• Content count

  • Joined

  • Last visited

About gradinaruvasile

  • Rank
    New Member
  1. You never know. Maybe the WIKO has something installed too?
  2. I tried uploading it to virustotal and Malwarebytes does not detect it there. I would expect all mobile antivirus solutions to work with virustotal since we can get a better picture in a few seconds instead of installing a ton of anti malware apps. BTW after the yesterday's "outbreak" i removed the "SYSTEM_ALERT_WINDOW" permission (that is the permission that lets a window cover everything permanently, used by this kind of malware to force the user to actually tap a button) from systemui and since then no more popups... May be a coincidence, may not. Will see. adb shell pm revoke android.permission.SYSTEM_ALERT_WINDOW
  3. Well it started happening again. Now i don't know if there is another modified system/google component that has access, the systemui has built in stuff that does stuff regardless of net access or maybe NetGuard doesnt always work (after switching networks?) - one day about 2-3 weeks ago the NetGuard app probably crashed (no status icon) and for about 7 hours the phone was connected to the net with no limitations. Today we saw that an apk was downloaded from somewhere and full screen messages started appearing. I wonder that Chrome itself may be compromised too... Anyway, this sucks.
  4. Hi, I asked Cubot too. Well i got the Exact same answer you got (in an implicit admission): -Some Fota upgrade or No Root firewall. Now the Fota link they sent was not working. They seem to provide the Adups Fota data collection tool (which is built in the Wireless Update tool) that besides the actulal updates can do some presonal data collection. Note that this is done surreptitiously in the background and the data us sent to the same servers the updates come from. There was a scandal about it in the US where they stopped the data collection by an update (which BTW can just as well be reversed by them). To block this you should block net access to the Wireless Update tool. Now on the phone i had issues with (used by my wife) i reflashed the firmware (from their site, via the wireless update local update option) then reset to defaults. But before giving it any net access i installed NetGuard from .apk (i compiled it from source but AFAIK the play store version .apk can be downloaded too) and disabled network access to system ui, wireless update and another shady package thad has the Opera Store description but has some chinese name. No issues were since more than a month. And as you can see above System UI tried to connect to many sites since. But these kind of issues have to be known to the world - the chinese (people?) brands lost any trust i had. Is there a site where we get these phones listed with links to reports like these for validation? Chinese vendors i had interacted with on AliExpress, Ebay etc all had a "slippery" attitude when something was wrong with their merchandise (anyway i buy only cheaper stuff that i afford to lose my money over) . I get it, cultural differences and all but anyway. Customer: Guys, you have malware installed on the phones you sell and customers store private data on. Chinese: Please try disabling net access of our malware with a 3rd party tool (which, if some reason is stopped, will allow the malware to run). What the #$##? Probably they are accustomed to no privacy over there they don't even understand what we want (BTW i lived my childhood under Communism and i know how it works). But they sell stuff to people that have other needs than them. Is that hard to provide a firmware that has no crap in it??? BTW i remembered somebody posting on Amazon i believe a screencap about a conversation about this subject with a chinese dude that went something like: Customer: you sold a phone that sent my personal data to China Sales rep: your data is safe with us Customer (i believe the exact words): You are seriously typing this?? PS: Malwarebytes still does not detect this (come on, even ClamAv detects it!).
  5. So, i pulled more logs from Net Guard. It wants to connect to a multitude of sites. These connections were all blocked. I have no idea how it acquired all this connection info in the first place, i doubt it has these all hardcoded. Maybe uses Google's ad network and Net Guard lets something related slip through? Interesting arr those 123 port connections that arr usually NTP. T4 - tcpv4 protocol U4 - udpv4 protocol The last number after the / - destination port number. There may be some slight errors, this list was obtained via ocr ing some screenshots (Mainly extra spaces or misinterpreted - signs). T4 >e02-54-169-134-231.ap-southeast-1 U4 > T4 > T4 > U4 > U4 > U4 > U4 > U4 > U4 > T4 >e02-54-1 69-184-223.ap-southeast-1 T4 >e02-52-220-106-1 61.ap-southeast-1 U4 > U4 > T4 > T4 > U4 > U4 > U4 >ec2-34-198-99-183.compute— T4 > T4 > U4 > U4 > U4 > T4 >ec2-54-222-139-1 U4 > U4 > U4 > U4 >61-216-153-105.HINET— T4 >e02-52-76-189-231.ap-southeast-1 80 T4 > U4 > U4 > U4 > T4 > U4 > U4 > T4 > T4 >e02-52-220-124-195.ap-southeast-1 U4 > U4 >61-216-153-104.HINET— T4 >ec2—54-222——north-1 U4 > U4 > U4 > U4 > U4 > T4 > T4 >ec2— U4 > U4 >
  6. You could check with logcat, Cheetah might have different apps that do this thing. A simple check for "System UI" is to check the data used by the app. It should not have any usage (look at the apps list and enable "show system" in the 3dot upper right menu ). BTW i met someone who has also a Cubot Rainbow and it seems that it has no issues (no data used by System UI since 2 months or so). It also has an older firmware revision. And it seems it was purchased in UK originally.
  7. Other IPS: (this IP is registered to LLC (AL-3)) Looking at the connection attempt history the first IP address ( seems to be the primary, it is attempted connections every few minutes. I exported a pcap packet capture from Net Guard (the rule is set to block the outgoing connections) it seems that these are only keepalive packets. Also i looked into the domain, it is registered to "inter police", Sponsoring LLC (R65-AFIN): Domain ID:D9641135-AFIN Domain Name:ASENSE.IN Created On:11-Jul-2015 07:50:58 UTC Last Updated On:19-Jun-2016 16:58:38 UTC Expiration Date:11-Jul-2017 07:50:58 UTC Sponsoring LLC (R65-AFIN) Status:CLIENT TRANSFER PROHIBITED Reason: Registrant ID:nec08dzk96cxew8q Registrant Name:inter police Registrant Organization: Registrant Street1:shanghai Registrant Street2: Registrant Street3: Registrant City:shanghai Registrant State/Province:shanghai Registrant Postal Code:200000 Registrant Country:CN Registrant Phone:+86.12345678 Registrant Phone Ext.: Registrant FAX: Registrant FAX Ext.: Registrant I was under the impression that .in domains normally mean India, but in this case (which is a US domain name registrar) can sell .in domain names to others to resell to dubious Chinese organisations. BTW this email address is linked to other .in domains that have connections to Android malware. netguard_20170331 (5)
  8. If you want to see what app initiated the fulscreen ads you can do it via adb logcat using the phone's USB debugging mode. Now the set up of ADB is your task please look it up, the method of finding the malware is described here: Basicall you install ADB and USB drivers, launch logcat and reproduce the issue (stop logging with CTRL+C) then sift the logs (which are very detailed) for something like this (fullscreen ads might use WebView instead of Chrome): 03-20 21:04:42.310 23448 23722 I ActivityManager: START u0 {act=android.intent.action.VIEW dat= flg=0x10000000} from uid 10022 from pid 23613 on display 0 Take the uid number and adb shell "dumpsys package | grep -A6 'userId=UIDNUMBER'" This will return something like this: userId=10022 sharedUser=SharedUserSetting{de1a2e5 android.uid.systemui/10022} pkg=Package{ad251ba} codePath=/system/priv-app/SystemUI resourcePath=/system/priv-app/SystemUI legacyNativeLibraryDir=/system/priv-app/SystemUI/lib And that is the package that initiated the ads. Now you can go into the codePath and see what is there with "adb shell ls -al thecontentsofcodepath". If you see an .apk file there you can download it with "adb pull filenamewithfullpath" to your computer and you can upload it to virustotal. Now in case of fullscreen ads i suppose you don't know the exact URL but searching for the "START u0" or "dat=http://" string you probably find it somewhere. The above while taken from a valid case might and probably IS different from your issue.
  9. After some time other connections to more IPs were attempted. The list so far (don't know the forward DNS for all except the first): ( )
  10. I installed the Net Guard appication and it seems that tries to access an AWS instance: (reverse DNS is on port 80. I did a curl on that address and it just returned the word "parbat". Edit: Logcat reports that the forward DNS is in fact which is the same IP address (
  11. Hi, I have a cheap Chines phone (Cubot Rainbow) which after a month of purchase started to open unwanted web pages. This happened when Chrome was running or was just launched, or when the Store app was launched it opened with random unrequested apps focused. The most annoying was when using the Facebook Lite app it showed full screen app install nag pages that could be only escaped if you actually tapped a X sign on it - anything else is below it even if you open stuff from the drop down menu. I did a logcat on the phone and it has some lines like this (various websites are opened): 03-20 21:04:42.310 23448 23722 I ActivityManager: START u0 {act=android.intent.action.VIEW dat= flg=0x10000000} from uid 10022 from pid 23613 on display 0 The "uid" 10022 is the user id of the package that requested the action. adb shell "dumpsys package | grep -A30 'userId=10022'" userId=10022 sharedUser=SharedUserSetting{de1a2e5 android.uid.systemui/10022} pkg=Package{ad251ba} codePath=/system/priv-app/SystemUI resourcePath=/system/priv-app/SystemUI legacyNativeLibraryDir=/system/priv-app/SystemUI/lib primaryCpuAbi=null secondaryCpuAbi=null versionCode=23 targetSdk=23 versionName=6.0-1474361238 splits=[base] applicationInfo=ApplicationInfo{aead9c8} flags=[ SYSTEM HAS_CODE PERSISTENT ] privateFlags=[ PRIVILEGED ] pkgFlagsEx=[ ] dataDir=/data/user/0/ supportsScreens=[small, medium, large, xlarge, resizeable, anyDensity] timeStamp=2016-09-20 11:09:09 firstInstallTime=2016-09-20 11:09:09 lastUpdateTime=2016-09-20 11:09:09 signatures=PackageSignatures{4fa86b [4fd7fc8]} installPermissionsFixed=false installStatus=1 pkgFlags=[ SYSTEM HAS_CODE PERSISTENT ] declared permissions: prot=signature, INSTALLED User 0: installed=true hidden=false stopped=false notLaunched=false enabled=0 I found the apk file on the phone and downloaded it and attached it to the post. Also i loaded it in the page - attached below. 13 / 55 detection ratio but Malwarebytes did not detect it. The "System UI" application can not be disabled and i suspect it is the actual system ui which manages the UI, taskbar, touch and whatnot. It does some data transfer - i am not sure if the system ui needs access to the internet. The phone was reset to factory defaults and there are no visible issues right now, but the app did make some data transfer. I tried reflashing the phone but i am not sure it actually it worked because it did not took much to reset (the .zip downloaded contained another .zip with the actual data maybe i have to extract that...).
  12. To pinpoint the app that opens these you should use adb and logcat: It works. Now removing it is another thing, it might not be so simple. But at least you can see who is the culprit.