0/56

Threat

com.samsung.android.svcagent

SVC Agent

Analyzed on 2022-05-27T13:28:01.513588

5

permissions

0

activities

2

services

1

receivers

1

domains

File sums

MD5 53ece30faee6b2cf69b45a14046ae2ff
SHA1 128ab3b1a6c6676e2b686e3aeb46eeb9c3933992
SHA256 0a538d2c17418191064c63e8941f417b6133caf336b64608bc976c7f7cd5bf40
Size 0.79MB

APKiD

Information computed with APKiD.

/tmp/tmp08mkulc9!classes.dex
anti_vm
  • possible Build.SERIAL check
compiler
  • dx

SSdeep

Information computed with ssdeep.

APK file 12288:h/f3zRuTz0qCLgX+Kih1EDcWh2ei4ULz34qoTfH/:pNuTzUY+Kq1EDrh2N4ULz3cf
Manifest 96:pIX1FBDgScon0GDNrka5ywUGKCgd+ZRxSCACaCi9gfg/B96cZt9qOK0cD:GX1gSRn0…
classes.dex 12288:TMUF5UlgnpyDy8hoykYFrCTo4Jus+GVhaK/dxY997ZrBO0H:XUWp+GTog54AY3O…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 96:HBrtSGENAWeKilVa21+I0RpfTTY41PHbziw8:Hxt/MP6+lbfTT91Dew8
classes.dex 96:HBrtSGENAWeKilVa21+I0RpfTTY41PHbziw8:Hxt/MP6+lbfTT91Dew8

APK details

Information computed with AndroGuard and Pithus.

Package com.samsung.android.svcagent
App name SVC Agent
Version name 4.0.00.6
Version code 400000006
SDK 24 - 24
UAID cd1149ddd5998e84fffc1413d2023f51e81e4d35
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 d087e72912fba064cafa78dc34aea839
SHA1 9ca5170f381919dfe0446fcdab18b19a143b3163
SHA256 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:12+00:00
Not after 2038-11-07T12:25:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

High Service (com.samsung.android.service.svcagent.ConnectionJobService) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.BIND_JOB_SERVICE [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Medium High Intent Priority (999)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Receivers

Information computed with AndroGuard.

com.samsung.android.service.svcagent.BootReceiver

Services

Information computed with AndroGuard.

com.samsung.android.service.svcagent.ConnectionJobService
com.samsung.android.service.svcagent.MainService

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before June 22, 2011, 12:25 p.m.
First submission on VT April 27, 2021, 4:03 a.m.
Last submission on VT April 27, 2021, 4:03 a.m.
Upload on Pithus May 27, 2022, 1:28 p.m.
Certificate valid not after Nov. 7, 2038, 12:25 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application use no DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication

Code analysis

Information computed with MobSF.

Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/samsung/android/service/svcagent/h.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/sec/icdverification/ICDVerification.java
com/samsung/android/service/svcagent/BootReceiver.java
com/samsung/android/service/svcagent/g.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 com/samsung/android/service/svcagent/n.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 com/samsung/android/service/svcagent/j.java
Pygal Ireland: 100

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

IE dir-apis.samsungdm.com 34.255.247.243

URL analysis

Information computed with MobSF.

https://dir-apis.samsungdm.com/api/v1/device/component
Defined in com/samsung/android/service/svcagent/h.java

Permissions analysis

Information computed with MobSF.

Low android.permission.ACCESS_WIFI_STATE view Wi-Fi status
Allows an application to view the information about the status of Wi-Fi.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
android.permission.READ_PRIVILEGED_PHONE_STATE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Method reflection
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Open a file from given absolute path of the file
Confidence:
100%
Check if the given path is directory
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get absolute path of the file and store in string
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get location of the device
Confidence:
100%
Query the IMEI number
Confidence:
100%
Check if the given file path exist
Confidence:
100%
Method reflection
Confidence:
100%
Get the time of current location
Confidence:
100%
Get filename and put it to JSON object
Confidence:
80%
Get absolute path of file and put it to JSON object
Confidence:
80%
Get calendar information
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Base64 encode
       com/samsung/android/service/svcagent/h.java
Certificate handling
       com/samsung/android/service/svcagent/j.java
com/samsung/android/service/svcagent/h.java
Get system service
       com/samsung/android/service/svcagent/o.java
com/samsung/android/service/svcagent/l.java
com/samsung/android/service/svcagent/a.java
com/samsung/android/service/svcagent/ConnectionJobService.java
Https connection
       com/samsung/android/service/svcagent/h.java
Inter process communication
       com/samsung/android/service/svcagent/o.java
com/samsung/android/service/svcagent/a.java
com/samsung/android/service/svcagent/MainService.java
com/samsung/android/service/svcagent/ConnectionJobService.java
com/samsung/android/service/svcagent/BootReceiver.java
com/samsung/android/service/svcagent/c.java
Loading native code (shared library)
       com/sec/icdverification/ICDVerification.java
Message digest
       com/samsung/android/service/svcagent/o.java
com/samsung/android/service/svcagent/h.java
Sending broadcast
       com/samsung/android/service/svcagent/o.java
com/samsung/android/service/svcagent/ConnectionJobService.java
com/samsung/android/service/svcagent/BootReceiver.java
com/samsung/android/service/svcagent/c.java
Starting service
       com/samsung/android/service/svcagent/o.java
Tcp socket
       com/samsung/android/service/svcagent/h.java