the given host address
Confidence:
80%
Check the active network type
Confidence:
80%
Monitor data identified by a given content URI changes(SMS, MMS, etc.)
Confidence:
80%
Create a secure socket connection to the given host address
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Open a file from given absolute path of the file
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Android notifications
       g2/n.java
Base64 decode
       o2/a.java
o7/b.java
g6/v1.java
y6/a.java
i2/d.java
Base64 encode
       o7/b.java
m6/d.java
o5/d.java
n5/b.java
h5/p.java
n2/e.java
p5/n.java
h7/e.java
m7/f.java
Certificate handling
       xa/h.java
ua/h.java
pa/v.java
pa/a.java
xa/d.java
ta/g.java
ya/l.java
Get installed applications
       u2/i.java
k6/k4.java
Get sim provider details
       f5/b.java
Get system service
       q6/a.java
j/q0.java
v6/o.java
k6/l5.java
w1/l.java
v6/i0.java
q0/a.java
j/n.java
o5/d.java
k6/s5.java
k6/k2.java
g2/f.java
j/p0.java
o5/f.java
v6/y.java
x7/a.java
j/f.java
g2/g.java
r2/t.java
g2/n.java
f5/b.java
v2/c.java
k6/x3.java
h2/a.java
a6/i.java
fc/a.java
e2/u.java
m2/f.java
Http connection
       t5/b.java
b/b.java
k6/k4.java
p7/c.java
m7/b.java
Https connection
       z6/a.java
Inter process communication
       u5/u.java
b9/c.java
m3/e.java
g2/l.java
k6/l5.java
x5/l.java
x5/w.java
splitties/permissions/internal/PermissionRequestFallbackActivity.java
c6/a.java
k6/u2.java
m6/d.java
x5/e0.java
u2/i.java
i/a.java
h9/c.java
u5/v.java
d/b.java
k6/s5.java
p8/m0.java
x5/x.java
x5/v.java
u5/b.java
c2/k.java
w1/k.java
x5/m.java
x7/a.java
f6/a.java
k6/d5.java
a/a.java
k6/m2.java
x5/d.java
u5/h.java
x5/h0.java
g2/n.java
k6/y4.java
g2/e.java
h2/a.java
t5/a.java
u5/q.java
g6/l0.java
g6/b0.java
c6/b.java
d/c.java
d6/f.java
g6/z.java
u5/r.java
i/e.java
m3/h.java
e6/c.java
x5/o.java
w1/l.java
k6/k4.java
x5/t.java
c6/c.java
g6/n0.java
k6/g4.java
io/fournkoner/hdrezka/DownloadService.java
x5/n.java
p8/c.java
k6/c5.java
d6/g.java
m2/a.java
g6/k0.java
d/a.java
z5/a.java
g6/q0.java
m3/l.java
v6/y.java
g2/j.java
e6/a.java
k6/x4.java
x5/c0.java
k6/t1.java
u5/p.java
h9/m.java
d/d.java
y5/b.java
x5/i0.java
u5/a.java
i/c.java
m3/i.java
g2/a.java
g6/t0.java
Java reflection
       g6/e7.java
g6/h8.java
yb/v.java
j2/h.java
xa/g.java
xa/b.java
y9/z.java
cc/a.java
bb/k.java
j/a0.java
xa/h.java
j/s0.java
m6/d.java
u2/i.java
k6/l0.java
g6/f0.java
g6/i7.java
ia/b.java
k6/s5.java
i5/l.java
r2/c0.java
j2/g.java
yb/a0.java
x7/a.java
ya/f.java
g6/u5.java
j2/d.java
v9/a.java
k6/f.java
yb/k.java
r2/t.java
yb/d0.java
j/w.java
t9/a.java
g2/e.java
r2/e.java
g6/y6.java
c6/b.java
t3/a.java
h/c.java
yb/m.java
v6/o.java
g6/u6.java
g6/f8.java
j/c0.java
r2/v.java
u3/a.java
y9/e.java
ma/c.java
ha/y0.java
j2/f.java
ma/u.java
xa/e.java
yb/x.java
w3/a.java
k6/h4.java
j2/e.java
xa/d.java
g6/f7.java
s9/f.java
j/p0.java
w3/b.java
yb/z.java
t9/b.java
xa/c.java
g6/i8.java
ya/h.java
yb/u.java
g6/o7.java
z2/b.java
g6/a6.java
u9/a.java
g2/d.java
j/s.java
i/c.java
g6/p5.java
s9/a.java
Load and manipulate dex files
       d6/c.java
Local file i/o operations
       q7/a.java
w8/c.java
p8/d.java
j2/k.java
k6/k4.java
ec/d.java
m4/j.java
c7/c.java
k6/q2.java
b8/a.java
io/fournkoner/hdrezka/HDRezkaApp.java
k6/p2.java
k6/h4.java
w8/b.java
v6/e.java
m3/q.java
k6/n2.java
k6/s2.java
c2/e.java
h4/d.java
x7/d.java
k6/r2.java
k7/i.java
ec/e.java
k6/y4.java
k6/o2.java
j9/a.java
o7/b.java
r3/b.java
p8/e.java
k6/b2.java
m4/c.java
k6/m.java
Message digest
       k6/u5.java
k6/y4.java
bb/f0.java
o7/b.java
k6/a5.java
v6/e.java
k6/z5.java
p7/c.java
bb/h.java
u5/p.java
Query database of sms, contacts etc
       j/g.java
n2/d.java
Sending broadcast
       k6/k4.java
Set or read clipboard data
       j/f.java
Starting activity
       b9/c.java
p8/c.java
h9/c.java
g2/a.java
p8/m0.java
h9/m.java
Starting service
       g2/n.java
z5/a.java
m3/l.java
Tcp socket
       ta/h.java
wa/f.java
va/b.java
za/a.java
ua/h.java
pa/v.java
bb/h0.java
pa/a.java
xa/b.java
ta/c.java
xa/h.java
wa/q.java
qa/c.java
ta/d.java
g6/v1.java
n8/d.java
ta/g.java
Url connection to file/http/https/ftp/jar
       k6/k4.java
p7/c.java

Control flow graphs analysis

Information computed by Pithus.

The application probably gets different information regarding the telephony capabilities

The application probably gets the network connections information

The application probably uses the phone sensors

The application probably makes OS calls

The application probably sends data over HTTP/S

The application probably gets memory and CPU information