0/59

Threat

com.transsion.statisticalsales

sys Stasl

Analyzed on 2022-06-22T22:20:53.121702

13

permissions

5

activities

4

services

1

receivers

2

domains

File sums

MD5 1fe2aee1338546ef48f87c36da0b9c1c
SHA1 b247b6aefda7aacd25143419aa0abfc7280d3317
SHA256 35fa58c779ac80bcf44875e279cc4a6ba08678b0004e9c8f0816426cf0c584ab
Size 0.8MB

APKiD

Information computed with APKiD.

/tmp/tmpi3og112c!classes.dex
yara_issue
  • yara issue - dex file recognized by apkid but not yara module
compiler
  • unknown (please file detection issue!)

SSdeep

Information computed with ssdeep.

APK file 12288:l7RyfN6/MfsLgKMAGZ22joBascauWQ32M/Jlalddba3aSTHHT0qAuW:l7RyfeRLg0GZ68r0AnaldUdHHT+1
Manifest 192:pwmc12iuOTHPTyDVwSDMOF1opO06Kp+SiYHP1AY2l:pwmc19uOTHPTyDVwSDMA1op…
classes.dex 12288:xp1khZAc+YMz7I5g9UeTpjfoxwg0FC15sG:SAcB4oqG

Dexofuzzy

Information computed with Dexofuzzy.

classes.dex None

APK details

Information computed with AndroGuard and Pithus.

Package com.transsion.statisticalsales
App name sys Stasl
Version name 1.4.22.1
Version code 22
SDK 30 - 30
UAID d063ede0093e9c5ae479b2cf63d628016fc74985
Signature Signature V1 Signature V2 Signature V3
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0xf05368c0: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 4e0244ab4cf7f14ee58378e017e903ed
SHA1 aec83f63bfa3a6ad9422086688639fea7684ef00
SHA256 40e4400c5c90f79d8f390584eebad893ac9bdba0ff1507b126d4c9db547929da
Issuer Email Address: hios@tecno-mobile.com, Common Name: HiOS, Organizational Unit: HiOS, Organization: TecnoMobile, Locality: Shanghai, State/Province: Shanghai, Country: CN
Not before 2019-04-16T07:56:33+00:00
Not after 2046-09-01T07:56:33+00:00

Manifest analysis

Information computed with MobSF.

High Broadcast Receiver (com.transsion.statisticalsales.BootCompletedReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Dailer Code: 862016 Found [android:scheme="android_secret_code"]
A secret code was found in the manifest. These codes, when entered into the dialer grant access to hidden content that may contain sensitive information.

Activities

Information computed with AndroGuard.

com.transsion.statisticalsales.MainActivity
com.transsion.statisticalsales.PreferenceXActivity
com.transsion.statisticalsales.sms.SubmitsendActivityIndia
com.transsion.statisticalsales.sms.SubmitsendActivityVietnam
com.transsion.statisticalsales.sms.SubmitreceiveActivity

Receivers

Information computed with AndroGuard.

com.transsion.statisticalsales.BootCompletedReceiver

Services

Information computed with AndroGuard.

com.transsion.statisticalsales.RegisterService
com.transsion.statisticalsales.sms.InforSmsService
com.transsion.statisticalsales.InforSimService
com.transsion.statisticalsales.SelectBranchService

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before April 16, 2019, 7:56 a.m.
First submission on VT March 9, 2022, 4:52 p.m.
Last submission on VT March 9, 2022, 4:52 p.m.
Upload on Pithus June 22, 2022, 10:20 p.m.
Certificate valid not after Sept. 1, 2046, 7:56 a.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application use no DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 de/greenrobot/event/SubscriberMethodFinder.java
com/loopj/android/http/RangeFileAsyncHttpResponseHandler.java
com/loopj/android/http/AsyncHttpRequest.java
com/loopj/android/http/AsyncHttpResponseHandler.java
com/loopj/android/http/SimpleMultipartEntity.java
de/greenrobot/event/BackgroundPoster.java
com/loopj/android/http/PersistentCookieStore.java
com/transsion/statisticalsales/util/MD5Util.java
com/loopj/android/http/SaxAsyncHttpResponseHandler.java
com/loopj/android/http/RequestParams.java
com/loopj/android/http/AsyncHttpClient.java
com/transsion/statisticalsales/util/Logs.java
com/loopj/android/http/BinaryHttpResponseHandler.java
com/loopj/android/http/FileAsyncHttpResponseHandler.java
com/loopj/android/http/JsonHttpResponseHandler.java
com/loopj/android/http/BaseJsonHttpResponseHandler.java
com/loopj/android/http/JsonStreamerEntity.java
com/transsion/statisticalsales/SalesModel.java
com/loopj/android/http/DataAsyncHttpResponseHandler.java
com/loopj/android/http/TextHttpResponseHandler.java
de/greenrobot/event/EventBus.java
Medium
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/transsion/statisticalsales/util/MD5Util.java
Medium
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/loopj/android/http/FileAsyncHttpResponseHandler.java
Medium
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 com/loopj/android/http/SimpleMultipartEntity.java
High
CVSS:7.4
Insecure Implementation of SSL. Trusting all the certificates or accepting self signed certificates is a critical Security Hole. This application is vulnerable to MITM attacks
MASVS: MSTG-NETWORK-3
CWE-295 Improper Certificate Validation
M3: Insecure Communication
Files:
 com/loopj/android/http/MySSLSocketFactory.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 com/loopj/android/http/MySSLSocketFactory.java
Pygal Ireland: 100 India: 100

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

IE asv.transsion.com 54.72.140.145
IN asvin.transsion.com 147.139.5.216

URL analysis

Information computed with MobSF.

https://asv.transsion.com:443/SaleStatistics/sendsale/sendSale
https://asvin.transsion.com:8080/SaleStatistics/sendsale/sendSale
Defined in com/transsion/statisticalsales/util/SSHttpClient.java
https://asv.transsion.com:443/SaleStatistics/sendsale/sendSale
https://asvin.transsion.com:8080/SaleStatistics/sendsale/sendSale
Defined in com/transsion/statisticalsales/util/SSHttpClient.java

Permissions analysis

Information computed with MobSF.

High android.permission.MOUNT_UNMOUNT_FILESYSTEMS mount and unmount file systems
Allows the application to mount and unmount file systems for removable storage.
High android.permission.GET_TASKS retrieve running applications
Allows application to retrieve information about currently and recently running tasks. May allow malicious applications to discover private information about other applications.
High android.permission.SYSTEM_ALERT_WINDOW display system-level alerts
Allows an application to show system-alert windows. Malicious applications can take over the entire screen of the phone.
High android.permission.WRITE_SETTINGS modify global system settings
Allows an application to modify the system's settings data. Malicious applications can corrupt your system's configuration.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.ACCESS_WIFI_STATE view Wi-Fi status
Allows an application to view the information about the status of Wi-Fi.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.RESTART_PACKAGES kill background processes
Allows an application to kill background processes of other applications, even if memory is not low.
Low android.permission.KILL_BACKGROUND_PROCESSES kill background processes
Allows an application to kill background processes of other applications, even if memory is not low.
Medium android.permission.FORCE_STOP_PACKAGES force-stop other applications
Allows an application to stop other applications forcibly.
Medium android.permission.WRITE_SECURE_SETTINGS modify secure system settings
Allows an application to modify the system's secure settings data. Not for use by common applications.
android.permission.READ_PRIVILEGED_PHONE_STATE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Method reflection
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Query the IMSI number
Confidence:
100%
Deletes media specified by a content URI(SMS, CALL_LOG, File, etc.)
Confidence:
100%
Query the IMEI number
Confidence:
100%
Method reflection
Confidence:
100%
Query data from URI (SMS, CALLLOGS)
Confidence:
100%
Query the phone number
Confidence:
80%
Find a method from given class name, usually for reflection
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Get absolute path of the file and store in string
Confidence:
80%
Executes the specified string Linux command

Behavior analysis

Information computed with MobSF.

Certificate handling
       com/loopj/android/http/MySSLSocketFactory.java
com/loopj/android/http/AsyncHttpClient.java
Execute os command
       com/transsion/statisticalsales/util/MobileUtil.java
Get cell location
       com/transsion/statisticalsales/SalesModel.java
Get phone number
       com/transsion/statisticalsales/util/MobileUtil.java
Get subscriber id
       com/transsion/statisticalsales/util/MobileUtil.java
Get system service
       com/transsion/statisticalsales/RegisterService.java
com/transsion/statisticalsales/SimStateReceive.java
com/transsion/statisticalsales/sms/InforSmsService.java
com/transsion/statisticalsales/util/MobileUtil.java
com/transsion/statisticalsales/SalesModel.java
com/transsion/statisticalsales/SelectBranchService.java
Http connection
       com/loopj/android/http/AsyncHttpRequest.java
android/net/http/Headers.java
com/loopj/android/http/MyRedirectHandler.java
com/loopj/android/http/PreemtiveAuthorizationHttpRequestInterceptor.java
android/net/http/AndroidHttpClient.java
com/loopj/android/http/SyncHttpClient.java
com/loopj/android/http/RetryHandler.java
com/loopj/android/http/AsyncHttpClient.java
android/net/http/AndroidHttpClientConnection.java
Http requests, connections and sessions
       com/loopj/android/http/AsyncHttpRequest.java
android/net/http/AndroidHttpClient.java
com/loopj/android/http/AsyncHttpClient.java
Https connection
       com/loopj/android/http/MySSLSocketFactory.java
Inter process communication
       com/transsion/statisticalsales/RegisterService.java
com/transsion/statisticalsales/SimStateReceive.java
com/transsion/statisticalsales/sms/InforSmsService.java
com/transsion/statisticalsales/sms/SmsReceiver.java
com/transsion/statisticalsales/BootCompletedReceiver.java
com/transsion/statisticalsales/SalesModel.java
com/transsion/statisticalsales/InforSimService.java
com/transsion/statisticalsales/SelectBranchService.java
com/transsion/statisticalsales/util/NvRAMAgent.java
Java reflection
       de/greenrobot/event/SubscriberMethodFinder.java
com/transsion/statisticalsales/util/MobileUtil.java
de/greenrobot/event/SubscriberMethod.java
com/transsion/statisticalsales/SalesModel.java
com/loopj/android/http/AsyncHttpClient.java
Kill process
       com/transsion/statisticalsales/sms/InforSmsService.java
Local file i/o operations
       com/loopj/android/http/FileAsyncHttpResponseHandler.java
com/loopj/android/http/PersistentCookieStore.java
com/transsion/statisticalsales/util/PreferencesUtils.java
Message digest
       com/transsion/statisticalsales/util/MD5Util.java
Query database of sms, contacts etc
       com/transsion/statisticalsales/sms/InforSmsService.java
Send sms
       com/transsion/statisticalsales/sms/InforSmsService.java
Starting activity
       com/transsion/statisticalsales/sms/InforSmsService.java
com/transsion/statisticalsales/BootCompletedReceiver.java
Starting service
       com/transsion/statisticalsales/SimStateReceive.java
com/transsion/statisticalsales/BootCompletedReceiver.java
Tcp socket
       com/loopj/android/http/MySSLSocketFactory.java
com/loopj/android/http/RetryHandler.java
android/net/http/AndroidHttpClientConnection.java

Control flow graphs analysis

Information computed by Pithus.

The application probably kills background processes

The application probably gets different information regarding the telephony capabilities

The application probably gets the IMEI of the phone

The application probably gets the subscriber ID associated to the SIM card/ Should never be collected

The application probably determines the location based on cell towers

The application probably gets the phone number associated to the SIM card

The application probably gets the network connections information

The application probably sends SMS/MMS messages

The application probably executes OS commands