Posts It all started with a text message

It all started with a text message


The real company itsme contacted me on twitter and they verifed that they didn’t created an android app for their product. So they reported the app to google and it has been taking down successfully.


People are receiving text messages saying that their friends invited them to chat. The messages makes them install an application. Opening the app, it shows a quick walkthrough of the app and asks for a verification code. With the right code, you are instructed to install another application is constantly spamming the user with ads.

Quick vocabulary

  • APK: Android Package is the package file format used by the Android operating system for distribution and installation of mobile apps.
  • Activities: An activity is a single, focused thing that the user can do.
  • Emulator: simulates Android devices on your computer
  • jadx-gui: Dex to Java decompiler
  • Android manifest: The manifest file describes essential information about your app.

I got a text message from a random number saying that my friends wanted to chat to on another app(itsme). I initially though this was weird since my friends would tell me if they wanted to switch to another app. Since the link was going to apple store. I ignored it.


Waking up the next day, some of my friends got the same messages. Now, I had to pay attention to it. It wasn’t just a coincidence. Switching to my VM, I downloaded the app and opened it with a decompiler, jadx-gui.

I took a look at the Manifest.xml to find the entry point.


There were a total of 7 activities. 6 of them were just onboarding info about the app.


Then there’s the main activity which only ask for a verification code.


Right away, I saw the person can’t even spell install. Bad start.

I found two ways to get the verification code. First, if you clicked on the left button, you get redirect to a website, The site asks for a username and your phone platform. Then it tells you to rate the app on the play store to get the code. I couldn’t get it that way because I was in an emulator and I was not logged in to the play store.

SiteSite verifcation

The other solution was to get the code with jadx-gui. Entering the main activity, there’s a validate function.


We can see the the access code and two urls.

  • hxxp://
  • hxxps://

Entering the code in the app would work, but because I wasn’t logged in, it failed on me. Time to investigate the links.

The []( link is a redirect to The []( is shorten link for a public google drive with a download button for another apk.

Installing the apk on my emulator, I didn’t see any indication of it being installed. There was no app icon or anything else to prove to me it was there. Looking back to jadx-gui, I looked at the manifest again and the package name made everything clear.

The whole application might have just been a joke.


There is much more activity in this application. In the main activity, nothing much is going on except that it is loading an ad


The rest of the app are doing the same.



People who downloaded the app from the play store noticed the constant ad being presented.


How was the application able to spread? Well, I am not sure how the app was able to send the invite message. People on twitter were saying that it read your contacts and send the message.


I didn’t see any indication of that. The permission declared in both apps had nothing to do with contacts. The first app(itsme) had just needed internet connection and wake lock


The second app(tapeviral) had more and those permissions were to read the application’s badges


The whole application is just a troll from what I could find. Nothing but trying to make money by spamming users with useless ads. Best thing to do is just delete the app and not click links from phone numbers you don’t know.

File hash

App NameMD5
This post is licensed under CC BY 4.0

Recent Update

Trending Tags


Trending Tags