0/56
Threat
Analyzed on 2022-05-27T13:28:01.513588
MD5 | 53ece30faee6b2cf69b45a14046ae2ff | |
SHA1 | 128ab3b1a6c6676e2b686e3aeb46eeb9c3933992 | |
SHA256 | 0a538d2c17418191064c63e8941f417b6133caf336b64608bc976c7f7cd5bf40 | |
Size | 0.79MB |
Information computed with APKiD.
/tmp/tmp08mkulc9!classes.dex | |
anti_vm |
|
compiler |
|
Information computed with ssdeep.
APK file | 12288:h/f3zRuTz0qCLgX+Kih1EDcWh2ei4ULz34qoTfH/:pNuTzUY+Kq1EDrh2N4ULz3cf | |
Manifest | 96:pIX1FBDgScon0GDNrka5ywUGKCgd+ZRxSCACaCi9gfg/B96cZt9qOK0cD:GX1gSRn0… | |
classes.dex | 12288:TMUF5UlgnpyDy8hoykYFrCTo4Jus+GVhaK/dxY997ZrBO0H:XUWp+GTog54AY3O… |
Information computed with Dexofuzzy.
APK file | 96:HBrtSGENAWeKilVa21+I0RpfTTY41PHbziw8:Hxt/MP6+lbfTT91Dew8 | |
classes.dex | 96:HBrtSGENAWeKilVa21+I0RpfTTY41PHbziw8:Hxt/MP6+lbfTT91Dew8 |
Information computed with AndroGuard and Pithus.
Information computed with AndroGuard.
Information computed with MobSF.
Findings | Files |
---|---|
Certificate/Key files hardcoded inside the app. |
SEC-INF/buildConfirm.crt |
Information computed with MobSF.
High | Service (com.samsung.android.service.svcagent.ConnectionJobService) is Protected by a permission, but the protection level of the permission should be checked.Permission: android.permission.BIND_JOB_SERVICE [android:exported=true] A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission. |
Medium | High Intent Priority (999)[android:priority] By setting an intent priority higher than another intent, the app effectively overrides other requests. |
Information computed with AndroGuard.
|
Information computed with AndroGuard.
|
Oldest file found in APK | Jan. 1, 2009, midnight |
Latest file found in APK | Jan. 1, 2009, midnight |
Certificate valid not before | June 22, 2011, 12:25 p.m. |
First submission on VT | April 27, 2021, 4:03 a.m. |
Last submission on VT | April 27, 2021, 4:03 a.m. |
Upload on Pithus | May 27, 2022, 1:28 p.m. |
Certificate valid not after | Nov. 7, 2038, 12:25 p.m. |
Score | 0/56 |
Report | https://www.virustotal.com/gui/file/0a538d2c17418191064c63e8941f417b6133caf336b64608bc976c7f7cd5bf40/detection |
Information computed with MobSF.
FCS_RBG_EXT.1.1 | The application use no DRBG functionality for its cryptographic operations. Random Bit Generation Services |
FCS_STO_EXT.1.1 | The application does not store any credentials to non-volatile memory. Storage of Credentials |
FCS_CKM_EXT.1.1 | The application generate no asymmetric cryptographic keys. Cryptographic Key Generation Services |
FDP_DEC_EXT.1.1 | The application has access to ['network connectivity']. Access to Platform Resources |
FDP_DEC_EXT.1.2 | The application has access to no sensitive information repositories. Access to Platform Resources |
FDP_NET_EXT.1.1 | The application has user/application initiated network communications. Network Communications |
FDP_DAR_EXT.1.1 | The application does not encrypt files in non-volatile memory. Encryption Of Sensitive Application Data |
FTP_DIT_EXT.1.1 | The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product. Protection of Data in Transit |
FCS_COP.1.1(2) | The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5. Cryptographic Operation - Hashing |
FCS_HTTPS_EXT.1.1 | The application implement the HTTPS protocol that complies with RFC 2818. HTTPS Protocol |
FCS_HTTPS_EXT.1.2 | The application implement HTTPS using TLS. HTTPS Protocol |
FCS_HTTPS_EXT.1.3 | The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid. HTTPS Protocol |
FIA_X509_EXT.2.1 | The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS. X.509 Certificate Authentication |
Information computed with MobSF.
Map computed by Pithus.
Information computed with MobSF.
https://dir-apis.samsungdm.com/api/v1/device/component Defined in com/samsung/android/service/svcagent/h.java |
Information computed with MobSF.
Information computed with Quark-Engine.
Confidence:
|
Find a method from given class name, usually for reflection |
Confidence:
|
Method reflection |
Confidence:
|
Load class from given class name |
Confidence:
|
Retrieve data from broadcast |
Confidence:
|
Read sensitive data(SMS, CALLLOG, etc) |
Confidence:
|
Open a file from given absolute path of the file |
Confidence:
|
Check if the given path is directory |
Confidence:
|
Monitor the broadcast action events (BOOT_COMPLETED) |
Confidence:
|
Get absolute path of the file and store in string |
Confidence:
|
Get last known location of the device |
Confidence:
|
Get location of the device |
Confidence:
|
Query the IMEI number |
Confidence:
|
Check if the given file path exist |
Confidence:
|
Method reflection |
Confidence:
|
Get the time of current location |
Confidence:
|
Get filename and put it to JSON object |
Confidence:
|
Get absolute path of file and put it to JSON object |
Confidence:
|
Get calendar information |
Confidence:
|
Get resource file from res/raw directory |
Information computed with MobSF.
Information computed by Pithus.