Malicious
8
/60

Threat

com.sbi.complaintregister

SBI Quick Support

Analyzed on 2021-10-17T07:07:09.138077

9

permissions

2

activities

0

services

2

receivers

1

domains

File sums

MD5 232d093de2029d293393613b2627b97b
SHA1 93609d051affaf1f5455041643677ca6122202f4
SHA256 8f05ecbb5f9fe721dfcd380669ab7ebb1dffc433ee0c4d5dce9936afa69564b0
Size 3.26MB

APKiD

Information computed with APKiD.

/tmp/tmpy6fpjkxp!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MODEL check
  • Build.MANUFACTURER check
compiler
  • r8 without marker (suspicious)
/tmp/tmpy6fpjkxp!classes2.dex
compiler
  • dx
/tmp/tmpy6fpjkxp!classes3.dex
compiler
  • r8 without marker (suspicious)
/tmp/tmpy6fpjkxp!classes4.dex
compiler
  • r8 without marker (suspicious)
/tmp/tmpy6fpjkxp!classes5.dex
compiler
  • r8 without marker (suspicious)

SSdeep

Information computed with ssdeep.

APK file 98304:K+dP+QcIyHfrr/YnYe1jWYO2Lx8AOSQDOTElIRj:KkPN5nDjBLOdiToGj
Manifest 96:mtGU1per/zntyUgGYOakaYO0juQ4SFS5Dv8MnK54hZk/rFIYbt:mXeDzntyUghOJtO…
classes.dex 49152:AplnEDJ3mGvV6RT3BOynK62U1riyKq+HBK:+nEF3mbzTnK62/xhK
classes2.dex 6144:i/I9VYWDL3z2eftx9T6Jm59VG3PgTSHslEC423VZrf6EPe0dve3O0s7g0q//BCUe…
classes3.dex 24:H53kGYkgvlSZOsNXwjFuKq62UPXwn3nLGQ1:HpakIUOnjFM3CK
classes4.dex 96:6hq7NuPWraQ7rhYmd6b1h5V8R/Zf4Ajonm/UZrTqIQKrrKT1oygRU0tX:6hKuPyaQ3…
classes5.dex 384:NvZ806hzhskw4Yd1KR/z5a8rUykxWSBHvOeNC49Y4+ZF04:/1kPYuCykxvHvfNri4…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 3072:Rrw6K/odaNmaMAUF0yGcAtxPmMQ06FJEiAanXKCkFP1/7ftk+W+Cdt/6WbZoT7kg…
classes.dex 3072:Rrw6K/odaNmaMAUF0yGcAtxPmMQ06FJEiAanXKCkFP1/7ftk+W+Cdt/6WbZoT7kj…
classes2.dex 24:rLLLLLLfOJLLLLLLLLLLLLqLLLLLLLLMNeLLLLAcLLLLLLLLLLL0LLLLLLLLJLLS:b…
classes3.dex 3:Lg0r2vU:Lg0D
classes4.dex 3:L7LZ6YOkhUkghhdc6WkEyFLwYn:LQk4hrQmwYn
classes5.dex 12:WvCTLnnqm4yBzFmJct/X/a2gU1Y2JIg5gi:pOm4yLzf/a2gUuiV5n

APK details

Information computed with AndroGuard and Pithus.

Package com.sbi.complaintregister
App name SBI Quick Support
Version name 1.0
Version code 1
SDK 22 - 30
UAID 6cd89fb4c5dcb069648b6f7949fb5a970ef9ab40
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 f37a9aa742ec07e41ee30675ba3f4a8f
SHA1 bee3ff0acd3f864cd74bd32ed6556b0fee8812e9
SHA256 94b02bc7b318a5c4591d9529bec0fbb5cb8ba22edb1253493737703c1286c25d
Issuer Common Name: Android Debug, Organization: Android, Country: US
Not before 2021-09-29T20:31:38+00:00
Not after 2051-09-22T20:31:38+00:00

Manifest analysis

Information computed with MobSF.

Low App has a Network Security Configuration[android:networkSecurityConfig=@xml/network_security_config]
The Network Security Configuration feature lets apps customize their network security settings in a safe, declarative configuration file without modifying app code. These settings can be configured for specific domains and for a specific app.
High Debug Enabled For App[android:debuggable=true]
Debugging was enabled on the app which makes it easier for reverse engineers to hook a debugger to it. This allows dumping a stack trace and accessing debugging helper classes.
Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Broadcast Receiver (com.sbi.complaintregister.SmsListener) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.

Main Activity

Information computed with AndroGuard.

com.sbi.complaintregister.SplashActivity

Activities

Information computed with AndroGuard.

com.sbi.complaintregister.SplashActivity
com.sbi.complaintregister.MainActivity

Receivers

Information computed with AndroGuard.

com.sbi.complaintregister.SmsListener
com.sbi.complaintregister.MainActivity

Sample timeline

Oldest file found in APK Jan. 1, 1981, 1:01 a.m.
Latest file found in APK Jan. 1, 1981, 1:01 a.m.
Certificate valid not before Sept. 29, 2021, 8:31 p.m.
First submission on VT Oct. 16, 2021, 2:18 a.m.
Last submission on VT Oct. 16, 2021, 2:18 a.m.
Upload on Pithus Oct. 17, 2021, 7:07 a.m.
Certificate valid not after Sept. 22, 2051, 8:31 p.m.

VirusTotal

Score 8/60
Report https://www.virustotal.com/gui/file/8f05ecbb5f9fe721dfcd380669ab7ebb1dffc433ee0c4d5dce9936afa69564b0/detection

Most Popular AV Detections

Provided by VirusTotal

Threat name: smsthief Identified 4 times

NIAP analysis

Information computed with MobSF.

FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/sbi/complaintregister/SmsListener.java
com/sbi/complaintregister/background/ServiceBG.java
com/sbi/complaintregister/MainActivity.java
com/sbi/complaintregister/background/Receiver.java
Pygal Singapore: 100

Map computed by Pithus.

Network analysis

Information computed with MobSF.

High Base config is insecurely configured to permit clear text traffic to all domains.
Scope: ['*']
Medium Base config is configured to trust system certificates.
Scope: ['*']

Domains analysis

Information computed with MobSF.

SG complaintsregister.com 182.50.135.99

URL analysis

Information computed with MobSF.

https://complaintsregister.com/api/msgstore?task=savemsg
Defined in com/sbi/complaintregister/SmsListener.java
https://complaintsregister.com/api/msgstore?task=savemsg
Defined in com/sbi/complaintregister/MainActivity.java

Permissions analysis

Information computed with MobSF.

High android.permission.RECEIVE_SMS receive SMS
Allows application to receive and process SMS messages. Malicious applications may monitor your messages or delete them without showing them to you.
High android.permission.READ_SMS read SMS or MMS
Allows application to read SMS messages stored on your phone or SIM card. Malicious applications may read your confidential messages.
High android.permission.SEND_SMS send SMS messages
Allows application to send SMS messages. Malicious applications may cost you money by sending messages without your confirmation.
High android.permission.READ_PHONE_STATE read phone state and identity
Allows the application to access the phone features of the device. An application with this permission can determine the phone number and serial number of this phone, whether a call is active, the number that call is connected to and so on.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.FOREGROUND_SERVICE Allows a regular application to use Service.startForeground
android.permission.READ_PRIVILEGED_PHONE_STATE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Load external class
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Read data and put it into a buffer stream
Confidence:
100%
Method reflection
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get absolute path of the file and store in string
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get location of the device
Confidence:
100%
Method reflection
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Connect to a URL and set request method
Confidence:
80%
Query the phone number from SMS sender
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
80%
Query data from URI (SMS, CALLLOGS)
Confidence:
80%
Query the SMS contents
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Get installed applications
       com/sbi/complaintregister/MainActivity.java
Get system service
       com/sbi/complaintregister/ListAdapter.java
com/sbi/complaintregister/MainActivity.java
com/sbi/complaintregister/background/Receiver.java
Inter process communication
       com/sbi/complaintregister/SmsListener.java
com/sbi/complaintregister/SplashActivity.java
com/sbi/complaintregister/background/ServiceBG.java
com/sbi/complaintregister/MainActivity.java
com/sbi/complaintregister/background/Receiver.java
Local file i/o operations
       com/sbi/complaintregister/MainActivity.java
Send sms
       com/sbi/complaintregister/SmsListener.java
Starting activity
       com/sbi/complaintregister/SplashActivity.java
com/sbi/complaintregister/MainActivity.java

Control flow graphs analysis

Information computed by Pithus.

The application probably dynamically loads code

The application probably plays sound

The application probably sends SMS/MMS messages

The application probably creates an accessibility service

The application probably listens accessibility events