1/65

Threat

com.devolver.downwell_rerelease

Downwell

Analyzed on 2022-09-24T11:07:13.314810

3

permissions

2

activities

0

services

0

receivers

2

domains

File sums

MD5 93ffa90c9c7778b1baa6a4ce44f59a94
SHA1 65959ecddf3e62b4543e194f6e27ddc876284cd1
SHA256 e0c5638501f666628ea73493a0e8fe549d0f410b715ab04eafd27c2fb2d9040d
Size 37.34MB

APKiD

Information computed with APKiD.

/tmp/tmp1hozbo2p!classes.dex
anti_vm
  • Build.MANUFACTURER check
  • Build.BOARD check
compiler
  • r8

SSdeep

Information computed with ssdeep.

APK file 786432:kOfQ+wQgZTjikQe/vVjtUHCt4um1thXZVGuKxIO5eemplCYcsZJ++ngX33G:5DgZTEe3Vjdt4t19VYxIbPpTtngXHG
Manifest 96:4SyQVzUoj5ZwcdSI5r/9fxWPiyeoQGz+KyISqIh9R5DKlKrWNYfZRTCk7:4SBhjSI5…
classes.dex 24576:5p/4747j7347WQaSxbAXAXQXUXJsKahIWQhy97qsm:E4H7343aSMK62JHahIWQhd

Dexofuzzy

Information computed with Dexofuzzy.

APK file 384:hFeKnt9uOENt/+aoZZkZYuJbmBbKllPeAUdQ6ZWbMqu6yFC5:zeKn7unF6uJbcoPz…
classes.dex 384:hFeKnt9uOENt/+aoZZkZYuJbmBbKllPeAUdQ6ZWbMqu6yFC5:zeKn7unF6uJbcoPz…

APK details

Information computed with AndroGuard and Pithus.

Package com.devolver.downwell_rerelease
App name Downwell
Version name 1.1.1
Version code 1001001
SDK 16 - 28
UAID 93b58b181d14f700f1bf42719e46bcbbc316a109
Signature Signature V1
Frosting Not frosted

Certificate details

Information computed with AndroGuard.

MD5 e89b158e4bcf988ebd09eb83f5378e87
SHA1 61ed377e85d386a8dfee6b864bd85b0bfaa5af81
SHA256 a40da80a59d170caa950cf15c18c454d47a39b26989d8b640ecd745ba71bf5dc
Issuer Email Address: android@android.com, Common Name: Android, Organizational Unit: Android, Organization: Android, Locality: Mountain View, State/Province: California, Country: US
Not before 2008-02-29T01:33:46+00:00
Not after 2035-07-17T01:33:46+00:00

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup] flag is missing.
The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.

Main Activity

Information computed with AndroGuard.

com.devolver.downwell_rerelease.RunnerActivity

Activities

Information computed with AndroGuard.

com.devolver.downwell_rerelease.RunnerActivity
com.devolver.downwell_rerelease.RunnerPreferenceActivity

Sample timeline

Certificate valid not before Feb. 29, 2008, 1:33 a.m.
Oldest file found in APK Feb. 29, 2008, 3:33 a.m.
Latest file found in APK Feb. 29, 2008, 3:33 a.m.
First submission on VT Sept. 20, 2019, 10:57 p.m.
Last submission on VT Sept. 23, 2022, 5:28 a.m.
Upload on Pithus Sept. 24, 2022, 11:07 a.m.
Certificate valid not after July 17, 2035, 1:33 a.m.

NIAP analysis

Information computed with MobSF.

FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['bluetooth', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/devolver/downwell_rerelease/IniBundle.java
com/devolver/downwell_rerelease/IRunnerBilling.java
com/devolver/downwell_rerelease/RunnerSocial.java
com/devolver/downwell_rerelease/DemoRenderer.java
com/devolver/downwell_rerelease/AdvertisingBase.java
com/devolver/downwell_rerelease/RunnerActivity.java
com/devolver/downwell_rerelease/NullBilling.java
com/devolver/downwell_rerelease/RunnerKeyboardController.java
com/devolver/downwell_rerelease/RunnerDownloadTask.java
com/devolver/downwell_rerelease/DemoRendererGL2.java
com/yoyogames/runner/RunnerJNILib.java
com/devolver/downwell_rerelease/DemoGLSurfaceView.java
com/devolver/downwell_rerelease/GamepadHandler_API12.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/devolver/downwell_rerelease/DemoRenderer.java
com/devolver/downwell_rerelease/RunnerActivity.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/devolver/downwell_rerelease/IRunnerBilling.java
Medium
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 org/ini4j/Reg.java
Pygal United States: 100

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

ping.yoyogames.com
US market.android.com 142.251.5.118

URL analysis

Information computed with MobSF.

http://market.android.com/support/bin/answer.py?answer=1050566&hl=%lang%&dl=%region%
Defined in Android String Resource
https://ping.yoyogames.com/pingback?data=
Defined in lib/armeabi-v7a/libyoyo.so
https://ping.yoyogames.com/pingback?data=
Defined in lib/arm64-v8a/libyoyo.so

Permissions analysis

Information computed with MobSF.

Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.BLUETOOTH create Bluetooth connections
Allows applications to connect to paired bluetooth devices.

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Write HTTP input stream into a file
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Connect to a URL and receive input stream from the server
Confidence:
100%
Method reflection
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get absolute path of the file and store in string
Confidence:
100%
Method reflection
Confidence:
100%
Connect to the remote server through the given URL
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Read the input stream from given URL
Confidence:
100%
Connect to a URL and set request method
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Check if the given file path exist

Behavior analysis

Information computed with MobSF.

Execute os command
       org/ini4j/Reg.java
Get system service
       com/devolver/downwell_rerelease/RunnerKeyboardController.java
com/devolver/downwell_rerelease/DemoRenderer.java
com/yoyogames/runner/RunnerJNILib.java
com/devolver/downwell_rerelease/RunnerActivity.java
Http connection
       com/devolver/downwell_rerelease/RunnerDownloadTask.java
com/yoyogames/runner/RunnerJNILib.java
Inter process communication
       com/devolver/downwell_rerelease/IExtensionBase.java
com/devolver/downwell_rerelease/IRunnerBilling.java
com/devolver/downwell_rerelease/RunnerAdExt.java
com/devolver/downwell_rerelease/RunnerSocial.java
com/devolver/downwell_rerelease/RunnerDownloadTask.java
com/yoyogames/runner/RunnerJNILib.java
com/devolver/downwell_rerelease/RunnerActivity.java
com/devolver/downwell_rerelease/ExtensionBase.java
Java reflection
       com/yoyogames/runner/RunnerJNILib.java
com/devolver/downwell_rerelease/RunnerActivity.java
org/ini4j/spi/BeanTool.java
org/ini4j/spi/ServiceFinder.java
org/ini4j/spi/AbstractBeanInvocationHandler.java
Loading native code (shared library)
       com/yoyogames/runner/RunnerJNILib.java
Local file i/o operations
       com/devolver/downwell_rerelease/IRunnerBilling.java
com/devolver/downwell_rerelease/DemoRenderer.java
Message digest
       com/devolver/downwell_rerelease/IRunnerBilling.java
Starting activity
       com/devolver/downwell_rerelease/RunnerDownloadTask.java
com/yoyogames/runner/RunnerJNILib.java
com/devolver/downwell_rerelease/RunnerActivity.java
Tcp socket
       com/yoyogames/runner/RunnerJNILib.java
Url connection to file/http/https/ftp/jar
       com/yoyogames/runner/RunnerJNILib.java