0/60
Threat
Analyzed on 2022-01-23T06:16:21.933756
MD5 | 69d0a7d9384f5c0aab27f6a6ebae677b | |
SHA1 | 9bcda06dda08420dda9774d7469680bf601fc3c5 | |
SHA256 | eb49953aa5466bcfac6d0d5b9f99dadebf24443dec2b3dfa140906b79ac99a2d | |
Size | 6.77MB |
Information computed with APKiD.
/tmp/tmpf1bu6250!classes.dex | |
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 196608:J27XSkuHQCZ0FDXMcGEKXlsWvjS+yNd9R5yLsXV:CXSECZC8cGFXru+yTzkLyV | |
Manifest | 384:ht84RxcKE6X1SbAoTmRgmetyO7trX6fsl+TtrTFu0HQqxRs7Ur6KQspRjx9x5ju8:… | |
classes.dex | 24576:fX15xz6I3HYM6WgHEF1qZxlz62uNWcpPexhOkoXVGtWgQDxp4iytf9XSIqBukVP… |
Information computed with Dexofuzzy.
APK file | 3072:b1NnWDMeF4u7UfRw0TFzNz7SlyT6UmkZ4BfcaKR0KUSTuIWNpjPzMUKHE:byQeFP… | |
classes.dex | 3072:b1NnWDMeF4u7UfRw0TFzNz7SlyT6UmkZ4BfcaKR0KUSTuIWNpjPzMUKHE:byQeFP… |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Findings | Files |
---|---|
Certificate/Key files hardcoded inside the app. |
okhttp3/internal/publicsuffix/NOTICE stamp-cert-sha256 |
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup=true] This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
High | Broadcast Receiver (ph.staysafe.mobileapp.broadcastreceivers.ExposureNotificationBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.google.android.gms.nearby.exposurenotification.EXPOSURE_CALLBACK [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (com.google.android.gms.nearby.exposurenotification.WakeUpService) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.google.android.gms.nearby.exposurenotification.EXPOSURE_CALLBACK [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (com.google.android.gms.auth.api.signin.RevocationBoundService) is Protected by a permission, but the protection level of the permission should be checked.Permission: com.google.android.gms.auth.api.signin.permission.REVOCATION_NOTIFICATION [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Service (androidx.work.impl.background.systemjob.SystemJobService) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_JOB_SERVICE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
High | Broadcast Receiver (androidx.work.impl.diagnostics.DiagnosticsReceiver) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.DUMP [android:exported=true] A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 1981, 1:01 a.m. |
Latest file found in APK | Jan. 1, 1981, 1:01 a.m. |
Certificate valid not before | April 30, 2020, 5:42 a.m. |
First submission on VT | Nov. 23, 2021, 6:10 a.m. |
Last submission on VT | Nov. 23, 2021, 6:10 a.m. |
Upload on Pithus | Jan. 23, 2022, 6:16 a.m. |
Certificate valid not after | April 30, 2050, 5:42 a.m. |
Score | 0/60 |
Report | https://www.virustotal.com/gui/file/eb49953aa5466bcfac6d0d5b9f99dadebf24443dec2b3dfa140906b79ac99a2d/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application invoke platform-provided DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['bluetooth', 'network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_RBG_EXT.2.1 FCS_RBG_EXT.2.2 |
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate. Random Bit Generation from Application |
FCS_COP.1.1(2) | The application perform cryptographic hashing services in accordance with a specified cryptographic algorithm SHA-1/SHA-256/SHA-384/SHA-512 and message digest sizes 160/256/384/512 bits. Cryptographic Operation - Hashing |
FCS_COP.1.1(4) | The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] . Cryptographic Operation - Keyed-Hash Message Authentication |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
Information computed with MobSF.
https://www.staysafe.ph/privacy-statement Defined in ph/staysafe/mobileapp/tos/PrivacyPolicyActivity.java |
|
https://storage.googleapis.com/exposure-notification-export-obubu/ Defined in ph/staysafe/mobileapp/workers/ProvideDiagnosisKeysWorker.java |
|
http://schemas.android.com/apk/res/android Defined in y/h/c/b/h.java |
|
https://plus.google.com/ Defined in d/f/a/a/b/k/e1.java |
|
https://accounts.google.com/o/oauth2/revoke?token= Defined in d/f/a/a/a/a/e/b/f.java |
|
https://exposure-36ghqzmrtq-uc.a.run.app Defined in g0/a/a/k/i/a.java |
|
https://storage.googleapis.com/exposure-notification-export-obubu/ Defined in g0/a/a/k/d/a.java |
|
https://ws2.staysafe.ph/api/ Defined in g0/a/a/k/b/b.java |
|
https://ws2.staysafe.ph/api/ Defined in g0/a/a/k/k/c/b.java |
|
https://www.staysafe.ph/digital-logbook Defined in defpackage/j.java |
|
https://www.doh.gov.ph/covid19tracker https://www.doh.gov.ph/about-us Defined in defpackage/t.java |
|
https://www.doh.gov.ph/covid19tracker https://www.doh.gov.ph/about-us Defined in defpackage/t.java |
|
http://www.doh.gov.ph/sites/default/files/health-update/dm2020-0189.pdf Defined in defpackage/n.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Check if the network is connected |
Confidence:
|
Load external class |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Check the active network type |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Method reflection |
Confidence:
|
Connect to a URL and read data from it |
Confidence:
|
Load class from given class name |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Open a file from given absolute path of the file |
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) via setData |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Send notification |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Check the current active network type |
Confidence:
|
Check the network capabilities |
Confidence:
|
Get last known location of the device |
Confidence:
|
Get location of the device |
Confidence:
|
Create a secure socket connection to the proxy address |
Confidence:
|
Method reflection |
Confidence:
|
Hide the current app's icon |
Confidence:
|
Connect to the remote server through the given URL |
Confidence:
|
Check if the device is in data roaming mode |
Confidence:
|
Get the time of current location |
Confidence:
|
Initialize class object dynamically |
Confidence:
|
Read the input stream from given URL |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Create a socket connection to the given host address |
Confidence:
|
Create a secure socket connection to the given host address |
Confidence:
|
Read file and put it into a stream |
Confidence:
|
Get declared method from given method name |
Confidence:
|
Create a socket connection to the proxy address |
Confidence:
|
Read file from assets directory |
Confidence:
|
Get calendar information |
Confidence:
|
Get resource file from res/raw directory |
Information computed with MobSF.
Information computed by Pithus.