Moderate Risk

Threat level

com.samsung.android.kgclient

Device Services

Analyzed on 2021-11-28T11:00:12.627582

51

permissions

14

activities

11

services

10

receivers

15

domains

File sums

MD5 b4562df9c1fe4fd577ac120b49e3ab0e
SHA1 d534f8137f0815716e30b9ea6775420614bacfe1
SHA256 afffc5fe43b5ac21a945601efcce7074ea15b541e6eb10ed8524d25c5963cdb2
Size 2.98MB

APKiD

Information computed with APKiD.

/tmp/tmp8t27zlo1!classes.dex
anti_vm
  • subscriber ID check
  • ro.build.type check
compiler
  • r8

SSdeep

Information computed with ssdeep.

APK file 49152:pFHcJx3OuPIG2YUFuI+VURuLa9aCWgaki2OnoaVa8smL63v:2J2YUFupVUUyaBgeNDa1l/
Manifest 768:4u9E8PhmidaObqUQvDaob/OigL7mUHA7yw1AtKmyDzg2Bp+TLAp/APqCenNrasiI:…
classes.dex 24576:xMoRz1KHqEJIZqhWPSHfVgDY7tKRkD95LsyzsFHkwPXue8kTb9TNosJ3AO7:xV0…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 1536:gUicUvo0fbbbbrNfI1yjwLeWxZelcF5gui0armc:wg0fbbbbrQyMolcbgNJ
classes.dex 1536:gUicUvo0fbbbbrNfI1yjwLeWxZelcF5gui0armc:wg0fbbbbrQyMolcbgNJ

APK details

Information computed with AndroGuard and Pithus.

Package com.samsung.android.kgclient
App name Device Services
Version name 2.2.88
Version code 228800000
SDK 26 - 29
UAID 8717d4225f93fa1f307f70ccbde99a9f3d8a1fc4
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 d087e72912fba064cafa78dc34aea839
SHA1 9ca5170f381919dfe0446fcdab18b19a143b3163
SHA256 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:12+00:00
Not after 2038-11-07T12:25:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
High Activity (com.samsung.android.kgclient.browser.LaunchActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.KGIntentReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.knoxguard.STATUS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.systemIntent.SystemIntentReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.serviceIntent.ServiceIntentReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.knoxguard.STATUS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.KGKesReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.knoxguard.STATUS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.systemIntent.ServiceStateReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Service (com.google.firebase.messaging.FirebaseMessagingService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INSTALL_PACKAGES [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Service (com.google.firebase.iid.FirebaseInstanceIdService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
Medium High Intent Priority (500)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (100000000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (500)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.samsung.android.kgclient.browser.LaunchActivity

Hosts: me.samsungknox.com

Schemes: smdm:// https://

Activities

Information computed with AndroGuard.

com.samsung.android.kgclient.activities.blink.BlinkScreenActivity
com.samsung.android.kgclient.activities.warning.WarningScreenActivity
com.samsung.android.kgclient.activities.overdue.OverdueMessageActivity
com.samsung.android.kgclient.activities.alert.AlertDialogActivity
com.samsung.android.kgclient.activities.eula.EulaActivity
com.samsung.android.kgclient.activities.email.EmailScreenActivity
com.samsung.android.kgclient.activities.support.SupportScreenActivity
com.samsung.android.kgclient.activities.support.SupportScreenActivity$DownloadPolicyActivity
com.samsung.android.kgclient.activities.support.SupportScreenActivity$InputPinActivity
com.samsung.android.kgclient.browser.LaunchActivity
com.samsung.android.kgclient.browser.EnrollActivity
com.samsung.android.kgclient.selfupdate.AgentUpdatorActivity
com.samsung.android.kgclient.browser.BluetoothScanningActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.samsung.android.kgclient.receiver.KGAdminReceiver
com.samsung.android.kgclient.receiver.KGIntentReceiver
com.samsung.android.kgclient.receiver.systemIntent.SystemIntentReceiver
com.samsung.android.kgclient.receiver.serviceIntent.ServiceIntentReceiver
com.samsung.android.kgclient.receiver.KGKesReceiver
com.samsung.android.kgclient.alarm.AlarmReceiver
com.samsung.android.kgclient.receiver.systemIntent.ServiceStateReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver

Services

Information computed with AndroGuard.

com.samsung.android.kgclient.service.KGIntentService
com.samsung.android.kgclient.receiver.systemIntent.SystemIntentReceiverService
com.samsung.android.kgclient.receiver.serviceIntent.ServiceIntentReceiverService
com.samsung.android.kgclient.alarm.AlarmService
com.samsung.android.kgclient.fcm.FirebaseCloudMessagingService
com.samsung.android.kgclient.fcm.FirebaseInstanceIDService
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.iid.FirebaseInstanceIdService

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'bluetooth', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(2) The application perform cryptographic hashing services not in accordance with FCS_COP.1.1(2) and uses the cryptographic algorithm RC2/RC4/MD4/MD5.
Cryptographic Operation - Hashing
FCS_COP.1.1(4) The application perform keyed-hash message authentication with cryptographic algorithm ['HMAC-SHA-256'] .
Cryptographic Operation - Keyed-Hash Message Authentication
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication
FIA_X509_EXT.2.2 When the application cannot establish a connection to determine the validity of a certificate, the application allow the administrator to choose whether to accept the certificate in these cases or accept the certificate ,or not accept the certificate.
X.509 Certificate Authentication
FPT_TUD_EXT.2.1 The application shall be distributed using the format of the platform-supported package manager.
Integrity for Installation and Update

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 com/samsung/android/kgclient/utils/h.java
com/samsung/android/kgclient/log/d.java
com/samsung/android/kgclient/h/a.java
High
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/samsung/android/kgclient/server/models/mdm/DeviceInfo.java
com/samsung/android/kgclient/rlc/c.java
High
CVSS:7.4
Files may contain hardcoded sensitive informations like usernames, passwords, keys etc.
MASVS: MSTG-STORAGE-14
CWE-312 Cleartext Storage of Sensitive Information
M9: Reverse Engineering
Files:
 com/samsung/android/kgclient/server/models/mdm/DeviceInfo.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 com/samsung/android/kgclient/d/a.java
com/samsung/android/kgclient/d/d.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/samsung/android/kgclient/d/d.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 com/samsung/android/kgclient/utils/i.java
High
CVSS:7.4
MD5 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 com/samsung/android/kgclient/utils/i.java
Pygal China: 600 Germany: 200 Ireland: 200 United States: 500

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

IE gslb.secb2b.com 34.250.234.50
CN china-gslb.secb2b.com.cn 140.179.123.191
CN china-stage-gslb.secb2b.com.cn 140.179.105.73
DE pinning-02.secb2b.com 143.204.98.191
CN preprod-china-segd-api.secb2b.com.cn 54.223.250.76
US preprod-us-segd-api.secb2b.com 34.210.226.163
CN pinning.secb2b.com.cn 54.223.121.62
DE stage-pinning-02.secb2b.com 143.204.95.14
US knox-antifraud.firebaseio.com 35.201.97.85
CN china-segd-api.secb2b.com.cn 52.80.50.169
IE eu-segd-api.secb2b.com 52.213.150.208
CN stage-pinning.secb2b.com.cn 140.179.157.16
US preprod-eu-segd-api.secb2b.com 34.210.226.163
US us-segd-api.secb2b.com 44.229.129.31
US stage-gslb.secb2b.com 54.213.49.228

URL analysis

Information computed with MobSF.

https://pinning.secb2b.com.cn/service/umc/leafcert
https://stage-pinning.secb2b.com.cn/service/umc/leafcert
https://pinning-02.secb2b.com/service/umc/leafcert
https://stage-pinning-02.secb2b.com/service/umc/leafcert
Defined in com/samsung/android/kgclient/d/a.java
https://pinning.secb2b.com.cn/service/umc/leafcert
https://stage-pinning.secb2b.com.cn/service/umc/leafcert
https://pinning-02.secb2b.com/service/umc/leafcert
https://stage-pinning-02.secb2b.com/service/umc/leafcert
Defined in com/samsung/android/kgclient/d/a.java
https://pinning.secb2b.com.cn/service/umc/leafcert
https://stage-pinning.secb2b.com.cn/service/umc/leafcert
https://pinning-02.secb2b.com/service/umc/leafcert
https://stage-pinning-02.secb2b.com/service/umc/leafcert
Defined in com/samsung/android/kgclient/d/a.java
https://pinning.secb2b.com.cn/service/umc/leafcert
https://stage-pinning.secb2b.com.cn/service/umc/leafcert
https://pinning-02.secb2b.com/service/umc/leafcert
https://stage-pinning-02.secb2b.com/service/umc/leafcert
Defined in com/samsung/android/kgclient/d/a.java
https://preprod-china-segd-api.secb2b.com.cn:443/v2
https://china-segd-api.secb2b.com.cn:443/v2
https://preprod-us-segd-api.secb2b.com:443/v2
https://us-segd-api.secb2b.com:443/v2
Defined in com/samsung/android/kgclient/server/ServerConstants.java
https://preprod-china-segd-api.secb2b.com.cn:443/v2
https://china-segd-api.secb2b.com.cn:443/v2
https://preprod-us-segd-api.secb2b.com:443/v2
https://us-segd-api.secb2b.com:443/v2
Defined in com/samsung/android/kgclient/server/ServerConstants.java
https://preprod-china-segd-api.secb2b.com.cn:443/v2
https://china-segd-api.secb2b.com.cn:443/v2
https://preprod-us-segd-api.secb2b.com:443/v2
https://us-segd-api.secb2b.com:443/v2
Defined in com/samsung/android/kgclient/server/ServerConstants.java
https://preprod-china-segd-api.secb2b.com.cn:443/v2
https://china-segd-api.secb2b.com.cn:443/v2
https://preprod-us-segd-api.secb2b.com:443/v2
https://us-segd-api.secb2b.com:443/v2
Defined in com/samsung/android/kgclient/server/ServerConstants.java
https://china-stage-gslb.secb2b.com.cn
https://stage-gslb.secb2b.com
https://china-gslb.secb2b.com.cn
https://gslb.secb2b.com
Defined in com/samsung/android/kgclient/gslb/GSLBManager.java
https://china-stage-gslb.secb2b.com.cn
https://stage-gslb.secb2b.com
https://china-gslb.secb2b.com.cn
https://gslb.secb2b.com
Defined in com/samsung/android/kgclient/gslb/GSLBManager.java
https://china-stage-gslb.secb2b.com.cn
https://stage-gslb.secb2b.com
https://china-gslb.secb2b.com.cn
https://gslb.secb2b.com
Defined in com/samsung/android/kgclient/gslb/GSLBManager.java
https://china-stage-gslb.secb2b.com.cn
https://stage-gslb.secb2b.com
https://china-gslb.secb2b.com.cn
https://gslb.secb2b.com
Defined in com/samsung/android/kgclient/gslb/GSLBManager.java
https://china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://preprod-china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in com/samsung/android/kgclient/utils/i.java
https://china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://preprod-china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in com/samsung/android/kgclient/utils/i.java
https://china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://preprod-china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in com/samsung/android/kgclient/utils/i.java
https://china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://preprod-china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in com/samsung/android/kgclient/utils/i.java
https://china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://preprod-china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in com/samsung/android/kgclient/utils/i.java
https://china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://preprod-china-segd-api.secb2b.com.cn/ds/v1/profiles/
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in com/samsung/android/kgclient/utils/i.java
https://knox-antifraud.firebaseio.com
Defined in Android String Resource

Permissions analysis

Information computed with MobSF.

High android.permission.ACCESS_COARSE_LOCATION coarse (network-based) location
Access coarse location sources, such as the mobile network database, to determine an approximate phone location, where available. Malicious applications can use this to determine approximately where you are.
High android.permission.SET_PROCESS_LIMIT limit number of running processes
Allows an application to control the maximum number of processes that will run. Never needed for common applications.
High android.permission.ACCESS_FINE_LOCATION fine (GPS) location
Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.
High android.permission.WRITE_APN_SETTINGS write Access Point Name settings
Allows an application to modify the APN settings, such as Proxy and Port of any APN.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.BLUETOOTH create Bluetooth connections
Allows applications to connect to paired bluetooth devices.
Low android.permission.BLUETOOTH_ADMIN bluetooth administration
Allows applications to discover and pair bluetooth devices.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Medium android.permission.BIND_DEVICE_ADMIN interact with device admin
Allows the holder to send intents to a device administrator. Should never be needed for common applications.
Medium android.permission.DEVICE_POWER turn phone on or off
Allows the application to turn the phone on or off.
Medium android.permission.STOP_APP_SWITCHES prevent app switches
Prevents the user from switching to another application.
Medium com.google.android.c2dm.permission.RECEIVE C2DM permissions
Permission for cloud to device messaging.
Medium android.permission.UPDATE_DEVICE_STATS modify battery statistics
Allows the modification of collected battery statistics. Not for use by common applications.
Medium android.permission.CALL_PRIVILEGED directly call any phone numbers
Allows the application to call any phone number, including emergency numbers, without your intervention. Malicious applications may place unnecessary and illegal calls to emergency services.
Medium android.permission.WRITE_SECURE_SETTINGS modify secure system settings
Allows an application to modify the system's secure settings data. Not for use by common applications.
Medium android.permission.STATUS_BAR disable or modify status bar
Allows application to disable the status bar or add and remove system icons.
Medium android.permission.MODIFY_PHONE_STATE modify phone status
Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like, without ever notifying you.
android.permission.READ_PRIVILEGED_PHONE_STATE Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_APP_MGMT Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_SECURITY Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_RESTRICTION_MGMT Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_KIOSK_MODE Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_HW_CONTROL Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_LOCATION Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_CONTAINER Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_ENTERPRISE_DEVICE_ADMIN Unknown permission
Unknown permission from android reference
com.sec.android.EXCEPTION_AUTORUN_DEFAULT_OFF Unknown permission
Unknown permission from android reference
android.Manifest.permission.MANAGE_DEVICE_ADMINS Unknown permission
Unknown permission from android reference
android.permission.MANAGE_DEVICE_ADMINS Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_TIMA_KEYSTORE Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_CCM_KEYSTORE Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_PHONE_RESTRICTION Unknown permission
Unknown permission from android reference
android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME Unknown permission
Unknown permission from android reference
com.samsung.android.knoxguard.STATUS Unknown permission
Unknown permission from android reference
android.permission.MANAGE_USERS Unknown permission
Unknown permission from android reference
android.permission.INTERACT_ACROSS_USERS Unknown permission
Unknown permission from android reference
android.permission.ACCESS_KEYGUARD_SECURE_STORAGE Unknown permission
Unknown permission from android reference
android.permission.MANAGE_USB Unknown permission
Unknown permission from android reference
com.google.android.providers.settings.permission.WRITE_GSETTINGS Unknown permission
Unknown permission from android reference
android.permission.MANAGE_NETWORK_POLICY Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_LICENSE_INTERNAL Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_INTERNAL_EXCEPTION Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_SIM_RESTRICTION Unknown permission
Unknown permission from android reference
android.permission.UPDATE_APP_OPS_STATS Unknown permission
Unknown permission from android reference
android.permission.START_ACTIVITIES_FROM_BACKGROUND Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_CUSTOM_SETTING Unknown permission
Unknown permission from android reference
com.samsung.android.security.permission.SAMSUNG_KEYSTORE_PERMISSION Unknown permission
Unknown permission from android reference
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Unknown permission
Unknown permission from android reference
com.samsung.android.kgclient.permission.C2D_MESSAGE Unknown permission
Unknown permission from android reference

Tracking analysis

Information computed with Exodus-core.

Google Firebase Analytics https://reports.exodus-privacy.eu.org/fr/trackers/49

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Write HTTP input stream into a file
Confidence:
100%
Start another application from current application
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Connect to a URL and receive input stream from the server
Confidence:
100%
Method reflection
Confidence:
100%
Get the network operator name
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Load class from given class name
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Send notification
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get calendar information
Confidence:
100%
Get location of the device
Confidence:
100%
Query the IMEI number
Confidence:
100%
Method reflection
Confidence:
100%
Hide the current app's icon
Confidence:
100%
Get the country code of the SIM card provider
Confidence:
100%
Connect to the remote server through the given URL
Confidence:
100%
Query data from URI (SMS, CALLLOGS)
Confidence:
100%
Read file into a stream and put it into a JSON object
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Get filename and put it to JSON object
Confidence:
100%
Read the input stream from given URL
Confidence:
100%
Check the list of currently running applications
Confidence:
80%
Check if the network is connected
Confidence:
80%
Load external class
Confidence:
80%
Check the active network type
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Get absolute path of the file and store in string
Confidence:
80%
Query the network operator name
Confidence:
80%
Query the ICCID number
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Android notifications
       com/samsung/android/kgclient/e/a.java
Base64 decode
       com/samsung/android/kgclient/d/a.java
com/samsung/android/kgclient/utils/i.java
Base64 encode
       com/samsung/android/kgclient/server/models/mdm/DeviceInfo.java
com/samsung/android/kgclient/utils/i.java
com/samsung/android/kgclient/gslb/SecureDataGenerator.java
com/samsung/android/kgclient/g/a.java
com/samsung/android/kgclient/rlc/c.java
Certificate handling
       com/samsung/android/kgclient/d/a.java
Content provider
       com/samsung/android/kgclient/provider/KGProvider.java
Crypto
       com/samsung/android/kgclient/gslb/SecureDataGenerator.java
com/samsung/android/kgclient/rlc/c.java
Get device id, imei,meid/esn etc
       com/samsung/android/kgclient/utils/h.java
Get sim provider details
       com/samsung/android/kgclient/utils/h.java
com/samsung/android/kgclient/i/a.java
Get subscriber id
       com/samsung/android/kgclient/h/n.java
Get system service
       com/samsung/android/kgclient/e/a.java
com/samsung/android/kgclient/browser/a.java
com/samsung/android/kgclient/activities/alert/AlertDialogActivity.java
com/samsung/android/kgclient/utils/f.java
com/samsung/android/kgclient/utils/i.java
com/samsung/android/kgclient/h/o.java
com/samsung/android/kgclient/i/b.java
com/samsung/android/kgclient/server/models/mdm/DeviceInfo.java
com/samsung/android/kgclient/browser/BluetoothScanningActivity.java
com/samsung/android/kgclient/activities/support/SupportScreenActivity.java
com/samsung/android/kgclient/h/c.java
com/samsung/android/kgclient/utils/h.java
com/samsung/android/kgclient/h/l.java
com/samsung/android/kgclient/i/a.java
com/samsung/android/kgclient/activities/blink/BlinkScreenActivity.java
com/samsung/android/kgclient/alarm/a.java
com/samsung/android/kgclient/c/a.java
com/samsung/android/kgclient/activities/email/EmailScreenActivity.java
com/samsung/android/kgclient/browser/c.java
com/samsung/android/kgclient/h/n.java
com/samsung/android/kgclient/activities/a.java
Http connection
       com/samsung/android/kgclient/d/d.java
Https connection
       com/samsung/android/kgclient/d/a.java
com/samsung/android/kgclient/selfupdate/a.java
com/samsung/android/kgclient/d/d.java
com/samsung/android/kgclient/d/c.java
Inter process communication
       com/samsung/android/kgclient/activities/blink/a.java
com/samsung/android/kgclient/browser/EnrollActivity.java
com/samsung/android/kgclient/receiver/serviceIntent/ServiceIntentReceiver.java
com/samsung/android/kgclient/activities/overdue/b.java
com/samsung/android/kgclient/receiver/systemIntent/a.java
com/samsung/android/kgclient/utils/i.java
com/samsung/android/kgclient/browser/b.java
com/samsung/android/kgclient/g/e.java
com/samsung/android/kgclient/receiver/KGKesReceiver.java
com/samsung/android/kgclient/receiver/serviceIntent/b.java
com/samsung/android/kgclient/i/b.java
com/samsung/android/kgclient/activities/warning/b.java
com/samsung/android/kgclient/browser/BluetoothScanningActivity.java
com/samsung/android/kgclient/activities/support/SupportScreenActivity.java
com/samsung/android/kgclient/activities/eula/EulaActivity.java
com/samsung/android/kgclient/alarm/a.java
com/samsung/android/kgclient/activities/overdue/OverdueMessageActivity.java
com/samsung/android/kgclient/receiver/b.java
com/samsung/android/kgclient/b/a.java
com/samsung/android/kgclient/receiver/systemIntent/SystemIntentReceiverService.java
com/samsung/android/kgclient/rlc/c.java
com/samsung/android/kgclient/receiver/serviceIntent/ServiceIntentReceiverService.java
com/samsung/android/kgclient/e/a.java
com/samsung/android/kgclient/activities/alert/AlertDialogActivity.java
com/samsung/android/kgclient/alarm/AlarmReceiver.java
com/samsung/android/kgclient/selfupdate/a.java
com/samsung/android/kgclient/f/a.java
com/samsung/android/kgclient/receiver/systemIntent/b.java
com/samsung/android/kgclient/receiver/systemIntent/SystemIntentReceiver.java
com/samsung/android/kgclient/fcm/c.java
com/samsung/android/kgclient/activities/overdue/c.java
com/samsung/android/kgclient/receiver/systemIntent/ServiceStateReceiver.java
com/samsung/android/kgclient/utils/d.java
com/samsung/android/kgclient/browser/LaunchActivity.java
com/samsung/android/kgclient/utils/g.java
com/samsung/android/kgclient/g/c.java
com/samsung/android/kgclient/receiver/KGAdminReceiver.java
com/samsung/android/kgclient/activities/warning/WarningScreenActivity.java
com/samsung/android/kgclient/activities/blink/BlinkScreenActivity.java
com/samsung/android/kgclient/activities/email/EmailScreenActivity.java
com/samsung/android/kgclient/browser/c.java
com/samsung/android/kgclient/service/KGIntentService.java
com/samsung/android/kgclient/receiver/serviceIntent/a.java
com/samsung/android/kgclient/receiver/KGIntentReceiver.java
com/samsung/android/kgclient/h/f.java
Java reflection
       com/samsung/android/kgclient/h/h.java
com/samsung/android/kgclient/h/l.java
com/samsung/android/kgclient/h/o.java
com/samsung/android/kgclient/rlc/b.java
com/samsung/android/kgclient/h/a.java
com/samsung/android/kgclient/h/b.java
com/samsung/android/kgclient/h/f.java
Local file i/o operations
       com/samsung/android/kgclient/utils/e.java
Message digest
       com/samsung/android/kgclient/server/models/mdm/DeviceInfo.java
com/samsung/android/kgclient/utils/i.java
com/samsung/android/kgclient/gslb/SecureDataGenerator.java
com/samsung/android/kgclient/utils/g.java
Query database of sms, contacts etc
       com/samsung/android/kgclient/utils/i.java
Sending broadcast
       com/samsung/android/kgclient/utils/i.java
Starting activity
       com/samsung/android/kgclient/e/a.java
com/samsung/android/kgclient/activities/alert/AlertDialogActivity.java
com/samsung/android/kgclient/selfupdate/a.java
com/samsung/android/kgclient/activities/blink/a.java
com/samsung/android/kgclient/receiver/systemIntent/b.java
com/samsung/android/kgclient/utils/i.java
com/samsung/android/kgclient/browser/b.java
com/samsung/android/kgclient/browser/LaunchActivity.java
com/samsung/android/kgclient/receiver/KGKesReceiver.java
com/samsung/android/kgclient/i/b.java
com/samsung/android/kgclient/activities/warning/b.java
com/samsung/android/kgclient/utils/g.java
com/samsung/android/kgclient/g/c.java
com/samsung/android/kgclient/browser/BluetoothScanningActivity.java
com/samsung/android/kgclient/activities/support/SupportScreenActivity.java
com/samsung/android/kgclient/receiver/KGAdminReceiver.java
com/samsung/android/kgclient/activities/warning/WarningScreenActivity.java
com/samsung/android/kgclient/activities/blink/BlinkScreenActivity.java
com/samsung/android/kgclient/activities/overdue/OverdueMessageActivity.java
com/samsung/android/kgclient/receiver/b.java
Starting service
       com/samsung/android/kgclient/utils/i.java
Tcp socket
       com/samsung/android/kgclient/d/d.java

Control flow graphs analysis

Information computed by Pithus.

The application probably lists running applications

The application probably gets the location based on GPS and/or Wi-Fi

The application probably uses reflection

The application probably plays sound