Moderate Risk

Threat level

com.deliveryclub.rider

Курьер Delivery Club

Analyzed on 2021-09-09T23:20:55.662684

19

permissions

24

activities

37

services

29

receivers

37

domains

File sums

MD5 2afee4ea49fb6549151b296bda8a3dda
SHA1 2213d440d728d36146ca6b2bc4625cfdec4f502d
SHA256 e0ac785e22c9eaa4d767c59559282a2c176269a6d38f6dac8bc12f28a0be7264
Size 18.51MB

APKiD

Information computed with APKiD.

/tmp/tmp9iorqc94!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • SIM operator check
  • network operator name check
  • device ID check
  • ro.kernel.qemu check
compiler
  • r8
/tmp/tmp9iorqc94!classes2.dex
compiler
  • r8
/tmp/tmp9iorqc94!classes3.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
  • Build.PRODUCT check
  • Build.HARDWARE check
  • possible Build.SERIAL check
  • Build.TAGS check
  • SIM operator check
  • network operator name check
  • subscriber ID check
  • possible ro.secure check
  • possible VM check
anti_debug
  • Debug.isDebuggerConnected() check
compiler
  • r8 without marker (suspicious)

SSdeep

Information computed with ssdeep.

APK file 393216:dA5zw94nYg9IZMdZt/mOfH/X6FLVeab6KF0Nn38TQLcYXWvrR2ad:dA5zOg9IZKLzHW6q0NnMiKR2ad
Manifest 3072:O5RwRkA+Er+tR2clSy5/6wxsW5CBj0ZBHeZpL2a96mfP0UpUmAYvlHdY:DjwxsbJ…
classes.dex 49152:HGrg/Dh8D2kOMUhu57mSz1Ic5PoPs+inNP4sKMa3DrIUdn1M40WpWtc9+AA:HGM…
classes2.dex 6144:9vLqLW/sscJuh5wOwBGuqSxlb0k2Gx6OiY9DduFmnpR6FQ0HpFslxuU4sgTteC3a…
classes3.dex 49152:C/JLShcz0hlL7faTlOjMXUfSTueC7KXM4rrvQ/rqupaHGt+upqC5see3H7zVcAb…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 12288:VqP7/yPCRXcWlWLFSIbKftBzTOHNI7EDQwGYfW3Vlhx324OY3am:WSChcVLFSwK…
classes.dex 6144:VqguX7/jiprzyfwORloOPXc9AKpPWE/LHlSJo5bKftm4Ba5:VqP7/yPCRXcWlWLF…
classes2.dex 768:bROxYxMR6Kwmmt/KcHsJfruxltE15hKNbYDDBlD:dOxYUdXmtsy9ENDDBlD
classes3.dex 6144:3WNOOHNghpBliUEDQw3WyrDyka7R0Gv3VlhxVp24fOY5PlPK2a61:FOHNI7EDQwG…

APK details

Information computed with AndroGuard and Pithus.

Package com.deliveryclub.rider
App name Курьер Delivery Club
Version name 3.9.22
Version code 309224
SDK 21 - 30
UAID fe7a70b0bc8e82465de819e3f994dafcbebc703e
Signature Signature V1 Signature V2
Frosting Frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x504b4453: Dependency metadata
  • 0x42726577: Verity padding
  • 0x2146444e: Google metadata

Certificate details

Information computed with AndroGuard.

MD5 bbe275b7b238cdfe4241f78d1941b149
SHA1 04f2b6cbff65940f5130d1dfe46d447a51f61b55
SHA256 37078cf49d660a38c8fda0a8b43f08760215ffbf973847364a85eaeda82552c6
Issuer Organization: Delivery Club, Locality: Moscow, Country: 07
Not before 2016-11-28T16:30:43+00:00
Not after 2041-11-22T16:30:43+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. res/GB.crt
okhttp3/internal/publicsuffix/NOTICE

Manifest analysis

Information computed with MobSF.

Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
High Activity (com.deliveryclub.rider.businesslayer.activities.DeeplinkActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Activity-Alias (com.deliveryclub.rider.Launcher) is not Protected.An intent-filter exists.
An Activity-Alias is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity-Alias is explicitly exported.
High Broadcast Receiver (com.deliveryclub.rider.businesslayer.receivers.GpsLocationReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.appsflyer.SingleInstallBroadcastReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (ai.nerve.lmsdc.educationimpl.EducationActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.google.android.play.core.assetpacks.AssetPackExtractionService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (ru.mail.libverify.sms.SmsRetrieverReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.gms.auth.api.phone.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (ru.mail.libverify.sms.IncomingSmsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BROADCAST_SMS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (ru.mail.libverify.sms.IncomingCallReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.READ_PHONE_STATE [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (ru.mail.libverify.ipc.IpcMessageService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INTERNET [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (ru.mail.libverify.ipc.IpcNotificationService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INTERNET [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High TaskAffinity is set for Activity
(ru.mail.libverify.notifications.SettingsActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(ru.mail.libverify.notifications.SmsCodeNotificationActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(ru.mail.libverify.notifications.SmsDialogsActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High TaskAffinity is set for Activity
(ru.mail.libverify.notifications.SmsMessagesActivity)
If taskAffinity is set, then other application could read the Intents sent to Activities belonging to another task. Always use the default setting keeping the affinity as the package name in order to prevent sensitive information inside sent or received Intents from being read by another application.
High Broadcast Receiver (ru.mail.libverify.utils.ScreenStateReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.libverify.utils.PackageStateReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.libverify.utils.SystemRestartReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.libverify.utils.BatteryLevelReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.verify.core.utils.network.NetworkStateReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.verify.core.utils.TimeChangeReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.notify.core.utils.network.NetworkStateReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (ru.mail.notify.core.utils.TimeChangeReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.DUMP [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Medium High Intent Priority (999)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (999)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.deliveryclub.rider.businesslayer.activities.DeeplinkActivity

Hosts: @string/url_host

Schemes: @string/url_scheme://

Main Activity

Information computed with AndroGuard.

com.deliveryclub.rider.Launcher

Activities

Information computed with AndroGuard.

com.deliveryclub.rider.businesslayer.activities.LoginActivity
com.deliveryclub.rider.businesslayer.activities.DeeplinkActivity
com.deliveryclub.rider.businesslayer.activities.DashboardActivity
com.deliveryclub.rider.common.businesslayer.activities.MapActivity
com.deliveryclub.rider.businesslayer.activities.SplashActivity
com.deliveryclub.rider.businesslayer.activities.MiscActivity
com.deliveryclub.rider.businesslayer.activities.BottomSheetActivity
com.deliveryclub.rider.common.businesslayer.activities.CopyClipboardActivity
com.deliveryclub.rider.businesslayer.activities.ChooseDeliveryZoneActivity
com.deliveryclub.rider.businesslayer.activities.ConfirmationActivity
com.deliveryclub.rider.features.vkpay.businesslayer.activities.VkPayActivity
com.deliveryclub.rider.features.bazar_impl.presentation.choosezones.ChooseDeliveryZoneActivity
ai.nerve.lmsdc.educationimpl.EducationActivity
com.vk.api.sdk.ui.VKWebViewAuthActivity
com.vk.api.sdk.ui.VKCaptchaActivity
com.vk.api.sdk.ui.VKConfirmationActivity
com.google.android.play.core.missingsplits.PlayCoreMissingSplitsActivity
com.google.android.play.core.common.PlayCoreDialogWrapperActivity
ru.mail.libverify.notifications.SettingsActivity
ru.mail.libverify.notifications.SmsCodeNotificationActivity
ru.mail.libverify.notifications.SmsDialogsActivity
ru.mail.libverify.notifications.SmsMessagesActivity
ru.mail.libverify.utils.permissions.ShadowActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.deliveryclub.rider.businesslayer.receivers.GpsLocationReceiver
com.appsflyer.SingleInstallBroadcastReceiver
ru.mail.libverify.sms.SmsRetrieverReceiver
ru.mail.libverify.sms.IncomingSmsReceiver
ru.mail.libverify.sms.IncomingCallReceiver
ru.mail.libverify.utils.NetworkStateReceiver
ru.mail.libverify.utils.network.NetworkStateReceiver
ru.mail.libverify.utils.ScreenStateReceiver
ru.mail.libverify.utils.PackageStateReceiver
ru.mail.libverify.utils.SystemRestartReceiver
ru.mail.libverify.utils.AlarmReceiver
ru.mail.libverify.utils.BatteryLevelReceiver
ru.mail.verify.core.utils.network.NetworkStateReceiver
ru.mail.verify.core.utils.TimeChangeReceiver
ru.mail.notify.core.utils.AlarmReceiver
ru.mail.notify.core.utils.network.NetworkStateReceiver
ru.mail.notify.core.utils.TimeChangeReceiver
com.google.android.gms.analytics.AnalyticsReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
androidx.work.impl.utils.ForceStopRunnable$BroadcastReceiver
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryChargingProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$BatteryNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$StorageNotLowProxy
androidx.work.impl.background.systemalarm.ConstraintProxy$NetworkStateProxy
androidx.work.impl.background.systemalarm.RescheduleReceiver
androidx.work.impl.background.systemalarm.ConstraintProxyUpdateReceiver
androidx.work.impl.diagnostics.DiagnosticsReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver

Services

Information computed with AndroGuard.

com.deliveryclub.rider.notificationservice.NotificationService
com.deliveryclub.rider.common.businesslayer.service.BackgroundService
com.deliveryclub.rider.common.businesslayer.service.RiderSecService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.play.core.assetpacks.AssetPackExtractionService
com.google.android.play.core.assetpacks.ExtractionForegroundService
com.google.firebase.messaging.FirebaseMessagingService
ru.mail.verify.core.gcm.GcmMessageHandlerService
ru.mail.libverify.sms.SmsRetrieverService
ru.mail.libverify.sms.SmsHandlingService
ru.mail.libverify.ipc.IpcMessageService
ru.mail.libverify.ipc.IpcNotificationService
ru.mail.libverify.notifications.NotificationService
ru.mail.libverify.utils.network.NetworkCheckService
ru.mail.libverify.fetcher.FetcherService
ru.mail.libverify.fetcher.FetcherJobService
ru.mail.verify.core.utils.VerificationService
ru.mail.verify.core.utils.VerificationJobService
ru.mail.verify.core.gcm.GcmProcessService
ru.mail.verify.core.utils.IntentProcessService
ru.mail.verify.core.utils.IntentProcessJobService
ru.mail.notify.core.gcm.GcmMessageHandlerService
ru.mail.notify.core.utils.VerificationService
ru.mail.notify.core.utils.VerificationJobService
ru.mail.notify.core.gcm.GcmProcessService
ru.mail.notify.core.utils.IntentProcessService
ru.mail.notify.core.utils.IntentProcessJobService
com.google.android.gms.analytics.AnalyticsService
com.google.android.gms.analytics.AnalyticsJobService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
androidx.work.impl.background.systemalarm.SystemAlarmService
androidx.work.impl.background.systemjob.SystemJobService
androidx.work.impl.foreground.SystemForegroundService
androidx.room.MultiInstanceInvalidationService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application implement DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'network connectivity', 'camera'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys not in accordance with FCS_CKM.1.1(1) using key generation algorithm RSA schemes and cryptographic key sizes of 1024-bit or lower.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(1) The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit.
Cryptographic Operation - Encryption/Decryption
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(4) The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] .
Cryptographic Operation - Keyed-Hash Message Authentication
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update
FCS_CKM.1.1(2) The application shall generate symmetric cryptographic keys using a Random Bit Generator as specified in FCS_RBG_EXT.1 and specified cryptographic key sizes 128 bit or 256 bit.
Cryptographic Symmetric Key Generation

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 defpackage/sx7.java
defpackage/j94.java
defpackage/ko.java
defpackage/a64.java
defpackage/jk.java
defpackage/cr7.java
defpackage/gj.java
defpackage/ou6.java
defpackage/di.java
defpackage/qu6.java
defpackage/gz4.java
defpackage/ym7.java
defpackage/jf4.java
defpackage/h46.java
defpackage/uh0.java
defpackage/di5.java
ru/mail/libverify/ipc/IpcNotificationService.java
defpackage/jv.java
defpackage/sn.java
defpackage/as.java
defpackage/cd6.java
defpackage/cn0.java
defpackage/r34.java
defpackage/po.java
com/commonsware/cwac/netsecurity/config/RootTrustManager.java
defpackage/ek.java
defpackage/vk.java
ru/mail/libverify/storage/m.java
defpackage/cn.java
defpackage/zp.java
defpackage/xb6.java
defpackage/al.java
defpackage/ic6.java
defpackage/ja4.java
defpackage/st6.java
defpackage/c74.java
defpackage/ti.java
defpackage/xf4.java
defpackage/ij6.java
defpackage/mq5.java
defpackage/qj6.java
defpackage/y91.java
defpackage/ir5.java
defpackage/gj4.java
defpackage/hg6.java
defpackage/dk.java
defpackage/fm.java
defpackage/jq6.java
defpackage/tj5.java
defpackage/ac6.java
com/appsflyer/AFLogger.java
defpackage/vo7.java
defpackage/s83.java
defpackage/yj.java
defpackage/c64.java
defpackage/lj.java
defpackage/s64.java
defpackage/vb4.java
defpackage/o64.java
defpackage/ae6.java
defpackage/nb4.java
defpackage/wn6.java
defpackage/de6.java
defpackage/l55.java
defpackage/pe4.java
defpackage/ro.java
com/vk/api/sdk/internal/VKInitProvider.java
com/commonsware/cwac/netsecurity/conscrypt/TrustManagerImpl.java
defpackage/ie6.java
defpackage/gs4.java
defpackage/Cdo.java
defpackage/oo.java
defpackage/ms4.java
defpackage/le6.java
defpackage/rp.java
defpackage/eb6.java
defpackage/q08.java
defpackage/qu.java
defpackage/aj5.java
defpackage/v08.java
defpackage/ll.java
defpackage/q36.java
defpackage/ci.java
defpackage/l83.java
defpackage/jg4.java
defpackage/ls6.java
defpackage/wb6.java
defpackage/dc6.java
defpackage/bj.java
defpackage/vw5.java
defpackage/sn4.java
defpackage/yx.java
defpackage/bp.java
defpackage/kx.java
defpackage/zf4.java
defpackage/js.java
defpackage/ak.java
defpackage/fn.java
defpackage/em0.java
defpackage/uc4.java
defpackage/v74.java
defpackage/jm0.java
defpackage/pj.java
defpackage/um.java
defpackage/bs4.java
defpackage/qo.java
defpackage/eu.java
ru/mail/libverify/storage/l.java
defpackage/km4.java
defpackage/n84.java
defpackage/nu6.java
defpackage/gt4.java
defpackage/zr4.java
defpackage/ld6.java
defpackage/ze4.java
defpackage/tn.java
defpackage/e80.java
defpackage/vm.java
defpackage/pb4.java
defpackage/ri.java
ai/nerve/lmsdc/testimpl/presentation/widgets/ShowMoreTextView.java
defpackage/pd6.java
com/deliveryclub/rider/businesslayer/activities/SplashActivity.java
defpackage/ru6.java
defpackage/tu6.java
defpackage/kf4.java
com/commonsware/cwac/netsecurity/config/ManifestConfigSource.java
defpackage/os.java
com/wdullaer/materialdatetimepicker/time/RadialPickerLayout.java
defpackage/gi5.java
defpackage/hm.java
defpackage/du.java
defpackage/sr4.java
defpackage/bx7.java
com/commonsware/cwac/netsecurity/TrustManagerBuilder.java
defpackage/kp.java
defpackage/pd4.java
defpackage/rt.java
defpackage/qp.java
defpackage/t64.java
defpackage/ol4.java
defpackage/l64.java
defpackage/ft4.java
defpackage/n64.java
defpackage/zj.java
defpackage/ub6.java
defpackage/xm.java
defpackage/xw5.java
defpackage/ax.java
defpackage/qb6.java
defpackage/pm0.java
defpackage/d74.java
defpackage/bi.java
defpackage/ds4.java
defpackage/y94.java
defpackage/fp.java
defpackage/jd6.java
ru/mail/libverify/ipc/IpcMessageService.java
defpackage/ai.java
defpackage/ve4.java
defpackage/ce6.java
ru/mail/libverify/storage/d.java
defpackage/ye4.java
defpackage/zy.java
defpackage/fb5.java
defpackage/kb5.java
io/sentry/SystemOutLogger.java
defpackage/he6.java
io/sentry/android/core/AndroidLogger.java
defpackage/is4.java
defpackage/kj.java
defpackage/hs4.java
defpackage/fk.java
defpackage/jp.java
defpackage/me6.java
defpackage/xk4.java
defpackage/am.java
defpackage/h26.java
defpackage/xc6.java
defpackage/ae4.java
defpackage/bj4.java
defpackage/ts3.java
defpackage/jh5.java
defpackage/sn6.java
defpackage/wi6.java
defpackage/vb6.java
defpackage/ww5.java
defpackage/qy.java
defpackage/j36.java
defpackage/g28.java
com/my/tracker/obfuscated/d.java
defpackage/wj.java
defpackage/e74.java
defpackage/tc4.java
defpackage/nb6.java
defpackage/u74.java
defpackage/r74.java
defpackage/nn.java
defpackage/xi.java
defpackage/fe4.java
defpackage/hj.java
defpackage/pe6.java
defpackage/ql.java
defpackage/og.java
defpackage/lu.java
defpackage/cn7.java
defpackage/cs.java
defpackage/xu.java
defpackage/oi0.java
defpackage/vv.java
defpackage/to4.java
defpackage/g56.java
High
CVSS:7.4
Files may contain hardcoded sensitive informations like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 defpackage/lw2.java
defpackage/q43.java
defpackage/l66.java
com/appsflyer/CreateOneLinkHttpTask.java
defpackage/q60.java
defpackage/ta2.java
defpackage/n60.java
defpackage/o60.java
defpackage/wm7.java
defpackage/oj7.java
com/deliveryclub/rider/common/businesslayer/models/ProblemDescriptionModel.java
com/appsflyer/AppsFlyerProperties.java
defpackage/gk2.java
com/deliveryclub/rider/common/datalayer/objects/Payload.java
defpackage/ot2.java
defpackage/vq3.java
defpackage/et6.java
defpackage/zr6.java
defpackage/zu2.java
defpackage/ni0.java
ru/mail/libverify/api/VerificationFactory.java
Info
CVSS:0
This App may have root detection capabilities.
MASVS: MSTG-RESILIENCE-1
Files:
 com/my/tracker/obfuscated/v.java
defpackage/ds4.java
io/sentry/android/core/util/RootChecker.java
defpackage/b56.java
defpackage/vn6.java
io/sentry/android/core/DefaultAndroidEventProcessor.java
defpackage/zq5.java
High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 defpackage/pk6.java
defpackage/ly6.java
defpackage/vy5.java
defpackage/nv5.java
defpackage/sk6.java
defpackage/vg6.java
defpackage/rv4.java
defpackage/m47.java
defpackage/rh0.java
defpackage/l47.java
j$/util/concurrent/ThreadLocalRandom.java
defpackage/ry5.java
defpackage/j08.java
defpackage/w24.java
defpackage/g08.java
defpackage/d16.java
defpackage/fz6.java
com/appsflyer/internal/d.java
io/sentry/SentryClient.java
defpackage/ll6.java
defpackage/hz6.java
defpackage/rl6.java
io/sentry/TracesSampler.java
defpackage/av4.java
defpackage/yk6.java
defpackage/wz5.java
defpackage/w06.java
defpackage/oz5.java
defpackage/jt4.java
defpackage/nt4.java
defpackage/cj6.java
defpackage/zz6.java
defpackage/kt6.java
defpackage/ju4.java
defpackage/eu5.java
defpackage/pm6.java
defpackage/qt5.java
defpackage/ms7.java
defpackage/ul6.java
defpackage/um6.java
defpackage/tu4.java
defpackage/hx4.java
defpackage/oj6.java
defpackage/ml6.java
defpackage/il6.java
defpackage/f76.java
defpackage/p47.java
defpackage/hv4.java
defpackage/lv4.java
defpackage/lz5.java
defpackage/r06.java
defpackage/bn6.java
defpackage/to4.java
defpackage/mw4.java
defpackage/qw4.java
ru/mail/libverify/api/VerificationApi.java
defpackage/mu5.java
defpackage/ws3.java
defpackage/bz5.java
defpackage/qh5.java
defpackage/tz5.java
defpackage/pz5.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 defpackage/hj.java
defpackage/qr1.java
defpackage/bp5.java
defpackage/vm0.java
io/sentry/android/core/DefaultAndroidEventProcessor.java
Low
CVSS:3.9
App can write to App Directory. Sensitive Information should be encrypted.
MASVS: MSTG-STORAGE-14
CWE-276 Incorrect Default Permissions
Files:
 defpackage/ou0.java
defpackage/ww0.java
defpackage/eo6.java
defpackage/ls6.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 defpackage/uq7.java
defpackage/yj0.java
defpackage/vq7.java
defpackage/b18.java
defpackage/zq7.java
defpackage/yq7.java
com/commonsware/cwac/netsecurity/TrustManagerBuilder.java
com/commonsware/cwac/netsecurity/MemorizingTrustManager.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 defpackage/qu.java
defpackage/ko.java
defpackage/ji5.java
defpackage/vm0.java
defpackage/yc6.java
Medium
CVSS:4.3
IP Address disclosure
MASVS: MSTG-CODE-2
CWE-200 Information Exposure
Files:
 com/commonsware/cwac/netsecurity/conscrypt/TrustManagerImpl.java
defpackage/rh0.java
defpackage/wr0.java
com/deliveryclub/rider/common/businesslayer/models/CheckInternetFeatureModel.java
defpackage/ne1.java
defpackage/ws0.java
defpackage/rr0.java
com/commonsware/cwac/netsecurity/conscrypt/CertificatePriorityComparator.java
com/commonsware/cwac/netsecurity/conscrypt/ChainStrengthAnalyzer.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 defpackage/zs6.java
defpackage/vy0.java
defpackage/b18.java
com/my/tracker/obfuscated/g0.java
defpackage/qh5.java
com/appsflyer/internal/aj.java
High
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 defpackage/za3.java
defpackage/h80.java
defpackage/k24.java
defpackage/v65.java
defpackage/zh3.java
defpackage/w65.java
defpackage/fb3.java
ru/mail/libverify/storage/smsdb/SmsStorage.java
defpackage/yh3.java
com/my/tracker/obfuscated/g.java
defpackage/dn7.java
defpackage/eb5.java
defpackage/jh5.java
defpackage/sj4.java
defpackage/rj4.java
defpackage/db3.java
defpackage/nv.java
ru/mail/libverify/storage/smsdb/b.java
defpackage/gi5.java
defpackage/q24.java
defpackage/ci5.java
High
CVSS:7.4
Insecure Implementation of SSL. Trusting all the certificates or accepting self signed certificates is a critical Security Hole. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 defpackage/l08.java
High
CVSS:0
This App may request root (Super User) privileges.
MASVS: MSTG-RESILIENCE-1
CWE-250 Execution with Unnecessary Privileges
Files:
 io/sentry/android/core/util/RootChecker.java
defpackage/un6.java
Low
CVSS:0
This App copies data to clipboard. Sensitive data should not be copied to clipboard as other applications can access it.
MASVS: MSTG-STORAGE-10
Files:
 defpackage/il0.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 defpackage/v08.java
defpackage/nb6.java
defpackage/xc6.java
com/appsflyer/internal/aj.java
Pygal Germany: 300 Netherlands: 100 Russian Federation: 800 United States: 2100

Map computed by Pithus.

Network analysis

Information computed with MobSF.

Info Base config is configured to disallow clear text traffic to all domains.
Scope: ['*']
Medium Base config is configured to trust system certificates.
Scope: ['*']

Domains analysis

Information computed with MobSF.

US api2.amplitude.com 52.42.177.11
DE regionconfig.amplitude.com 143.204.98.6
scrap.commonsware.com
RU www.delivery-club.ru 5.61.236.230
RU api.dc-lms.ru 84.201.147.253
US google.com 142.250.181.238
US ssl.google-analytics.com 142.250.186.136
US developer.android.com 142.250.181.238
RU logistics-mobile-api-gateway.delivery-club.ru 128.140.175.214
DE schemas.microsoft.com 104.111.237.228
NL my.com 185.30.176.115
reports.crashlytics.com
US www.google.com 142.250.184.196
RU clientapi.mail.ru 95.163.56.199
DE developer.apple.com 17.253.57.203
RU vk.com 87.240.190.78
RU storage.yandexcloud.net 213.180.193.243
ns.adobe.com
US update.crashlytics.com 142.250.181.227
schemas.android.com
US www.googleadservices.com 142.250.186.98
US firebase.google.com 142.250.181.238
US exoplayer.dev 185.199.110.153
US firebase-settings.crashlytics.com 142.250.186.131
US issuetracker.google.com 142.250.185.142
US app-measurement.com 142.250.186.174
US www.w3.org 128.30.52.100
US dashif.org 185.199.108.153
US play.google.com 142.250.186.46
RU api.delivery-club.ru 5.61.236.230
US www.google-analytics.com 142.250.186.78
RU oauth.vk.com 87.240.129.135
US plus.google.com 142.250.184.238
US goo.gl 142.250.186.46
US aomedia.org 185.199.110.153
US github.com 140.82.121.4
US dcriderapp-883da.firebaseio.com 35.201.97.85

URL analysis

Information computed with MobSF.

https://clientapi.mail.ru/
Defined in ru/mail/libverify/storage/j.java
https://clientapi.mail.ru/
Defined in ru/mail/libverify/requests/b.java
https://oauth.vk.com/authorize
Defined in com/vk/api/sdk/ui/VKWebViewAuthActivity.java
https://scrap.commonsware.com/test.json
http://scrap.commonsware.com:8080/test.json
http://scrap.commonsware.com/test.json
Defined in com/commonsware/cwac/netsecurity/BuildConfig.java
https://scrap.commonsware.com/test.json
http://scrap.commonsware.com:8080/test.json
http://scrap.commonsware.com/test.json
Defined in com/commonsware/cwac/netsecurity/BuildConfig.java
https://scrap.commonsware.com/test.json
http://scrap.commonsware.com:8080/test.json
http://scrap.commonsware.com/test.json
Defined in com/commonsware/cwac/netsecurity/BuildConfig.java
https://my.com/?
Defined in com/my/tracker/obfuscated/j.java
https://firebase-settings.crashlytics.com/spi/v2/platforms/android/gmp/%s/settings
Defined in defpackage/w86.java
https://vk.com/?
Defined in defpackage/dt6.java
https://plus.google.com/
Defined in defpackage/rd4.java
http://dashif.org/guidelines/last-segment-number
data:cs:AudioPurposeCS:2007
http://dashif.org/guidelines/trickmode
Defined in defpackage/lu3.java
http://dashif.org/guidelines/last-segment-number
data:cs:AudioPurposeCS:2007
http://dashif.org/guidelines/trickmode
Defined in defpackage/lu3.java
https://issuetracker.google.com/issues/new?component=413107&template=1096568
Defined in defpackage/rt.java
https://aomedia.org/emsg/ID3
https://developer.apple.com/streaming/emsg-id3
Defined in defpackage/yp3.java
https://aomedia.org/emsg/ID3
https://developer.apple.com/streaming/emsg-id3
Defined in defpackage/yp3.java
https://github.com/grandcentrix/tray/wiki/Custom-Authority
https://github.com/grandcentrix/tray/issues
Defined in defpackage/cn7.java
https://github.com/grandcentrix/tray/wiki/Custom-Authority
https://github.com/grandcentrix/tray/issues
Defined in defpackage/cn7.java
https://developer.android.com/reference/com/google/android/play/core/assetpacks/model/AssetPackErrorCode.html#
Defined in defpackage/up5.java
https://oauth.vk.com/blank.html
https://vk.com/dev/access_token
Defined in defpackage/ms6.java
https://oauth.vk.com/blank.html
https://vk.com/dev/access_token
Defined in defpackage/ms6.java
https://goo.gl/J1sWQy
Defined in defpackage/to4.java
https://app-measurement.com/a
Defined in defpackage/ya5.java
https://app-measurement.com/a
Defined in defpackage/oy4.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
https://goo.gl/NAOOOI
https://goo.gl/NAOOOI.
Defined in defpackage/qh5.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
https://goo.gl/NAOOOI
https://goo.gl/NAOOOI.
Defined in defpackage/qh5.java
https://www.googleadservices.com/pagead/conversion/app/deeplink?id_type=adid&sdk_version=%s&rdid=%s&bundleid=%s&retry=%s
https://goo.gl/NAOOOI
https://goo.gl/NAOOOI.
Defined in defpackage/qh5.java
http://goo.gl/8Rd3yj
Defined in defpackage/fl4.java
https://google.com/search?
Defined in defpackage/pe5.java
http://schemas.microsoft.com/DRM/2007/03/protocols/AcquireLicense
Defined in defpackage/mj3.java
http://goo.gl/8Rd3yj
Defined in defpackage/uj4.java
https://exoplayer.dev/issues/player-accessed-on-wrong-thread
Defined in defpackage/he3.java
http://ns.adobe.com/xap/1.0/
Defined in defpackage/fl3.java
https://api.dc-lms.ru
https://storage.yandexcloud.net/dc-lms-prod/
Defined in defpackage/y6.java
https://api.dc-lms.ru
https://storage.yandexcloud.net/dc-lms-prod/
Defined in defpackage/y6.java
http://schemas.android.com/apk/res/android
Defined in defpackage/qj.java
www.google.com
https://www.google.com
Defined in defpackage/qe5.java
https://developer.android.com/reference/com/google/android/play/core/install/model/InstallErrorCode#
Defined in defpackage/lq5.java
https://firebase.google.com/support/privacy/init-options.
Defined in defpackage/mc6.java
http://www.w3.org/ns/ttml#parameter
Defined in defpackage/mx3.java
http://www.google-analytics.com
https://ssl.google-analytics.com
Defined in defpackage/pk4.java
http://www.google-analytics.com
https://ssl.google-analytics.com
Defined in defpackage/pk4.java
http://ns.adobe.com/xap/1.0/
Defined in defpackage/ko.java
https://update.crashlytics.com/spi/v1/platforms/android/apps
https://update.crashlytics.com/spi/v1/platforms/android/apps/%s
https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports
https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps
Defined in defpackage/a96.java
https://update.crashlytics.com/spi/v1/platforms/android/apps
https://update.crashlytics.com/spi/v1/platforms/android/apps/%s
https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports
https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps
Defined in defpackage/a96.java
https://update.crashlytics.com/spi/v1/platforms/android/apps
https://update.crashlytics.com/spi/v1/platforms/android/apps/%s
https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports
https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps
Defined in defpackage/a96.java
https://update.crashlytics.com/spi/v1/platforms/android/apps
https://update.crashlytics.com/spi/v1/platforms/android/apps/%s
https://reports.crashlytics.com/spi/v1/platforms/android/apps/%s/reports
https://reports.crashlytics.com/sdk-api/v1/platforms/android/apps/%s/minidumps
Defined in defpackage/a96.java
https://api2.amplitude.com/
https://regionconfig.amplitude.com/
Defined in defpackage/f80.java
https://api2.amplitude.com/
https://regionconfig.amplitude.com/
Defined in defpackage/f80.java
https://firebase.google.com/support/guides/disable-analytics
Defined in defpackage/cb5.java
http://dashif.org/guidelines/trickmode
Defined in defpackage/cu3.java
https://api2.amplitude.com/
Defined in defpackage/d80.java
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource
https://www.delivery-club.ru
https://dcriderapp-883da.firebaseio.com
https://play.google.com/store/apps/details?id=%s
https://github.com/vanniktech/Emoji
https://github.com/vinc3m1
https://github.com/vinc3m1/RoundedImageView
https://github.com/vinc3m1/RoundedImageView.git
https://logistics-mobile-api-gateway.delivery-club.ru
https://api.delivery-club.ru
https://vk.com/vkpay
Defined in Android String Resource

Permissions analysis

Information computed with MobSF.

High android.permission.ACCESS_FINE_LOCATION fine (GPS) location
Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.
High android.permission.ACCESS_COARSE_LOCATION coarse (network-based) location
Access coarse location sources, such as the mobile network database, to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.SYSTEM_ALERT_WINDOW display system-level alerts
Allows an application to show system-alert windows. Malicious applications can take over the entire screen of the phone.
High android.permission.READ_EXTERNAL_STORAGE read external storage contents
Allows an application to read from external storage.
High android.permission.CAMERA take pictures and videos
Allows application to take pictures and videos with the camera. This allows the application to collect images that the camera is seeing at any time.
High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.READ_PHONE_NUMBERS Allows read access to the device's phone number(s). This is a subset of the capabilities granted by
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.VIBRATE control vibrator
Allows the application to control the vibrator.
Low android.permission.ACCESS_WIFI_STATE view Wi-Fi status
Allows an application to view the information about the status of Wi-Fi.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground
Low android.permission.ACCESS_NOTIFICATION_POLICY Marker permission for applications that wish to access notification policy.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Medium com.google.android.c2dm.permission.RECEIVE C2DM permissions
Permission for cloud to device messaging.
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Check if the network is connected
Confidence:
100%
Load external class
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Check the active network type
Confidence:
100%
Connect to a URL and receive input stream from the server
Confidence:
100%
Modify voice volume
Confidence:
100%
Method reflection
Confidence:
100%
Get the network operator name
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Monitor data identified by a given content URI changes(SMS, MMS, etc.)
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Check the current network type
Confidence:
100%
Put data in cursor to JSON object
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Query user account information
Confidence: