Answer the question
In order to leave comments, you need to log in
How and how to reverse the Chinese virus?
The story is as follows: I ordered my sister a phone from China cubot echo, it came, it works fine, but after some time of using doctor web, it finds a virus in the file /system/app/CallerIdSearch/CallerIdSearch.apk. I downloaded the directory to my computer, there was this file and another one ./oat/armCallerIdSearch.odex. virustotal also shows that the virus https://virustotal.com/en/file/a6e09048369cdff4f09... https://virustotal.com/en/file/801d5d45507a2257565... The file utility showed
CallerIdSearch.odex: ELF 32-bit LSB shared object, ARM, EABI5 version 1 (GNU/Linux), dynamically linked, stripped
strings CallerIdSearch.odex |grep http
http://alog.umeng.co/app_logs
http://alog.umeng.com/app_logs
http://ciddb.iappgame.com/
http://log.umsns.com/
http://log.umsns.com/share/api/
http://www.google-analytics.com/collect
https://ssl.google-analytics.com/collect
<meta-data android:name="UMENG_APPKEY" android:value="56259ea3e0f55a5c17006ab0" />
<meta-data android:name="UMENG_CHANNEL" android:value="" />
<meta-data android:name="MP_FY_APPKEY" android:value="ZW26RFW7883RDVXCGV38" />
.
├── assets
│ └── d
├── com
│ ├── android
│ │ ├── service
│ │ └── tools
│ │ └── callassistant
│ │ ├── p004a
│ │ ├── p005b
│ │ ├── phone
│ │ ├── report1
│ │ └── update
│ │ ├── analytics
│ │ │ └── tracking
│ │ │ └── android
│ │ ├── android
│ │ │ └── gms
│ │ │ ├── analytics
│ │ │ │ └── internal
│ │ │ └── common
│ │ │ └── util
│ │ └── gson
│ │ ├── annotations
│ │ ├── internal
│ │ │ └── bind
│ │ ├── reflect
│ │ └── stream
│ ├── p002a
│ │ └── p003b
│ └── umeng
│ └── analytics
│ └── social
├── original
│ └── META-INF
├── p000a
│ └── p001a
└── unknown
package com.umeng.analytics;
/* renamed from: com.umeng.analytics.a */
public class AnalyticsConstants {
public static final String f1289a = "Android";
public static final String f1290b = "Android";
public static final String f1291c = "5.6.1";
public static final String f1292d = "5.6.1.0";
public static final String f1293e = "MobclickAgent";
public static final String[] f1294f;
public static final long f1295g = 86400000;
public static final long f1296h = 3600000;
public static final boolean f1297i = false;
public static final int f1298j = 64;
public static final int f1299k = 32;
public static final int f1300l = 64;
static {
f1294f = new String[]{"http://alog.umeng.com/app_logs", "http://alog.umeng.co/app_logs"};
}
}
Answer the question
In order to leave comments, you need to log in
This is not a virus, it is a spy that removes data of interest to the manufacturer from the operation of the device.
It is possible that this action is harmless - data on the operation and stability of the device is taken, the manufacturer monitors the quality of the product. No user activity data is collected.
But it is quite possible and more functionality.
Even Samsung indulges in such spies.
the dumbest solution is to fill the urls with zeros in the binary and re-sign the application.
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question