0/62

Threat

com.samsung.android.kgclient

Device Services

Analyzed on 2022-05-13T19:38:38.708944

48

permissions

14

activities

7

services

11

receivers

11

domains

File sums

MD5 53076fa31a6da3f35b645b650efe3e1f
SHA1 3a32bf6933b169cfde2847651d6a78d3e83fba14
SHA256 c3a5eaa50e8ccc078e218428e5b23959f977111d9b0a40c78f2ed4ed9fb08fd5
Size 4.26MB

APKiD

Information computed with APKiD.

/tmp/tmpxq9wzyzd!classes.dex
yara_issue
  • yara issue - dex file recognized by apkid but not yara module
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
  • subscriber ID check
compiler
  • unknown (please file detection issue!)

SSdeep

Information computed with ssdeep.

APK file 49152:YoME2M3rS2cyzUQInXZ30gACaWWmG/dR3u8iIZtgfr6SuJb0I:Yo3O2tU3nXZ3rA13tgfr6SuJQI
Manifest 768:Xug/E8Ph9daObqUQvOb/OigL7mn7yw1AtKmhTDzg2Bp+TLAp/AGRYnNWJ6SafQt3:…
classes.dex 24576:/7IzCLjE2kTroqBg7OrS2CM9oRwu1ZaH6eUEDPIwSOWKZSXZ30g5WgfW:/oME2M…

Dexofuzzy

Information computed with Dexofuzzy.

classes.dex None

APK details

Information computed with AndroGuard and Pithus.

Package com.samsung.android.kgclient
App name Device Services
Version name 3.0.78
Version code 307800000
SDK 28 - 30
UAID 8717d4225f93fa1f307f70ccbde99a9f3d8a1fc4
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown

Certificate details

Information computed with AndroGuard.

MD5 d087e72912fba064cafa78dc34aea839
SHA1 9ca5170f381919dfe0446fcdab18b19a143b3163
SHA256 34df0e7a9f1cf1892e45c056b4973cd81ccf148a4050d11aea4ac5a65f900a42
Issuer Email Address: android.os@samsung.com, Common Name: Samsung Cert, Organizational Unit: DMC, Organization: Samsung Corporation, Locality: Suwon City, State/Province: South Korea, Country: KR
Not before 2011-06-22T12:25:12+00:00
Not after 2038-11-07T12:25:12+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. SEC-INF/buildConfirm.crt

Manifest analysis

Information computed with MobSF.

High Activity (com.samsung.android.kgclient.ui.activities.browserenrollment.LaunchActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.ServiceIntentReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.knoxguard.STATUS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.ServiceStateReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.SimStateChangeReceiver) is not Protected. [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.KGIntentReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.knoxguard.STATUS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.samsung.android.kgclient.receiver.KGKesReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.samsung.android.knoxguard.STATUS [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
Medium High Intent Priority (100000000)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.
Medium High Intent Priority (500)[android:priority]
By setting an intent priority higher than another intent, the app effectively overrides other requests.

Browsable activities

Information computed with MobSF.

com.samsung.android.kgclient.ui.activities.browserenrollment.LaunchActivity

Schemes: smdm://

Activities

Information computed with AndroGuard.

com.samsung.android.kgclient.ui.activities.browserenrollment.BrowserEnrollmentActivity
com.samsung.android.kgclient.ui.activities.alert.AlertDialogActivity
com.samsung.android.kgclient.ui.activities.eula.EulaActivity
com.samsung.android.kgclient.ui.activities.email.EmailScreenActivity
com.samsung.android.kgclient.ui.activities.blink.BlinkScreenActivity
com.samsung.android.kgclient.ui.activities.warning.WarningScreenActivity
com.samsung.android.kgclient.ui.activities.overdue.OverdueMessageActivity
com.samsung.android.kgclient.ui.activities.relockreminder.RelockReminderActivity
com.samsung.android.kgclient.ui.activities.support.SupportScreenActivity
com.samsung.android.kgclient.ui.activities.support.SupportScreenActivity$DownloadPolicyActivity
com.samsung.android.kgclient.ui.activities.support.SupportScreenActivity$InputPinActivity
com.samsung.android.kgclient.ui.activities.browserenrollment.BluetoothScanningActivity
com.samsung.android.kgclient.ui.activities.browserenrollment.LaunchActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.samsung.android.kgclient.alarm.AlarmReceiver
com.samsung.android.kgclient.agent.KGDeviceAdminReceiver
com.samsung.android.kgclient.selfupdate.SelfupdateReceiver
com.samsung.android.kgclient.receiver.SystemIntentReceiver
com.samsung.android.kgclient.receiver.ServiceIntentReceiver
com.samsung.android.kgclient.receiver.ServiceStateReceiver
com.samsung.android.kgclient.receiver.SimStateChangeReceiver
com.samsung.android.kgclient.receiver.KGIntentReceiver
com.samsung.android.kgclient.receiver.KGKesReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver
com.google.android.datatransport.runtime.scheduling.jobscheduling.AlarmManagerSchedulerBroadcastReceiver

Services

Information computed with AndroGuard.

com.samsung.android.kgclient.events.KGEventService
com.samsung.android.kgclient.push.fcm.FCMReceiver
com.samsung.android.kgclient.alarm.AlarmService
com.google.firebase.messaging.FirebaseMessagingService
com.google.firebase.components.ComponentDiscoveryService
com.google.android.datatransport.runtime.backends.TransportBackendDiscovery
com.google.android.datatransport.runtime.scheduling.jobscheduling.JobInfoSchedulerService

Sample timeline

Oldest file found in APK Jan. 1, 2009, midnight
Latest file found in APK Jan. 1, 2009, midnight
Certificate valid not before June 22, 2011, 12:25 p.m.
First submission on VT Jan. 18, 2022, 9:57 a.m.
Last submission on VT Jan. 18, 2022, 9:57 a.m.
Upload on Pithus May 13, 2022, 7:38 p.m.
Certificate valid not after Nov. 7, 2038, 12:25 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application invoke platform-provided DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application implement asymmetric key generation.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['location', 'bluetooth', 'network connectivity'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit
FCS_RBG_EXT.2.1
FCS_RBG_EXT.2.2
The application perform all deterministic random bit generation (DRBG) services in accordance with NIST Special Publication 800-90A using Hash_DRBG. The deterministic RBG is seeded by an entropy source that accumulates entropy from a platform-based DRBG and a software-based noise source, with a minimum of 256 bits of entropy at least equal to the greatest security strength (according to NIST SP 800-57) of the keys and hashes that it will generate.
Random Bit Generation from Application
FCS_CKM.1.1(1) The application generate asymmetric cryptographic keys in accordance with a specified cryptographic key generation algorithm RSA schemes using cryptographic key sizes of 2048-bit or greater.
Cryptographic Asymmetric Key Generation
FCS_COP.1.1(2) The application perform cryptographic hashing services in accordance with a specified cryptographic algorithm SHA-1/SHA-256/SHA-384/SHA-512 and message digest sizes 160/256/384/512 bits.
Cryptographic Operation - Hashing
FCS_HTTPS_EXT.1.1 The application implement the HTTPS protocol that complies with RFC 2818.
HTTPS Protocol
FCS_HTTPS_EXT.1.2 The application implement HTTPS using TLS.
HTTPS Protocol
FCS_HTTPS_EXT.1.3 The application notify the user and not establish the connection or request application authorization to establish the connection if the peer certificate is deemed invalid.
HTTPS Protocol
FIA_X509_EXT.1.1 The application invoked platform-provided functionality to validate certificates in accordance with the following rules: ['The certificate path must terminate with a trusted CA certificate'].
X.509 Certificate Validation
FIA_X509_EXT.2.1 The application use X.509v3 certificates as defined by RFC 5280 to support authentication for HTTPS , TLS.
X.509 Certificate Authentication

Code analysis

Information computed with MobSF.

Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 c/a/b/c.java
b/b/o/j/i.java
b/h/g/d.java
b/b/p/v0.java
b/b/p/h0.java
c/a/b/k/k.java
b/h/g/e.java
c/a/b/k/l.java
b/h/e/e.java
c/a/b/k/e0.java
b/h/n/a0/c.java
b/b/o/j/j.java
c/a/a/c/l/h.java
b/h/n/e.java
c/a/b/k/v.java
c/a/b/k/y.java
c/a/a/b/c/l/d.java
com/samsung/android/kgclient/agent/KGDeviceAdminReceiver.java
b/b/p/y0.java
b/h/g/k/a.java
c/a/a/b/c/l/g.java
b/j/a/c.java
c/b/a/a/o/a.java
c/a/b/k/v0.java
c/b/a/a/a/a.java
c/a/a/c/g0/g.java
c/a/b/k/i.java
c/b/a/a/i/b.java
b/h/f/c/b.java
b/h/j/a.java
b/h/f/a.java
b/h/f/c/a.java
c/a/a/c/a0/a.java
c/a/a/c/q/a.java
b/h/l/b.java
b/k/a/i.java
b/h/g/b.java
c/a/b/n/o.java
b/h/o/h.java
b/h/e/i.java
b/h/e/l.java
c/a/a/b/h/a.java
c/a/a/b/e/c/l.java
c/a/a/b/c/l/f.java
c/a/a/b/e/d/p.java
b/b/k/i.java
c/a/a/b/c/l/c.java
b/h/n/s.java
c/a/b/k/q0.java
b/b/p/y.java
b/h/n/g.java
c/a/b/k/b1.java
b/f/b/c.java
c/a/b/n/q.java
com/samsung/android/kgclient/agent/KGApplication.java
c/a/b/f/f.java
c/a/b/n/f.java
c/a/a/b/c/f.java
c/a/b/n/e.java
c/a/b/k/a1.java
c/a/a/a/j/u/a.java
c/a/a/a/j/t/k.java
b/b/p/o0.java
b/h/n/u.java
c/a/b/k/r.java
c/a/b/k/c0.java
c/a/a/b/c/i/o/d0.java
c/a/a/b/c/l/a.java
com/samsung/android/kgclient/ui/activities/support/SupportScreenActivity.java
b/k/a/c.java
c/a/a/b/c/p/m.java
c/b/a/a/s/d.java
c/a/a/b/c/l/j.java
b/h/g/j.java
c/a/a/b/c/u.java
c/a/a/b/g/b/a.java
b/b/k/g.java
b/b/l/a/a.java
c/a/a/b/c/l/l0.java
b/t/a/a/h.java
b/b/o/g.java
c/a/a/b/c/t.java
b/h/e/b.java
b/h/g/k/e.java
b/h/n/b.java
b/b/p/j0.java
b/h/n/r.java
b/h/f/c/f.java
b/b/p/k0.java
c/a/a/b/c/e.java
c/a/a/b/c/i/o/e.java
c/a/b/n/p.java
c/a/b/k/h0.java
c/a/b/n/d.java
c/a/a/b/c/i/o/w.java
b/h/g/i.java
c/a/a/b/c/l/s0.java
c/a/a/b/c/o/a.java
c/a/a/c/e0/b.java
b/h/g/f.java
b/s/y.java
b/s/i0.java
b/f/b/b.java
b/h/o/c.java
c/a/a/b/c/o/d.java
c/a/b/k/q.java
b/b/p/x0.java
c/a/b/k/a0.java
c/a/b/k/t.java
c/a/a/b/c/b.java
c/a/b/k/w.java
Medium
CVSS:5.9
SHA-1 is a weak hash known to have hash collisions.
MASVS: MSTG-CRYPTO-4
CWE-327 Use of a Broken or Risky Cryptographic Algorithm
M5: Insufficient Cryptography
Files:
 c/a/b/k/l.java
Medium
CVSS:5.9
App uses SQLite Database and execute raw SQL query. Untrusted user input in raw SQL queries can cause SQL Injection. Also sensitive information should be encrypted and written to the database.
CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
M7: Client Code Quality
Files:
 c/a/a/a/j/w/k/z.java
c/a/a/a/j/w/k/e0.java
Info
CVSS:0
This App uses SSL certificate pinning to detect or prevent MITM attacks in secure communication channel.
MASVS: MSTG-NETWORK-4
Files:
 c/b/a/a/j/g/a.java
c/b/a/a/j/i/a.java
High
CVSS:5.5
App can read/write to External Storage. Any App can read data written to External Storage.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 c/b/a/a/s/d.java
Pygal Ireland: 200 United States: 800

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

IE eu-segd-api.secb2b.com 52.30.132.122
US stage-pinning-02.secb2b.com 65.9.68.158
US stage-gslb.secb2b.com 44.239.106.186
US preprod-us-segd-api.secb2b.com 35.162.251.244
US preprod-eu-segd-api.secb2b.com 35.162.251.244
schemas.android.com
US pinning-02.secb2b.com 52.222.210.66
US us-segd-api.secb2b.com 34.211.165.156
IE gslb.secb2b.com 99.80.48.28
US knox-antifraud.firebaseio.com 35.201.97.85
US plus.google.com 142.250.185.110

URL analysis

Information computed with MobSF.

https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in c/b/a/a/l/b.java
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in c/b/a/a/l/b.java
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in c/b/a/a/l/b.java
https://us-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-us-segd-api.secb2b.com/ds/v1/profiles/
https://eu-segd-api.secb2b.com/ds/v1/profiles/
https://preprod-eu-segd-api.secb2b.com/ds/v1/profiles/
Defined in c/b/a/a/l/b.java
https://pinning-02.secb2b.com/service/umc/leafcert
https://stage-pinning-02.secb2b.com/service/umc/leafcert
Defined in c/b/a/a/j/i/a.java
https://pinning-02.secb2b.com/service/umc/leafcert
https://stage-pinning-02.secb2b.com/service/umc/leafcert
Defined in c/b/a/a/j/i/a.java
https://stage-gslb.secb2b.com
https://gslb.secb2b.com
Defined in c/b/a/a/j/f/a.java
https://stage-gslb.secb2b.com
https://gslb.secb2b.com
Defined in c/b/a/a/j/f/a.java
http://schemas.android.com/apk/res-auto
Defined in c/a/a/c/s/a.java
https://plus.google.com/
Defined in c/a/a/b/c/l/n0.java
http://schemas.android.com/apk/res/android
Defined in b/h/f/c/g.java
https://knox-antifraud.firebaseio.com
Defined in Android String Resource

Permissions analysis

Information computed with MobSF.

High android.permission.SET_PROCESS_LIMIT limit number of running processes
Allows an application to control the maximum number of processes that will run. Never needed for common applications.
High android.permission.ACCESS_FINE_LOCATION fine (GPS) location
Access fine location sources, such as the Global Positioning System on the phone, where available. Malicious applications can use this to determine where you are and may consume additional battery power.
High android.permission.WRITE_APN_SETTINGS write Access Point Name settings
Allows an application to modify the APN settings, such as Proxy and Port of any APN.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.BLUETOOTH create Bluetooth connections
Allows applications to connect to paired bluetooth devices.
Low android.permission.BLUETOOTH_ADMIN bluetooth administration
Allows applications to discover and pair bluetooth devices.
Low android.permission.RECEIVE_BOOT_COMPLETED automatically start at boot
Allows an application to start itself as soon as the system has finished booting. This can make it take longer to start the phone and allow the application to slow down the overall phone by always running.
Low android.permission.QUERY_ALL_PACKAGES Allows query of any normal app on the device, regardless of manifest declarations.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Medium android.permission.BIND_DEVICE_ADMIN interact with device admin
Allows the holder to send intents to a device administrator. Should never be needed for common applications.
Medium android.permission.DEVICE_POWER turn phone on or off
Allows the application to turn the phone on or off.
Medium android.permission.STOP_APP_SWITCHES prevent app switches
Prevents the user from switching to another application.
Medium com.google.android.c2dm.permission.RECEIVE C2DM permissions
Permission for cloud to device messaging.
Medium android.permission.UPDATE_DEVICE_STATS modify battery statistics
Allows the modification of collected battery statistics. Not for use by common applications.
Medium android.permission.CALL_PRIVILEGED directly call any phone numbers
Allows the application to call any phone number, including emergency numbers, without your intervention. Malicious applications may place unnecessary and illegal calls to emergency services.
Medium android.permission.WRITE_SECURE_SETTINGS modify secure system settings
Allows an application to modify the system's secure settings data. Not for use by common applications.
Medium android.permission.STATUS_BAR disable or modify status bar
Allows application to disable the status bar or add and remove system icons.
Medium android.permission.MODIFY_PHONE_STATE modify phone status
Allows the application to control the phone features of the device. An application with this permission can switch networks, turn the phone radio on and off and the like, without ever notifying you.
android.permission.READ_PRIVILEGED_PHONE_STATE Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_APP_MGMT Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_SECURITY Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_RESTRICTION_MGMT Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_KIOSK_MODE Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_HW_CONTROL Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_LOCATION Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_CONTAINER Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_ENTERPRISE_DEVICE_ADMIN Unknown permission
Unknown permission from android reference
com.sec.android.EXCEPTION_AUTORUN_DEFAULT_OFF Unknown permission
Unknown permission from android reference
android.Manifest.permission.MANAGE_DEVICE_ADMINS Unknown permission
Unknown permission from android reference
android.permission.MANAGE_DEVICE_ADMINS Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_PHONE_RESTRICTION Unknown permission
Unknown permission from android reference
android.permission.SUBSTITUTE_NOTIFICATION_APP_NAME Unknown permission
Unknown permission from android reference
com.samsung.android.knoxguard.STATUS Unknown permission
Unknown permission from android reference
android.permission.MANAGE_USERS Unknown permission
Unknown permission from android reference
android.permission.INTERACT_ACROSS_USERS Unknown permission
Unknown permission from android reference
android.permission.ACCESS_KEYGUARD_SECURE_STORAGE Unknown permission
Unknown permission from android reference
android.permission.MANAGE_USB Unknown permission
Unknown permission from android reference
com.google.android.providers.settings.permission.WRITE_GSETTINGS Unknown permission
Unknown permission from android reference
android.permission.MANAGE_NETWORK_POLICY Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_LICENSE_INTERNAL Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_INTERNAL_EXCEPTION Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_SIM_RESTRICTION Unknown permission
Unknown permission from android reference
android.permission.UPDATE_APP_OPS_STATS Unknown permission
Unknown permission from android reference
android.permission.START_ACTIVITIES_FROM_BACKGROUND Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_CUSTOM_SETTING Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_HDM Unknown permission
Unknown permission from android reference
com.samsung.android.knox.permission.KNOX_DEX Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Write HTTP input stream into a file
Confidence:
100%
Start another application from current application
Confidence:
100%
Load external class
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Method reflection
Confidence:
100%
Get the network operator name
Confidence:
100%
Connect to a URL and read data from it
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
100%
Connect to a URL and get the response code
Confidence:
100%
Send notification
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get location of the device
Confidence:
100%
Query the IMEI number
Confidence:
100%
Method reflection
Confidence:
100%
Hide the current app's icon
Confidence:
100%
Get the country code of the SIM card provider
Confidence:
100%
Connect to the remote server through the given URL
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
100%
Get filename and put it to JSON object
Confidence:
100%
Read the input stream from given URL
Confidence:
100%
Check the list of currently running applications
Confidence:
100%
Connect to a URL and set request method
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Connect to a URL and receive input stream from the server
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Get absolute path of the file and store in string
Confidence:
80%
Get calendar information
Confidence:
80%
Query the network operator name
Confidence:
80%
Query the ICCID number
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Android notifications
       c/b/a/a/r/d/a.java
c/a/b/n/f.java
c/a/a/b/c/b.java
Base64 decode
       b/h/f/c/c.java
c/b/a/a/l/k.java
c/b/a/a/j/i/a.java
c/a/a/a/j/w/k/z.java
c/a/b/k/v0.java
c/b/a/a/s/d.java
Base64 encode
       b/h/k/a.java
c/a/a/a/j/w/k/z.java
c/a/b/k/l.java
c/a/b/h/h/d.java
c/a/b/k/v0.java
c/b/a/a/s/h.java
c/b/a/a/s/d.java
c/a/a/a/j/w/j/a.java
c/a/a/a/j/w/j/e.java
c/a/a/b/c/p/b.java
c/a/a/a/j/l.java
Certificate handling
       c/b/a/a/j/i/a.java
Content provider
       com/samsung/android/kgclient/provider/KGProvider.java
Crypto
       c/b/a/a/s/h.java
Gps location
       b/b/k/i.java
Get device id, imei,meid/esn etc
       c/b/a/a/s/d.java
Get installed applications
       b/h/o/i.java
Get sim provider details
       c/b/a/a/q/b.java
c/b/a/a/s/d.java
Get subscriber id
       c/b/a/a/o/k.java
Get system service
       b/i/a/c.java
b/j/a/a.java
b/k/a/b.java
b/b/o/j/l.java
c/a/b/n/f.java
c/a/a/a/i/e.java
c/b/a/a/c/b.java
c/b/a/a/l/p.java
c/b/a/a/s/f.java
com/samsung/android/kgclient/ui/activities/browserenrollment/BluetoothScanningActivity.java
c/b/a/a/s/i.java
c/a/a/c/j0/d.java
c/b/a/a/q/b.java
c/b/a/a/l/b.java
b/b/o/d.java
c/b/a/a/o/i.java
b/b/p/o0.java
c/b/a/a/o/l.java
c/a/a/a/j/w/j/a.java
b/h/j/b.java
c/a/a/c/k0/a.java
b/h/n/r.java
c/b/a/a/c/a.java
c/a/a/b/c/p/o.java
b/h/e/c.java
c/a/a/b/c/e.java
c/a/b/n/d.java
c/a/b/k/y.java
com/samsung/android/kgclient/ui/activities/blink/BlinkScreenActivity.java
com/samsung/android/kgclient/ui/activities/email/EmailScreenActivity.java
c/a/a/b/h/a.java
b/b/p/y0.java
com/samsung/android/kgclient/ui/activities/support/SupportScreenActivity.java
c/a/a/a/j/w/j/e.java
c/a/a/a/j/w/j/m.java
b/b/k/i.java
c/b/a/a/r/d/a.java
c/b/a/a/o/k.java
com/samsung/android/kgclient/ui/activities/alert/AlertDialogActivity.java
b/b/p/v.java
b/b/p/x0.java
c/b/a/a/s/d.java
c/b/a/a/b/a.java
c/a/a/b/c/b.java
Http connection
       c/b/a/a/j/g/a.java
c/a/a/a/i/e.java
Https connection
       c/b/a/a/j/g/a.java
c/b/a/a/j/i/a.java
Inter process communication
       c/a/b/c.java
b/b/o/j/i.java
c/a/a/b/e/a/b.java
c/b/a/a/r/b/h/c.java
c/b/a/a/r/b/i/c.java
c/a/a/b/e/d/z.java
c/a/b/k/x.java
c/a/a/b/e/b/b.java
b/p/a/a.java
com/samsung/android/kgclient/ui/activities/browserenrollment/BluetoothScanningActivity.java
c/a/a/b/c/i/r.java
c/a/a/b/d/a.java
c/a/a/b/e/d/a.java
c/a/b/k/l.java
c/a/a/b/c/l/q0.java
b/h/e/e.java
c/a/b/k/e0.java
b/b/o/j/j.java
c/a/a/b/e/a/a.java
com/samsung/android/kgclient/receiver/SimStateChangeReceiver.java
c/a/b/k/y.java
c/a/a/b/c/l/d.java
b/b/o/j/h.java
com/samsung/android/kgclient/ui/activities/blink/BlinkScreenActivity.java
com/samsung/android/kgclient/agent/KGDeviceAdminReceiver.java
c/a/a/b/f/d0.java
com/samsung/android/kgclient/ui/activities/relockreminder/RelockReminderActivity.java
c/a/a/b/c/l/n0.java
com/samsung/android/kgclient/ui/activities/warning/WarningScreenActivity.java
c/b/a/a/k/a.java
c/a/a/b/c/l/k0.java
c/a/a/b/c/l/g.java
c/b/a/a/g/a.java
c/a/a/b/f/a0.java
c/b/a/a/s/g.java
b/h/e/g.java
c/a/a/b/d/b.java
c/a/a/b/c/i/o/w0.java
c/a/a/b/f/c0.java
c/a/b/k/i.java
c/a/a/b/c/c.java
c/a/b/k/k0.java
b/h/f/a.java
c/a/a/b/c/l/i.java
c/b/a/a/n/b.java
c/a/a/b/e/d/d.java
c/a/a/b/c/l/y.java
c/a/a/a/j/w/j/a.java
com/samsung/android/kgclient/receiver/ServiceIntentReceiver.java
c/a/a/b/e/d/c0.java
c/a/a/b/c/p/o.java
c/a/a/b/c/i/a.java
b/h/e/i.java
com/samsung/android/kgclient/receiver/ServiceStateReceiver.java
b/h/e/l.java
com/samsung/android/kgclient/ui/activities/email/EmailScreenActivity.java
c/a/a/b/c/a0.java
com/samsung/android/kgclient/ui/activities/eula/EulaActivity.java
c/a/a/b/c/i/o/y.java
c/a/a/b/c/i/o/u0.java
b/b/k/c.java
com/samsung/android/kgclient/ui/activities/alert/AlertDialogActivity.java
c/a/a/b/f/o.java
com/samsung/android/kgclient/ui/activities/browserenrollment/BrowserEnrollmentActivity.java
c/a/a/b/c/l/v/b.java
c/a/b/k/b1.java
c/a/a/b/c/r.java
b/b/o/j/o.java
c/a/b/n/q.java
b/h/o/i.java
c/a/a/b/e/d/t.java
c/a/a/b/c/i/o/g.java
c/b/a/a/l/p.java
c/a/a/b/c/l/l.java
c/a/b/n/e.java
c/a/b/k/w0.java
c/a/a/b/c/l/g0.java
c/a/b/k/r.java
com/samsung/android/kgclient/selfupdate/SelfupdateReceiver.java
c/a/a/b/c/i/o/p0.java
com/samsung/android/kgclient/ui/activities/support/SupportScreenActivity.java
b/k/a/c.java
c/a/a/b/c/l/v/a.java
c/a/a/b/c/l/r0.java
c/b/a/a/r/d/a.java
c/a/a/b/c/l/m.java
c/a/b/k/f0.java
b/s/k0.java
c/b/a/a/o/d.java
c/b/a/a/s/d.java
c/a/a/b/e/d/f.java
c/a/a/b/g/b/b.java
c/a/a/b/c/l/n.java
c/b/a/a/r/a.java
com/samsung/android/kgclient/events/KGEventService.java
c/a/a/b/c/l/t.java
c/a/a/b/e/d/q.java
c/b/a/a/c/b.java
c/a/a/b/g/b/a.java
b/h/e/a.java
com/samsung/android/kgclient/receiver/KGKesReceiver.java
b/b/o/j/g.java
b/b/o/j/a.java
b/h/e/h.java
c/a/a/b/f/g0.java
a/a/a/a/a.java
b/h/e/b.java
c/a/a/b/f/z.java
c/b/a/a/l/l.java
c/a/a/b/g/b/g.java
com/samsung/android/kgclient/receiver/SystemIntentReceiver.java
com/samsung/android/kgclient/alarm/AlarmReceiver.java
c/a/b/n/a.java
c/a/b/k/h0.java
c/a/a/b/e/b/a.java
c/a/b/n/d.java
com/samsung/android/kgclient/ui/activities/overdue/OverdueMessageActivity.java
c/b/a/a/s/e.java
c/a/a/b/c/o/a.java
c/a/a/b/f/f0.java
c/a/a/b/c/o/d.java
c/a/a/b/c/l/m0.java
c/a/b/k/z.java
c/b/a/a/n/a.java
c/a/a/b/c/l/z.java
c/a/b/k/t.java
b/k/a/g.java
c/b/a/a/b/a.java
com/samsung/android/kgclient/receiver/KGIntentReceiver.java
c/a/a/b/c/b.java
c/a/a/b/c/l/w.java
Java reflection
       c/a/c/c.java
b/h/n/d.java
b/h/g/d.java
c/a/b/f/f.java
b/h/o/i.java
b/b/p/a1.java
b/b/p/h0.java
b/h/g/e.java
b/k/a/f.java
c/b/a/a/o/i.java
c/a/a/a/j/t/k.java
c/a/c/y/m.java
b/b/o/j/j.java
b/h/n/e.java
b/k/a/l.java
c/a/c/y/d.java
c/a/a/b/c/l/d.java
b/n/a.java
b/h/g/k/a.java
c/a/a/b/c/p/m.java
c/b/a/a/o/a.java
b/h/g/g.java
b/n/j.java
c/a/a/b/d/b.java
c/b/a/a/o/d.java
b/u/b.java
c/a/c/y/n/i.java
b/b/p/c0.java
b/b/k/g.java
c/a/c/e.java
b/b/o/g.java
b/h/e/b.java
b/h/l/b.java
c/a/c/y/o/c.java
b/h/g/k/e.java
c/b/a/a/o/l.java
b/b/p/j0.java
b/h/n/r.java
b/h/o/h.java
b/h/e/i.java
c/a/a/b/e/c/l.java
b/u/a.java
b/h/g/i.java
b/h/g/f.java
b/b/p/d0.java
b/s/y.java
b/s/i0.java
b/h/n/s.java
b/h/o/c.java
b/b/p/y.java
c/a/c/d.java
Local file i/o operations
       c/b/a/a/s/c.java
c/a/b/j/d.java
c/a/b/n/q.java
c/a/b/m/a.java
c/a/b/k/v0.java
c/a/a/b/a/a/a/a/b.java
c/b/a/a/s/d.java
c/a/b/k/w.java
b/h/g/j.java
Message digest
       c/b/a/a/l/b.java
c/a/b/k/l.java
c/b/a/a/s/g.java
c/b/a/a/s/h.java
c/b/a/a/s/d.java
Sending broadcast
       c/b/a/a/k/a.java
c/a/b/k/y.java
c/a/b/k/r.java
c/b/a/a/s/d.java
Starting activity
       b/b/o/j/i.java
c/b/a/a/r/a.java
c/a/a/b/c/i/o/r0.java
b/h/e/l.java
c/a/a/b/c/i/o/g.java
com/samsung/android/kgclient/ui/activities/support/SupportScreenActivity.java
com/samsung/android/kgclient/ui/activities/relockreminder/RelockReminderActivity.java
b/h/e/a.java
b/k/a/c.java
com/samsung/android/kgclient/ui/activities/browserenrollment/BluetoothScanningActivity.java
c/a/a/b/c/l/y.java
com/samsung/android/kgclient/ui/activities/alert/AlertDialogActivity.java
c/b/a/a/s/g.java
b/h/e/e.java
c/a/a/b/c/l/z.java
b/k/a/g.java
com/samsung/android/kgclient/ui/activities/browserenrollment/BrowserEnrollmentActivity.java
Starting service
       c/a/a/b/c/o/d.java
c/a/b/k/z.java
c/a/a/b/c/o/a.java
c/a/b/k/r.java
c/a/b/k/t.java
c/b/a/a/s/d.java
Url connection to file/http/https/ftp/jar
       c/a/b/n/o.java

Control flow graphs analysis

Information computed by Pithus.

The application probably lists running applications

The application probably dynamically loads code

The application probably gets different information regarding the telephony capabilities

The application probably gets the IMEI of the phone

The application probably gets the location based on GPS and/or Wi-Fi

The application probably gets the network connections information

The application probably uses cryptography

The application probably uses reflection

The application probably plays sound

The application probably makes OS calls

The application probably reads the Android serial number

The application probably sends data over HTTP/S

The application probably starts another application