What Is Software Update Com Sec Android Soagent Android
Incident Response
Risk Assessment
- Fingerprint
- Has the ability to identify network operator related data
Has the ability to read the device ID (e.g. IMEI or ESN) - Evasive
- Has the ability to execute code after reboot
Possibly tries to implement anti-virtualization techniques
MITRE ATT&CK™ Techniques Detection
This report has 3 indicators that were mapped to 3 attack techniques and 3 tactics. View all details
Indicators
Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.
- General
- Has the ability to read the device ID (e.g. IMEI or ESN)
- details
- Found invoke in "com.sec.android.soagent.device.IllIlIIIIlIIlIIIllIl.smali" to "android.telephony.TelephonyManager.getDeviceId"
Found invoke in "com.sec.android.soagent.device.llIIIIlllllIIllIIllI.smali" to "android.telephony.TelephonyManager.getSimSerialNumber" - source
- Static Parser
- relevance
- 3/10
- ATT&CK ID
- MOB-T1022 (Show technique in the MITRE ATT&CK™ matrix)
- Has the ability to read the device ID (e.g. IMEI or ESN)
- Installation/Persistance
- Has the ability to execute code after reboot
- details
- Permission request for "android.permission.RECEIVE_BOOT_COMPLETED"
- source
- Static Parser
- relevance
- 10/10
- Has the ability to execute code after reboot
- Anti-Reverse Engineering
- Possibly checks for known debuggers/analysis tools
- details
- "org/joda/time/tz/data/America/Kentucky/Monticello%" (Indicator: "ntice")
"org/joda/time/tz/data/America/Kentucky/MonticelloPK" (Indicator: "ntice")
"Name: org/joda/time/tz/data/America/Kentucky/Monticello" (Indicator: "ntice") - source
- String
- relevance
- 2/10
- Possibly checks for known debuggers/analysis tools
- Environment Awareness
- Possibly tries to implement anti-virtualization techniques
- details
- "SHA-256-Digest: ML3hWjSWJp7zugvVrLqEmuD4cZFyKdtE6ujHeQuPD8A=" (Indicator: "qemu")
- source
- String
- relevance
- 4/10
- Possibly tries to implement anti-virtualization techniques
- General
- Found a potential E-Mail address in binary/memory
- details
- Pattern match: "android.os@samsung.com0"
Pattern match: "android.os@samsung.com" - source
- String
- relevance
- 3/10
- ATT&CK ID
- T1114 (Show technique in the MITRE ATT&CK™ matrix)
- Has the ability to invoke native commands
- details
- Found invoke in "com.samsung.android.iccclib.llllIIIllIlIIIIllllI.smali" to "java.lang.Runtime.exec"
- source
- Static Parser
- relevance
- 3/10
- Uses java reflection classes
- details
- Found invoke in ".home.payloadsecurity.VxStream.VxAnalysisResults.2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d#200.2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d.apk.decoded.smali.llIIIIlllllIIllIIllI.smali.llIIIIlllllIIllIIllI.smali" to "java.lang.reflect.Field.get"
Found invoke in "org.joda.time.DateTimeUtils.smali" to "java.lang.reflect.Method.invoke" - source
- Static Parser
- relevance
- 3/10
- Found a potential E-Mail address in binary/memory
- Installation/Persistance
- The input sample dropped/contains a certificate file
- details
- File "buildConfirm.crt" is a certificate (Owner: CN=Samsung Cert SIGNER, OU=Mobile, O=Samsung Corporation, L=Suwon City, ST=South Korea, C=KR; Issuer: CN=Samsung Cert INTER, OU=Mobile, O=Samsung Corporation, L=Suwon City, ST=South Korea, C=KR; SerialNumber: 154a3d8d4bf; Valid From: 05/12/2016 07:22:57; Until: 05/11/2116 15:00:00; Fingerprints: MD5=7A:4A:AB:54:95:84:C5:7B:D8:F3:AF:11:4C:4A:2E:9E; SHA1=AF:38:4E:B7:D7:80:A2:EC:5E:7C:7E:C6:41:40:07:1E:6D:47:22:E2)
- source
- Extracted File
- relevance
- 10/10
- The input sample dropped/contains a certificate file
- Network Related
- Has the ability to open an internet connection
- details
- Found invoke in "com.sec.android.soagent.client.RestfulClient.smali" to "java.net.URL.openConnection"
Found invoke in "com.sec.android.soagent.client.lllIlIlIIIllIIlIllIl.smali" to "java.net.URL.openConnection" - source
- Static Parser
- relevance
- 3/10
- Has the ability to open an internet connection
- Hiding 3 Suspicious Indicators
- All indicators are available only in the private webservice or standalone version
- External Systems
- Sample was identified as clean by Antivirus engines
- details
- 0/21 Antivirus vendors marked sample as malicious (0% detection rate)
- source
- External System
- relevance
- 10/10
- Sample was identified as clean by Antivirus engines
- General
- Contains SQL queries
- details
- "CREATE TABLE IF NOT EXISTS Accessories (_id INTEGER PRIMARY KEY,acctype TEXT not null,accsn TEXT not null,accstatus INTEGER,accmodelid TEXT,accmcc TEXT,acctoken TEXT);"
- source
- String
- relevance
- 2/10
- Drops files marked as clean
- details
- Antivirus vendors marked dropped file "buildConfirm.crt" as clean (type is "data")
- source
- Extracted File
- relevance
- 10/10
- Tests the internet connectivity
- details
- Found invoke in ".home.payloadsecurity.VxStream.VxAnalysisResults.2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d#200.2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d.apk.decoded.smali.IlIlIlIlIlIIlllllIlI.smali.IlIlIlIlIlIIlllllIlI.smali" to "android.net.NetworkInfo.getDetailedState"
Found invoke in ".home.payloadsecurity.VxStream.VxAnalysisResults.2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d#200.2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d.apk.decoded.smali.IlIlIlIlIlIIlllllIlI.smali.IlIlIlIlIlIIlllllIlI.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo"
Found invoke in "com.sec.android.soagent.device.llIIIIlllllIIllIIllI.smali" to "android.net.ConnectivityManager.getActiveNetworkInfo" - source
- Static Parser
- relevance
- 3/10
- Contains SQL queries
- Installation/Persistance
- Dropped files
- details
- "buildConfirm.crt" has type "data"
"AndroidManifest.xml" has type "Android binary XML"
"CERT.RSA" has type "data"
"CERT.SF" has type "ASCII text with CRLF line terminators"
"MANIFEST.MF" has type "ASCII text with CRLF line terminators"
"buildinfo.xml" has type "data" - source
- Extracted File
- relevance
- 3/10
- Dropped files
- Network Related
- Found potential URL in binary/memory
- details
- Pattern match: "https://dir-apis.samsung.com.cn"
Pattern match: "https://dir-apis.samsungdm.com"
Heuristic match: "android.os@samsung.com" - source
- String
- relevance
- 10/10
- Found potential URL in binary/memory
File Details
All Details:
SOAgent.apk
- Filename
- SOAgent.apk
- Size
- 857KiB (877801 bytes)
- Type
- android
- Description
- Java archive data (JAR)
- Architecture
- SHA256
- 2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d
Version Info
- Minimum SDK
- 24 ()
- Target SDK
- 26 ()
- Version Code
- 442101000
- Version Name
- 4.4.21
- Package Name
- com.sec.android.soagent
- Entrypoint
- com.sec.android.soagent
Classification (TrID)
- 74.3% (.JAR) Java Archive
- 20.5% (.ZIP) ZIP compressed archive
- 5.1% (.BIN) PrintFox/Pagefox bitmap (var. P)
File Permissions
File Receivers
File Certificates
Extracted Files
Notifications
- Not all strings are visible in the report, because the maximum number of strings was reached (5000)
What Is Software Update Com Sec Android Soagent Android
Source: https://hybrid-analysis.com/sample/2c65f3b5f277bf0f31e47f44404b902d1783b07380b9c7f16c82cbf0cf87069d?environmentId=200
0 Response to "What Is Software Update Com Sec Android Soagent Android"
Post a Comment