0/60

Threat

com.snapchat.android

Snapchat

Analyzed on 2021-05-16T09:30:39.276518

44

permissions

17

activities

29

services

16

receivers

173

domains

File sums

MD5 98f57d3d9c9f74b733fdafeefcd58a89
SHA1 cdef6dba7a0ba3da9c13e28eff8aa7b9ab579364
SHA256 d099fe206a40edb55168320351f5eaf58190a52ba2528d83d863a680b1d54acb
Size 31.61MB

APKiD

Information computed with APKiD.

/tmp/tmpd5ackk9u!classes.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.TAGS check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • r8 without marker (suspicious)
/tmp/tmpd5ackk9u!classes2.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • Build.BOARD check
  • network operator name check
compiler
  • unknown (please file detection issue!)
/tmp/tmpd5ackk9u!classes3.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.BOARD check
  • possible Build.SERIAL check
  • Build.TAGS check
  • network operator name check
  • ro.kernel.qemu check
compiler
  • r8 without marker (suspicious)
/tmp/tmpd5ackk9u!classes4.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.MANUFACTURER check
compiler
  • r8 without marker (suspicious)
/tmp/tmpd5ackk9u!classes5.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.MANUFACTURER check
compiler
  • r8 without marker (suspicious)
/tmp/tmpd5ackk9u!classes6.dex
anti_disassembly
  • illegal class name
compiler
  • r8 without marker (suspicious)
/tmp/tmpd5ackk9u!classes7.dex
anti_disassembly
  • illegal class name
anti_vm
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • possible Build.SERIAL check
  • Build.TAGS check
  • SIM operator check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • r8 without marker (suspicious)

SSdeep

Information computed with ssdeep.

APK file 786432:6pF8LL9Cbrr/vSRD0H8nccVC754ORO5HqSC3SFJUEFMQ9L64JLcZJspL8o+:4sBar76lq+ccVCuKO5KpS0QMX
Manifest 768:zShzQt5b9gSTA1SumX/RxcKE6X5/FSbqUQtuOsTm9OrhgLop3c3oGEJ3yntZbGA9:…
classes.dex 49152:JsZ5W1RZsZO3aT5UKDYX7H0HlVkpNQIfJah:JsZ5W1DViIfJah
classes2.dex 98304:MTDFviP2C2UhW3BTgzoSHH5TmXu5bUII/Nr4:QDFviPF6L6H1gN8
classes3.dex 49152:WS3kemlz/+AnhWdY7Gz/hcYkCJ4AuPQnR2nsuxFjsUt5/QQ5fa8NDuhG1gGtWZc…
classes4.dex 49152:R7PSdhFmXV60k+HlLCgi1UZhEUS1BIKy3PsPNGdCcCsp/z1IUc1XoRZ9UxNvKSi…
classes5.dex 98304:cc+lpdPgb3G155lgBxVhx+NJu/XsusJ7NyezbzrDi:cLpWzGplgBFx+NJu/Xsus…
classes6.dex 196608:t862rrhsqEV5Uz0TG/1IlIyykQZPKo4Eb88DP7aWGjG9FxvbYc9r3SJM7:Wnrj…
classes7.dex 196608:yhQA71T4cQlQCPIIP4Nw8i+doZkE+jDzf:ySsTZQ+CPI7w1QBj3

Dexofuzzy

Information computed with Dexofuzzy.

APK file 24576:tIP6sKor43hN17S9j8v4cc2X2TPohOa+f5mQ1BU8T7WYH2xh5BgM3iJDuyTm0g3…
classes.dex 1536:AbswYk03gTOdzkifC4GLV3gvYhKmwo2bo9esUNh7ewkt6QhREZy12+P:8sL1gypT…
classes2.dex 6144:SSTa1w6kA1UdO3BVykgy895l6k3D9cDahGc6zlphoWYutj7p8tO:HWZMdQcE8/lr…
classes3.dex 6144:cbRDriXPI6dgUKiZ3arwg0DSN5gp3KMYXqphDgEniYe8XYyAVLYO/5quRtKh2Ais…
classes4.dex 6144:n0tH8f7miCZ6AuAPqgjaqBlRAqGZ6TydrwaFKBRH39xZA2OBM57USuUsEZ0Vi104…
classes5.dex 6144:Dw90iTXQgFUhFMOT+BzkQcJ+YubipMhuNO7dA32p3vgKVyGTWUjIRSuO7WwSCB+m…
classes6.dex 12288:CpVeSm3YH2OWzygg1K9F53RgkYW3iJZyt:CT7WYH2xh5BgM3iJG
classes7.dex 6144:+pyFaa7YgVaUdCPPhfXkOcoatP10OF+z+++Ap+2BRO0bd0uuu7cQ4rrrgvfXYhuO…

APK details

Information computed with AndroGuard and Pithus.

Package com.snapchat.android
App name Snapchat
Version name 11.24.0.34
Version code 2169
SDK 19 - 29
UAID db8f464fe6ac8177e56bd255987170bd80d4af08
Signature Signature V1 Signature V2 Signature V3
Frosting Frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x6dff800d: Source stamp V2 X509 cert
  • 0x2146444e: Google metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 885b1441b8fed97494456baaa7718ff2
SHA1 49f6badb81d89a9e38d65de76f09355071bd67e7
SHA256 2f1caafca1ed30d0b4e38863eefabea0e815711fa4cf79b822519a8259d95a58
Issuer Common Name: Daniel Smith, Organizational Unit: Captain Captcha, Organization: Snapchat, Locality: Los Angeles, State/Province: California, Country: 01
Not before 2012-09-11T10:06:20+00:00
Not after 2040-01-28T10:06:20+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. res/raw/pubcert_dev
res/raw/pubcert_prod
res/raw/verif_pubcert_dev
res/raw/verif_pubcert_prod
res/raw/verif_pubcert_prod_newport
stamp-cert-sha256

Manifest analysis

Information computed with MobSF.

Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
High Launch Mode of Activity (com.snap.mushroom.MainActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Activity (com.snap.mushroom.MainActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity-Alias (com.snapchat.android.LandingPageActivity) is not Protected.An intent-filter exists.
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity-Alias is explicitly exported.
High Service (com.snap.shortcuts.list.SnapChooserTargetService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_CHOOSER_TARGET_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Activity (com.snap.shake2report.ui.CrashViewerActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Launch Mode of Activity (com.snap.identity.loginsignup.ui.LoginSignupActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(com.snap.talk.lockscreen.LockScreenActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Service (com.firebase.jobdispatcher.GooglePlayReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.gms.permission.BIND_NETWORK_TASK_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.google.firebase.messaging.FirebaseMessagingService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.google.firebase.iid.FirebaseInstanceIdService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Launch Mode of Activity (com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity) is not standard.
An Activity should not be having the launch mode attribute set to "singleTask/singleInstance" as it becomes root Activity and it is possible for other applications to read the contents of the calling Intent. So it is required to use the "standard" launch mode attribute when sensitive information is included in an Intent.
High Service (com.google.android.play.core.assetpacks.AssetPackExtractionService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.

Browsable activities

Information computed with MobSF.

com.snap.mushroom.MainActivity

Hosts: creativekit snapchat.com www.snapchat.com link.snapchat.com snapchat.onelink.me click.snapchat.com story.snapchat.com map.snapchat.com lens.snapchat.com preview camera

Schemes: snapchat:// http:// https://

Mime types: */* image/* video/mp4 text/plain snapvideo/*

Main Activity

Information computed with AndroGuard.

['com.snap.mushroom.MainActivity', 'com.jakewharton.processphoenix.ProcessPhoenix', 'com.snap.unstuffing.lib.DataMigrationActivity', 'com.snap.shake2report.ui.Shake2ReportActivity', 'com.snap.shake2report.ui.CrashViewerActivity', 'com.snap.identity.loginsignup.ui.LoginSignupActivity', 'com.snap.talk.lockscreen.LockScreenActivity', 'com.snap.identity.ui.legal.LegalAgreementActivity', 'com.google.android.gms.common.api.GoogleApiActivity', 'com.google.android.gms.ads.AdActivity', 'com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity', 'com.google.android.play.core.common.PlayCoreDialogWrapperActivity', 'com.braintreepayments.api.AndroidPayActivity', 'com.braintreepayments.api.GooglePaymentActivity', 'com.braintreepayments.api.threedsecure.ThreeDSecureWebViewActivity', 'com.android.billingclient.api.ProxyBillingActivity', 'com.google.ar.core.InstallActivity']

Activities

Information computed with AndroGuard.

com.snap.mushroom.MainActivity
com.jakewharton.processphoenix.ProcessPhoenix
com.snap.unstuffing.lib.DataMigrationActivity
com.snap.shake2report.ui.Shake2ReportActivity
com.snap.shake2report.ui.CrashViewerActivity
com.snap.identity.loginsignup.ui.LoginSignupActivity
com.snap.talk.lockscreen.LockScreenActivity
com.snap.identity.ui.legal.LegalAgreementActivity
com.google.android.gms.common.api.GoogleApiActivity
com.google.android.gms.ads.AdActivity
com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity
com.google.android.play.core.common.PlayCoreDialogWrapperActivity
com.braintreepayments.api.AndroidPayActivity
com.braintreepayments.api.GooglePaymentActivity
com.braintreepayments.api.threedsecure.ThreeDSecureWebViewActivity
com.android.billingclient.api.ProxyBillingActivity
com.google.ar.core.InstallActivity

Receivers

Information computed with AndroGuard.

com.snap.ads.core.lib.adformat.reminders.AdReminderReceiver
com.snap.notification.service.LoginNotificationReceiver
com.snap.identity.loginsignup.RegistrationReengagementNotificationMushroomReceiver
com.snap.memories.lib.media.ExternalExportBroadcastReceiver
com.snap.identity.service.ForcedLogoutBroadcastReceiver
com.snap.sharing.ShareSheetBroadcastReceiver
com.snap.media.export.ExportStatusBroadcastReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver

Services

Information computed with AndroGuard.

com.snap.core.durablejob.DurableJobService
com.snap.mushroom.startup.BackgroundService
com.snap.messaging.talk.BackgroundCallService
com.snap.stuffing.lib.StateTrackingService
com.snap.shortcuts.list.SnapChooserTargetService
com.snap.notification.service.RegistrationIntentService
com.snap.notification.service.ClearNotificationIntentService
com.snap.shake2report.controller.screenshot.CaptureScreenService
com.snap.identity.loginsignup.RegistrationReengagementNotificationService
com.mapbox.services.android.telemetry.service.TelemetryService
com.snapchat.messaging.chat.sccp.service.SecureChatServiceImpl
com.snap.identity.service.ForcedLogoutService
com.snap.foregroundservice.core.SnapForegroundService
com.snap.core.durablejob.schedulers.direct.FirebasePeriodicWakeUpService
androidx.work.impl.background.systemjob.SystemJobService
com.snap.spectacles.base.service.SpectaclesService
com.snap.media.export.MediaExportService
com.snap.ms.notification.service.SnapNotificationMessageService
com.snap.ms.notification.service.SnapInstanceIdChangeService
com.firebase.jobdispatcher.GooglePlayReceiver
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.components.ComponentDiscoveryService
com.google.firebase.iid.FirebaseInstanceIdService
com.mapbox.android.telemetry.errors.ErrorReporterJobIntentService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.foreground.SystemForegroundService
androidx.room.MultiInstanceInvalidationService
com.google.android.play.core.assetpacks.AssetPackExtractionService
com.braintreepayments.api.internal.AnalyticsIntentService

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['microphone', 'location', 'network connectivity', 'bluetooth', 'camera'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['address book', 'call lists'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(1) The application perform encryption/decryption not in accordance with FCS_COP.1.1(1), AES-ECB mode is being used.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(3) The application perform cryptographic signature services (generation and verification) in accordance with a specified cryptographic algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Operation - Signing
FCS_COP.1.1(4) The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] .
Cryptographic Operation - Keyed-Hash Message Authentication
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 defpackage/JD6.java
defpackage/YUn.java
defpackage/C9009Nv7.java
defpackage/QY5.java
defpackage/AbstractC5852Iz0.java
defpackage/C50659vSf.java
defpackage/C30845iqj.java
defpackage/RunnableC31913jX1.java
defpackage/C36104mC1.java
defpackage/ZBf.java
defpackage/C21293cm.java
defpackage/AGc.java
defpackage/AbstractC48575u83.java
defpackage/AbstractC13379Uo2.java
defpackage/C22750dhd.java
High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 defpackage/AbstractC11679Ry2.java
defpackage/C50949ve1.java
defpackage/C57385zjn.java
defpackage/C15853Yj1.java
defpackage/AbstractC29741i92.java
defpackage/C32377jp4.java
defpackage/AbstractC26902gL6.java
defpackage/C47351tLn.java
defpackage/AbstractC42593qK2.java
defpackage/C25878fgn.java
defpackage/Q52.java
defpackage/AbstractC13154Uf2.java
defpackage/C19595bh2.java
defpackage/C10700Qkn.java
defpackage/B19.java
com/snapchat/research/previewcv/FloatVec.java
defpackage/C55995yr3.java
defpackage/C23108dvh.java
defpackage/C44188rL2.java
defpackage/C5401Ih.java
defpackage/C4729Hg2.java
defpackage/AbstractC9279Og2.java
defpackage/BinderC6428Jw1.java
defpackage/XIn.java
defpackage/C3353Fd1.java
defpackage/AbstractC44209rLn.java
defpackage/C35594ls2.java
defpackage/V5d.java
defpackage/C23455e94.java
defpackage/GY7.java
defpackage/GOk.java
defpackage/AbstractC54144xg2.java
defpackage/C6305Jr3.java
defpackage/AbstractC44719rg2.java
defpackage/AbstractC1505Ch2.java
defpackage/BJn.java
defpackage/AbstractC45744sKc.java
defpackage/C34963lT7.java
defpackage/C29104hk1.java
defpackage/C7475Lln.java
defpackage/C46963t6e.java
defpackage/View$OnClickListenerC13632Uy5.java
defpackage/C33.java
defpackage/C20553cIk.java
defpackage/C55489yX7.java
defpackage/R38.java
defpackage/B33.java
defpackage/C37873nJn.java
defpackage/AbstractHandlerC50915vcj.java
defpackage/C3918Fzg.java
defpackage/C20365cB7.java
defpackage/U38.java
defpackage/NO2.java
com/snap/perception/voicescan/view/DefaultVoiceScanWaveView.java
defpackage/AbstractC14454Wf2.java
defpackage/AbstractC20560cJ2.java
defpackage/HandlerC5946Jcj.java
defpackage/AbstractC51868wE3.java
defpackage/E08.java
defpackage/C53634xLn.java
defpackage/D08.java
defpackage/F08.java
defpackage/AbstractC34729lJn.java
defpackage/C45570sDd.java
defpackage/C41046pL2.java
defpackage/C10222Prk.java
com/snapchat/research/previewcv/vectoruc.java
defpackage/Y5d.java
defpackage/C45386s68.java
defpackage/C49458uh2.java
defpackage/EJn.java
defpackage/CJc.java
defpackage/C45780sLn.java
defpackage/AbstractC22153dJn.java
defpackage/VX7.java
defpackage/AbstractC17040a48.java
defpackage/HandlerC54057xcj.java
defpackage/FY7.java
defpackage/F38.java
defpackage/C44869rln.java
defpackage/C30594ign.java
com/snapchat/research/previewcv/StringVec.java
com/snap/camera/view/CameraLongPressParticleView.java
defpackage/LYf.java
defpackage/C17436aJn.java
defpackage/C55155yJn.java
defpackage/C5404Ih2.java
defpackage/C13179Ug2.java
defpackage/C30058iLi.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 defpackage/EnumC55282yP0.java
defpackage/YUn.java
defpackage/C36046m9j.java
defpackage/AbstractC41117pNn.java
com/addlive/BuildConfig.java
com/snapchat/android/BuildConfig.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 defpackage/AbstractC11679Ry2.java
defpackage/A2m.java
defpackage/FR0.java
defpackage/C49149uV0.java
defpackage/C27683gq1.java
defpackage/C4928Ho1.java
defpackage/AbstractC37015mm1.java
defpackage/Ako.java
defpackage/HQ2.java
defpackage/C15978Yo1.java
defpackage/SU0.java
defpackage/FQ2.java
defpackage/GQ2.java
defpackage/AbstractC13096Ucj.java
defpackage/BinderC52826wq1.java
defpackage/PP2.java
defpackage/OC2.java
defpackage/C36603mW0.java
defpackage/WU0.java
defpackage/RunnableC7553Lp1.java
defpackage/C18201ao1.java
defpackage/LX0.java
defpackage/KX0.java
defpackage/AbstractC5354If2.java
com/firebase/jobdispatcher/JobService.java
defpackage/RQ2.java
com/coremedia/iso/boxes/sampleentry/AudioSampleEntry.java
defpackage/AbstractC27046gR0.java
defpackage/XU0.java
defpackage/ServiceConnectionC56296z30.java
defpackage/NV0.java
defpackage/AbstractC28691hTn.java
defpackage/AbstractC52290wV0.java
defpackage/QQ0.java
defpackage/C4328Gq1.java
defpackage/LR0.java
defpackage/OW0.java
defpackage/ServiceConnectionC42743qQ2.java
defpackage/C41194pR0.java
defpackage/C55482yX0.java
defpackage/HandlerC2329Do1.java
defpackage/GT0.java
defpackage/C52240wT0.java
defpackage/C22330dR0.java
defpackage/C31764jR2.java
defpackage/C45882sQ0.java
defpackage/C47503tS0.java
com/bumptech/glide/GeneratedAppGlideModuleImpl.java
defpackage/C19236bT0.java
defpackage/H41.java
defpackage/I41.java
defpackage/AbstractC37216mu2.java
com/snap/composer/exceptions/GlobalExceptionHandler.java
defpackage/PP0.java
defpackage/GS0.java
defpackage/EX0.java
defpackage/C33795kj2.java
defpackage/US0.java
defpackage/DX0.java
defpackage/AbstractC42864qUn.java
defpackage/AbstractC51255vq1.java
defpackage/XW0.java
defpackage/SQ2.java
defpackage/ES0.java
defpackage/VW0.java
defpackage/WR0.java
defpackage/LB2.java
defpackage/AbstractC40284or1.java
defpackage/AbstractC53738xQ2.java
defpackage/QQ2.java
defpackage/C24715ex2.java
defpackage/C47453tQ0.java
com/googlecode/mp4parser/AbstractBox.java
defpackage/IQ2.java
defpackage/NW0.java
defpackage/C42941qY0.java
defpackage/C36553mU0.java
defpackage/C39599oQ2.java
defpackage/AbstractC57639zu1.java
defpackage/C27658gp1.java
Medium
CVSS:8.8
Insecure WebView Implementation. Execution of user controlled code in WebView is a critical Security Hole.
MASVS: MSTG-PLATFORM-7
CWE-749 Exposed Dangerous Method or Function
M1: Improper Platform Usage
Files:
 defpackage/C14593Wkg.java
defpackage/EF1.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 defpackage/CallableC56834zO6.java
com/mapbox/mapboxsdk/storage/FileSource.java
defpackage/H30.java
defpackage/CallableC50550vO6.java
defpackage/YG4.java
defpackage/C2355Dp2.java
defpackage/AbstractC2510Dv7.java
defpackage/C20815cT7.java
defpackage/C38737ns1.java
defpackage/CallableC3104Et2.java
defpackage/C44259rNn.java
defpackage/C42689qNn.java
defpackage/CallableC15451Xt.java
defpackage/JD2.java
defpackage/DI6.java
defpackage/ZV7.java
defpackage/RunnableC35049lWi.java
defpackage/XV7.java
defpackage/OA2.java
defpackage/AbstractC39545oNn.java
defpackage/AbstractC20860cV2.java
High
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 defpackage/C29878iEd.java
defpackage/C33585kb0.java
defpackage/VV1.java
defpackage/EM3.java
defpackage/S26.java
defpackage/AbstractC5852Iz0.java
defpackage/C44834rkd.java
defpackage/FM3.java
defpackage/C28786hXi.java
defpackage/C31888jW1.java
defpackage/C45832sO0.java
defpackage/C15203Xj1.java
High
CVSS:7.4
Files may contain hardcoded sensitive informations like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/snap/cognac/network/PuppyHttpInterface.java
com/snapchat/client/mdp_common/RequestKey.java
defpackage/C25499fS0.java
defpackage/C51520w0f.java
defpackage/C42063pz8.java
defpackage/C15516Xve.java
defpackage/C44818rjn.java
defpackage/C40681p6g.java
com/looksery/sdk/listener/AnalyticsListener.java
defpackage/C17924ad8.java
com/snapchat/android/BuildConfig.java
defpackage/C27757gt0.java
defpackage/C12985Ty8.java
defpackage/C3069Erh.java
defpackage/CZ8.java
defpackage/C26714gDi.java
com/looksery/sdk/domain/Category.java
com/snap/framework/developer/BuildConfigInfo.java
defpackage/X3k.java
defpackage/C52507wde.java
defpackage/C44244rN8.java
defpackage/C18904bFi.java
com/looksery/sdk/domain/ClientInterfaceData.java
com/snap/cognac/network/TokenShopHttpInterface.java
Low
CVSS:0
This App copies data to clipboard. Sensitive data should not be copied to clipboard as other applications can access it.
MASVS: MSTG-STORAGE-10
Files:
 defpackage/View$OnTouchListenerC42044pye.java
defpackage/WQ.java
defpackage/FZi.java
defpackage/C10161Pp9.java
defpackage/View$OnClickListenerC12176Ss.java
defpackage/C27095gT.java
com/snap/shake2report/ui/CrashViewerActivity.java
defpackage/K3l.java
defpackage/C44178rKh.java
defpackage/C55273yOg.java
defpackage/CX.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 defpackage/C51739w90.java
defpackage/C15971Ynj.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 defpackage/YUn.java
defpackage/FNn.java
defpackage/C4899Hmm.java
defpackage/EOn.java
defpackage/EO0.java
High
CVSS:5.4
Remote WebView debugging is enabled.
MASVS: MSTG-RESILIENCE-2
CWE-919 - Weaknesses in Mobile Applications
M1: Improper Platform Usage
Files:
 defpackage/Y9l.java
defpackage/C39590oPi.java
defpackage/C3607Fn5.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 defpackage/AbstractC41117pNn.java
defpackage/DC2.java
defpackage/AbstractC5852Iz0.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 defpackage/C30292iV2.java
defpackage/EY7.java
Pygal Austria: 600 Australia: 200 Germany: 1700 Finland: 200 United Kingdom: 100 Ireland: 300 United States: 13200

Map computed by Pithus.

Network analysis

Information computed with MobSF.

High Base config is insecurely configured to permit clear text traffic to all domains.
Scope: ['*']
Medium Base config is configured to trust system certificates.
Scope: ['*']

Domains analysis

Information computed with MobSF.

DE api-m.paypal.com 104.109.75.30
US gcp.api.snapchat.com 35.190.43.134
US support.snapchat.com 216.239.32.21
US adserver.staging.snapads.com 130.211.47.238
US csi.gstatic.com 216.239.32.3
IE www.netflix.com 54.73.148.110
AT static.aifactory.team 99.86.242.127
play.google.comhttps
www.feelinsonice.com
DE topic-sticker-vending.snap-dev.net 143.204.209.62
DE dcgro32pny54o.cloudfront.net 13.32.6.106
US adserver.shadow.snapads.com 35.186.216.157
US pro-insights.snapchat.com 34.193.58.17
US placekitten.com 172.67.180.80
DE premium-stories.snapchat.com 143.204.209.81
US accounts.snapchat.com 172.217.16.147
US cognac-prod.appspot.com 142.250.184.212
US gtq.sct.sc-prod.net 35.190.22.22
US www.google.com 142.250.184.228
US magic.sc-corp.net 35.190.16.123
US aw.sc-cdn.net 34.98.105.85
US storage.googleapis.com 142.250.74.208
US www.googleapis.com 142.250.186.138
US ase.adserver.snapads.com 35.186.200.183
search-staging.sc-jpl.com
US github.com 140.82.121.3
AT images.bitmoji.com 99.86.242.14
US gtq.sct.snap-dev.net 35.186.251.122
AT apps.mapbox.com 99.86.242.20
DE api.braintreegateway.com 3.122.176.248
US puppy.snapchat.com 172.217.16.147
US gtq-test.sct.snap-dev.net 35.186.251.122
US pro-accounts.snapchat.com 54.172.15.117
US scm.sc-jpl.com 35.190.55.155
US youtube-nocookie.com 142.250.185.174
US pro-stories-dev.snap-dev.net 23.23.239.106
DE snap.turbovote.org 143.204.209.69
US jaguar-prod.snapchat.com 172.217.16.147
US adserver.snapads.com 130.211.6.16
US mvm.snapchat.com 216.239.36.126
US local.sc-jpl.com 130.211.39.203
DE api.sandbox.braintreegateway.com 35.158.212.12
US pro-stories.snap-dev.net 52.207.0.47
US googleads.g.doubleclick.net 172.217.23.98
GB www.childline.org.uk 85.133.62.1
US pagead2.googlesyndication.com 142.250.185.98
US sc-review-tool.appspot.com 142.250.186.180
US devms.sc-jpl-internal.com 130.211.14.207
FI xerces.apache.org 95.216.26.30
US www.youtube-nocookie.com 142.250.185.110
US www.snap.com 142.250.184.243
US www.crisistextline.org 35.243.138.147
US staging-gcp.api.snapchat.com 34.102.159.121
US staging-us-central1-gcp.api.snapchat.com 34.102.159.121
US developers.google.com 142.250.74.206
US api-c.shazam.com 34.120.233.61
US investor.maxar.com 162.159.130.11
US aomedia.org 185.199.111.153
US s.sc-jpl-internal.com 130.211.14.207
US tr.snapchat.com 35.186.226.184
US snapchat.com 216.239.32.21
US youtu.be 142.250.186.110
DE developer.apple.com 17.253.57.203
jaguar-dev.snapchat.com
US api-dot-snap-connect-staging.appspot.com 142.250.186.180
US loca.sc-jpl.com 54.243.131.89
US youtube.com 142.250.186.78
US ns.useplus.org 54.83.4.77
US loc-staging.sc-jpl.com 35.190.89.110
US ms-staging.sc-jpl.com 130.211.23.38
US cobra.snap-dev.net 35.190.16.123
US pro-insights-dev.snap-dev.net 35.168.130.72
US us-east1-aws-api.sc-gw-dev.snapchat.com 52.20.112.45
US gcs.sc-cdn.net 216.239.36.126
FI apache.org 95.216.26.30
US jira.sc-corp.net 35.190.16.123
DE cf-st.sc-cdn.net 13.32.6.120
US www.spectacles.com 142.250.184.243
US play.google.com 142.250.186.46
US s3.amazonaws.com 52.217.33.46
AT login.playcanvas.com 99.86.242.36
US suicidepreventionlifeline.org 104.26.5.80
US c.sandbox.paypal.com 173.0.82.104
US grafana-dashboard.sc-corp.net 35.190.16.123
US ms.sc-jpl.com 35.186.202.220
US pro-insights.snap-dev.net 52.70.77.236
AT playcanvas.com 99.86.242.39
US www.w3.org 128.30.52.100
US assets.staging.braintreepayments.com 184.105.254.110
US usc.adserver.snapads.com 130.211.46.74
US xml.org 104.239.240.11
US support.spectacles.com 104.16.51.111
US docs.google.com 142.250.185.238
US app-analytics-v2.snapchat.com