0/62

Threat

com.sec.android.app.servicemodeapp

Service mode

Analyzed on 2022-05-24T01:20:23.420274

30

permissions

24

activities

5

services

3

receivers

0

domains

File sums

MD5 db48a55b21ce9a880048e11836daf49c
SHA1 8d1eec591ff1dff702ebf353a9693fc1547a4e49
SHA256 06fff23bc0fa8edde136ed867f4c31c5a660f8dc41fca1ff3f6cfb48b96f0775
Size 0.24MB

APKiD

Information computed with APKiD.

/tmp/tmp_1h0h4sv!classes.dex
yara_issue
  • yara issue - dex file recognized by apkid but not yara module
anti_vm
  • ro.build.type check
compiler
  • unknown (please file detection issue!)

SSdeep

Information computed with ssdeep.

APK file 6144:WYmvhXgS96a5cIb4BvsTlcoTqiTfFjJjieIVkTbM+YkFR:WYmvD96a5cKG8hI9ubikFR
Manifest 384:v6SgSy4qMK5n3i+7yj1WCSzhcknsX0BTQVwlr0shFkO7eGhp1JNnefg8BC/YtEZg:…
classes.dex 6144:knJk/VmzubtmykA+/TjWMp+6AhBZrPs7Khz4UCe28NHZha:CJytmykA0/dArZKle…

Dexofuzzy

Information computed with Dexofuzzy.

classes.dex None

APK details

Information computed with AndroGuard and Pithus.

Package com.sec.android.app.servicemodeapp
App name Service mode
Version name 9
Version code 28
SDK 11 - 26
UAID cfd9e741d7461777671a75c93098fc874055e737
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 d087e72912fba064cafa78dc34aea839
SHA1 9ca5170f381919dfe0446fcdab18b19a143b3163
SHA256 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:12+00:00
Not after 2038-11-07T12:25:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup] flag is missing.
The flag [android:allowBackup] should be set to false. By default it is set to true and allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
Low Activity (.DebugLevel) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (.CPDebugLevel) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (RTN_View) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (.ResetTotalCallTime) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (.TotalCallTime) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (.WifiInfoActivity) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (.NandFlashHeaderRead) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (.SilentLogOption) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (.FTATDumpReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (.WifiInfoBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Broadcast Receiver (.ServiceModeAppBroadcastReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
A Broadcast Receiver is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.SetPortUartUsbMSM8960) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil_MDM9x15) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil_ESC) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.SetPortUartUSBCTCModel) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil_SGLTE) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil_TD) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil_MarvellVIA) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.PhoneUtil_Bcom) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.ShowIMEI) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.USBSettings) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
Low Activity (com.sec.android.app.modemui.activities.AutoAnswer) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.sec.android.app.servicemodeapp.permission.KEYSTRING
protectionLevel: signatureOrSystem [android:exported=true]
An Activity is found to be exported, but is protected by a permission. However, the protection level of the permission is set to signatureOrSystem. It is recommended that signature level is used instead. Signature level should suffice for most purposes, and does not depend on where the applications are installed on the device.
High Service (AudioCodecDebugger) is not Protected.An intent-filter exists.
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Service is explicitly exported.
High Dailer Code: 22558463 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: RTN Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: \ 3214789650 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 9900 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 232338 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 0514 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 66336 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 66336324 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 99007788 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 638732 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 7284 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 06 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 272886 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 773738 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.
High Dailer Code: 03 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.

Activities

Information computed with AndroGuard.

com.sec.android.app.servicemodeapp.SysDump
com.sec.android.app.servicemodeapp.DebugLevel
com.sec.android.app.servicemodeapp.CPDebugLevel
com.sec.android.app.servicemodeapp.RTN_View
com.sec.android.app.servicemodeapp.ResetTotalCallTime
com.sec.android.app.servicemodeapp.TotalCallTime
com.sec.android.app.servicemodeapp.WifiInfoActivity
com.sec.android.app.servicemodeapp.NandFlashHeaderRead
com.sec.android.app.servicemodeapp.SilentLogOption
com.sec.android.app.servicemodeapp.SilentLogSprdOption
com.sec.android.app.servicemodeapp.DiagMdlogOption
com.sec.android.app.modemui.activities.PhoneUtil
com.sec.android.app.modemui.activities.SetPortUartUsbMSM8960
com.sec.android.app.modemui.activities.PhoneUtil_MDM9x15
com.sec.android.app.modemui.activities.PhoneUtil_ESC
com.sec.android.app.modemui.activities.SetPortUartUSBCTCModel
com.sec.android.app.modemui.activities.PhoneUtil_SGLTE
com.sec.android.app.modemui.activities.PhoneUtil_TD
com.sec.android.app.modemui.activities.PhoneUtil_MarvellVIA
com.sec.android.app.modemui.activities.PhoneUtil_Bcom
com.sec.android.app.modemui.activities.ShowIMEI
com.sec.android.app.modemui.activities.USBSettings
com.sec.android.app.modemui.activities.AutoAnswer
com.sec.android.app.servicemodeapp.BaseActivity

Receivers

Information computed with AndroGuard.

com.sec.android.app.servicemodeapp.FTATDumpReceiver
com.sec.android.app.servicemodeapp.WifiInfoBroadcastReceiver
com.sec.android.app.servicemodeapp.ServiceModeAppBroadcastReceiver

Services

Information computed with AndroGuard.

com.sec.android.app.servicemodeapp.FTATDumpService
com.sec.android.app.modemui.activities.ModemReset
com.sec.android.app.servicemodeapp.LogCatcherService
com.sec.android.app.servicemodeapp.SilentRilLogService
com.sec.android.app.servicemodeapp.AudioCodecDebugger

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before June 22, 2011, 12:25 p.m.
First submission on VT April 27, 2021, 3:59 a.m.
Last submission on VT April 27, 2021, 3:59 a.m.
Upload on Pithus May 24, 2022, 1:20 a.m.
Certificate valid not after Nov. 7, 2038, 12:25 p.m.

NIAP analysis

Information computed with MobSF.

FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['bluetooth'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to ['address book', 'system logs'].
Access to Platform Resources
FDP_NET_EXT.1.1 The application has no network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FTP_DIT_EXT.1.1 The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product.
Protection of Data in Transit

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/sec/android/app/modemui/activities/PhoneUtil_ESC.java
com/sec/android/app/modemui/activities/PhoneUtil_MarvellVIA.java
com/sec/android/app/modemui/activities/SetPortUartUSBCTCModel.java
com/sec/android/app/servicemodeapp/SilentLogSprdOption.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
com/sec/android/app/servicemodeapp/DebugLevel.java
com/sec/android/app/modemui/activities/PhoneUtil.java
com/sec/android/app/servicemodeapp/DiagMdlogOption.java
com/sec/android/app/modemui/activities/PhoneUtil_MDM9x15.java
com/sec/android/app/servicemodeapp/LogcatProcess.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/SilentRilLogService.java
com/sec/android/app/modemui/activities/AutoAnswer.java
com/sec/android/app/servicemodeapp/FTATDumpReceiver.java
com/sec/android/app/servicemodeapp/SilentLogOption.java
com/sec/android/app/servicemodeapp/CPDebugLevel.java
com/sec/android/app/servicemodeapp/TotalCallTime.java
com/sec/android/app/servicemodeapp/WifiInfoActivity.java
com/sec/android/app/modemui/activities/ModemReset.java
com/sec/android/app/servicemodeapp/ServiceModeAppBroadcastReceiver.java
com/sec/android/app/servicemodeapp/ResetTotalCallTime.java
com/sec/android/app/servicemodeapp/SilentRilLog.java
com/sec/android/app/servicemodeapp/AudioCodecDebugger.java
com/sec/android/app/modemui/util/LtUtil.java
com/sec/android/app/servicemodeapp/NandFlashHeaderRead.java
com/sec/android/app/servicemodeapp/RTN_View.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/modemui/activities/PhoneUtil_Bcom.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/sec/android/app/servicemodeapp/DiagMdlogOption.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/FTATDumpService.java

Permissions analysis

Information computed with MobSF.

High android.permission.SYSTEM_ALERT_WINDOW display system-level alerts
Allows an application to show system-alert windows. Malicious applications can take over the entire screen of the phone.
High android.permission.WRITE_SETTINGS modify global system settings
Allows an application to modify the system's settings data. Malicious applications can corrupt your system's configuration.
High android.permission.MOUNT_UNMOUNT_FILESYSTEMS mount and unmount file systems
Allows the application to mount and unmount file systems for removable storage.
High android.permission.CALL_PHONE directly call phone numbers
Allows the application to call phone numbers without your intervention. Malicious applications may cause unexpected calls on your phone bill. Note that this does not allow the application to call emergency numbers.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
High android.permission.WRITE_APN_SETTINGS write Access Point Name settings
Allows an application to modify the APN settings, such as Proxy and Port of any APN.
High android.permission.READ_LOGS read sensitive log data
Allows an application to read from the system's various log files. This allows it to discover general information about what you are doing with the phone, potentially including personal or private information.
High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.READ_CONTACTS read contact data
Allows an application to read all of the contact (address) data stored on your phone. Malicious applications can use this to send your data to other people.
High android.permission.WRITE_CONTACTS write contact data
Allows an application to modify the contact (address) data stored on your phone. Malicious applications can use this to erase or modify your contact data.
Low android.permission.VIBRATE control vibrator
Allows the application to control the vibrator.
Low android.permission.BLUETOOTH_ADMIN bluetooth administration
Allows applications to discover and pair bluetooth devices.
Low android.permission.MODIFY_AUDIO_SETTINGS change your audio settings
Allows application to modify global audio settings, such as volume and routing.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Medium android.permission.HARDWARE_TEST test hardware
Allows the application to control various peripherals for the purpose of hardware testing.
Medium android.permission.CLEAR_APP_USER_DATA delete other applications' data
Allows an application to clear user data.
Medium android.permission.DEVICE_POWER turn phone on or off
Allows the application to turn the phone on or off.
Medium android.permission.CHANGE_CONFIGURATION change your UI settings
Allows an application to change the current configuration, such as the locale or overall font size.
Medium android.permission.MODIFY_PHONE_STATE modify phone status
Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like, without ever notifying you.
Medium android.permission.ACCESS_CHECKIN_PROPERTIES access check-in properties
Allows read/write access to properties uploaded by the check-in service. Not for use by common applications.
Medium android.permission.WRITE_SECURE_SETTINGS modify secure system settings
Allows an application to modify the system's secure settings data. Not for use by common applications.
Medium android.permission.DUMP retrieve system internal status
Allows application to retrieve internal status of the system. Malicious applications may retrieve a wide variety of private and secure information that they should never commonly need.
Medium android.permission.MASTER_CLEAR reset system to factory defaults
Allows an application to completely reset the system to its factory settings, erasing all data, configuration and installed applications.
android.permission.BLUETOOTH_STACK Unknown permission
Unknown permission from android reference
com.samsung.android.permission.NETWORK_WAKELOCK_MONITORING Unknown permission
Unknown permission from android reference
android.permission.WRITE_MEDIA_STORAGE Unknown permission
Unknown permission from android reference
com.samsung.android.permission.MEDIA_CLOUD_CONTENTS Unknown permission
Unknown permission from android reference
com.sec.phone.permission.SEC_FACTORY_PHONE Unknown permission
Unknown permission from android reference
com.sec.imslogger.permission.SERVICE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.)
Confidence:
100%
Method reflection
Confidence:
100%
Send notification
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Return dynamic information about the current Wi-Fi connection
Confidence:
100%
Get calendar information
Confidence:
100%
Query WiFi information and WiFi Mac Address
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Monitor incoming call status
Confidence:
80%
Get the currently formatted WiFi IP address
Confidence:
80%
Check if the given file path exist
Confidence:
80%
Executes the specified string Linux command

Behavior analysis

Information computed with MobSF.

Android notifications
       com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/servicemodeapp/ServiceModeAppBroadcastReceiver.java
Base64 encode
       com/sec/android/app/servicemodeapp/SysDump.java
Execute os command
       com/sec/android/app/servicemodeapp/LogcatProcess.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
com/sec/android/app/servicemodeapp/AudioCodecDebugger.java
Get network interface information
       com/sec/android/app/servicemodeapp/SysDump.java
Get sim provider details
       com/sec/android/app/servicemodeapp/SilentLogOption.java
Get software version, imei/sv etc
       com/sec/android/app/modemui/activities/ShowIMEI.java
Get system service
       com/sec/android/app/modemui/activities/ShowIMEI.java
com/sec/android/app/modemui/activities/PhoneUtil_ESC.java
com/sec/android/app/modemui/activities/PhoneUtil_MarvellVIA.java
com/sec/android/app/modemui/activities/SetPortUartUSBCTCModel.java
com/sec/android/app/servicemodeapp/CPDebugLevel.java
com/sec/android/app/servicemodeapp/WifiInfoActivity.java
com/sec/android/app/modemui/activities/USBSettings.java
com/sec/android/app/servicemodeapp/ServiceModeAppBroadcastReceiver.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
com/sec/android/app/servicemodeapp/AudioCodecDebugger.java
com/sec/android/app/servicemodeapp/DebugLevel.java
com/sec/android/app/modemui/activities/PhoneUtil.java
com/sec/android/app/modemui/activities/PhoneUtil_MDM9x15.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/servicemodeapp/SilentLogOption.java
Get wifi details
       com/sec/android/app/servicemodeapp/WifiInfoActivity.java
Inter process communication
       com/sec/android/app/modemui/activities/PhoneUtil_SGLTE.java
com/sec/android/app/modemui/activities/PhoneUtil_TD.java
com/sec/android/app/modemui/activities/SetPortUartUSBCTCModel.java
com/sec/android/app/servicemodeapp/WifiInfoActivity.java
com/sec/android/app/modemui/activities/ModemReset.java
com/sec/android/app/servicemodeapp/SilentLogSprdOption.java
com/sec/android/app/servicemodeapp/ServiceModeAppBroadcastReceiver.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
com/sec/android/app/servicemodeapp/AudioCodecDebugger.java
com/sec/android/app/servicemodeapp/WifiInfoBroadcastReceiver.java
com/sec/android/app/modemui/activities/SetPortUartUsbMSM8960.java
com/sec/android/app/modemui/activities/PhoneUtil.java
com/sec/android/app/servicemodeapp/NandFlashHeaderRead.java
com/sec/android/app/servicemodeapp/DiagMdlogOption.java
com/sec/android/app/modemui/activities/PhoneUtil_MDM9x15.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/SilentRilLogService.java
com/sec/android/app/servicemodeapp/RTN_View.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/servicemodeapp/FTATDumpReceiver.java
com/sec/android/app/servicemodeapp/SilentLogOption.java
Java reflection
       com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
Local file i/o operations
       com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
Sending broadcast
       com/sec/android/app/modemui/activities/PhoneUtil_SGLTE.java
com/sec/android/app/modemui/activities/SetPortUartUsbMSM8960.java
com/sec/android/app/modemui/activities/PhoneUtil.java
com/sec/android/app/modemui/activities/PhoneUtil_TD.java
com/sec/android/app/modemui/activities/SetPortUartUSBCTCModel.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/modemui/activities/ModemReset.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
com/sec/android/app/servicemodeapp/AudioCodecDebugger.java
Starting activity
       com/sec/android/app/servicemodeapp/WifiInfoBroadcastReceiver.java
com/sec/android/app/modemui/activities/SetPortUartUsbMSM8960.java
com/sec/android/app/modemui/activities/PhoneUtil_MDM9x15.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/LogCatcherService.java
com/sec/android/app/servicemodeapp/ServiceModeAppBroadcastReceiver.java
Starting service
       com/sec/android/app/modemui/activities/PhoneUtil_SGLTE.java
com/sec/android/app/modemui/activities/PhoneUtil_TD.java
com/sec/android/app/modemui/activities/PhoneUtil_MDM9x15.java
com/sec/android/app/servicemodeapp/SysDump.java
com/sec/android/app/servicemodeapp/RTN_View.java
com/sec/android/app/servicemodeapp/SilentLogSprdOption.java
com/sec/android/app/servicemodeapp/ServiceModeAppBroadcastReceiver.java
com/sec/android/app/servicemodeapp/FTATDumpService.java
com/sec/android/app/servicemodeapp/FTATDumpReceiver.java
com/sec/android/app/servicemodeapp/SilentLogOption.java
Tcp socket
       com/sec/android/app/servicemodeapp/SysDump.java

Control flow graphs analysis

Information computed by Pithus.

The application probably lists running applications

The application probably gets the IMEI of the phone

The application probably gets the Wi-Fi connection information

The application probably gets the network connections information

The application probably gets network interfaces addresses (IP and/or MAC)