Skip to content

Coronavírus SUS - 1.0.9

Warning

Aether static analyses of apps can reveal what trackers are embedded in an application. It can also reveal which permissions the application requires in order to correctly operate on your smartphone and what are operations the app could execute. A static analysis can not provide conclusive evidence whether app features listed in this report are actually used in practice.

Warning

The report lists trackers signatures found by static analysis in the APK. This is not a proof of activity of these trackers. The application could also contain tracker(s) we do not know yet.

APK details

  • Size: 11.88MB
  • MD5: 914cd7670600110374cd839296363e59
  • SHA1: 291c7b6162b6e6cd0659149c4c20ad1b4de21d7c
  • SHA256: cd2455b18f3a33decec3c97cc9a1c9ab367fb5ee417fcfa37e4f282008d15617
  • UAID: C1840CBCBCCB19D28EC262D2985FE6E2A2620075
  • Package name: br.gov.datasus.guardioes
  • Main activity: br.gov.datasus.guardioes.MainActivity
  • Application name: Coronavírus SUS
  • Version name: 1.0.9
  • Version code: 10009

Application features overview

  • The application probably makes OS calls.

  • The application probably executes OS commands.

  • The application probably loads JS-capable web views.

  • The application probably gets network interfaces addresses (IP and/or MAC).

  • The application probably gets the network connections information.

  • The application probably reads the system settings.

  • The application probably gets different information regarding the telephony capabilities.

  • The application probably sends data over HTTP/S.

Certificate

Common Name: Ministerio da Saude, Organizational Unit: Datasus, Organization: Datasus, Locality: Brasilia, State/Province: Distrito Federal, Country: BR

Permissions

  • com.htc.launcher.permission.READ_SETTINGS

  • me.everything.badger.permission.BADGE_COUNT_READ

  • android.permission.WAKE_LOCK

  • android.permission.ACCESS_NETWORK_STATE

  • android.permission.ACCESS_FINE_LOCATION

  • com.oppo.launcher.permission.READ_SETTINGS

  • br.gov.datasus.guardioes.permission.C2D_MESSAGE

  • com.sonyericsson.home.permission.BROADCAST_BADGE

  • android.permission.READ_APP_BADGE

  • android.permission.ACCESS_COARSE_LOCATION

  • android.permission.VIBRATE

  • me.everything.badger.permission.BADGE_COUNT_WRITE

  • com.huawei.android.launcher.permission.WRITE_SETTINGS

  • android.permission.CALL_PHONE

  • com.htc.launcher.permission.UPDATE_SHORTCUT

  • com.sec.android.provider.badge.permission.READ

  • com.huawei.android.launcher.permission.READ_SETTINGS

  • com.google.android.c2dm.permission.RECEIVE

  • com.oppo.launcher.permission.WRITE_SETTINGS

  • com.sonymobile.home.permission.PROVIDER_INSERT_BADGE

  • com.huawei.android.launcher.permission.CHANGE_BADGE

  • com.anddoes.launcher.permission.UPDATE_COUNT

  • com.majeur.launcher.permission.UPDATE_BADGE

  • android.permission.INTERNET

  • com.sec.android.provider.badge.permission.WRITE

Trackers

  • Google Firebase Analytics

Detection rules

The application probably makes OS calls.

Entrypoints:

  • android.support.v4.graphics.TypefaceCompatApi21Impl.createFromFontInfo()

Calls:

  • android.system.Os.readlink(String)

  • android.system.OsConstants.S_ISREG(I)

  • android.system.Os.stat(String)

The application probably executes OS commands.

Entrypoints:

  • me.leolin.shortcutbadger.impl.OPPOHomeBader.executeBadge()

Calls:

  • java.lang.Runtime.exec(String)
The application probably loads JS-capable web views.

Entrypoints:

  • com.ionicframework.cordova.webview.IonicWebViewEngine.init()

  • org.apache.cordova.inappbrowser.InAppBrowser$7.run()

  • com.ionicframework.cordova.webview.IonicWebViewEngine$ServerClient.onPageFinished()

  • org.apache.cordova.inappbrowser.InAppBrowser$7$4.onKey()

  • com.ionicframework.cordova.webview.IonicWebViewEngine$ServerClient.onPageStarted()

  • org.apache.cordova.inappbrowser.InAppBrowser$6.run()

  • org.apache.cordova.inappbrowser.InAppBrowser$5.run()

  • org.apache.cordova.inappbrowser.InAppBrowser$2.run()

Calls:

  • android.webkit.WebView.addJavascriptInterface(Object,String)

  • android.webkit.WebSettings.setJavaScriptEnabled(Z)

  • android.webkit.WebView.loadUrl(String)

The application probably gets network interfaces addresses (IP and/or MAC).

Entrypoints:

  • okhttp3.internal.http2.Http2Connection$Builder.socket()

Calls:

  • java.net.Socket.getRemoteSocketAddress()
The application probably gets the network connections information.

Entrypoints:

  • uk.co.workingedge.phonegap.plugin.LaunchNavigatorPlugin.execute()

  • org.apache.cordova.networkinformation.NetworkManager$1.onReceive()

  • org.apache.cordova.networkinformation.NetworkManager.execute()

  • uk.co.workingedge.LaunchNavigator.reverseGeocodeLatLonToAddress()

  • com.google.firebase.iid.zzas.run()

  • com.google.firebase.iid.zzat.onReceive()

  • android.support.v4.net.ConnectivityManagerCompat.getNetworkInfoFromBroadcast()

  • android.support.v4.net.ConnectivityManagerCompat.isActiveNetworkMetered()

Calls:

  • android.net.ConnectivityManager.getNetworkInfo(I)

  • android.net.ConnectivityManager.getActiveNetworkInfo()

The application probably reads the system settings.

Entrypoints:

  • com.google.android.gms.common.util.CrashUtils.addErrorToDropBoxInternal()

  • com.google.android.gms.common.util.CrashUtils.addErrorToDropBox()

  • com.google.android.gms.common.util.DeviceStateUtils.isUserSetupComplete()

  • android.support.v4.app.NotificationManagerCompat$SideChannelManager.handleMessage()

  • org.apache.cordova.device.Device.initialize()

Calls:

  • android.provider.Settings$Secure.getString(ContentResolver,String)

  • android.provider.Settings$Secure.getInt(ContentResolver,String,I)

The application probably gets different information regarding the telephony capabilities.

Entrypoints:

  • com.rohithvaranasi.callnumber.CFCallNumber.onRequestPermissionResult()

  • com.rohithvaranasi.callnumber.CFCallNumber.execute()

Calls:

  • android.telephony.TelephonyManager.getPhoneType()
The application probably sends data over HTTP/S.

Entrypoints:

  • org.apache.cordova.CordovaWebViewImpl$EngineClient.onNavigationAttempt()

  • org.apache.cordova.inappbrowser.InAppBrowser$1.run()

  • com.ionicframework.cordova.webview.IonicWebViewEngine$ServerClient.shouldInterceptRequest()

Calls:

  • java.net.HttpURLConnection.setRequestMethod(String)

Domains

  • share.here.com

  • maps.google.com

  • citymapper.com

  • guardioes-e1626.firebaseio.com