KingShare Pro icon

com.streamboard.android.oscam_2_.apk

KingShare Pro

1.28 MB

Analyzed: 2026-03-18 16:31 UTC

APK Security & Privacy Score

Security scoring uses multi-engine scan signals and APK indicators. Privacy scoring uses requested permissions and network endpoint patterns.

Security Scan-weighted
67/100
Threat scan flagged Debuggable build Outdated target SDK
Privacy Permissions & network
84/100
High-risk permissions HTTP URLs found AllowBackup enabled
75/100
Good
Overall trust

Facts

Threat scan 3/75 flagged, 0 suspicious
Permissions 10 requested
Network strings 3 URLs (3 HTTP, 0 HTTPS)
Target SDK 22
Certificate Valid until 2035-09-01 (9 years, suspicious)

Warnings

Threat scan flagged: 3/75 scanners marked this file as malicious.
Found 3 HTTP URL strings (unencrypted).
High-risk permissions detected: android.permission.RECEIVE_BOOT_COMPLETED
AllowBackup is enabled.
Package Name com.streamboard.android.oscam
Version Code 20200420
Version Name v2.3.4
Application Name com.streamboard.android.oscam.ui.CamApplication
Debuggable Yes
Allow Backup Yes
Min SDK Android 17 (Jelly Bean)
Target SDK Android 22 (Lollipop)
Supported ABIs
Universal

Certificate & Signer

Valid From 2008-04-15 22:40:50
Valid To 2035-09-01 22:40:50
Serial Number b3998086d056cffa
Thumbprint 27196e386b875e76adf700e7ea84e4c6eee33dfa
Issuer: C US
Issuer: CN Android
Issuer: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Issuer: L Mountain View
Issuer: O Android
Issuer: OU Android
Issuer: ST California
Issuer: email android@android.com
Subject: C US
Subject: CN Android
Subject: DN C:US, CN:Android, L:Mountain View, O:Android, ST:California, OU:Android, email:android@android.com
Subject: L Mountain View
Subject: O Android
Subject: OU Android
Subject: ST California
Subject: email android@android.com

Security Scan

3 /75
⚠️ Threats Detected
Detected by 3 vendors: Avast-Mobile (APK:RepSandbox [Trj]), Qihoo-360 (Trojan.Android.Gen), Trustlook (Android.PUA.DebugKey)
Scanned by 75 security vendors
Last scan: 2020-09-29 09:33 UTC
Malicious
3
Suspicious
0
Harmless
0
Undetected
61
Timeout
0
Failure
0

Scan Providers

75 vendors
ALYac undetected
No result reported
Engine 1.1.1.5
APEX type-unsupported
No result reported
Engine 6.75
AVG undetected
No result reported
Engine 18.4.3895.0
Acronis type-unsupported
No result reported
Engine 1.1.1.78
Ad-Aware undetected
No result reported
Engine 3.0.16.117
AhnLab-V3 undetected
No result reported
Engine 3.18.2.10046
Alibaba undetected
No result reported
Engine 0.3.0.5
Antiy-AVL undetected
No result reported
Engine 3.0.0.1
Arcabit undetected
No result reported
Engine 1.0.0.881
Avast undetected
No result reported
Engine 18.4.3895.0
Avast-Mobile malicious
APK:RepSandbox [Trj]
Engine 200929-00
Avira undetected
No result reported
Engine 8.3.3.8
Baidu undetected
No result reported
Engine 1.0.0.2
BitDefender undetected
No result reported
Engine 7.2
BitDefenderTheta undetected
No result reported
Engine 7.2.37796.0
Bkav undetected
No result reported
Engine 1.3.0.9899
CAT-QuickHeal undetected
No result reported
Engine 14.00
CMC undetected
No result reported
Engine 2.7.2019.1
ClamAV undetected
No result reported
Engine 0.102.3.0
Comodo undetected
No result reported
Engine 32853
CrowdStrike type-unsupported
No result reported
Engine 1.0
Cybereason type-unsupported
No result reported
Cylance type-unsupported
No result reported
Engine 2.3.1.101
Cynet undetected
No result reported
Engine 4.0.0.24
Cyren undetected
No result reported
Engine 6.3.0.2
DrWeb undetected
No result reported
Engine 7.0.49.9080
ESET-NOD32 undetected
No result reported
Engine 22067
Elastic type-unsupported
No result reported
Engine 4.0.9
Emsisoft undetected
No result reported
Engine 2018.12.0.1641
F-Secure undetected
No result reported
Engine 12.0.86.52
FireEye undetected
No result reported
Engine 32.36.1.0
Fortinet undetected
No result reported
Engine 6.2.142.0
GData undetected
No result reported
Engine A:25.27177B:27.20338
Ikarus undetected
No result reported
Engine 0.1.5.2
Invincea undetected
No result reported
Engine 1.0.1.0
Jiangmin undetected
No result reported
Engine 16.0.100
K7AntiVirus undetected
No result reported
Engine 11.142.35315
K7GW undetected
No result reported
Engine 11.142.35315
Kaspersky undetected
No result reported
Engine 15.0.1.13
Kingsoft undetected
No result reported
Engine 2013.8.14.323
Lionic undetected
No result reported
Engine 4.2
MAX undetected
No result reported
Engine 2019.9.16.1
Malwarebytes undetected
No result reported
Engine 3.6.4.335
MaxSecure undetected
No result reported
Engine 1.0.0.1
McAfee undetected
No result reported
Engine 6.0.6.653
McAfee-GW-Edition undetected
No result reported
Engine v2019.1.2+3728
MicroWorld-eScan undetected
No result reported
Engine 14.0.409.0
Microsoft undetected
No result reported
Engine 1.1.17400.5
NANO-Antivirus undetected
No result reported
Engine 1.0.134.25169
Paloalto type-unsupported
No result reported
Engine 1.0
Panda undetected
No result reported
Engine 4.6.4.2
Qihoo-360 malicious
Trojan.Android.Gen
Engine 1.0.0.1120
Rising undetected
No result reported
Engine 25.0.0.26
SUPERAntiSpyware undetected
No result reported
Engine 5.6.0.1032
Sangfor undetected
No result reported
Engine 1.0
SentinelOne type-unsupported
No result reported
Engine 4.4.0.0
Sophos undetected
No result reported
Engine 4.98.0
Symantec undetected
No result reported
Engine 1.12.0.0
SymantecMobileInsight undetected
No result reported
Engine 2.0
TACHYON undetected
No result reported
Engine 2020-09-29.02
Tencent undetected
No result reported
Engine 1.0.0.1
TotalDefense undetected
No result reported
Engine 37.1.62.1
Trapmine type-unsupported
No result reported
Engine 3.5.0.1023
TrendMicro undetected
No result reported
Engine 11.0.0.1006
TrendMicro-HouseCall undetected
No result reported
Engine 10.0.0.1040
Trustlook malicious
Android.PUA.DebugKey
Engine 1.0
VBA32 undetected
No result reported
Engine 4.4.1
VIPRE undetected
No result reported
Engine 87046
ViRobot undetected
No result reported
Engine 2014.3.20.0
Webroot type-unsupported
No result reported
Engine 1.0.0.403
Yandex undetected
No result reported
Engine 5.5.2.24
Zillya undetected
No result reported
Engine 2.0.0.4184
ZoneAlarm undetected
No result reported
Engine 1.0
Zoner undetected
No result reported
Engine 0.0.0.0
eGambit type-unsupported
No result reported

File Signatures

SHA-256 7dd73605d7e9c5ca5721ea5d9336e8dfeaf811104ea22d9b45f70dc362099f67
MD5 cdd58e176a95844b36bfea62dad40cc9
SHA-1 b5734479f18e3ef2d7d1b24d88e1c442c1c9b8ea
SSDEEP 24576:ODnNo3JSny4fWGSZzfu5t2h8PRm54AybT6UKiubgYDvIAMaFffwrk:ODNXy4zSZzfuc8pm549X5avbVfwA
VHASH 642936ce7a8ac67e54621b3dc3f3a0d8

File Intelligence

Type Description Android Human-friendly file type name based on multiple detection methods.
Type Extension apk Most likely file extension inferred from the content.
Type Tag android Primary type tag assigned by the classifier.
Type Tags executable, mobile, android, apk Additional type tags that describe the file content.
Magic Zip archive data, at least v2.0 to extract File signature result from magic bytes inspection.
TrID Android Package (67.5%), Java Archive (23.6%), ZIP compressed archive (7%), PrintFox/Pagefox bitmap (640x800) (1.7%) TrID file type guesses with probabilities.
extensions png (47), xml (38), cfg (1), css (1), cw (1), dex (1), Key (1), MF (1), RSA (1), SF (1) File extensions found inside the APK and how many of each.
file types PNG (47), XML (38), unknown (22), DEX (1), ELF (1) Detected embedded file types and their counts.
highest datetime 2008-04-16 02:40:50 UTC Latest timestamp found among files inside the archive.
lowest datetime 2008-04-16 02:40:50 UTC Earliest timestamp found among files inside the archive.
num children 109 Number of files contained within the archive.
type APK Container type detected for the analyzed file.
uncompressed size 2.5 MB Estimated total size of all files after extraction.

Deep Manifest Analysis

Activity Intents (1)

com.streamboard.android.oscam.ui.SettingActivity
Actions
Main Activity Action: Start as a main entry point, does not expect to android.intent.action.MAIN
Categories
android.intent.category.LAUNCHER

Service Intents (2)

com.streamboard.android.oscam.service.InputKeyService
Actions
com.streamboard.oscam.KeyService com.streamboard.oscam.KeyService
com.streamboard.android.oscam.service.SocketServerService
Actions
com.streamboard.oscam.SocketService com.streamboard.oscam.SocketService

Receiver Intents (1)

com.streamboard.android.oscam.BootBroadcastReceiver
Actions
Boot Completed Broadcast Action: This is broadcast once, after the system has finished android.intent.action.BOOT_COMPLETED
com.amlogic.dvbplayer.powerkey com.amlogic.dvbplayer.powerkey
com.amlogic.dvb.sen5.active com.amlogic.dvb.sen5.active

Requested Permissions (10)

view network connections Allows the app to view information about network connections such as which networks exist and are connected. android.permission.ACCESS_NETWORK_STATE
have full network access Allows the app to create network sockets and use custom network protocols. The browser and other applications provide means to send data to the internet, so this permission is not required to send data to the internet. android.permission.INTERNET
Mount Unmount Filesystems android.permission.MOUNT_UNMOUNT_FILESYSTEMS
read the contents of your shared storage Allows the app to read the contents of your shared storage. android.permission.READ_EXTERNAL_STORAGE
modify or delete the contents of your shared storage Allows the app to write the contents of your shared storage. android.permission.WRITE_EXTERNAL_STORAGE
run at startup Allows the app to have itself started as soon as the system has finished booting. This can make it take longer to start the tablet and allow the app to slow down the overall tablet by always running. android.permission.RECEIVE_BOOT_COMPLETED
Interact Across Users Full android.permission.INTERACT_ACROSS_USERS_FULL
set time zone Allows the app to change the tablet\'s time zone. android.permission.SET_TIME_ZONE
Write Media Storage android.permission.WRITE_MEDIA_STORAGE
access approximate location only in the foreground This app can get your approximate location from location services while the app is in use. Location services for your device must be turned on for the app to get location. android.permission.ACCESS_COARSE_LOCATION

Activities (8)

com.streamboard.android.oscam.ui.StartActivity
com.streamboard.android.oscam.ui.SettingActivity
com.streamboard.android.oscam.ui.AccountListActivity
com.streamboard.android.oscam.ui.CodeEditListActivity
com.streamboard.android.oscam.ui.AccountDetailActivity
com.streamboard.android.oscam.ui.FileBrowserActivity
com.streamboard.android.oscam.ui.SmartCardActivity
com.streamboard.android.oscam.ui.EntitlementsActivity

Services (4)

com.streamboard.android.oscam.UninstallListenSer
com.streamboard.android.oscam.service.SocketServerService
com.streamboard.android.oscam.service.AccountStatusService
com.streamboard.android.oscam.service.InputKeyService

Broadcast Receivers (1)

com.streamboard.android.oscam.BootBroadcastReceiver com.streamboard.android.oscam.BootBroadcastReceiver

Submission Details

Submitted At 2026-03-18
First Submission 2026-03-18
Last Submission 2026-03-18
Stored Until 2026-04-17