Download
Download
XVIDEOS (0.66)
File Name: base.apk
Grade:
B
Trackers Detection: 2/432
FINDINGS SEVERITY
5 13 3 1 1
FILE INFORMATION
File Name: base.apk
Size: 3.69MB
MD5: 50f8f9ea9b8e56eecdf9ac6b03dba257
SHA1: 6d2424d224be013291527f5d99b3c3363deb5dd6
SHA256: 5e49e290f980d85ec946fdd403c57459985210b9bbb61857a8ffef17acf25d98
APP INFORMATION
App Name: XVIDEOS
Package Name: com.wg.xvideos.app
Main Activity:
Target SDK: 29
Min SDK: 16
Max SDK:
Android Version Name: 0.66
Android Version Code: 5
APP COMPONENTS
Activities: 5
Services: 6
Receivers: 4
Providers: 4
Exported Activities: 3
Exported Services: 0
Exported Receivers: 0
Exported Providers: 1
CERTIFICATE INFORMATION
Binary is signed
v1 signature: True
v2 signature: True
v3 signature: False
v4 signature: False
X.509 Subject: O=Xvideos, OU=Android Development
Signature Algorithm: rsassa_pkcs1v15
Valid From: 2019-10-18 11:44:55+00:00
Valid To: 2074-10-04 11:44:55+00:00
Issuer: O=Xvideos, OU=Android Development
Serial Number: 0x779faf0d
Hash Algorithm: sha256
md5: 3b72936d488106ddbeab29e959fa264c
sha1: d1bf7d822bb2ab1a1e3a066f28a5cc88faf9297b
sha256: faeadd29cb91e775c3de67782d8dd8ee860c04da175f5dcdf37b4925cc8d8ca6
sha512: 0724d81082c1cc9db9fd222903488b4281b72f5fa5d2c0a134d0ff8f6f0281375c9c4c3fd7725db0adb6efb861602048f50d12dab2cb5c023789dbf7bca8db79
PublicKey Algorithm: rsa
Bit Size: 2048
Fingerprint: be72269305017f723219c6d861f824f712fadd5d85277f1471202d16a52402ed
Found 1 unique certificates
APPLICATION PERMISSIONS
enables an app to
Allows an application to request
android.permission.REQUEST_DELETE_PACKAGES normal request package
deleting packages.
deletions.
read/modify/delete
Allows an application to write to
android.permission.WRITE_EXTERNAL_STORAGE dangerous external storage
external storage.
contents
PERMISSION STATUS INFO DESCRIPTION
APKID ANALYSIS
FILE DETAILS
FILE DETAILS
FINDINGS DETAILS
Build.FINGERPRINT check
Build.MODEL check
Build.MANUFACTURER check
Anti-VM Code
Build.PRODUCT check
Build.TAGS check
possible VM check
classes.dex
Compiler r8
BROWSABLE ACTIVITIES
ACTIVITY INTENT
NETWORK SECURITY
NO SCOPE SEVERITY DESCRIPTION
CERTIFICATE ANALYSIS
HIGH: 0 | WARNING: 1 | INFO: 1
Application Application is signed with v1 signature scheme, making it vulnerable to Janus vulnerability on Android 5.0-8.0, if signed
vulnerable to Janus warning only with v1 signature scheme. Applications running on Android 5.0-7.0 signed with v1, and v2/v3 scheme is also
Vulnerability vulnerable.
MANIFEST ANALYSIS
HIGH: 4 | WARNING: 4 | INFO: 0 | SUPPRESSED: 0
The app intends to use cleartext network traffic, such as cleartext HTTP,
FTP stacks, DownloadManager, and MediaPlayer. The default value for
apps that target API level 27 or lower is "true". Apps that target API level
Clear text traffic is Enabled For App
2 high 28 or higher default to "false". The key reason for avoiding cleartext traffic
[android:usesCleartextTraffic=true]
is the lack of confidentiality, authenticity, and protections against
tampering; a network attacker can eavesdrop on transmitted data and
also modify it without being detected.
Activity (com.xvideos.common.activities.MainActivity) is not An Activity is found to be shared with other apps on the device therefore
5 Protected. warning leaving it accessible to any other application on the device. The presence
An intent-filter exists. of intent-filter indicates that the Activity is explicitly exported.
NO ISSUE SEVERITY DESCRIPTION
CODE ANALYSIS
HIGH: 1 | WARNING: 6 | INFO: 2 | SECURE: 0 | SUPPRESSED: 0
com/bumptech/glide/Glide.java
com/bumptech/glide/disklrucache/DiskL
ruCache.java
com/bumptech/glide/gifdecoder/GifHea
derParser.java
com/bumptech/glide/gifdecoder/Standa
rdGifDecoder.java
com/bumptech/glide/load/data/AssetPat
hFetcher.java
com/bumptech/glide/load/data/HttpUrl
Fetcher.java
com/bumptech/glide/load/data/LocalUri
Fetcher.java
com/bumptech/glide/load/data/mediast
com/bumptech/glide/load/data/mediast
NO ISSUE SEVERITY STANDARDS FILES
ore/ThumbFetcher.java
com/bumptech/glide/load/data/mediast
ore/ThumbnailStreamOpener.java
com/bumptech/glide/load/engine/Deco
deJob.java
com/bumptech/glide/load/engine/Deco
dePath.java
com/bumptech/glide/load/engine/Engin
e.java
com/bumptech/glide/load/engine/Glide
Exception.java
com/bumptech/glide/load/engine/Sourc
eGenerator.java
com/bumptech/glide/load/engine/bitma
p_recycle/LruArrayPool.java
com/bumptech/glide/load/engine/bitma
p_recycle/LruBitmapPool.java
com/bumptech/glide/load/engine/cache
/DiskLruCacheWrapper.java
com/bumptech/glide/load/engine/cache
/MemorySizeCalculator.java
com/bumptech/glide/load/engine/execu
tor/GlideExecutor.java
com/bumptech/glide/load/engine/execu
tor/RuntimeCompat.java
com/bumptech/glide/load/engine/prefill
/BitmapPreFillRunner.java
com/bumptech/glide/load/model/ByteB
ufferEncoder.java
com/bumptech/glide/load/model/ByteB
ufferFileLoader.java
com/bumptech/glide/load/model/FileLo
ader.java
com/bumptech/glide/load/model/Resou
rceLoader.java
com/bumptech/glide/load/model/Strea
mEncoder.java
com/bumptech/glide/load/resource/bit
map/BitmapEncoder.java
com/bumptech/glide/load/resource/bit
map/DefaultImageHeaderParser.java
NO ISSUE SEVERITY STANDARDS
CWE: CWE-532: Insertion of Sensitive Information FILES
com/bumptech/glide/load/resource/bit
The App logs information. Sensitive
1 info into Log File map/Downsampler.java
information should never be logged.
OWASP MASVS: MSTG-STORAGE-3 com/bumptech/glide/load/resource/bit
map/DrawableToBitmapConverter.java
com/bumptech/glide/load/resource/bit
map/HardwareConfigState.java
com/bumptech/glide/load/resource/bit
map/TransformationUtils.java
com/bumptech/glide/load/resource/bit
map/VideoDecoder.java
com/bumptech/glide/load/resource/gif/
ByteBufferGifDecoder.java
com/bumptech/glide/load/resource/gif/
GifDrawableEncoder.java
com/bumptech/glide/load/resource/gif/
StreamGifDecoder.java
com/bumptech/glide/manager/DefaultC
onnectivityMonitor.java
com/bumptech/glide/manager/DefaultC
onnectivityMonitorFactory.java
com/bumptech/glide/manager/Request
ManagerFragment.java
com/bumptech/glide/manager/Request
ManagerRetriever.java
com/bumptech/glide/manager/RequestT
racker.java
com/bumptech/glide/manager/Support
RequestManagerFragment.java
com/bumptech/glide/module/ManifestP
arser.java
com/bumptech/glide/request/SingleReq
uest.java
com/bumptech/glide/request/target/Cus
tomViewTarget.java
com/bumptech/glide/request/target/Vie
wTarget.java
com/bumptech/glide/signature/Applicati
onVersionSignature.java
com/bumptech/glide/util/ContentLength
InputStream.java
InputStream.java
com/bumptech/glide/util/pool/FactoryP
NO ISSUE SEVERITY STANDARDS FILES
ools.java
com/scottyab/aescrypt/AESCrypt.java
com/xvideos/common/CustomWebview
/VideoEnabledWebView.java
com/xvideos/common/activities/MainAc
tivity.java
com/xvideos/common/activities/Setting
sActivity.java
com/xvideos/common/service/Downloa
dErogesService.java
com/xvideos/common/utils/ArchLifecycl
eApp.java
com/xvideos/common/utils/Connectivit
yChangeReceiver.java
com/xvideos/common/utils/H.java
com/xvideos/common/utils/MyReceiver.
java
com/xvideos/common/activities/MainAc
tivity.java
com/xvideos/common/activities/Setting
sActivity.java
App can read/write to External CWE: CWE-276: Incorrect Default Permissions com/xvideos/common/service/Downloa
3 Storage. Any App can read data warning OWASP Top 10: M2: Insecure Data Storage dErogesService.java
written to External Storage. OWASP MASVS: MSTG-STORAGE-2 com/xvideos/common/utils/DownloadA
pkUtils.java
com/xvideos/common/utils/ExternalSto
rageUtil.java
lib/folderpicker/FolderPicker.java
NO ISSUE SEVERITY STANDARDS FILES
com/bumptech/glide/load/Option.java
com/bumptech/glide/load/engine/DataC
acheKey.java
com/bumptech/glide/load/engine/Engin
CWE: CWE-312: Cleartext Storage of Sensitive
Files may contain hardcoded eResource.java
Information
5 sensitive information like usernames, warning com/bumptech/glide/load/engine/Resou
OWASP Top 10: M9: Reverse Engineering
passwords, keys etc. rceCacheKey.java
OWASP MASVS: MSTG-STORAGE-14
com/bumptech/glide/manager/Request
ManagerRetriever.java
com/xvideos/common/activities/Passco
deActivity.java
App creates temp file. Sensitive CWE: CWE-276: Incorrect Default Permissions
com/xvideos/common/activities/MainAc
8 information should never be written warning OWASP Top 10: M2: Insecure Data Storage
tivity.java
into a temp file. OWASP MASVS: MSTG-STORAGE-2
NO ISSUE SEVERITY STANDARDS FILES
BEHAVIOUR ANALYSIS
com/xvideos/common/service/DownloadErogesService.java
Open a file from given absolute path
00022 file com/xvideos/common/utils/ExternalStorageUtil.java
of the file
lib/folderpicker/FolderPicker.java
com/xvideos/common/activities/MainActivity.java
00091 Retrieve data from broadcast collection com/xvideos/common/activities/SettingsActivity.java
lib/folderpicker/FolderPicker.java
com/xvideos/common/activities/MainActivity.java
Implicit intent(view a web page, make
00063 control com/xvideos/common/service/DownloadErogesService.java
a phone call, etc.)
com/xvideos/common/utils/DownloadApkUtils.java
com/xvideos/common/activities/MainActivity.java
00191 Get messages in the SMS inbox sms com/xvideos/common/service/DownloadErogesService.java
com/xvideos/common/utils/DownloadApkUtils.java
com/xvideos/common/AppIDProvider.java
Get resource file from res/raw
00036 reflection com/xvideos/common/activities/MainActivity.java
directory
com/xvideos/common/utils/DownloadApkUtils.java
com/xvideos/common/fragments/CravingQuestDialogFragment.java
00079 Hide the current app's icon evasion
com/xvideos/common/fragments/IconDialogFragment.java
com/bumptech/glide/disklrucache/DiskLruCache.java
00013 Read file and put it into a stream file com/bumptech/glide/load/model/FileLoader.java
okio/Okio.java
App talks to a
Firebase info The app talks to Firebase database at https://xvideos-c53d3.firebaseio.com
database
ABUSED PERMISSIONS
Other
Common 2/44 android.permission.FOREGROUND_SERVICE, com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
Permissions
Malware Permissions:
Top permissions that are widely abused by known malware.
Other Common Permissions:
Permissions that are commonly abused by known malware.
DOMAIN COUNTRY/REGION
IP: 3.120.162.38
Country: Germany
Region: Hessen
www.qwikisoft.com ok City: Frankfurt am Main
Latitude: 50.115520
Longitude: 8.684170
View: Google Map
IP: 185.88.181.10
Country: Netherlands
Region: Noord-Holland
www.xvideos.com ok City: Amsterdam
Latitude: 52.374031
Longitude: 4.889690
View: Google Map
IP: 206.189.103.198
Country: Netherlands
Region: Noord-Holland
api.veebs.org ok City: Amsterdam
Latitude: 52.374031
Longitude: 4.889690
View: Google Map
IP: 34.120.160.131
Country: United States of America
Region: Missouri
xvideos-c53d3.firebaseio.com ok City: Kansas City
Latitude: 39.099731
Longitude: -94.578568
View: Google Map
DOMAIN STATUS GEOLOCATION
IP: 141.0.173.175
Country: Netherlands
Region: Noord-Holland
xvideos.net ok City: Amsterdam
Latitude: 52.374031
Longitude: 4.889690
View: Google Map
TRACKERS
HARDCODED SECRETS
POSSIBLE SECRETS
"firebase_database_url" : "https://xvideos-c53d3.firebaseio.com"
"google_api_key" : "AIzaSyCYfQKMgPF5fzp67gksIdBcmjbTg-cPJcs"
"google_crash_reporting_api_key" : "AIzaSyCYfQKMgPF5fzp67gksIdBcmjbTg-cPJcs"
POSSIBLE SECRETS
"password" : "Password"
"password" : "Passwort"
"password" : "Κωδικός"
"password" : "Wachtwoord"
"password" : "Hasło"
"password" : "Passord"
"password" : "Parola"
"password" : "Parola"
POSSIBLE SECRETS
"password" : "Heslo"
"password" : "Contraseña"
"password" : "Password"
"password" : "Palavra-passe"
"password" : "Jelszó"
"password" : "Lösenord"
470fa2b4ae81cd56ecbcda9735803434cec591fa
258EAFA5-E914-47DA-95CA-C5AB0DC85B11
SCAN LOGS