daily timer icon

app-release__3_.apk

daily timer

7.73 MB

Analyzed: 2026-02-21 08:53 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
91/100
Threat scan flagged Modern target SDK
Privacy Permissions & network
91/100
HTTP URLs found AllowBackup enabled Low data access
91/100
Excellent
Overall trust

Facts

Threat scan 1/76 flagged, 0 suspicious
Permissions 7 requested
Network strings 18 URLs (1 HTTP, 17 HTTPS)
Target SDK 36
Certificate Valid until 2107-09-02 (82 years, suspicious)

Warnings

Threat scan flagged: 1/76 scanners marked this file as malicious.
Found 1 HTTP URL strings (unencrypted).
AllowBackup is enabled.
Package Name co.median.android.mpyekd
Version Code 3
Version Name 1.0.0
Application Name co.median.android.GoNativeApplication
Debuggable No
Allow Backup Yes
Min SDK Android 23 (Marshmallow)
Target SDK Android 36 (Unknown)
Supported ABIs
Universal

Certificate & Signer

Valid From 2025-07-13 18:13:00
Valid To 2107-09-02 18:13:00
Serial Number 62f3adec57bbab4c
Thumbprint 814744270fc62d4c56726eb653ff9bd464002827
Issuer: C NA
Issuer: CN GoNative.io
Issuer: DN C:NA, CN:GoNative.io, L:NA, O:GoNative.io, ST:NA, OU:NA
Issuer: L NA
Issuer: O GoNative.io
Issuer: OU NA
Issuer: ST NA
Subject: C NA
Subject: CN GoNative.io
Subject: DN C:NA, CN:GoNative.io, L:NA, O:GoNative.io, ST:NA, OU:NA
Subject: L NA
Subject: O GoNative.io
Subject: OU NA
Subject: ST NA

Security Scan

1 /76
⚠️ Threats Detected
Detected by 1 vendor: K7GW (Trojan ( 0001140e1 ))
Scanned by 76 security vendors
Last scan: 2026-02-21 08:53 UTC
Malicious
1
Suspicious
0
Harmless
0
Undetected
66
Timeout
0
Failure
0

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.749
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260220-00
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav undetected
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.1.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic type-unsupported
No result reported
Engine 4.0.249
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43604AVA:64.30699
Google undetected
No result reported
Engine 1771660862
Gridinsoft undetected
No result reported
Engine 1.0.237.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.37.58657
K7GW malicious
Trojan ( 0001140e1 )
Engine 14.37.58652
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.209
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.13781
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-02-21.02
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.9.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1150
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38428
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5549
ZoneAlarm undetected
No result reported
Engine 6.23-113518354
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine 2403add:2403add:b97a070:b97a070
tehtris type-unsupported
No result reported

File Signatures

SHA-256 27106cccf10fa6c398d7805b07c6a6557ce23e083bec55c6db61cb5120fd000d
MD5 42ab4e4ce43e2ce2ce44933327d3cc03
SHA-1 bb00c8d88c8cb7aec620652f85cd9a1d9c7a2d5f
SSDEEP 196608:65ZFW6RC7DKRo/7usBbch1kABFNUjdFfkAR2cDA:KZ06RPRo/nBw1hbNUj/fhRG
TLSH T1B58612DAF7E89D2FC87310B28D69567212574C168A839F577908331C787B6E80F89BD8
VHASH 5ea9f889105e343c35e932d1939c13f8
PERMHASH 9cd510fe88f64bc7b86f89b8191fc32680b83dd2ece9f996bf327a8666bb73f2

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v0.0 to extract, compression method=deflate File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (40%), Java Archive (20%), VYM Mind Map (18.5%), Sweet Home 3D Design (generic) (15.5%), ZIP compressed archive (5.9%) TrID file type guesses with probabilities.
dhash 0000001e1e090c08 Perceptual hash used to compare visual similarity of files.
raw md5 b22dc0907e0c69a9d96f60b1f9e1c6a4 Raw MD5 hash of the file contents.
extensions xml (660), png (241), version (58), kotlin_builtins (8), ttf (7), json (5), properties (5), js (4), css (2), bin (1), dex (1), html (1), MF (1), p (1), prof (1), profm (1), s (1), textproto (1), txt (1) File extensions found inside the APK and how many of each.
file types XML (660), PNG (241), unknown (96), DEX (1), HTML (1), Java Bytecode (1) Detected embedded file types and their counts.
highest datetime 1981-01-01 01:01:02 UTC Latest timestamp found among files inside the archive.
lowest datetime 1981-01-01 01:01:02 UTC Earliest timestamp found among files inside the archive.
num children 1087 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 11 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

co.median.android.LaunchActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Receiver Intents (2)

Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver
Actions
Install performance profile Installs a profile that helps optimize app performance. androidx.profileinstaller.action.INSTALL_PROFILE
Skip profile install Skips profile installation for this build. androidx.profileinstaller.action.SKIP_FILE
Save performance profile Saves a profile generated during app usage. androidx.profileinstaller.action.SAVE_PROFILE
Benchmark operation Runs a profile installer benchmark operation. androidx.profileinstaller.action.BENCHMARK_OPERATION
co.median.android.AppUpgradeReceiver
Actions
My Package Replaced Broadcast Action: A new version of your application has been installed android.intent.action.MY_PACKAGE_REPLACED

Requested Permissions (7)

have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
read phone status and identity Allows the app to access the phone features of the device. This permission allows the app to determine the phone number and device IDs, whether a call is active, and the remote number connected by a call. android.permission.READ_PHONE_STATE
control vibration Allows the app to control the vibrator. android.permission.VIBRATE
Cloud messaging receive Allows the app to receive push messages via Google/Firebase Cloud Messaging. com.google.android.c2dm.permission.RECEIVE
Cloud messaging Allows the app to receive push messages (legacy C2DM/FCM). co.median.android.mpyekd.permission.C2D_MESSAGE
Dynamic receiver access Internal app permission used to protect dynamic broadcast receivers. co.median.android.mpyekd.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION

Activities (4)

co.median.android.LaunchActivity
co.median.android.MainActivity
co.median.android.AppLinksActivity
com.google.android.gms.common.api.GoogleApiActivity

Services (1)

co.median.android.DownloadService

Broadcast Receivers (2)

co.median.android.AppUpgradeReceiver co.median.android.AppUpgradeReceiver
Profile installer Installs performance profiles to speed up app startup and hot paths. androidx.profileinstaller.ProfileInstallReceiver

Content Providers (2)

androidx.core.content.FileProvider
androidx.startup.InitializationProvider

Submission Details

Submitted At 2026-02-21
First Submission 2026-02-21
Last Submission 2026-02-21
Stored Until 2026-03-23