Diva icon

DivaApplication.apk

Diva

1.43 MB

Analyzed: 2026-03-13 06:58 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
91/100
Threat scan clean Debuggable build Outdated target SDK
Privacy Permissions & network
92/100
HTTP URLs found AllowBackup enabled Low data access
91/100
Excellent
Overall trust

Facts

Threat scan 0/76 flagged, 0 suspicious
Permissions 3 requested
Network strings 1 URLs (1 HTTP, 0 HTTPS)
Target SDK 23
Certificate Valid until 2045-10-25 (20 years, suspicious)

Warnings

Found 1 HTTP URL strings (unencrypted).
AllowBackup is enabled.
Package Name jakhar.aseem.diva
Version Code 1
Version Name 1.0
Debuggable Yes
Allow Backup Yes
Min SDK Android 15 (Ice Cream Sandwich)
Target SDK Android 23 (Marshmallow)
Supported ABIs
arm64-v8a armeabi armeabi-v7a mips mips64 x86 x86_64

Certificate & Signer

Valid From 2015-11-02 08:32:11
Valid To 2045-10-25 08:32:11
Serial Number 218330df
Thumbprint ae4ead5aeaba4e9e4fc928e7c7f7fd459f008031
Issuer: C US
Issuer: CN Android Debug
Issuer: DN C:US, CN:Android Debug, O:Android
Issuer: O Android
Subject: C US
Subject: CN Android Debug
Subject: DN C:US, CN:Android Debug, O:Android
Subject: O Android

Security Scan

0 /76
✓ Clean
Scanned by 76 security vendors
Last scan: 2026-03-13 06:28 UTC
Malicious
0
Suspicious
0
Harmless
0
Undetected
67
Timeout
0
Failure
1

Scan Providers

76 vendors
ALYac undetected
No result reported
Engine 2.0.0.10
APEX type-unsupported
No result reported
Engine 6.757
AVG undetected
No result reported
Engine 23.9.8494.0
Acronis undetected
No result reported
Engine 1.2.0.121
AhnLab-V3 undetected
No result reported
Engine 3.29.1.10604
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0
Arcabit undetected
No result reported
Engine 2025.0.0.23
Avast undetected
No result reported
Engine 23.9.8494.0
Avast-Mobile undetected
No result reported
Engine 260312-02
Avira undetected
No result reported
Engine 8.3.3.24
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderFalx undetected
No result reported
Engine 2.0.936
Bkav failure
No result reported
Engine 2.0.0.1
CAT-QuickHeal undetected
No result reported
Engine 22.00
CMC undetected
No result reported
Engine 2.4.2022.1
CTX undetected
No result reported
Engine 2024.8.29.1
ClamAV undetected
No result reported
Engine 1.5.2.0
CrowdStrike undetected
No result reported
Engine 1.0
Cylance type-unsupported
No result reported
Engine 3.0.0.0
Cynet undetected
No result reported
Engine 4.0.3.4
DeepInstinct type-unsupported
No result reported
Engine 5.0.0.8
DrWeb undetected
No result reported
Engine 7.0.75.2070
ESET-NOD32 undetected
No result reported
Engine 18.2.18.0
Elastic undetected
No result reported
Engine 4.0.252
Emsisoft undetected
No result reported
Engine 2024.8.0.61147
F-Secure undetected
No result reported
Engine 18.10.1547.307
Fortinet undetected
No result reported
Engine 7.0.30.0
GData undetected
No result reported
Engine GD:27.43838AVA:64.30831
Google undetected
No result reported
Engine 1773378033
Gridinsoft undetected
No result reported
Engine 1.0.241.174
Ikarus undetected
No result reported
Engine 6.4.16.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 14.41.58865
K7GW undetected
No result reported
Engine 14.41.58866
Kaspersky undetected
No result reported
Engine 22.0.1.28
Kingsoft undetected
No result reported
Engine None
Lionic undetected
No result reported
Engine 8.16
Malwarebytes undetected
No result reported
Engine 3.1.0.211
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfeeD undetected
No result reported
Engine 1.2.0.14035
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.26010.1
NANO-Antivirus undetected
No result reported
Engine 1.0.170.26895
Paloalto type-unsupported
No result reported
Engine 0.9.0.1003
Panda undetected
No result reported
Engine 4.6.4.2
Rising undetected
No result reported
Engine 25.0.0.28
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 2.22.3.0
SentinelOne type-unsupported
No result reported
Engine 7.5.3.1
Skyhigh undetected
No result reported
Engine v2021.2.0+4045
Sophos undetected
No result reported
Engine 3.3.1.0
Symantec undetected
No result reported
Engine 1.22.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2026-03-13.01
Tencent undetected
No result reported
Engine 1.0.0.1
Trapmine type-unsupported
No result reported
Engine 4.0.10.0
TrellixENS undetected
No result reported
Engine 6.0.6.653
TrendMicro undetected
No result reported
Engine 24.550.0.1002
TrendMicro-HouseCall undetected
No result reported
Engine 24.550.0.1002
Trustlook undetected
No result reported
Engine 1.0
VBA32 undetected
No result reported
Engine 5.5.1
VIPRE undetected
No result reported
Engine 6.0.0.35
Varist undetected
No result reported
Engine 6.6.1.3
ViRobot undetected
No result reported
Engine 2014.3.20.0
VirIT undetected
No result reported
Engine 9.5.1164
Webroot undetected
No result reported
Engine 1.9.0.8
Xcitium undetected
No result reported
Engine 38479
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.5562
ZoneAlarm undetected
No result reported
Engine 6.23-113518878
Zoner undetected
No result reported
Engine 2.2.2.0
alibabacloud type-unsupported
No result reported
Engine 2.2.0
huorong undetected
No result reported
Engine e357881:e357881:4eba1a7:4eba1a7
tehtris type-unsupported
No result reported

File Signatures

SHA-256 5cefc51fce9bd760b92ab2340477f4dda84b4ae0c5d04a8c9493e4fe34fab7c5
MD5 82ab8b2193b3cfb1c737e3a786be363a
SHA-1 27e849d9d7b86a3a3357fb3e980433a91d416801
SSDEEP 24576:axGO+KUa8k9tRZPhsSHlH34GgI+xyGHbH+ZWx/jOUyntF9bPVALJRbB+TZS1Pnnu:ax+KUPkTRZPh8Rxy4H+ZPUyndPu9iTZT
TLSH T10F65E092B749E427C873C43682BA47A62B45CC144687E7630955F26C8DBFAC46F86FCC
VHASH 526c0a6334c5f0831d489b639a106eee
PERMHASH c955c26de2f91ab27562d8e36ba2e6488ddf60af904b43e5119e09108efb8616

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Java archive data (JAR) File signature result from magic bytes inspection.
Magika APK File type predicted by Magika (ML-based file type detection).
TrID Android Package (49%), Java Archive (24.5%), Sweet Home 3D Design (generic) (19%), ZIP compressed archive (7.2%) TrID file type guesses with probabilities.
dhash 0000000c0e0f0608 Perceptual hash used to compare visual similarity of files.
raw md5 34522efac42855266025cf7b55556a2b Raw MD5 hash of the file contents.
extensions png (218), xml (160), so (7), arsc (1), dex (1), MF (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types PNG (218), XML (160), ELF (7), unknown (4), DEX (1) Detected embedded file types and their counts.
highest datetime 2015-12-31 15:59:14 UTC Latest timestamp found among files inside the archive.
lowest datetime 2015-12-31 14:37:06 UTC Earliest timestamp found among files inside the archive.
num children 390 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 3.5 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (3)

jakhar.aseem.diva.APICreds2Activity
Actions
jakhar.aseem.diva.action.VIEW_CREDS2 jakhar.aseem.diva.action.VIEW_CREDS2
Categories
android.intent.category.DEFAULT
jakhar.aseem.diva.APICredsActivity
Actions
jakhar.aseem.diva.action.VIEW_CREDS jakhar.aseem.diva.action.VIEW_CREDS
Categories
android.intent.category.DEFAULT
jakhar.aseem.diva.MainActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Native Libraries (1)

libdivajni libdivajni.so

Requested Permissions (3)

modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET

Activities (17)

jakhar.aseem.diva.MainActivity
jakhar.aseem.diva.LogActivity
jakhar.aseem.diva.HardcodeActivity
jakhar.aseem.diva.InsecureDataStorage1Activity
jakhar.aseem.diva.InsecureDataStorage2Activity
jakhar.aseem.diva.InsecureDataStorage3Activity
jakhar.aseem.diva.InsecureDataStorage4Activity
jakhar.aseem.diva.SQLInjectionActivity
jakhar.aseem.diva.InputValidation2URISchemeActivity
jakhar.aseem.diva.AccessControl1Activity
jakhar.aseem.diva.APICredsActivity
jakhar.aseem.diva.AccessControl2Activity
jakhar.aseem.diva.APICreds2Activity
jakhar.aseem.diva.AccessControl3Activity
jakhar.aseem.diva.Hardcode2Activity
jakhar.aseem.diva.AccessControl3NotesActivity
jakhar.aseem.diva.InputValidation3Activity

Content Providers (1)

jakhar.aseem.diva.NotesProvider

URL Endpoints (1)

Submission Details

Submitted At 2026-03-13
First Submission 2026-03-13
Last Submission 2026-03-13
Stored Until 2026-04-12