Adhan Time Holy Quran Classic_v1.4.1_apkpure.com.apk
This report is generated from a file or URL submitted to this webservice on May 19th 2024 02:25:11 (UTC)
Report generated by
Falcon Sandbox v8.00 © Hybrid Analysis
Incident Response
Risk Assessment
- Fingerprint
- Has the ability to identify network operator related data
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
-
Suspicious Indicators 5
-
Environment Awareness
-
Possibly tries to implement anti-virtualization techniques
- details
-
"vbox86p" (Indicator: "vbox")
"vbox86tp" (Indicator: "vbox") - source
- File/Memory
- relevance
- 4/10
-
Possibly tries to implement anti-virtualization techniques
-
General
-
Uses java reflection classes
- details
-
Found invoke in "com.facebook.ads.internal.util.h.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.facebook.ads.internal.util.g.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.google.android.youtube.player.internal.v.smali" to "java.lang.reflect.Field.get"
Found invoke in "com.google.android.gms.security.ProviderInstaller.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.google.android.gms.ads.internal.purchase.zzb.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.google.android.gms.ads.internal.purchase.zzd.smali" to "java.lang.reflect.Method.invoke"
Found invoke in "com.google.android.gms.ads.internal.util.client.zza.smali" to "java.lang.reflect.Method.invoke" - source
- Static Parser
- relevance
- 3/10
-
Uses java reflection classes
-
Network Related
-
Has the ability to identify network operator related data
- details
- Found invoke in "com.facebook.ads.internal.dto.f.smali" to "android.telephony.TelephonyManager.getNetworkOperatorName"
- source
- Static Parser
- relevance
- 10/10
-
Has the ability to identify network operator related data
-
Unusual Characteristics
-
Found an indicator for phone dialing capabilities
- details
-
"tel:" (Indicator: "tel:"; File: "c.smali")
"android.intent.action.CALL" (Indicator: "android.intent.action.CALL"; File: "c.smali") - source
- File/Memory
- relevance
- 10/10
-
Found an indicator for phone dialing capabilities
-
Hiding 1 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
-
Informative 4
-
External Systems
-
Sample was identified as clean by Antivirus engines
- details
- 0/59 Antivirus vendors marked sample as malicious (0% detection rate)
- source
- External System
- relevance
- 10/10
-
Sample was identified as clean by Antivirus engines
-
General
-
Tests the internet connectivity
- details
-
Found invoke in "com.facebook.ads.internal.server.a.smali" to "android.net.NetworkInfo.isConnected"
Found invoke in "com.facebook.ads.internal.server.a.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo"
Found invoke in "com.facebook.ads.internal.dto.f.smali" to "android.net.NetworkInfo.isConnectedOrConnecting"
Found invoke in "com.facebook.ads.internal.dto.f.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo" - source
- Static Parser
- relevance
- 3/10
-
Tests the internet connectivity
-
Network Related
-
Found potential URL in binary/memory
- details
-
Heuristic match: "VerseByVerseQuran.Com"
Pattern match: "www.dvdvideosoft.comAPIC"
Heuristic match: "2011www.dvdvideosoft.com"
Pattern match: "www.ezan.gen.trWOAF"
Heuristic match: "g!?s.i.dk"
Pattern match: "www.ezan.gen.tr"
Pattern match: "https://ad6.liverail.com/"
Pattern match: "https://ad6.%s.liverail.com/"
Pattern match: "https://graph.facebook.com/network_ads_common/"
Pattern match: "https://graph.%s.facebook.com/network_ads_common/"
Pattern match: "https://www.facebook.com/"
Pattern match: "https://www.%s.facebook.com"
Pattern match: "http://www.youtube.com/playlist?list="
Pattern match: "http://www.youtube.com/watch?v="
Pattern match: "http://www.youtube.com/user/"
Pattern match: "http://play.google.com/store/apps/details"
Heuristic match: "com.google.android.tv"
Pattern match: "pagead2.googlesyndication.com/pagead/gen_204"
Pattern match: "https://www.googleapis.com/auth/games"
Pattern match: "https://www.googleapis.com/auth/games.firstparty"
Heuristic match: "popupLocationInfo.top"
Pattern match: "google.com/iid"
Pattern match: "gcm.googleapis.com/refresh"
Pattern match: "https://accounts.google.com"
Pattern match: "https://www.facebook.com"
Pattern match: "https://www.googleapis.com/auth/fitness.activity.read"
Pattern match: "https://www.googleapis.com/auth/fitness.activity.write"
Pattern match: "https://www.googleapis.com/auth/fitness.location.read"
Pattern match: "https://www.googleapis.com/auth/fitness.location.write"
Pattern match: "https://www.googleapis.com/auth/fitness.body.read"
Pattern match: "https://www.googleapis.com/auth/fitness.body.write"
Pattern match: "https://www.googleapis.com/auth/fitness.nutrition.read"
Pattern match: "https://www.googleapis.com/auth/fitness.nutrition.write" - source
- File/Memory
- relevance
- 10/10
-
Found potential URL in binary/memory
-
Spyware/Information Retrieval
-
Found a reference to a known community page
- details
-
"res/drawable/paypal.png" (Indicator: "paypal")
"https://graph.facebook.com/network_ads_common/" (Indicator: "facebook.com")
"https://graph.%s.facebook.com/network_ads_common/" (Indicator: "facebook.com")
"https://www.facebook.com/" (Indicator: "facebook.com")
"https://www.%s.facebook.com" (Indicator: "facebook.com")
"http://www.youtube.com/playlist?list=" (Indicator: "youtube")
"com.google.android.youtube.googletv" (Indicator: "youtube")
"com.google.android.youtube" (Indicator: "youtube")
"http://www.youtube.com/watch?v=" (Indicator: "youtube")
"com.google.android.youtube.intent.action.UPLOAD" (Indicator: "youtube")
"http://www.youtube.com/user/" (Indicator: "youtube")
"A YouTubePlayerView can only be created with an Activity which extends YouTubeBaseActivity as its context." (Indicator: "youtube")
"Can\'t perform resolution for YouTubeInitalizationError" (Indicator: "youtube")
"YouTubeAndroidPlayerAPI" (Indicator: "youtube")
"YouTubeBaseActivity.KEY_PLAYER_VIEW_STATE" (Indicator: "youtube")
"YouTubePlayerSupportFragment.KEY_PLAYER_VIEW_STATE" (Indicator: "youtube")
"YouTubePlayerFragment.KEY_PLAYER_VIEW_STATE" (Indicator: "youtube")
"com.google.android.youtube.api.StandalonePlayerActivity.START" (Indicator: "youtube")
"com.google.android.youtube.player.internal.IYouTubeService" (Indicator: "youtube")
"com.google.android.youtube.player.internal.IPlayerStateChangeListener" (Indicator: "youtube") - source
- File/Memory
- relevance
- 7/10
-
Found a reference to a known community page
File Details
Adhan Time Holy Quran Classic_v1.4.1_apkpure.com.apk
- Filename
- Adhan Time Holy Quran Classic_v1.4.1_apkpure.com.apk
- Size
- 19MiB (20105400 bytes)
- Type
- android
- Description
- Java archive data (JAR)
- Architecture
- SHA256
- aa7e50e6e55853c684b07993632d05ebf3815873f0614b07032f00f5b428fd8e
- MD5
- 4bffa3d43397ece98c79ae06e96bf1ff
- SHA1
- 6bdc7fed9e7cbe48e7b8ebdc96f0263491201c2b
Version Info
- Minimum SDK
- 10 (Gingerbread MR1)
- Target SDK
- 17 (Jelly Bean MR1)
- Version Code
- 8
- Version Name
- 1.4.1
- Package Name
- com.mobilexsoft.ezanvaktiold
- Entrypoint
- com.mobilexsoft.ezanvaktiold.EzanVaktiActivity
Classification (TrID)
- 66.4% (.APK) Android Package
- 18.3% (.JAR) Java Archive
- 10.1% (.WIDGET) Konfabulator widget
- 5.0% (.ZIP) ZIP compressed archive
File Permissions
Permission | Description |
---|---|
android.permission.INTERNET | Allows applications to open network sockets. |
android.permission.ACCESS_COARSE_LOCATION | Allows an app to access approximate location. |
android.permission.ACCESS_FINE_LOCATION | Allows an app to access precise location. |
android.permission.ACCESS_MOCK_LOCATION | - |
android.permission.ACCESS_LOCATION_EXTRA_COMMANDS | Allows an application to access extra location provider commands. |
android.permission.ACCESS_NETWORK_STATE | Allows applications to access information about networks. |
android.permission.ACCESS_GPS | - |
android.permission.WAKE_LOCK | Allows using PowerManager WakeLocks to keep processor from sleeping or screen from dimming. |
android.permission.VIBRATE | Allows access to the vibrator. |
android.permission.WRITE_EXTERNAL_STORAGE | Allows an application to write to external storage. |
android.permission.READ_PHONE_STATE | Allows read only access to phone state. |
File Activities
Activity | Description |
---|---|
com.mobilexsoft.ezanvaktiold.EzanVaktiActivity | Entrypoint |
com.mobilexsoft.ezanvaktiold.UlkeSehirAyarActivity | - |
com.mobilexsoft.ezanvaktiold.AyarlarActivity | - |
com.mobilexsoft.ezanvaktiold.AmelDefteriActivity | - |
com.mobilexsoft.ezanvaktiold.AmelSoruEditActivity | - |
com.mobilexsoft.ezanvaktiold.DuaKardesligiActivity2 | - |
com.mobilexsoft.ezanvaktiold.HtmlKitapOkuyanActivity | - |
com.mobilexsoft.ezanvaktiold.HicriTakvimActivity | - |
com.mobilexsoft.ezanvaktiold.TesbihatActivity | - |
com.mobilexsoft.ezanvaktiold.DiniGunlerActivity | - |
com.mobilexsoft.ezanvaktiold.AsirActivity | - |
com.mobilexsoft.ezanvaktiold.KutuphaneActivity | - |
com.mobilexsoft.ezanvaktiold.KibleMapsActivity | - |
com.mobilexsoft.ezanvaktiold.EzanVaktiActivityEski | - |
com.mobilexsoft.ezanvaktiold.Compass | - |
com.mobilexsoft.ezanvaktiold.zikirmatik.ZikirmatikActivity | - |
com.mobilexsoft.ezanvaktiold.CumaAyarActivity | - |
com.mobilexsoft.ezanvaktiold.TestActivity | - |
com.mobilexsoft.ezanvaktiold.MekkeActivity | - |
com.mobilexsoft.ezanvaktiold.VakitlerActivity | - |
com.mobilexsoft.ezanvaktiold.FazlasiActivity | - |
com.mobilexsoft.ezanvaktiold.hatim.HatimActivity | - |
com.mobilexsoft.ezanvaktiold.hatim.YeniHatimBaslatActivity | - |
com.mobilexsoft.ezanvaktiold.KazalarActivity | - |
com.mobilexsoft.ezanvaktiold.KuranOkuyanActivity | - |
com.mobilexsoft.ezanvaktiold.MushafActivity | - |
com.mobilexsoft.ezanvaktiold.HatirlaticilarActivity | - |
com.mobilexsoft.ezanvaktiold.HatirlatanActivity | - |
com.mobilexsoft.ezanvaktiold.MessengerActivity | - |
com.mobilexsoft.ezanvaktiold.UyariVerenActivity | - |
com.mobilexsoft.ezanvaktiold.EzanOkuyanActivity | - |
com.mobilexsoft.ezanvaktiold.HakkindaActivity | - |
com.mobilexsoft.ezanvaktiold.AmelUyariActivity | - |
com.mobilexsoft.ezanvaktioldcom.google.android.gms.ads.AdActivity | - |
File Receivers
Receiver | Intents |
---|---|
.EzanVaktiBootupReceiver | android.intent.action.BOOT_COMPLETED |
.updatewidget |
android.appwidget.action.APPWIDGET_UPDATE
com.mobilexsoft.ezanvakti.updatewidget.DKEZAN_WIDGET_UPDATE |
.updatewidget2 |
android.appwidget.action.APPWIDGET_UPDATE
com.mobilexsoft.ezanvakti.updatewidget.DKEZAN_WIDGET_UPDATE2 |
File Certificates
Owner | Issuer | Validity | Hashes (MD5, SHA1) |
---|---|---|---|
CN=Mobilex, OU=software, C=TR | CN=Mobilex, OU=software, C=TR Serial: 4e848a71 |
09/29/2011 16:10:41 09/22/2036 16:10:41 |
B0:20:C2:E2:58:FD:02:B4:C3:B2:DB:75:18:0E:B5:5D F3:74:8C:F4:E4:7B:6D:AA:1A:99:DD:27:9B:6E:50:6E:97:0F:1A:23 |
Extracted Strings
Extracted Files
No significant files were extracted.
Notifications
-
Runtime
- Not all IP/URL string resources were checked online
- Not all sources for indicator ID "string-10" are available in the report
- Not all strings are visible in the report, because the maximum number of strings was reached (5000)