
Heuristic match: "Name: res/drawable-xhdpi-v4/common_signin_btn_text_disabled_light.9.pn" Heuristic match: "Name: res/drawable-hdpi-v4/btn_check_off_disable_focused_holo_light.pn" Heuristic match: "Name: res/drawable-hdpi-v4/btn_check_off_disabled_focused_holo_dark.pn" Heuristic match: "Name: lib/x86/libdrastic_cpu.so"

Heuristic match: "Name: res/drawable-mdpi-v4/btn_check_off_disabled_focused_holo_dark.pn" Heuristic match: "Name: res/drawable-xhdpi-v4/common_signin_btn_icon_disabled_light.9.pn"

Heuristic match: "Name: res/drawable-mdpi-v4/btn_check_on_disabled_focused_holo_light.pn" Heuristic match: "Name: res/drawable-mdpi-v4/btn_check_off_disable_focused_holo_light.pn" Heuristic match: "Name: res/drawable-hdpi-v4/btn_check_on_disabled_focused_holo_light.pn" Heuristic match: "Name: lib/x86/libdrastic_x86.so" Heuristic match: "Name: res/drawable-xhdpi-v4/btn_check_off_disable_focused_holo_dark.pn" Heuristic match: "lib/x86/libdrastic_cpu.so" Heuristic match: "lib/x86/libdrastic_x86.so" "libdrastic_x86.so" has type "ELF 32-bit LSB shared object Intel 80386 version 1 (SYSV) dynamically linked stripped" "libdrastic_cpu.so_1648985355567" has type "ELF 32-bit LSB shared object Intel 80386 version 1 (SYSV) dynamically linked stripped" "libdrastic_cpu.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped" "libdrastic_compat.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped" "libdrastic.so" has type "ELF 32-bit LSB shared object ARM EABI5 version 1 (SYSV) dynamically linked interpreter /system/bin/linker stripped" "V0_" has type "exported SGML document ASCII text" "MANIFEST.MF" has type "ASCII text with CRLF line terminators" "Jsr305_" has type "exported SGML document ASCII text" "DRASTIC.SF" has type "ASCII text with CRLF line terminators" "CERT.SF" has type "ASCII text with CRLF line terminators" "AndroidManifest.xml" has type "Android binary XML" Has the ability to access external storageĪdversaries may capture audio to collect information on a user of a mobile device using standard operating system APIs. On Android, command line tools or the Java file APIs can be used to enumerate file system contents.

Has the ability to query the phone location (GPS) On Android, applications can use standard APIs to gather a list of network connections to and from the device.Īn adversary could use a malicious or exploited application to surreptitiously track the device's physical location through use of standard operating system APIs.
#Free drastic r2.2.1.2a code
Has the ability to use the DexClassLoader (possible code injection) Has the ability to execute code after rebootĪdversaries may use code injection attacks to implant arbitrary code into the address space of a running application.
#Free drastic r2.2.1.2a android
An intent is a message passed between Android application or system components.
