Malicious
20
/62
Threat
Analyzed on 2021-12-30T11:24:28.145224
MD5 | e711d4208fd1e3a26439cf50fb1d43e6 | |
SHA1 | 59f41994c4dc51ce621c7845d6686b873db663bd | |
SHA256 | 000a7b0b00e9120007849ca741d1addb469f3c9accd99a490ee023c8c1645da2 | |
Size | 9.46MB |
Information computed with APKiD.
/tmp/tmpubxs0pf7 | |
packer |
|
/tmp/tmpubxs0pf7!classes.dex | |
anti_vm |
|
manipulator |
|
compiler |
|
Information computed with ssdeep.
APK file | 196608:rmpAD1ERmEJeWspXYE0hwjpJh6MI/F/4UN6Y/MSAIUfHRw:IA5/nWsp0Cj3zUF/4K6+PAh/Rw | |
Manifest | 96:yVjagScyzD6r3yTsFrt1pRgaYywRi4vSE7rR:yZagSr6rmmrt1pRgtywRi4BrR | |
classes.dex | 12288:bPPswsDefvfnCNkh/4nKXomBdCKeKoUiAlC49:b8tDefOK4mXCKeKoUiAlC49 |
Information computed with Dexofuzzy.
APK file | 768:yYcWry8/G9N8+LdHVaHD8r3PYbW6kCL2+iK/2v9XnhiWByke8r17:yR8/z+LdHVaH… | |
classes.dex | 768:yYcWry8/G9N8+LdHVaHD8r3PYbW6kCL2+iK/2v9XnhiWByke8r17:yR8/z+LdHVaH… |
Information computed with AndroGuard and Pithus.
Package | com.songge.aotemanwfdk | |
App name | 奥特曼大战小怪兽 | |
Version name | 1.0 | |
Version code | 1 | |
SDK | 7 - None | |
UAID | effe329e2658ece26c694b8fc168c148e0f52345 | |
Signature | Signature V1 | |
Frosting | Not frosted |
Information computed with AndroGuard.
Information computed with MobSF.
Medium | Application Data can be Backed up[android:allowBackup] flag is missing. The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | April 19, 2008, 7:43 p.m. |
Certificate valid not before | Jan. 14, 2014, 8:06 a.m. |
Latest file found in APK | May 14, 2014, 4:40 p.m. |
First submission on VT | Aug. 12, 2014, 6:14 a.m. |
Last submission on VT | Sept. 13, 2021, 2:43 a.m. |
Upload on Pithus | Dec. 30, 2021, 11:24 a.m. |
Certificate valid not after | Jan. 14, 2034, 8:06 a.m. |
Score | 20/62 |
Report | https://www.virustotal.com/gui/file/000a7b0b00e9120007849ca741d1addb469f3c9accd99a490ee023c8c1645da2/detection |
Provided by VirusTotal
Threat name: smsreg | Identified 8 times |
Threat name: artemis | Identified 2 times |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application use no DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application implement functionality to encrypt sensitive data in non-volatile memory. Encryption Of Sensitive Application Data |
FMT_MEC_EXT.1.1 | The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options. Supported Configuration Mechanism |
FTP_DIT_EXT.1.1 | The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(1) | The application perform encryption/decryption in accordance with a specified cryptographic algorithm AES-CBC (as defined in NIST SP 800-38A) mode or AES-GCM (as defined in NIST SP 800-38D) and cryptographic key sizes 256-bit/128-bit. Cryptographic Operation - Encryption/Decryption |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
CN | wapgame.189.cn | 114.80.179.225 | ||
CN | da.mmarket.com | 120.197.233.121 | ||
CN | uniview.wostore.cn | 140.206.176.31 |
Information computed with MobSF.
http://wapgame.189.cn Defined in com/songge/aotemanwfdk/GMIDlet.java |
|
http://uniview.wostore.cn/log-app/test Defined in com/unicom/dcLoader/MainActivity.java |
|
http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:getappparameter&appkey= http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postactlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posterrlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posteventlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postsyslog Defined in com/chinaMobile/MobileAgent.java |
|
http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:getappparameter&appkey= http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postactlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posterrlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posteventlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postsyslog Defined in com/chinaMobile/MobileAgent.java |
|
http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:getappparameter&appkey= http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postactlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posterrlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posteventlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postsyslog Defined in com/chinaMobile/MobileAgent.java |
|
http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:getappparameter&appkey= http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postactlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posterrlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posteventlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postsyslog Defined in com/chinaMobile/MobileAgent.java |
|
http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:getappparameter&appkey= http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postactlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posterrlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:posteventlog http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:postsyslog Defined in com/chinaMobile/MobileAgent.java |
|
http://da.mmarket.com/mmsdk/mmsdk?func=mmsdk:feedback Defined in com/chinaMobile/i.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Implicit intent(view a web page, make a phone call, etc.) |
Confidence:
|
Query the list of the installed packages |
Confidence:
|
Connect to a URL and receive input stream from the server |
Confidence:
|
Modify voice volume |
Confidence:
|
Method reflection |
Confidence:
|
Get the network operator name |
Confidence:
|
Connect to a URL and get the response code |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Query the IMSI number |
Confidence:
|
Read file from assets directory |
Confidence:
|
Get the current WIFI information |
Confidence:
|
Query the ICCID number |
Confidence:
|
Get the current WiFi information and put it into JSON |
Confidence:
|
Query the IMEI number |
Confidence:
|
Method reflection |
Confidence:
|
Query WiFi information and WiFi Mac Address |
Confidence:
|
Get the current WiFi MAC address and put it into JSON |
Confidence:
|
Get the current WiFi MAC address |
Confidence:
|
Connect to a URL and set request method |
Confidence:
|
Write the IMSI number into a file |
Confidence:
|
Read file and put it into a stream |
Confidence:
|
Write the IMEI number into a file |
Confidence:
|
Open a file from given absolute path of the file |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Send IMSI over Internet |
Confidence:
|
Get the IMSI and network operator name |
Confidence:
|
Check if successfully sending out SMS |
Information computed with MobSF.
Information computed by Pithus.