0/61
Threat
Analyzed on 2022-06-22T22:35:53.138812
MD5 | 890776f0d0a0fd7079809707ee01305f | |
SHA1 | ccbac77728387f0bbb98db23e08c8027d6db3475 | |
SHA256 | ca30c6d1d7c7625e0850c4114dfea5aab5118d391191d2c074cde1414bbccd8c | |
Size | 7.58MB |
Information computed with APKiD.
/tmp/tmpghgv7mvq!classes.dex | |
yara_issue |
|
anti_vm |
|
anti_debug |
|
compiler |
|
Information computed with ssdeep.
APK file | 196608:Q8S0pAZS222S8gbmWaih1+bl7VAKVdk2eT5nh:Q8BAZV2lNVthm7VNuT5nh | |
Manifest | 384:ZigyotuN4RxcKE6ubO1/W1mSbnBVTmRfqbJtyUvCz8HebXu7l+TtrTFu0HQ1RsQQ:… | |
classes.dex | 24576:EDD4W/uXjgur95btv7xPE1Y+3FcyYYjr56c4zh6WUO6N0g+Ys2m9YRsZoycoDKQ… |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup=true] This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
High | Activity (com.transsion.childmode.ChildAppActivity) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Activity (com.transsion.childmode.SplashActivity) is not Protected. [android:exported=true] An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Content Provider (com.transsion.childmode.model.ChildModeProvider) is not Protected. [android:exported=true] A Content Provider is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. |
High | Service (com.transsion.childmode.service.QsControlService) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_QUICK_SETTINGS_TILE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_JOB_SERVICE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 2009, midnight |
Latest file found in APK | Jan. 1, 2009, midnight |
Certificate valid not before | April 16, 2019, 7:56 a.m. |
First submission on VT | Jan. 24, 2022, 3:52 a.m. |
Last submission on VT | Jan. 24, 2022, 3:52 a.m. |
Upload on Pithus | June 22, 2022, 10:35 p.m. |
Certificate valid not after | Sept. 1, 2046, 7:56 a.m. |
Score | 0/61 |
Report | https://www.virustotal.com/gui/file/ca30c6d1d7c7625e0850c4114dfea5aab5118d391191d2c074cde1414bbccd8c/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application invoke platform-provided DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_RBG_EXT.2.1 FCS_RBG_EXT.2.2 |
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate. Random Bit Generation from Application |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.1 | The application implement the HTTPS protocol that complies with RFC 2818. HTTPS Protocol |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
FPT_TUD_EXT.2.1 | The application shall be distributed using the format of the platform-supported package manager. Integrity for Installation and Update |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
Information computed with MobSF.
https://firebase.google.com/support/privacy/init-options. Defined in d/b/c/q/d.java |
|
https://update.crashlytics.com/spi/v1/platforms/android/apps https://update.crashlytics.com/spi/v1/platforms/android/apps/%s https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps Defined in d/b/c/l/e/s/h.java |
|
https://update.crashlytics.com/spi/v1/platforms/android/apps https://update.crashlytics.com/spi/v1/platforms/android/apps/%s https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps Defined in d/b/c/l/e/s/h.java |
|
https://update.crashlytics.com/spi/v1/platforms/android/apps https://update.crashlytics.com/spi/v1/platforms/android/apps/%s https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps Defined in d/b/c/l/e/s/h.java |
|
https://update.crashlytics.com/spi/v1/platforms/android/apps https://update.crashlytics.com/spi/v1/platforms/android/apps/%s https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps Defined in d/b/c/l/e/s/h.java |
|
www.google.com https://www.google.com https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s https://goo.gl/NAOOOI. https://goo.gl/NAOOOI Defined in d/b/a/b/f/b/u9.java |
|
www.google.com https://www.google.com https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s https://goo.gl/NAOOOI. https://goo.gl/NAOOOI Defined in d/b/a/b/f/b/u9.java |
|
www.google.com https://www.google.com https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s https://goo.gl/NAOOOI. https://goo.gl/NAOOOI Defined in d/b/a/b/f/b/u9.java |
|
www.google.com https://www.google.com https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s https://goo.gl/NAOOOI. https://goo.gl/NAOOOI Defined in d/b/a/b/f/b/u9.java |
|
https://firebase.google.com/support/guides/disable-analytics Defined in d/b/a/b/f/b/o3.java |
|
https://google.com/search? Defined in d/b/a/b/f/b/d7.java |
|
https://app-measurement.com/a Defined in d/b/a/b/f/b/q.java |
|
https://app-measurement.com/a Defined in d/b/a/b/e/c/ea.java |
|
https://goo.gl/J1sWQy Defined in d/b/a/b/e/c/g.java |
|
https://pagead2.googlesyndication.com/pagead/gen_204?id=gmob-apps Defined in d/b/a/b/a/a/b.java |
|
http://schemas.android.com/apk/res/android Defined in b/b/k/p.java |
Information computed with MobSF.
Information computed with Exodus-core.
Google CrashLytics | https://reports.exodus-privacy.eu.org/fr/trackers/27 |
Google Firebase Analytics | https://reports.exodus-privacy.eu.org/fr/trackers/49 |
Information computed with Quark-Engine.
Confidence:
|
Check if the network is connected |
Confidence:
|
Load external class |
Confidence:
|
Create a socket connection to the given host address |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Check the active network type |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Method reflection |
Confidence:
|
Connect to a URL and read data from it |
Confidence:
|
Monitor data identified by a given content URI changes(SMS, MMS, etc.) |
Confidence:
|
Create a secure socket connection to the given host address |
Confidence:
|
Load class from given class name |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Send notification |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Check the current active network type |
Confidence:
|
Create a socket connection to the proxy address |
Confidence:
|
Check the network capabilities |
Confidence:
|
Get last known location of the device |
Confidence:
|
Get calendar information |
Confidence:
|
Create a secure socket connection to the proxy address |
Confidence:
|
Method reflection |
Confidence:
|
Hide the current app's icon |
Confidence:
|
Connect to the remote server through the given URL |
Confidence:
|
Query the name of currently running application |
Confidence:
|
Query data from URI (SMS, CALLLOGS) |
Confidence:
|
Check if the device is in data roaming mode |
Confidence:
|
Read file into a stream and put it into a JSON object |
Confidence:
|
Get the time of current location |
Confidence:
|
Initialize class object dynamically |
Confidence:
|
Read the input stream from given URL |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) via setData |
Confidence:
|
Get location of the device |
Confidence:
|
Get resource file from res/raw directory |
Information computed with MobSF.
Information computed by Pithus.