Malicious
7
/63

Threat

com.hawsoft.mobile.speechtrans

Voice Translator

Analyzed on 2021-12-16T10:02:41.340079

12

permissions

21

activities

3

services

4

receivers

1

domains

File sums

MD5 1104eed88d13c6daca4f6fa920b1be29
SHA1 0803387e1a8c441fd3e0483c3e89a1bd80e0a013
SHA256 db00a080aed099c4addcaa20c0cc690a28f62dddf00844f3476229a37400d07b
Size 9.27MB

APKiD

Information computed with APKiD.

/tmp/tmpqd5qpa6d
packer
  • Jiagu
/tmp/tmpqd5qpa6d!classes.dex
obfuscator
  • unreadable field names
  • unreadable method names
compiler
  • dexlib 2.x

SSdeep

Information computed with ssdeep.

APK file 196608:cbMe+1WX/q4BymtUSFxxi09IYlY2aq7f4Lyiqega4w4IvSQwJkQ5A:cbM30dBy0UIxxiEIM7sFqNaBNvSQwS
Manifest 384:4BpXS5zwywO/cKvCITFHmNTDrjNtfLC6gC075amLzzTAU7hwXF:4BpXS5zwywO/cK…
classes.dex 49152:CYG9hV7+1i7FRHZWuNs2CMjEGzA6eTSIRw0Mxze:DGBMi7rEugMFzESK

Dexofuzzy

Information computed with Dexofuzzy.

APK file 6:RWm3KnK56PikiEE8GtVm0fFUUlzYfdQV/AprGzOovyqXEATmJtxMmeL5xtCKT5OH:RW…
classes.dex 6:RWm3KnK56PikiEE8GtVm0fFUUlzYfdQV/AprGzOovyqXEATmJtxMmeL5xtCKT5OH:RW…

APK details

Information computed with AndroGuard and Pithus.

Package com.hawsoft.mobile.speechtrans
App name Voice Translator
Version name 1.5.7
Version code 39
SDK 16 - 29
UAID 2761c7ae5f509bbdfa601ceb87cc4afc58ffb865
Signature Signature V1 Signature V2
Frosting Frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x2146444e: Google metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 27e698698665aa6d1c5ea81388f75a85
SHA1 ab919f02be441a19ca166119b3b6443e9b8e1939
SHA256 383e4aa93aacc4c40f22eadc1766677797271dbcf90a970c8e2939caea7544b7
Issuer Common Name: axis hawsoft, Organizational Unit: mobile, Organization: Hawsoft, Locality: jining, State/Province: shandong, Country: CN
Not before 2015-04-09T02:21:22+00:00
Not after 2115-03-16T02:21:22+00:00

File Analysis

Information computed with MobSF.

Findings Files
Certificate/Key files hardcoded inside the app. assets/.appkey

Manifest analysis

Information computed with MobSF.

High Clear text traffic is Enabled For App[android:usesCleartextTraffic=true]
The app intends to use cleartext network traffic, such as cleartext HTTP, FTP stacks, DownloadManager, and MediaPlayer. The default value for apps that target API level 27 or lower is "true". Apps that target API level 28 or higher default to "false". The key reason for avoiding cleartext traffic is the lack of confidentiality, authenticity, and protections against tampering; a network attacker can eavesdrop on transmitted data and also modify it without being detected.
Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Broadcast Receiver (com.hawsoft.mobile.comm.NetBroadcastReceiver) is not Protected.An intent-filter exists.
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Broadcast Receiver is explicitly exported.
High Activity (com.hawsoft.mobile.speechtrans.wxapi.WXPayEntryActivity) is not Protected. [android:exported=true]
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.
High Activity (com.hawsoft.mobile.speechtrans.SettingActivity) is not Protected.An intent-filter exists.
An Activity is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. The presence of intent-filter indicates that the Activity is explicitly exported.
High Broadcast Receiver (com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: android.permission.INSTALL_PACKAGES [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.
High Broadcast Receiver (com.google.firebase.iid.FirebaseInstanceIdReceiver) is Protected by a permission, but the protection level of the permission should be checked.
Permission: com.google.android.c2dm.permission.SEND [android:exported=true]
A Broadcast Receiver is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device. It is protected by a permission which is not defined in the analysed application. As a result, the protection level of the permission should be checked where it is defined. If it is set to normal or dangerous, a malicious application can request and obtain the permission and interact with the component. If it is set to signature, only applications signed with the same certificate can obtain the permission.

Main Activity

Information computed with AndroGuard.

com.hawsoft.mobile.speechtrans.Appstart

Activities

Information computed with AndroGuard.

com.hawsoft.mobile.speechtrans.Appstart
com.hawsoft.mobile.speechtrans.wxapi.WXPayEntryActivity
com.hawsoft.mobile.speechtrans.MainActivity
com.hawsoft.mobile.speechtrans.MuLangActivity
com.hawsoft.mobile.speechtrans.MainHistoryActivity
com.hawsoft.mobile.speechtrans.LangsSpinnerActivity
com.hawsoft.mobile.speechtrans.LangsSelectActivity
com.hawsoft.mobile.speechtrans.SettingActivity
com.hawsoft.mobile.speechtrans.TextActivity
com.hawsoft.mobile.speechtrans.AboutActivity
com.hawsoft.mobile.speechtrans.AdActivity
com.hawsoft.mobile.speechtrans.ListeningDialog
com.hawsoft.mobile.speechtrans.XFListeningDialog
com.google.android.gms.ads.AdActivity
com.hawsoft.mobile.speechtrans.WXpayActivity
com.hawsoft.mobile.speechtrans.VipSettingActivity
com.hawsoft.mobile.speechtrans.GPpayActivity
com.hawsoft.mobile.speechtrans.DataDownActivity
com.hawsoft.mobile.speechtrans.DataUpActivity
com.hawsoft.mobile.speechtrans.zxing.activity.CaptureActivity
com.google.android.gms.common.api.GoogleApiActivity

Receivers

Information computed with AndroGuard.

com.hawsoft.mobile.comm.NetBroadcastReceiver
com.google.android.gms.measurement.AppMeasurementReceiver
com.google.android.gms.measurement.AppMeasurementInstallReferrerReceiver
com.google.firebase.iid.FirebaseInstanceIdReceiver

Services

Information computed with AndroGuard.

com.google.android.gms.measurement.AppMeasurementService
com.google.android.gms.measurement.AppMeasurementJobService
com.google.firebase.components.ComponentDiscoveryService

Sample timeline

Certificate valid not before April 9, 2015, 2:21 a.m.
Latest file found in APK Aug. 20, 2020, 12:29 p.m.
First submission on VT Aug. 22, 2020, 4:59 a.m.
Last submission on VT Sept. 25, 2020, 9:08 a.m.
Upload on Pithus Dec. 16, 2021, 10:02 a.m.
Certificate valid not after March 16, 2115, 2:21 a.m.

VirusTotal

Score 7/63
Report https://www.virustotal.com/gui/file/db00a080aed099c4addcaa20c0cc690a28f62dddf00844f3476229a37400d07b/detection

Most Popular AV Detections

Provided by VirusTotal

Threat name: jiagu Identified 3 times

NIAP analysis

Information computed with MobSF.

FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to ['network connectivity', 'microphone', 'camera'].
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has user/application initiated network communications.
Network Communications
FDP_DAR_EXT.1.1 The application does not encrypt files in non-volatile memory.
Encryption Of Sensitive Application Data
FTP_DIT_EXT.1.1 The application does not encrypt any data in traffic or does not transmit any data between itself and another trusted IT product.
Protection of Data in Transit
Pygal United States: 100

Map computed by Pithus.

Domains analysis

Information computed with MobSF.

US utility-axis-601.firebaseio.com 35.201.97.85

URL analysis

Information computed with MobSF.

https://utility-axis-601.firebaseio.com
Defined in Android String Resource

Permissions analysis

Information computed with MobSF.

High android.permission.RECORD_AUDIO record audio
Allows application to access the audio record path.
High android.permission.WRITE_EXTERNAL_STORAGE read/modify/delete external storage contents
Allows an application to write to external storage.
High android.permission.CAMERA take pictures and videos
Allows application to take pictures and videos with the camera. This allows the application to collect images that the camera is seeing at any time.
Low android.permission.MODIFY_AUDIO_SETTINGS change your audio settings
Allows application to modify global audio settings, such as volume and routing.
Low android.permission.INTERNET full Internet access
Allows an application to create network sockets.
Low android.permission.ACCESS_NETWORK_STATE view network status
Allows an application to view the status of all networks.
Low android.permission.ACCESS_WIFI_STATE view Wi-Fi status
Allows an application to view the information about the status of Wi-Fi.
Low android.permission.VIBRATE control vibrator
Allows the application to control the vibrator.
Low android.permission.WAKE_LOCK prevent phone from sleeping
Allows an application to prevent the phone from going to sleep.
Medium com.google.android.c2dm.permission.RECEIVE C2DM permissions
Permission for cloud to device messaging.
com.android.vending.BILLING Unknown permission
Unknown permission from android reference
com.google.android.finsky.permission.BIND_GET_INSTALL_REFERRER_SERVICE Unknown permission
Unknown permission from android reference

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Read file from assets directory
Confidence:
100%
Method reflection
Confidence:
80%
Read data and put it into a buffer stream
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Open a file from given absolute path of the file
Confidence:
80%
Get absolute path of the file and store in string

Behavior analysis

Information computed with MobSF.

Java reflection
       com/stub/StubApp.java
com/qihoo/util/C0002.java
Load and manipulate dex files
       com/stub/StubApp.java
Loading native code (shared library)
       com/stub/StubApp.java

Control flow graphs analysis

Information computed by Pithus.

The application probably dynamically loads code