JioSaavn


Warning: This app has been signed by a Certificate also used to sign known malware.
Click here to see the certificate details for more information.

Warning: Warning: This is likely a virus/malware. There are 2 detections - This could be a virus.
Click here to see the external analysis for more information.

App Info:

Package Name com.jio.media.jiobeats  
Icon
Universal App. ID C3DCC72FCC63ECAE8D9D950491AB103CE5A0CB4B
Universal App ID. Provides a unique ID for an application across app sources/versions. Computed using the package name as well as each of the certificates used to sign the app: SHA1(PKG_NAME + " " + certFP1 + " " + ... + certFPn-1 + " " + certFPn)
Shared User ID String None
Version
7.0.1
Version Code: 250
APK Source User
Added On 2020-09-14 06:39:06.433829
Internal Analysis
External Analysis (not reached) (Virus found)
Links to other APK analysis platforms will only work if the external platform has the APK in their database.
! Attention, external analysis was not reached, try yourself by clicking here !

App Hashes:

APK C14C3788D7FD715462710B488172E54BD9040E8D 
SHA1 Hash of the application binary. Computed as SHA1(APP_APK_FILE).
APK-SHA-256 687D7DF11CFCD0BF3076F5D8043F2343A120330E62FE5A7648C3A3BAE4CDB865 
SHA256 Hash of the application binary. Computed as SHA256(APP_APK_FILE).
APK-MD5 76C18B7EF51BE2F28576799326AE4C94 
MD5 Hash of the application binary. Computed as MD5(APP_APK_FILE).
classes.dex C0C5A8D51C88DE032D9C601C004723B601029B13 
SHA1 Hash of the application dex extracted from the APK. Computed as SHA1(APP_DEX_FILE).
resources.arsc 92E74A21160CFCC02A3AA2105AF6D3A318E967E0 
SHA1 Hash of the application resource file extracted from the APK. Computed as SHA1(APP_RES_FILE).
AndroidManifest.xml 5D3C38E22EB364BAB4BC4A906E6BD8C562E0E501 
SHA1 Hash of the application manifest file extracted from the APK. Computed as SHA1(APP_MANIFEST_FILE).

Signed by:

Fingerprint: 61:ED:37:7E:85:D3:86:A8:DF:EE:6B:86:4B:D8:5B:0B:FA:A5:AF:81
Subject: C=US, ST=California, L=Mountain View, O=Android, OU=Android, CN=Android/emailAddress=android@android.com
Issuer: C=US, ST=California, L=Mountain View, O=Android, OU=Android, CN=Android/emailAddress=android@android.com

Other sources:

None

Permissions Requested

android.permission.ACCESS_COARSE_LOCATION
android.permission.ACCESS_NETWORK_STATE
android.permission.ACCESS_WIFI_STATE
android.permission.BLUETOOTH
android.permission.BLUETOOTH_ADMIN
android.permission.CAMERA
android.permission.DOWNLOAD_WITHOUT_NOTIFICATION
android.permission.FOREGROUND_SERVICE
android.permission.INTERNET
android.permission.MODIFY_AUDIO_SETTINGS
android.permission.READ_EXTERNAL_STORAGE
android.permission.VIBRATE
android.permission.WAKE_LOCK
android.permission.WRITE_EXTERNAL_STORAGE
com.android.vending.BILLING
com.google.android.c2dm.permission.RECEIVE
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE
com.google.android.gms.permission.ACTIVITY_RECOGNITION
com.google.android.providers.gsf.permission.READ_GSERVICES
com.jio.media.jiobeats.INTERNAL_CLASS_PROTECTION
com.jio.media.jiobeats.PAYMENT_BROADCAST_PERMISSION
com.jio.media.jiobeats.permission.C2D_MESSAGE