Low Risk

Threat level

cn.imyfone.famiguard.child

麦苗助手

Analyzed on 2022-01-06T14:53:38.522567

53

permissions

34

activities

33

services

22

receivers

5

domains

File sums

MD5 2889d838506f1fd599a95c56e8bc6702
SHA1 d17835112156272942d68f379f1d9b3c28a36bac
SHA256 d4d0f3dac11d0eb647a9fcbb7c71af2e847f8fd0d469b953cfd861e691c53be2
Size 32.63MB

APKiD

Information computed with APKiD.

/tmp/tmp9xagajdb
packer
  • Jiagu
/tmp/tmp9xagajdb!classes.dex
compiler
  • dexlib 2.x

SSdeep

Information computed with ssdeep.

APK file 786432:ch/c2ey3MZgcaNrFNLaQOiLeJR+IawUErZaD:ch/cZy3MZIDpOiLeJR+I0Em
Manifest 768:BLUaoSjKS2yOz3moSsaxc72JOpKYoU+3ksEL6tJsrRDihTjp8RmA5+eEf551tG5N:…
classes.dex 196608:cE14maDGH3Efi2eJS0iqFZBxBDgOSO6zuILnTdQc2yq:cNm8GH3Eq1S0fBxBh1…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 12:VWm3r6Pik154IZFUofyVzODqXEUPbGMo3E:VWm3rYNZGoaVzHEMGMoU
classes.dex 12:VWm3r6Pik154IZFUofyVzODqXEUPbGMo3E:VWm3rYNZGoaVzHEMGMoU

APK details

Information computed with AndroGuard and Pithus.

Package cn.imyfone.famiguard.child
App name 麦苗助手
Version name 3.2.0
Version code 26
SDK 23 - 28
UAID 436aaa6d7e98140471bffda0c4faf465130ed81f
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 494279a0080492ffa665cbaa701a4b88
SHA1 22d7325537fa6da3370691a8d27ea720aa83c3f7
SHA256 234400bf07d05b434ab1db3fdd53c1ff6885b30190faad444f8c6c782035a412
Issuer Common Name: 黄德安, Organizational Unit: 移动研发部, Organization: 麦风科技, Locality: 深圳, State/Province: 广东, Country: CN
Not before 2020-04-28T01:14:15+00:00
Not after 2119-04-05T01:14:15+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. assets/.appkey
assets/ag_sdk_cbg_root.cer
assets/famiguardcn.cer
okhttp3/internal/publicsuffix/NOTICE
Findings Files
Hardcoded Keystore found. assets/grs_sp.bks
assets/hmsincas.bks
assets/hmsrootcas.bks
assets/updatesdkcas.bks

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
High Activity (com.imyfone.children.activity.ShowUploadTaskActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.imyfone.children.activity.BackupExcitationActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.imyfone.children.activity.WrapperExcitationActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.imyfone.children.activity.HomeActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.imyfone.children.activity.permission.PermissionSettingActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.imyfone.children.activity.IdentityCheckActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.imyfone.children.service.MyNotificationListener) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_NOTIFICATION_LISTENER_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.imyfone.children.service.MyAccessibilityService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_ACCESSIBILITY_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.imyfone.children.looptask.TaskReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.imyfone.children.service.MyAdminReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_DEVICE_ADMIN [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Low Activity (com.imyfone.children.ipc.IPCServerActivity) is Protected by a permission.
Permission: imyfone.permission.EXCHANGE_CHILD_DATA
protectionLevel: signature[android:exported=true]
An Activity is found to be exported, but is protected by permission.
Low Service (com.imyfone.children.ipc.IPCServerService) is Protected by a permission.
Permission: imyfone.permission.EXCHANGE_CHILD_DATA
protectionLevel: signature[android:exported=true]
A Service is found to be exported, but is protected by permission.
High Service (com.taobao.accs.ChannelService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.taobao.accs.data.MsgDistributeService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.taobao.accs.EventReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.taobao.accs.ServiceReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (org.android.agoo.accs.AgooService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.umeng.message.UmengIntentService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.umeng.message.XiaomiIntentService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.taobao.agoo.AgooCommondReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.umeng.message.UmengMessageIntentReceiverService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.imyfone.children.utils.MfrMessageActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.imyfone.children.utils.MfrMzMessageReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.huawei.hms.support.api.push.service.HmsMsgService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Low Broadcast Receiver (com.huawei.hms.support.api.push.PushMsgReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: cn.imyfone.famiguard.child.permission.PROCESS_PUSH_MSG
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (com.huawei.hms.support.api.push.PushReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: cn.imyfone.famiguard.child.permission.PROCESS_PUSH_MSG
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Content Provider (com.huawei.hms.support.api.push.PushProvider) is Protected by a permission, but the protection level of the permission should be checked.
Permission: cn.imyfone.famiguard.child.permission.PUSH_PROVIDER
protectionLevel: signatureOrSystem [android:exported=true]
A Content Provider is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Service (com.meizu.cloud.pushsdk.NotificationService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.meizu.cloud.pushsdk.MzPushSystemReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.meizu.flyme.permission.PUSH [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.heytap.msp.push.service.CompatibleDataMessageCallbackService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.coloros.mcs.permission.SEND_MCS_MESSAGE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.heytap.msp.push.service.DataMessageCallbackService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.heytap.mcs.permission.SEND_PUSH_MESSAGE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.vivo.push.sdk.service.CommandClientService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (org.android.agoo.vivo.PushMessageReceiverImpl) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Service (com.xiaomi.mipush.sdk.PushMessageHandler) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.xiaomi.push.service.receivers.NetworkStatusReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (org.android.agoo.xiaomi.MiPushBroadcastReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.

Browsable activities

Information computed with MobSF.

com.imyfone.children.utils.MfrMessageActivity

Hosts: cn.imyfone.famiguard.child

Schemes: agoo://

Main Activity

Information computed with AndroGuard.

com.imyfone.famiguard.guide.SplashActivity

Activities

Information computed with AndroGuard.

com.imyfone.famiguard.guide.SplashActivity
com.imyfone.famiguard.account.AgreementActivity
com.imyfone.children.activity.ShowUploadTaskActivity
com.imyfone.children.activity.BackupExcitationActivity
com.imyfone.children.activity.WrapperExcitationActivity
com.imyfone.children.activity.HomeActivity
com.imyfone.children.activity.BindPermissionNoticeActivity
com.imyfone.children.activity.permission.PermissionSettingActivity
com.imyfone.children.activity.permission.PermissionHelperActivity
com.imyfone.children.activity.permission.PermissionListActivity
com.imyfone.children.activity.KidInfoActivity
com.imyfone.children.activity.KidQRCodeActivity
com.imyfone.children.activity.SyncingAppActivity
com.imyfone.children.activity.KidCompletedActivity
com.imyfone.children.activity.NewsActivity
com.imyfone.children.activity.AboutUsActivity
com.imyfone.children.activity.SettingActivity
com.imyfone.children.activity.WebSiteActivity
com.imyfone.children.activity.IdentityCheckActivity
com.imyfone.children.activity.ShowDatabaseActivity
com.imyfone.children.activity.FindAppActivity
com.imyfone.children.activity.FindAppRecordActivity
com.imyfone.children.activity.InterceptionAppActivity
com.imyfone.children.activity.InterceptionAppActivity2
com.imyfone.children.activity.InterceptionSplitWindowActivity
com.imyfone.children.activity.LockScreenActivity
com.imyfone.children.ipc.IPCServerActivity
com.uuzuche.lib_zxing.activity.CaptureActivity
com.famiguard.screenshot.activity.ScreenCaptureActivity
com.imyfone.children.utils.MfrMessageActivity
com.huawei.updatesdk.service.otaupdate.AppUpdateActivity
com.huawei.updatesdk.support.pm.PackageInstallerActivity
com.huawei.hms.activity.BridgeActivity
com.huawei.hms.activity.EnableServiceActivity

Receivers

Information computed with AndroGuard.

com.imyfone.children.looptask.TaskReceiver
com.imyfone.children.service.MyAdminReceiver
com.taobao.accs.EventReceiver
com.taobao.accs.ServiceReceiver
com.taobao.agoo.AgooCommondReceiver
com.umeng.message.NotificationProxyBroadcastReceiver
com.imyfone.children.utils.MfrMzMessageReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver
com.huawei.hms.support.api.push.PushMsgReceiver
com.huawei.hms.support.api.push.PushReceiver
com.meizu.cloud.pushsdk.MzPushSystemReceiver
org.android.agoo.vivo.PushMessageReceiverImpl
com.xiaomi.push.service.receivers.NetworkStatusReceiver
com.xiaomi.push.service.receivers.PingReceiver
org.android.agoo.xiaomi.MiPushBroadcastReceiver

Services

Information computed with AndroGuard.

com.imyfone.children.service.MainService
com.imyfone.children.service.MyNotificationListener
com.baidu.location.f
com.imyfone.children.service.MyAccessibilityService
com.imyfone.children.service.ChildrenHandlerAppRunService
com.imyfone.children.looptask.SchedulerService
com.imyfone.common.service.FloatViewService
com.imyfone.children.ipc.IPCServerService
com.taobao.accs.ChannelService
com.taobao.accs.data.MsgDistributeService
com.taobao.accs.internal.AccsJobService
com.taobao.accs.ChannelService$KernelService
org.android.agoo.accs.AgooService
com.umeng.message.UmengIntentService
com.umeng.message.XiaomiIntentService
com.umeng.message.UmengMessageIntentReceiverService
com.umeng.message.UmengMessageCallbackHandlerService
com.umeng.message.UmengDownloadResourceService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService
androidx.room.MultiInstanceInvalidationService
com.huawei.hms.support.api.push.service.HmsMsgService
org.android.agoo.huawei.HuaweiPushMessageService
com.meizu.cloud.pushsdk.NotificationService
com.heytap.msp.push.service.CompatibleDataMessageCallbackService
com.heytap.msp.push.service.DataMessageCallbackService
com.vivo.push.sdk.service.CommandClientService
com.xiaomi.push.service.XMPushService
com.xiaomi.push.service.XMJobService
com.xiaomi.mipush.sdk.PushMessageHandler
com.xiaomi.mipush.sdk.MessageHandleService
com.huawei.agconnect.core.ServiceDiscovery

NIAP analysis

Information computed with MobSF.

FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'bluetooth', 'network connectivity', 'camera'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['system logs', 'call lists', 'address book'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FTP_DIT_EXT.1.1 The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product.
Protection of Data in Transit
Pygal China: 100 Germany: 200 Hong Kong: 100 United States: 100

Map computed by Pithus.

Network analysis

Information computed with MobSF.

High Base config is insecurely configured to permit clear text traffic to all domains.
Scope: ['*']

Domains analysis

Information computed with MobSF.

DE appgallery.cloud.huawei.com 80.158.41.227
US play.google.com 142.250.186.142
CN errlog.umeng.com 111.63.137.73
HK errlogos.umeng.com 47.246.110.18
DE store.hispace.hicloud.com 160.44.202.202

URL analysis

Information computed with MobSF.

https://play.google.com/store/apps/details?id=
https://appgallery.cloud.huawei.com
https://store.hispace.hicloud.com/hwmarket/api/
Defined in Android String Resource
https://play.google.com/store/apps/details?id=
https://appgallery.cloud.huawei.com
https://store.hispace.hicloud.com/hwmarket/api/
Defined in Android String Resource
https://play.google.com/store/apps/details?id=
https://appgallery.cloud.huawei.com
https://store.hispace.hicloud.com/hwmarket/api/
Defined in Android String Resource
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi-v7a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi-v7a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi-v7a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi-v7a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/armeabi/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/arm64-v8a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/arm64-v8a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/arm64-v8a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/arm64-v8a/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/x86/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/x86/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/x86/libcrashsdk.so
https://errlog.umeng.com/api/crashsdk/logcollect
https://errlogos.umeng.com/api/crashsdk/logcollect
https://errlog.umeng.com
https://errlogos.umeng.com
Defined in lib/x86/libcrashsdk.so

Permissions analysis

Information computed with MobSF.

High android.permission.ACCESS_COARSE_LOCATION coarse (network-based) location
Access coarse location sources, such as the mobile network database, to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
High android.permission.ACCESS_FINE_LOCATION fine (GPS) location
Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.
High android.permission.REQUEST_INSTALL_PACKAGES Allows an application to request installing packages.
Malicious applications can use this to try and trick users into installing additional malicious packages.
High android.permission.READ_LOGS read sensitive log data
Allows an application to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.SYSTEM_ALERT_WINDOW display system-level alerts
Allows an application to show system-alert windows. Malicious applications can take over the entire screen of the phone.
High android.permission.READ_EXTERNAL_STORAGE read external storage contents
Allows an application to read from external storage.
High android.permission.GET_TASKS retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
High android.permission.ACCESS_BACKGROUND_LOCATION access location in background
Allows an app to access location in the background. If you're requesting this permission, you must also request either
High android.permission.CAMERA take pictures and videos
Allows application to take pictures and videos with the camera. This allows the application to collect images that the camera is seeing at any time.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.PROCESS_OUTGOING_CALLS intercept outgoing calls
Allows application to process outgoing calls and change the number to be dialled. Malicious applications may monitor, redirect or prevent outgoing calls.
High android.permission.READ_CALL_LOG Allows an application to read the user's call log.
High android.permission.WRITE_CALL_LOG Allows an application to write (but not read) the user's call log data.
High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.ANSWER_PHONE_CALLS Allows the app to answer an incoming phone call.
High android.permission.READ_PHONE_NUMBERS Allows read access to the device's phone number(s). This is a subset of the capabilities granted by
High android.permission.READ_CONTACTS read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.CHANGE_WIFI_STATE change Wi-Fi status
Allows an application to connect to and disconnect from Wi-Fi access points and to make changes to configured Wi-Fi networks.
Low android.permission.REORDER_TASKS reorder applications running
Allows an application to move tasks to the foreground and background. Malicious applications can force themselves to the front without your control.
Low android.permission.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS Permission an application must hold in order to use Settings.ACTION_REQUEST_IGNORE_BATTERY_OPTIMIZATIONS.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.ACCESS_WIFI_STATE view Wi-Fi status
Allows an application to view the information about the status of Wi-Fi.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Low android.permission.CHANGE_NETWORK_STATE change network connectivity
Allows applications to change network connectivity state.
Low android.permission.BLUETOOTH create Bluetooth connections
Allows applications to connect to paired bluetooth devices.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground
Low android.permission.REQUEST_DELETE_PACKAGES Allows an application to request deleting packages.
Low android.permission.VIBRATE control vibrator
Allows the application to control the vibrator.
Medium android.permission.BIND_DEVICE_ADMIN interact with device admin
Allows the holder to send intents to a device administrator. Should never be needed for common applications.
Medium android.permission.BIND_ACCESSIBILITY_SERVICE Must be required by an AccessibilityService, to ensure that only the system can bind to it.
Medium android.permission.PACKAGE_USAGE_STATS update component usage statistics
Allows the modification of collected component usage statistics. Not for use by common applications.
Medium android.permission.INSTALL_PACKAGES directly install applications
Allows an application to install new or updated Android packages. Malicious applications can use this to add new applications with arbitrarily powerful permissions.
android.permission.SYSTEM_OVERLAY_WINDOW Unknown permission
Unknown permission from android reference
com.huawei.permission.external_app_settings.USE_COMPONENT Unknown permission
Unknown permission from android reference
android.permission.BROADCAST_PACKAGE_ADDED Unknown permission
Unknown permission from android reference
android.permission.BROADCAST_PACKAGE_CHANGED Unknown permission
Unknown permission from android reference
android.permission.BROADCAST_PACKAGE_INSTALL Unknown permission
Unknown permission from android reference
android.permission.BROADCAST_PACKAGE_REPLACED Unknown permission
Unknown permission from android reference
cn.imyfone.famiguard.child.permission.PROCESS_PUSH_MSG Unknown permission
Unknown permission from android reference
cn.imyfone.famiguard.child.permission.PUSH_PROVIDER Unknown permission
Unknown permission from android reference
com.meizu.flyme.push.permission.RECEIVE Unknown permission
Unknown permission from android reference
cn.imyfone.famiguard.child.push.permission.MESSAGE Unknown permission
Unknown permission from android reference
com.meizu.c2dm.permission.RECEIVE Unknown permission
Unknown permission from android reference
cn.imyfone.famiguard.child.permission.C2D_MESSAGE Unknown permission
Unknown permission from android reference
com.meizu.flyme.permission.PUSH Unknown permission
Unknown permission from android reference
com.coloros.mcs.permission.RECIEVE_MCS_MESSAGE Unknown permission
Unknown permission from android reference
com.heytap.mcs.permission.RECIEVE_MCS_MESSAGE Unknown permission
Unknown permission from android reference
com.vivo.notification.permission.BADGE_ICON Unknown permission
Unknown permission from android reference
cn.imyfone.famiguard.child.permission.MIPUSH_RECEIVE Unknown permission
Unknown permission from android reference
com.huawei.appmarket.service.commondata.permission.GET_COMMON_DATA Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Read file from assets directory
Confidence:
100%
Method reflection
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Open a file from given absolute path of the file
Confidence:
80%
Get absolute path of the file and store in string

Behavior analysis

Information computed with MobSF.

Java reflection
       com/qihoo/util/c.java
com/stub/StubApp.java
Load and manipulate dex files
       com/stub/StubApp.java
Loading native code (shared library)
       com/stub/StubApp.java