0/61

Threat

eu.micer.clipboardservice

ClipboardService

Analyzed on 2021-11-13T00:59:09.098344

0

permissions

1

activities

1

services

0

receivers

0

domains

File sums

MD5 de56d8dad24dcd457527f2cf56a9bd9d
SHA1 67f3c627067bd028bfba4e32f72a3695569c9143
SHA256 f20e0808f4e5641ca6dcc8c674ab3f134db64015e83eac477ac3f8c0af407294
Size 3.21MB

APKiD

Information computed with APKiD.

/tmp/tmp87zpeu0h!classes.dex
anti_vm
  • Build.FINGERPRINT check
  • Build.MANUFACTURER check
compiler
  • r8

SSdeep

Information computed with ssdeep.

APK file 98304:vauWzfr+XK7MtRCaI2mV8nYn8TPMGOrf/9vm2:vafYRSanvbKflvm2
Manifest 48:8XojR2EvThpm1V5vOTIlklR/lSVlfsHoPlol098BvJeDdaEM90pPk+bMsssOz8/f:t…
classes.dex 49152:ZE73UJHkFknR2lFLcgzYNgdkhvK62NsBUR2gfe3ArLWocyLsf2yev8P9V:6zyGF…

Dexofuzzy

Information computed with Dexofuzzy.

APK file 6144:WK5669GNbJNjypeF5KjTe2Q+8kLbTQZAPbAxNH8fv8lsUN:WK5Rw1JNQHTe9I2N
classes.dex 6144:WK5669GNbJNjypeF5KjTe2Q+8kLbTQZAPbAxNH8fv8lsUN:WK5Rw1JNQHTe9I2N

APK details

Information computed with AndroGuard and Pithus.

Package eu.micer.clipboardservice
App name ClipboardService
Version name 1.1
Version code 2
SDK 21 - 30
UAID 655ca54c8ddaa0e9c212d8335f832ffd14ceec54
Signature Signature V1 Signature V2
Frosting Not frosted
Blocks found within V2 signature:
  • 0x7109871a: Unknown
  • 0x504b4453: Dependency metadata
  • 0x42726577: Verity padding

Certificate details

Information computed with AndroGuard.

MD5 f85db05bb307f9befe5dffddf1c55902
SHA1 68864bcdbce72e0b68d65fcdb5105cbe82f52b82
SHA256 bf19d60800064681083e3f39d14e5cef50cb6bdf70e2f45183a9049f537a1663
Issuer Common Name: Michal Cerman, Organization: micer.eu, Locality: Gibraltar, State/Province: Gibraltar, Country: GI
Not before 2019-04-15T15:29:48+00:00
Not after 2044-04-08T15:29:48+00:00

Manifest analysis

Information computed with MobSF.

Medium Application Data can be Backed up[android:allowBackup=true]
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB debugging to copy application data off of the device.
High Service (eu.micer.clipboardservice.ClipboardService) is not Protected. [android:exported=true]
A Service is found to be shared with other apps on the device therefore leaving it accessible to any other application on the device.

Main Activity

Information computed with AndroGuard.

eu.micer.clipboardservice.EmptyActivity

Activities

Information computed with AndroGuard.

eu.micer.clipboardservice.EmptyActivity

Services

Information computed with AndroGuard.

eu.micer.clipboardservice.ClipboardService

Sample timeline

Oldest file found in APK Jan. 1, 1981, 1:01 a.m.
Latest file found in APK Jan. 1, 1981, 1:01 a.m.
Certificate valid not before April 15, 2019, 3:29 p.m.
First submission on VT July 25, 2021, 6:02 p.m.
Last submission on VT Nov. 12, 2021, 6:27 p.m.
Upload on Pithus Nov. 13, 2021, 12:59 a.m.
Certificate valid not after April 8, 2044, 3:29 p.m.

NIAP analysis

Information computed with MobSF.

FCS_RBG_EXT.1.1 The application use no DRBG functionality for its cryptographic operations.
Random Bit Generation Services
FCS_STO_EXT.1.1 The application does not store any credentials to non-volatile memory.
Storage of Credentials
FCS_CKM_EXT.1.1 The application generate no asymmetric cryptographic keys.
Cryptographic Key Generation Services
FDP_DEC_EXT.1.1 The application has access to no hardware resources.
Access to Platform Resources
FDP_DEC_EXT.1.2 The application has access to no sensitive information repositories.
Access to Platform Resources
FDP_NET_EXT.1.1 The application has no network communications.
Network Communications
FDP_DAR_EXT.1.1 The application implement functionality to encrypt sensitive data in non-volatile memory.
Encryption Of Sensitive Application Data
FMT_MEC_EXT.1.1 The application invoke the mechanisms recommended by the platform vendor for storing and setting configuration options.
Supported Configuration Mechanism
FTP_DIT_EXT.1.1 The application does encrypt some transmitted data with HTTPS/TLS/SSH between itself and another trusted IT product.
Protection of Data in Transit

Code analysis

Information computed with MobSF.

High
CVSS:7.5
The App uses an insecure Random Number Generator.
MASVS: MSTG-CRYPTO-6
CWE-330 Use of Insufficiently Random Values
M5: Insufficient Cryptography
Files:
 kotlin/collections/EmptyList.java
kotlin/random/AbstractPlatformRandom.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$4.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$1.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$6.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$3.java
kotlin/random/KotlinRandom.java
kotlin/collections/AbstractList.java
kotlin/collections/RingBuffer.java
kotlin/random/PlatformRandomKt.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$7.java
kotlin/collections/CollectionsKt__CollectionsJVMKt.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$2.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$1.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$4.java
kotlin/collections/builders/ListBuilder.java
kotlin/collections/CollectionsKt___CollectionsKt.java
kotlin/random/FallbackThreadLocalRandom.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$2.java
kotlin/collections/MovingSubList.java
kotlin/collections/unsigned/UArraysKt___UArraysJvmKt$asList$3.java
kotlin/collections/CollectionsKt__MutableCollectionsJVMKt.java
kotlin/random/FallbackThreadLocalRandom$implStorage$1.java
kotlin/random/PlatformRandom.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$5.java
kotlin/collections/ArraysKt___ArraysJvmKt$asList$8.java
kotlin/collections/CollectionsKt__MutableCollectionsKt.java
Low
CVSS:7.5
The App logs information. Sensitive information should never be logged.
MASVS: MSTG-STORAGE-3
CWE-532 Insertion of Sensitive Information into Log File
Files:
 kotlin/io/ConsoleKt.java
Low
CVSS:0
This App copies data to clipboard. Sensitive data should not be copied to clipboard as other applications can access it.
MASVS: MSTG-STORAGE-10
Files:
 eu/micer/clipboardservice/ClipboardService.java
High
CVSS:5.5
App creates temp file. Sensitive information should never be written into a temp file.
MASVS: MSTG-STORAGE-2
CWE-276 Incorrect Default Permissions
M2: Insecure Data Storage
Files:
 kotlin/io/FilesKt__UtilsKt.java

Threat analysis

Information computed with Quark-Engine.

Confidence:
100%
Load external class
Confidence:
100%
Find a method from given class name, usually for reflection
Confidence:
100%
Method reflection
Confidence:
100%
Retrieve data from broadcast
Confidence:
100%
Read sensitive data(SMS, CALLLOG, etc)
Confidence:
100%
Monitor the broadcast action events (BOOT_COMPLETED)
Confidence:
100%
Get last known location of the device
Confidence:
100%
Get location of the device
Confidence:
100%
Method reflection
Confidence:
100%
Get the time of current location
Confidence:
100%
Initialize class object dynamically
Confidence:
80%
Read file and put it into a stream
Confidence:
80%
Get declared method from given method name
Confidence:
80%
Implicit intent(view a web page, make a phone call, etc.) via setData
Confidence:
80%
Get resource file from res/raw directory

Behavior analysis

Information computed with MobSF.

Get system service
       eu/micer/clipboardservice/ClipboardService.java
Inter process communication
       eu/micer/clipboardservice/ClipboardService.java
Java reflection
       kotlin/internal/PlatformImplementations.java
kotlin/internal/PlatformImplementationsKt.java
kotlin/coroutines/jvm/internal/ModuleNameRetriever.java
kotlin/jvm/internal/Intrinsics.java
kotlin/jvm/internal/Reflection.java
kotlin/jvm/internal/ClassReference.java
kotlin/coroutines/jvm/internal/DebugMetadataKt.java
Set or read clipboard data
       eu/micer/clipboardservice/ClipboardService.java

Control flow graphs analysis

Information computed by Pithus.

The application probably gets the network connections information

The application probably plays sound

The application probably creates an accessibility service

The application probably listens accessibility events