0/63

Threat

com.google.android.overlay.modules.cellbroadcastservice

Analyzed on 2022-09-25T10:56:55.479295

0

permissions

0

activities

0

services

0

receivers

0

domains

File sums

MD5 a774192256b27231ffdc64d991d159c3
SHA1 7dd11489a9b84ba696c06272e3f39d95b6e01cdc
SHA256 f664dc611df137ad2ec3f13d9133056efdab2b769b6f558b4bc529b2fe9eaad6
Size 0.01MB

APKiD

Information computed with APKiD.

SSdeep

Information computed with ssdeep.

APK file 96:qfTqtszzCkDW2FAPf8jwicwxRwtGjJeqnwhWx/kORTqJbDOQSAB9xkTlOlNXiUl6:qfTF1ip0jWtE8CaDOPR2NXikcbxyi10C
Manifest 48:PxOzEvThpyy/U5v5KUlQDTlbDTl1BPlol/8BvJMDdxdFcainOhm+zstX:pOeo6VUMT…

Dexofuzzy

Information computed with Dexofuzzy.

APK details

Information computed with AndroGuard and Pithus.

Package com.google.android.overlay.modules.cellbroadcastservice
App name
Version name 12
Version code 31
SDK 31 - 31
UAID 4d6d739f1a86dbb6590eebda9a46b94e8b609534
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 1ed6907e477e89c847cd7f7a971e0f46
SHA1 9741a0f330dc2e8619b76a2597f308c37dbe30a2
SHA256 b9a42dd5fc4e054889ae4127a6274cec64e75c41733d42f5991e7019f9ea5caf
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:13+00:00
Not after 2038-11-07T12:25:13+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup] flag is missing.
The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before June 22, 2011, 12:25 p.m.
First submission on VT July 10, 2022, 11 p.m.
Last submission on VT July 10, 2022, 11 p.m.
Upload on Pithus Sept. 25, 2022, 10:56 a.m.
Certificate valid not after Nov. 7, 2038, 12:25 p.m.

NIAP analysis

Information computed with MobSF.

FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to no hardware resources.
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has no network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FTP_DIT_EXT.1.1 The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product.
Protection of Data in Transit

Threat analysis

Information computed with Quark-Engine.

Control flow graphs analysis

Information computed by Pithus.