NVISO ApkScan malware analysis report

May 24, 2018

General information
File nameCamera4-signed.apk
Other known file namesNone
OriginManually uploaded by anonymous user [2017-07-08 23:23:24]
MD5 hash487f89acb22e49bbaf51ae287f49556e
SHA256 hashf025655ed727a03c6413102edca9a556aa6428b814c28b111f3f30e9e43b930a
File size39316.4 KB
Static malware analysis
Android manifest (AndroidManifest.xml)
ACCESS_COARSE_LOCATION Allows an app to access approximate location derived from network location sources such as cell towers and Wi-Fi.
ACCESS_FINE_LOCATION Allows an app to access precise location from location sources such as GPS, cell towers, and Wi-Fi.
ACCESS_NETWORK_STATE Allows applications to access information about networks
ACCESS_WIFI_STATE Allows applications to access information about Wi-Fi networks
BIND_WALLPAPER Must be required by a WallpaperService, to ensure that only the system can bind to it.
CAMERA Required to be able to access the camera device.
CHANGE_WIFI_STATE Allows applications to change Wi-Fi connectivity state
INTERNET Allows applications to open network sockets.
NFC Allows applications to perform I/O operations over NFC
READ_SYNC_SETTINGS Allows applications to read the sync settings
RECEIVE_BOOT_COMPLETED Allows an application to receive the ACTION_BOOT_COMPLETED that is broadcast after the system finishes booting.
RECORD_AUDIO Allows an application to record audio
SET_WALLPAPER Allows applications to set the wallpaper
SUBSCRIBED_FEEDS_READ Allows an application to allow access the subscribed feeds ContentProvider.
GALLERY_PROVIDERUnknown permission
READ_GSERVICESUnknown permission
USE_CREDENTIALS Allows an application to request authtokens from the AccountManager
VIBRATE Allows access to the vibrator
WAKE_LOCK Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming
WRITE_EXTERNAL_STORAGE Allows an application to write to external storage.
WRITE_SETTINGS Allows an application to read or write the system settings.
WRITE_SYNC_SETTINGS Allows applications to write the sync settings
Class com.android.camera.processing.ProcessingService
Class com.android.camera.prewarm.NoOpPrewarmService
Class com.android.camera.silentfeedback.SilentFeedbackService
Virus Total scan results
None of the 57 scanners detected malicious behavior.
Disassembled source code
Hardcoded URL's
Dynamic malware analysis
Screenshot or animated GIF of the analysed application

No screenshot taken during dynamic analysis.

This most likely means that your application did not run correctly on our test device.
Our test devices run Android 4.1 Jelly Bean (API level 16), and currently do not support hardware OpenGL acceleration.

Since the application did not run correctly, the results in the sections below could be incomplete!

Disk activity
Accessed files
No files were accessed.
Network activity
Opened network connections
No network connections were opened.
Automatically placed calls and text messages
Placed phone calls
No phone calls were placed automatically.
Sent SMS messages
No text messages were placed automatically.
Cryptographic activity
Used encryption keys
No cryptographic activity detected.
Encryption operations
No cryptographic activity detected.
Decryption operations
No cryptographic activity detected.
Information leakage
Network information leakage
No network information leakage detected.
SMS information leakage
No SMS information leakage detected.
File information leakage
No file information leakage detected.
Started services
No services were started.
Output generated by ADB logcat
Download ADB logcat file (text format - 40 KB)
report overview | terms & conditions | support & feedback | nviso.be