Open GoogleCodeExporter opened 8 years ago
Me too,how to get a comprehensive information of malware?
Original comment by vinceHK2...@gmail.com
on 2 Mar 2012 at 2:32
Are you always getting empty reports?
Original comment by lantz.pa...@gmail.com
on 10 Mar 2012 at 3:16
I also get this problem. But instead of it being completely blank, I only get
something from the Broadcast receivers part of the output. My AVD target is the
Android 2.1
Original comment by rjtolent...@gmail.com
on 11 Mar 2012 at 3:10
Same problem. With some apks I get Broadcast receivers output where as for
others, I get none.
Original comment by r3ha...@gmail.com
on 12 Mar 2012 at 6:37
Nevermind, I got it to work. I kept getting the error "ADB server didn't ACK
* failed to start daemon *" Fixed that and it worked.
Original comment by r3ha...@gmail.com
on 12 Mar 2012 at 7:01
[deleted comment]
The reasons: the apk have installed in android,but the malware be not touch
off.i use the monkey to touch off a malware,and monkey was be killed. why is it
i donot know?
Original comment by zifang...@gmail.com
on 2 Jul 2012 at 3:47
Hey, I got the same problem,
All APK test has none logs include the DroidboxTests.apk,
____ __ ____
/\ _`\ __ /\ \/\ _`\
\ \ \/\ \ _ __ ___ /\_\ \_\ \ \ \L\ \ ___ __ _
\ \ \ \ \/\`'__\ __`\/\ \ /'_` \ \ _ <' / __`\/\ \/'\
\ \ \_\ \ \ \/\ \L\ \ \ \/\ \L\ \ \ \L\ \ \L\ \/> </
\ \____/\ \_\ \____/\ \_\ \___,_\ \____/ \____//\_/\_\
\/___/ \/_/\/___/ \/_/\/__,_ /\/___/ \/___/ \//\/_/
^C [*] Collected 0 sandbox logs
And the sandbox logs is still 0 whenever run any times.After Actrl+C,there was
nothing I got ,and the png pictures was empty,too.
Can anyone help me?Thanks for advance.
Original comment by zhuobat...@gmail.com
on 12 Sep 2013 at 3:41
[deleted comment]
I am getting the o/p some thing like this
I am expecting structured output like what this video shows
https://www.youtube.com/watch?v=E-3s7ZfjTsA&noredirect=1
also the png image was not saved. Please let me know if any package needs to
installed for getting it work?
Pasting the output for the reference.
33a204672692c203031204a616e2031393930203030", "host": "173.194.126.69", "type":
"net read", "port": "80"}, "1.8875269889831543": {"data":
"6f2d63616368652c206d7573742d726576616c69646174650d0a436f6e74656e742d547970653a2
0746578742f68746d6c3b20636861727365743d5554462d380d0a582d436f6e74656e742d5479706
52d4f7074696f6e733a206e6f736e6966660d0a53", "host": "173.194.126.69", "type":
"net read", "port": "80"}, "1.9445819854736328": {"data":
"272f2f64726f6964626f782e676f6f676c65636f64652e636f6d2f66696c65732f64726f6964626
f78342e312e312e7461722e677a272c202746656174757265642c20547970652d536f75726365275
d293b223e0a203c2f613e0a203c6120687265663d", "host": "173.194.126.69", "type":
"net read", "port": "80"}, "2.918276071548462": {"data":
"485454502f312e3020353033205365727669636520556e617661696c61626c650d0a53657276657
23a2073717569642f332e312e31300d0a4d696d652d56657273696f6e3a20312e300d0a446174653
a205475652c203139204175672032303134203130", "host": "74.207.224.32", "type":
"net read", "port": "80"}, "1.9314539432525635": {"data":
"6e74656e743d22746578742f68746d6c3b20636861727365743d5554462d3822203e0a203c6d657
46120687474702d65717569763d22582d55412d436f6d70617469626c652220636f6e74656e743d2
249453d656467652c6368726f6d653d3122203e0a", "host": "173.194.126.69", "type":
"net read", "port": "80"}, "1.9145550727844238": {"data":
"0d0a582d43616368652d4c6f6f6b75703a204d4953532066726f6d2070726f78793a383038300d0
a436f6e6e656374696f6e3a20636c6f73650d0a0d0a0a0a3c21444f43545950452068746d6c3e0a3
c68746d6c3e0a3c686561643e0a203c6d65746120", "host": "173.194.126.69", "type":
"net read", "port": "80"}, "2.928925037384033": {"data":
"38300d0a436f6e6e656374696f6e3a206b6565702d616c6976650d0a0d0a3c21444f43545950452
068746d6c205055424c494320222d2f2f5733432f2f4454442048544d4c20342e30312f2f454e222
022687474703a2f2f7777772e77332e6f72672f54", "host": "74.207.224.32", "type":
"net read", "port": "80"}, "1.8931450843811035": {"data":
"376238663633323a544d3d313430383434323834323a4c4d3d313430383434323834323a533d447
475566a4151664d7a7138626453633b20657870697265733d5468752c2031382d4175672d3230313
62031303a30373a323220474d543b20706174683d", "host": "173.194.126.69", "type":
"net read", "port": "80"}, "2.9230141639709473": {"data":
"78742f68746d6c0d0a436f6e74656e742d4c656e6774683a20333339370d0a582d53717569642d4
572726f723a204552525f434f4e4e4543545f4641494c203131310d0a582d43616368653a204d495
3532066726f6d2070726f78790d0a582d43616368", "host": "74.207.224.32", "type":
"net read", "port": "80"}, "1.8984301090240479": {"data":
"723a20636f6465736974650d0a582d5853532d50726f74656374696f6e3a20313b206d6f64653d6
26c6f636b0d0a582d4672616d652d4f7074696f6e733a2053414d454f524947494e0d0a416c74657
26e6174652d50726f746f636f6c3a2038303a7175", "host": "173.194.126.69", "type":
"net read", "port": "80"}}, "servicestart": {"6.461895942687988": {"type":
"service", "name": "com.android.contacts.ViewNotificationService"},
"18.36899995803833": {"type": "service", "name":
"com.android.contacts.calllog.CallLogNotificationsService"}}, "sendsms":
{"2.987370014190674": {"message": "Sending sms...", "type": "sms", "number":
"0735445281"}, "3.0141539573669434": {"message":
"92a871af351ba74720dd7ab4d9126996", "tag": ["TAINT_IMEI"], "type": "sms",
"sink": "SMS", "number": "0735445281"}}, "cryptousage": {"1.5051469802856445":
{"operation": "keyalgo", "type": "crypto", "algorithm": "AES", "key": "0, 42,
2, 54, 4, 45, 6, 7, 65, 9, 54, 11, 12, 13, 60, 15"}, "1.5088069438934326":
{"type": "crypto", "operation": "encryption", "data": "357242043237511",
"algorithm": "AES"}, "1.5226011276245117": {"operation": "keyalgo", "type":
"crypto", "algorithm": "DES", "key": "0, 42, 2, 54, 4, 45, 6, 8"},
"1.5254271030426025": {"type": "crypto", "operation": "encryption", "data":
"357242043237511", "algorithm": "DES"}, "1.530076026916504": {"operation":
"keyalgo", "type": "crypto", "algorithm": "DES", "key": "0, 42, 2, 54, 4, 45,
6, 8"}, "1.5318090915679932": {"type": "crypto", "operation": "decryption",
"data": "357242043237511", "algorithm": "DES"}, "1.5124361515045166":
{"operation": "keyalgo", "type": "crypto", "algorithm": "AES", "key": "0, 42,
2, 54, 4, 45, 6, 7, 65, 9, 54, 11, 12, 13, 60, 15"}, "1.5138540267944336":
{"type": "crypto", "operation": "decryption", "data": "357242043237511",
"algorithm": "AES"}}, "sendnet": {"1.5918750762939453": {"type": "net write",
"desthost": "173.194.126.69", "fd": "20", "operation": "send", "data":
"474554202f702f64726f6964626f782f20485454502f312e310d0a557365722d4167656e743a204
4616c76696b2f312e362e3020284c696e75783b20553b20416e64726f696420342e312e313b20467
56c6c20416e64726f6964206f6e20456d756c6174", "destport": "80"},
"1.9775769710540771": {"type": "net write", "desthost": "74.207.224.32", "tag":
["TAINT_IMEI"], "fd": "23", "sink": "Network", "operation": "send", "data":
"474554202f696d65692e7068703f696d65693d37666137353730356437353433376236646630373
96263366565313731396461353733663837643520485454502f312e310d0a557365722d4167656e7
43a2044616c76696b2f312e362e3020284c696e75", "destport": "80"}},
"accessedfiles": {"1679427065": "/proc/2020/cmdline", "791495430":
"/data/data/droidbox.tests/files/output.txt", "1792798780":
"/data/data/droidbox.tests/files/myfilename.txt", "1515390314":
"/data/data/droidbox.tests/files/output.txt", "1969315119":
"/data/data/com.GoldDream.TingTing08ii/files/zjphonecall.txt", "833380305":
"/data/data/droidbox.tests/files/output.txt", "103176886":
"/proc/2031/cmdline", "40458650":
"/data/data/droidbox.tests/files/myfilename.txt", "262021480":
"/data/data/droidbox.tests/files/myfilename.txt"}, "fdaccess":
{"1.436953067779541": {"path":
"/data/data/droidbox.tests/files/myfilename.txt", "operation": "write", "data":
"57726974652061206c696e650a", "id": "1792798780", "type": "file write"},
"1.441241979598999": {"path": "/data/data/droidbox.tests/files/output.txt",
"operation": "write", "data": "6e756c6c0a", "id": "833380305", "type": "file
write"}, "1.4866361618041992": {"path":
"/data/data/droidbox.tests/files/output.txt", "operation": "read", "data":
"0000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000", "id": "1515390314", "type": "file
read"}, "1.4634780883789062": {"path":
"/data/data/droidbox.tests/files/myfilename.txt", "operation": "read", "data":
"0000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000000000000000000000000000000000000000000
00000000000000000000000000000000000000000", "id": "262021480", "type": "file
read"},
Original comment by vijayend...@gmail.com
on 19 Aug 2014 at 10:19
Original issue reported on code.google.com by
675399...@qq.com
on 27 Feb 2012 at 2:04