Skip to content

Corona Kavach - 1.1.2

Warning

Aether static analyses of apps can reveal what trackers are embedded in an application. It can also reveal which permissions the application requires in order to correctly operate on your smartphone and what are operations the app could execute. A static analysis can not provide conclusive evidence whether app features listed in this report are actually used in practice.

Warning

The report lists trackers signatures found by static analysis in the APK. This is not a proof of activity of these trackers. The application could also contain tracker(s) we do not know yet.

APK details

  • Size: 5.21MB
  • MD5: b42c215ae768530578560aa1016c3f7b
  • SHA1: d41d66b21d20f7eb97fe14fc82eb038536eac462
  • SHA256: beffb56585ed5b978453294f06b4ef1c483c66391fd6d117c57bc26ea6077568
  • UAID: E48D1502F593CEC4CC7E92074D714E4EAF6EA294
  • Package name: com.cosafe.android
  • Main activity: com.cosafe.android.SplashActivity
  • Application name: Corona Kavach
  • Version name: 1.1.2
  • Version code: 5

Application features overview

  • The application probably makes OS calls.

  • The application probably loads JS-capable web views.

  • The application probably plays sound.

  • The application probably gets all the contacts.

  • The application probably gets the location based on GPS and/or Wi-Fi.

  • The application probably gets network interfaces addresses (IP and/or MAC).

  • The application probably gets the network connections information.

  • The application probably gets memory and CPU information.

  • The application probably reads the system settings.

  • The application probably sends data over HTTP/S.

  • The application probably uses Bluetooth

  • The application probably uses reflection.

Certificate

Common Name: Negd, Organizational Unit: Negd, Organization: Negd, Locality: New Delhi, State/Province: New Delhi, Country: 91

Permissions

  • android.permission.ACCESS_NETWORK_STATE

  • android.permission.ACCESS_FINE_LOCATION

  • android.permission.ACCESS_COARSE_LOCATION

  • android.permission.INTERNET

  • android.permission.WRITE_EXTERNAL_STORAGE

  • android.permission.READ_EXTERNAL_STORAGE

  • android.permission.READ_PHONE_STATE

  • android.permission.ACCESS_WIFI_STATE

  • android.permission.FOREGROUND_SERVICE

  • android.permission.BLUETOOTH_ADMIN

  • android.permission.BLUETOOTH

Trackers

No trackers found.

Detection rules

The application probably makes OS calls.

Entrypoints:

  • androidx.core.graphics.TypefaceCompatApi21Impl.createFromFontInfo()

Calls:

  • android.system.OsConstants.S_ISREG(I)

  • android.system.Os.stat(String)

  • android.system.Os.readlink(String)

The application probably loads JS-capable web views.

Entrypoints:

  • com.cosafe.android.MainActivity.onClick()

  • com.cosafe.android.MainActivity$2.shouldOverrideUrlLoading()

  • com.cosafe.android.MainActivity.onCreate()

Calls:

  • android.webkit.WebSettings.setJavaScriptEnabled(Z)

  • android.webkit.WebView.loadUrl(String)

The application probably plays sound.

Entrypoints:

  • androidx.appcompat.app.AppCompatDelegateImpl$AppCompatWindowCallback.dispatchKeyEvent()

  • androidx.appcompat.app.AppCompatDelegateImpl$ListMenuDecorView.dispatchKeyEvent()

Calls:

  • android.media.AudioManager.playSoundEffect(I)
The application probably gets all the contacts.

Entrypoints:

Calls:

  • android.provider.ContactsContract$Contacts.lookupContact(ContentResolver,Uri)

  • android.provider.ContactsContract$Contacts.openContactPhotoInputStream(ContentResolver,Uri,Z)

The application probably gets the location based on GPS and/or Wi-Fi.

Entrypoints:

  • androidx.appcompat.app.AppCompatDelegateImpl$AutoTimeNightModeManager.getApplyableNightMode()

  • com.cosafe.android.utils.GPSTracker.<init>()

Calls:

  • android.location.LocationManager.getLastKnownLocation(String)

  • android.location.LocationManager.requestLocationUpdates(String,J,F,LocationListener)

The application probably gets network interfaces addresses (IP and/or MAC).

Entrypoints:

  • okhttp3.internal.http2.Http2Connection$Builder.socket()

Calls:

  • java.net.Socket.getRemoteSocketAddress()
The application probably gets the network connections information.

Entrypoints:

  • com.cosafe.android.utils.AppAsyncReqUtil.isNetworkAvailable()

  • com.cosafe.android.LoginActivity.onClick()

  • androidx.core.net.ConnectivityManagerCompat.getNetworkInfoFromBroadcast()

  • androidx.core.net.ConnectivityManagerCompat.isActiveNetworkMetered()

  • com.cosafe.android.UploadActivity.onClick()

  • com.cosafe.android.FormActivity$2.onClick()

  • com.bumptech.glide.manager.DefaultConnectivityMonitor$1.onReceive()

  • com.bumptech.glide.manager.DefaultConnectivityMonitor.onStart()

Calls:

  • android.net.ConnectivityManager.getActiveNetworkInfo()

  • android.net.ConnectivityManager.getNetworkInfo(I)

The application probably gets memory and CPU information.

Entrypoints:

  • com.bumptech.glide.Glide.init()

  • com.bumptech.glide.manager.SupportRequestManagerFragment.onAttach()

  • com.bumptech.glide.load.resource.bitmap.DrawableTransformation.transform()

  • com.bumptech.glide.load.model.stream.MediaStoreVideoThumbLoader.buildLoadData()

  • com.bumptech.glide.load.resource.gif.ByteBufferGifDecoder.<init>()

  • com.cosafe.android.MainActivity.onCreate()

  • com.bumptech.glide.load.resource.gif.GifDrawable.<init>()

  • com.bumptech.glide.load.resource.bitmap.VideoBitmapDecoder.<init>()

  • com.bumptech.glide.load.resource.bitmap.LazyBitmapDrawableResource.obtain()

  • com.bumptech.glide.load.resource.bitmap.BitmapTransformation.transform()

  • com.bumptech.glide.load.resource.gif.ByteBufferGifDecoder.decode()

  • com.bumptech.glide.Glide.with()

  • com.bumptech.glide.load.model.stream.MediaStoreImageThumbLoader.buildLoadData()

  • com.bumptech.glide.load.resource.gif.GifDrawableTransformation.transform()

  • com.bumptech.glide.manager.RequestManagerFragment.onAttach()

  • com.cosafe.android.ViewPagerAdapter.onBindViewHolder()

  • com.bumptech.glide.load.engine.executor.GlideExecutor.newSourceExecutor()

Calls:

  • java.lang.Runtime.availableProcessors()
The application probably reads the system settings.

Entrypoints:

  • androidx.media.MediaSessionManagerImplApi21.isTrustedForMediaControl()

  • com.cosafe.android.LoginActivity.onClick()

  • com.cosafe.android.service.AppService.onCreate()

  • com.cosafe.android.MainActivity.onContinuousLocationUpdate()

  • androidx.core.app.NotificationManagerCompat$SideChannelManager.handleMessage()

  • com.cosafe.android.utils.DownloadDataManager.doInBackground()

  • com.cosafe.android.LoginActivity.isSuccess()

  • com.cosafe.android.LoginActivity.onCreate()

  • com.cosafe.android.UploadActivityNew$2.onClick()

Calls:

  • android.provider.Settings$Secure.getString(ContentResolver,String)
The application probably sends data over HTTP/S.

Entrypoints:

  • com.cosafe.android.utils.UploadManager.doInBackground()

Calls:

  • java.net.HttpURLConnection.setRequestMethod(String)

  • java.net.HttpURLConnection.setRequestProperty(String,String)

The application probably uses Bluetooth

Entrypoints:

  • com.cosafe.android.service.AppService.onCreate()

  • com.cosafe.android.MainActivity$6.onReceive()

  • com.cosafe.android.service.AppService$1.run()

  • com.cosafe.android.MainActivity.onCreate()

Calls:

  • android.bluetooth.BluetoothAdapter.getDefaultAdapter()

  • android.bluetooth.BluetoothAdapter.disable()

  • android.bluetooth.BluetoothAdapter.getBluetoothLeScanner()

  • android.bluetooth.BluetoothAdapter.enable()

  • android.bluetooth.BluetoothAdapter.isEnabled()

  • android.bluetooth.BluetoothAdapter.getBluetoothLeAdvertiser()

The application probably uses reflection.

Entrypoints:

  • com.google.gson.internal.reflect.UnsafeReflectionAccessor.makeAccessible()

  • com.google.gson.internal.reflect.PreJava9ReflectionAccessor.makeAccessible()

Calls:

  • java.lang.reflect.AccessibleObject.setAccessible(Z)

Domains

  • test1.ncog.gov.in

  • delhipolice.ncog.gov.in

  • api.ncog.gov.in

  • play.google.com