Skip to content

allertaLOM - 1.4.0

Warning

Aether static analyses of apps can reveal what trackers are embedded in an application. It can also reveal which permissions the application requires in order to correctly operate on your smartphone and what are operations the app could execute. A static analysis can not provide conclusive evidence whether app features listed in this report are actually used in practice.

Warning

The report lists trackers signatures found by static analysis in the APK. This is not a proof of activity of these trackers. The application could also contain tracker(s) we do not know yet.

APK details

  • Size: 9.18MB
  • MD5: ff676eabe6702a0f4a70e83aecbfbcc5
  • SHA1: 4ef20740d404c29d2b4ba7f5da78396dedf0aec1
  • SHA256: 2e5b4588938633285c5edf0c796df5cab7213d5c088a949bbe09637dfc3ca3a6
  • UAID: 825A71A8C3D2BA0E3DAD2B14537A8F716AE36DF9
  • Package name: it.lispa.sire.app.mobile.allertalom
  • Main activity: it.lispa.sire.app.mobile.allertalom.MainActivity
  • Application name: allertaLOM
  • Version name: 1.4.0
  • Version code: 1582806104

Application features overview

  • The application probably makes OS calls.

  • The application probably executes OS commands.

  • The application probably loads JS-capable web views.

  • The application probably gets the advertising ID for tracking purposes.

  • The application probably gets network interfaces addresses (IP and/or MAC).

  • The application probably gets the network connections information.

  • The application probably reads the system settings.

  • The application probably gets different information regarding the telephony capabilities.

  • The application probably sends data over HTTP/S.

  • The application probably uses cryptography.

Certificate

Common Name: Lombardia Informatica S.p.A, Organizational Unit: PMTA, Organization: LISPA, Locality: Italia, State/Province: Milano, Country: IT

Permissions

  • android.permission.WAKE_LOCK

  • android.permission.ACCESS_NETWORK_STATE

  • android.permission.CALL_PHONE

  • com.google.android.c2dm.permission.RECEIVE

  • android.permission.INTERNET

  • android.permission.WRITE_EXTERNAL_STORAGE

  • android.permission.READ_EXTERNAL_STORAGE

  • android.permission.GET_ACCOUNTS

  • it.lispa.sire.app.mobile.allertalom.permission.C2D_MESSAGE

Trackers

  • Google Firebase Analytics

Detection rules

The application probably makes OS calls.

Entrypoints:

  • android.support.v4.graphics.TypefaceCompatApi21Impl.createFromFontInfo()

Calls:

  • android.system.OsConstants.S_ISREG(I)

  • android.system.Os.stat(String)

  • android.system.Os.readlink(String)

The application probably executes OS commands.

Entrypoints:

  • de.cyberkatze.iroot.IRoot$2.run()

  • de.cyberkatze.iroot.IRoot$3.run()

  • de.cyberkatze.iroot.IRoot$4.run()

Calls:

  • java.lang.Runtime.exec(String)

  • java.lang.Runtime.exec([Ljava/lang/String;)

The application probably loads JS-capable web views.

Entrypoints:

  • com.ionicframework.cordova.webview.IonicWebViewEngine.init()

  • org.apache.cordova.inappbrowser.InAppBrowser$2.run()

  • org.apache.cordova.inappbrowser.InAppBrowser$6.run()

  • org.apache.cordova.inappbrowser.InAppBrowser$5.run()

  • org.apache.cordova.inappbrowser.InAppBrowser$7$4.onKey()

  • com.ionicframework.cordova.webview.IonicWebViewEngine$ServerClient.onPageStarted()

  • org.apache.cordova.inappbrowser.InAppBrowser$7.run()

  • com.ionicframework.cordova.webview.IonicWebViewEngine$ServerClient.onPageFinished()

Calls:

  • android.webkit.WebView.addJavascriptInterface(Object,String)

  • android.webkit.WebSettings.setJavaScriptEnabled(Z)

  • android.webkit.WebView.loadUrl(String)

The application probably gets the advertising ID for tracking purposes.

Entrypoints:

  • com.google.android.gms.internal.zzauf$3.run()

  • com.google.android.gms.internal.zzauf$10.run()

  • com.google.android.gms.internal.zzauf$2.run()

  • com.google.android.gms.internal.zzauf$5.run()

  • com.google.android.gms.internal.zzauf$4.run()

  • com.google.android.gms.internal.zzauf$12.call()

  • com.google.android.gms.internal.zzauf$14.run()

  • com.google.android.gms.internal.zzauf$13.run()

  • com.google.android.gms.internal.zzauf$11.run()

  • com.google.android.gms.internal.zzauf$16.run()

  • com.google.android.gms.internal.zzauf$1.run()

Calls:

  • com.google.android.gms.ads.identifier.AdvertisingIdClient.getAdvertisingIdInfo(Context)
The application probably gets network interfaces addresses (IP and/or MAC).

Entrypoints:

  • okhttp3.internal.http2.Http2Connection$Builder.socket()

Calls:

  • java.net.Socket.getRemoteSocketAddress()
The application probably gets the network connections information.

Entrypoints:

  • com.google.firebase.iid.FirebaseInstanceIdService.handleIntent()

  • com.google.android.gms.internal.zzauf$4.run()

  • com.google.android.gms.internal.zzauf$5.run()

  • com.google.firebase.iid.FirebaseInstanceIdService$zza.onReceive()

  • com.google.android.gms.internal.zzatz$1.run()

  • com.google.android.gms.internal.zzauf$3.run()

  • org.apache.cordova.networkinformation.NetworkManager.execute()

  • com.google.android.gms.internal.zzaue$3.zza()

  • org.apache.cordova.networkinformation.NetworkManager$1.onReceive()

  • com.google.android.gms.internal.zzauf$16.run()

  • android.support.v4.net.ConnectivityManagerCompat.getNetworkInfoFromBroadcast()

  • com.google.android.gms.internal.zzauf$10.run()

  • com.google.android.gms.internal.zzaum$1.run()

  • com.google.android.gms.internal.zzauf$2.run()

  • com.google.android.gms.internal.zzatz.onReceive()

  • com.google.android.gms.internal.zzauf$11.run()

  • com.google.android.gms.internal.zzaue$1.run()

  • android.support.v4.net.ConnectivityManagerCompat.isActiveNetworkMetered()

  • com.google.android.gms.internal.zzaue$4.zza()

Calls:

  • android.net.ConnectivityManager.getActiveNetworkInfo()

  • android.net.ConnectivityManager.getNetworkInfo(I)

The application probably reads the system settings.

Entrypoints:

  • com.google.android.gms.internal.zzauf$3.run()

  • com.google.android.gms.internal.zzauf$10.run()

  • com.google.android.gms.internal.zzauf$2.run()

  • org.apache.cordova.device.Device.initialize()

  • com.google.android.gms.internal.zzauf$5.run()

  • android.support.v4.media.MediaSessionManagerImplApi21.isTrustedForMediaControl()

  • com.google.android.gms.internal.zzauf$4.run()

  • android.support.v4.app.NotificationManagerCompat$SideChannelManager.handleMessage()

  • com.google.android.gms.internal.zzauf$11.run()

  • com.google.android.gms.internal.zzauf$16.run()

Calls:

  • android.provider.Settings$Secure.getString(ContentResolver,String)
The application probably gets different information regarding the telephony capabilities.

Entrypoints:

  • com.rohithvaranasi.callnumber.CFCallNumber.execute()

  • com.rohithvaranasi.callnumber.CFCallNumber.onRequestPermissionResult()

Calls:

  • android.telephony.TelephonyManager.getPhoneType()
The application probably sends data over HTTP/S.

Entrypoints:

  • com.silkimen.http.HttpRequest.acceptGzipEncoding()

  • com.silkimen.http.HttpRequest.header()

  • com.silkimen.http.HttpRequest.eTag()

  • com.silkimen.cordovahttp.CordovaHttpBase.run()

  • com.silkimen.http.HttpRequest.writePartHeader()

  • com.silkimen.http.HttpRequest.isBodyEmpty()

  • okhttp3.internal.huc.OkHttpsURLConnection.setRequestMethod()

  • okhttp3.internal.huc.OkHttpsURLConnection.setRequestProperty()

  • com.silkimen.http.HttpRequest.ifNoneMatch()

  • com.silkimen.http.HttpRequest.date()

  • com.silkimen.cordovahttp.CordovaHttpDownload.processResponse()

  • com.silkimen.http.HttpRequest.badRequest()

  • com.silkimen.http.HttpRequest.notModified()

  • com.silkimen.http.HttpRequest.toString()

  • com.silkimen.http.HttpRequest.basic()

  • com.ionicframework.cordova.webview.IonicWebViewEngine$ServerClient.shouldInterceptRequest()

  • com.silkimen.http.HttpRequest.proxyBasic()

  • com.silkimen.http.HttpRequest.useCaches()

  • org.apache.cordova.filetransfer.FileTransfer$1.run()

  • org.apache.cordova.file.ContentFilesystem.getFileMetadataForLocalURL()

  • com.silkimen.http.HttpRequest.reader()

  • com.silkimen.http.HttpRequest.part()

  • com.silkimen.http.HttpRequest.chunk()

  • org.apache.cordova.CordovaWebViewImpl$EngineClient.onNavigationAttempt()

  • com.silkimen.http.HttpRequest.referer()

  • com.silkimen.http.HttpRequest.connectTimeout()

  • org.apache.cordova.inappbrowser.InAppBrowser$1.run()

  • com.silkimen.http.HttpRequest.disconnect()

  • com.silkimen.http.HttpRequest.ok()

  • com.silkimen.http.HttpRequest.receive()

  • com.silkimen.http.HttpRequest.send()

  • org.apache.cordova.file.LocalFilesystem.getFileMetadataForLocalURL()

  • com.silkimen.http.HttpRequest.headers()

  • com.silkimen.http.HttpRequest.userAgent()

  • com.silkimen.http.HttpRequest.bytes()

  • org.apache.cordova.file.AssetFilesystem.getFileForLocalURL()

  • com.silkimen.http.HttpRequest.writer()

  • com.silkimen.http.HttpRequest.acceptJson()

  • com.silkimen.http.HttpRequest.contentLength()

  • com.silkimen.cordovahttp.CordovaHttpUpload.sendBody()

  • com.silkimen.http.HttpRequest.ifModifiedSince()

  • com.silkimen.http.HttpRequest.body()

  • com.silkimen.http.HttpRequest.contentType()

  • org.apache.cordova.filetransfer.FileTransfer$2.run()

  • com.silkimen.http.HttpRequest.location()

  • com.silkimen.http.HttpRequest.lastModified()

  • com.silkimen.http.HttpRequest.parameters()

  • com.silkimen.http.HttpRequest.cacheControl()

  • com.silkimen.http.HttpRequest.noContent()

  • com.silkimen.http.HttpRequest.form()

  • com.silkimen.http.HttpRequest.notFound()

  • com.silkimen.http.HttpRequest.serverError()

  • com.silkimen.http.HttpRequest.message()

  • com.google.android.gms.internal.zzaa.zza()

  • com.silkimen.http.HttpRequest.created()

  • com.silkimen.http.HttpRequest.code()

  • com.silkimen.http.HttpRequest.server()

  • com.silkimen.http.HttpRequest.expires()

Calls:

  • java.net.HttpURLConnection.setRequestMethod(String)

  • java.net.HttpURLConnection.setRequestProperty(String,String)

The application probably uses cryptography.

Entrypoints:

  • com.crypho.plugins.SecureStorage$1.run()

  • com.crypho.plugins.RSA.<clinit>()

  • com.crypho.plugins.SecureStorage.execute()

  • com.crypho.plugins.SecureStorage$2.run()

  • com.crypho.plugins.AES.<clinit>()

  • com.crypho.plugins.SecureStorage$3.run()

Calls:

  • javax.crypto.Cipher.doFinal([B)

  • javax.crypto.Cipher.getIV()

  • javax.crypto.Cipher.init(I,Key,AlgorithmParameterSpec)

  • javax.crypto.Cipher.getInstance(String)

  • javax.crypto.Cipher.init(I,Key)

Domains

  • api.whatsapp.com

  • appcom-mobapp-prod.firebaseio.com

  • play.google.com