Trojan on Gretel A9 smart phone - Android Q&A, Help & Troubleshooting

Hello, I have been having trouble for months with a Gretel A9 smart phone provided by my employer.
The thing seems to be infected by a Trojan which cannot be removed by Factory Restore, or any virus program I have been able to find. (Malwarebytes will detect and clear it, but it comes back straight away).
Here are the symptoms:
-Horrendous pop-ups advertising games
Such as "Grumpy Gorrilla", "Oh No", "99 Balls", and "Sticky Glue). These pop ups are difficult to remove and require scrolling on the advert to find the X to remove, which often leads to clicking on the pop up itself.
This ended up with the phone being subscribed to "Demon Games", running up a £50 phone bill with the network provider.
-Constant browser pop ups to a website called "Aiboo.cc" which I am sure has something to do with it.
-An app called "Magic" which comes up as a virus on malware bytes, and keeps reappearing on the phone, with a little picture of a blue Octopus.
-Constantly tells me I have a new Whatsapp message, but when clicked on, something called "H5 Games" comes up.
-Lake worth ISD is another dodgy app that keeps appearing.
The phone is running Android 6.0.1
Please, help me if you can. I have tried resetting numerous times, and I've researched everything I have found but there's no information online about any of these things.

If it's provided by your employer than return it to him and refuse to use it until fixed or received new one.
To remove any files from system you need a root access. You have to root your device first but you lose warranty

If I return it, they will only provide me with a tiny 'Alcatel Pixi' phone, which is just awful to use.

I think I may try to Root it, but I have no experience doing this

Huscarl said:
I think I may try to Root it, but I have no experience doing this
Click to expand...
Click to collapse
Please post a screenshot of 'About phone' and also run Anti-virus Dr.Web Light (https://play.google.com/store/apps/details?id=com.drweb&hl=en) and post the results. Feel free to post the results from Malwarebytes as well.

Palm Trees said:
Please post a screenshot of 'About phone' and also run Anti-virus Dr.Web Light (https://play.google.com/store/apps/details?id=com.drweb&hl=en) and post the results. Feel free to post the results from Malwarebytes as well.
Click to expand...
Click to collapse
Ok, I will figure out how to get this done and post it tomorrow night (it's late here now and I need to figure out how to do it).
I will also keep a log of what appears on the phone during the day, as I get various messages and pop-ups.
Really do appreciate any help on this, as it has me and my work stumped. It would be a decent phone to use were it not for this terrible virus/trojan.

A quick scan on Malwarebytes came up with this:
2 Malware found
-Android/Trojan.Agent.ASH
(Installed Application - Settings) [I repeatedly get a fake application called Settings]
--------------
-Android/Trojan.Dropper.Agent.CKA
(Installed Application - Magic) [This is the app with the Octopus Icon which I mention earlier]
Tried wiping these off the phone numerous times, both manually and using Malware bytes and other virus apps, but they persistently come back.

Huscarl said:
Really do appreciate any help on this, as it has me and my work stumped. It would be a decent phone to use were it not for this terrible virus/trojan.
Click to expand...
Click to collapse
Did my own research. A number of phones came pre-installed with the Triada malware/virus, which is a well-known case. Unfortunately, Gretel A9 was one of those.
I downloaded the stock rom 3.04 and 3.02 both are infected and the only solution I see is replacing the lib which is causing this and deleting the .apk that is also causing this (based on what I could tell). However, I need to know specifically which version you are running and also what the result of the Dr. Web scan is (please post a screenshot). We could try to repack the cleaned system.img and then you can flash that. However, there are no guarantees it'll work.
TWRP and a few custom roms are available for your phone + general discussion here: https://4pda.ru/forum/index.php?showtopic=807386.

I have posted a Dropbox link to a screenshot of my About Phone..
https://www.dropbox.com/s/lie3868wcrquchg/LongShot_20190415_092503.png?dl=0
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}

Currently running a full scan with Dr Web Lite and it has detected 20 threats so far, that's far more than malware bytes or any other virus scanner I have used.
Once that's done I will post the results

Huscarl said:
Currently running a full scan with Dr Web Lite and it has detected 20 threats so far, that's far more than malware bytes or any other virus scanner I have used.
Once that's done I will post the results
Click to expand...
Click to collapse
Sounds good! Did some more research, Alberto96 posted this in 2017 (huge thanks for providing both TWRP + the K10 and A9 firmware) https://forum.xda-developers.com/showpost.php?p=77545922&postcount=7 and I've succesfully compared the firmware. My thinking here is - replace the clean files from the Oshiyama K10 stock firmware with the infected ones from the Gretel A9. Repack system.img and then you can try flashing the new system.img via SP Flash Tools. Alternatively, flash TWRP and we'll have to figure out how to create a new flashable system.img script.

I'm having a hard time getting it onto one screenshot despite trying to save it as a long shot, but here is some of the Dr Web diagnosis..
https://www.dropbox.com/s/na47qmq9ek4fvs0/LongShot_20190416_084021.png?dl=0

Palm Trees said:
Sounds good! Did some more research, Alberto96 posted this in 2017 (huge thanks for providing both TWRP + the K10 and A9 firmware) https://forum.xda-developers.com/showpost.php?p=77545922&postcount=7 and I've succesfully compared the firmware. My thinking here is - replace the clean files from the Oshiyama K10 stock firmware with the infected ones from the Gretel A9. Repack system.img and then you can try flashing the new system.img via SP Flash Tools. Alternatively, flash TWRP and we'll have to figure out how to create a new flashable system.img script.
Click to expand...
Click to collapse
Just looked through this thread and I can confirm they were getting the exact same symptoms. Everything they described is what is happening with my phone.

Huscarl said:
I'm having a hard time getting it onto one screenshot despite trying to save it as a long shot, but here is some of the Dr Web diagnosis..
https://www.dropbox.com/s/na47qmq9ek4fvs0/LongShot_20190416_084021.png?dl=0
Click to expand...
Click to collapse
Thanks. If you can pull the full detection list that would be great.
I need to know what some of the detections are associated with, so can you run 'adb shell' and then 'pm list packages –f' like this example:
Then copy the list and post it here as .txt preferably.
Currently decompiling the rest of the 3.04 firmware to see if they've hidden malware in the other partitions as well. If not, we're all set to have you flash a test cleaned test rom if you're up for it.
deleted: \system\priv-app\SecurityService\
https://www.virustotal.com/#/file/1...2b95f86b37e1fd65d495ec4f7782a1df5b8/detection
replaced: system\lib\libandroid_runtime.so with the clean libandroid_runtime.so from the Oshiyama K10 (the device Alberto was referring to).
https://www.virustotal.com/#/file/4...63a1eaca0329162e1d5bd6a6205c1ce78ab/detection
Furthermore, I've removed these vendor apps (pre-installed bloat).
\system\vendor\operator\app\FaceBook
\system\vendor\operator\app\Gmail2
\system\vendor\operator\app\Instagram
\system\vendor\operator\app\Maps
\system\vendor\operator\app\Twitter
\system\vendor\operator\app\YouTube

Here is everything I am getting from Dr Web:
https://www.dropbox.com/s/4a8xw8838vizxul/OneShot_20190416_164440.png?dl=0
https://www.dropbox.com/s/gvl5it7ucfo0s01/OneShot_20190416_164541.png?dl=0
https://www.dropbox.com/s/04am7g7mdw1vlk1/OneShot_20190416_164604.png?dl=0
https://www.dropbox.com/s/04am7g7mdw1vlk1/OneShot_20190416_164604.png?dl=0
https://www.dropbox.com/s/e987ajlgp3hjriz/OneShot_20190416_164612.png?dl=0
Sorry about the format, I'm not so tech savvy, I'm sure that's the lot. I'll now start working on the other instructions you gave me (abd)

Still trying to figure out how to use ABD.
I am following the instructions on here:
https://www.howtogeek.com/125769/how-to-install-and-use-abd-the-android-debug-bridge-utility/
I have download the SDK tools, and unzipped them to a new folder, but I do not see the SDK Manager EXE

I think that it would be easier to flash new rom from the link few posts above - xda site

a602820922 said:
I think that it would be easier to flash new rom from the link few posts above - xda site
Click to expand...
Click to collapse
The problem is, it won't boot. You need to flash the system.img only - but the K10 system.img needs to have the required libs from the A9, e.g. fingerprint, cam libs. Though there's no indication hereof, the K10 may pack malware as well. But like I said, I can repack the K10 system.img with the required A9 files and Huscarl can test it. This can likely be omitted, if we can repack the stock rom with the clean files from the K10 system.img. That's why I need to know what packages are linked to the Dr. Web detections aside from SecurityService and libandroid_runtime.so.
An alternative quick fix: flash TWRP, root the phone, run Dr. Web and let it remove the malware. However, as research indicates, the problem still persists for some users.

Related

[Guide] Reodexing your SGS3

This guide is for reodexing your SGS3, such as UltimaROM, Omega, Foxhound, CodecROM, _null, Sotmax and others (I'm just listing off the top off my head).
It's not terribly tough and 100% of the credit belongs to rujelus22 for his amazing work on his AIO tool. This guide is just for deodexing/odexing, but you can use that tool for other things.
Firstly, why would you want to odex your ROM?
Well, this will help you understand more:
http://www.xda-developers.com/xda-tv-2/pro-tip-number-5-why-you-should-odex-and-deodex-xda-tv/
It's very useful and saves on battery life and makes the phone slightly more responsive.
Consider:
When you have downloaded and installed your chosen ROM you should odex it back up for the speed and agility odexing affords you. However you should ONLY do this after you are happy with your setup. I.E., install any mods you wanted and then Odex your phone.
If you want to add mods later, say, perhaps, your developer releases a new mod, or patch for your ROM you will NEED to Deodex the ROM before applying a patch or new mod. This is important. Please do not pester your dev about an error if you have not done this.
In my opinion, it can take maybe 30 minutes to Deodex, apply your mods/patch, and then Reodex using this tool, but the benefits are worth it.
You should also perform these actions AFTER a successful boot. You should flash the ROM. Boot. skip the setup pages and get to the homepage, then do this odexing.
How to do it:
Firstly, head off over to Rujelus22's AIO script thread and download it:
http://forum.xda-developers.com/showthread.php?t=1955745
Don't forget to click "Thanks"
Make sure you also download these the Android-SDK and the Java Development kit. The SDK is necessary for the Deodexing, I believe, in case you want to do that later:
http://forum.xda-developers.com/showpost.php?p=33268059&postcount=2
After that, extract the AIO script somewhere useful where you can find it again and run the "Start_AIO.bat" file. This will set up some folders in the directory you extracted to and then open the start page
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
After this make sure your phone is plugged into you computer and that USB Debugging mode is on in the Developers Options. ALSO, you must have an "Insecure Kernel" such as any custom kernel (Siyah, Perseus, Boeffla) or Wanam/zoot1's repacked stock kernel.
If you do not have an Insecure Kernel head off to Chainfire's adbd Insecure thread: http://forum.xda-developers.com/showthread.php?t=1687590
You might considering buying it on Google Play, if you like, but there is a free XDA version.
After you are plugged in, on USB debugging and have an Insecure Kernel, load the AIO script and choose option "22" which reads "Odex the ROM on your phone". You will be given the opportunity to take a nandroid backup at this point.
Sit back and let it do it's thing. It will take about 10 minutes, and it will seem to hang on the clean up bit. Fear not, because it IS doing something. Your phone will automatically reboot when it has finished.
You're done! Once you have done that little bit of setting up... in future it is as easy as opening the script, hitting 22 and sitting back.
Notes/FAQ:
Sometimes it can constantly loop around the first page as though it is doing a first run. To solve this, go into "AIO_FOLDER/tools/Settings/" and create a new .txt file called "firstrun". Make the contents of the file 1. Just "1" and nothing else.
Sometimes it can say that you don't have remount access and the Odex option will not show. Similar to the point above, go into "AIO_FOLDER/tools/Settings/" and make a .txt file called "remount" and place a single 1 in the folder.
Deodexing can take some time. Be patient.
Can any ROM be Odexed this way, such as CyanogenMod, for example?
I think so, yes. As long as the script can find the bootclasspath!
Kryten2k35 said:
I think so, yes. As long as the script can find the bootclasspath!
Click to expand...
Click to collapse
Thanks. I'll give it a try. I've always stuck with Odexed ROMs for all the reasons that Adam discussed in the video, so I'd be very pleased if I could Odex CM. Best of both worlds.
When i select 99 and 4 and 2 the script closes...:/
Also all odexing options are greyed out...i followed the instructions just fine,any help?
nfsmw_gr said:
When i select 99 and 4 and 2 the script closes...:/
Also all odexing options are greyed out...i followed the instructions just fine,any help?
Click to expand...
Click to collapse
This might help
http://forum.xda-developers.com/showpost.php?p=39378436&postcount=164
Make that edit to the "script.bat"
Kryten2k35 said:
This might help
http://forum.xda-developers.com/showpost.php?p=39378436&postcount=164
Make that edit to the "script.bat"
Click to expand...
Click to collapse
idk speed of the rom is same as deodexed will see about battery life:silly:
Kryten2k35 said:
This might help
http://forum.xda-developers.com/showpost.php?p=39378436&postcount=164
Make that edit to the "script.bat"
Click to expand...
Click to collapse
Woot woot!
Working like a charm now,thanks!
Maybe you should add this to the op?
I still can't select 99->4->2 but now odexing options are available!
Nice tut, I'm a big fan of reodexing since I first tried it, :thumbup:
I'm kind of new to this things and have to questions;
1.- First specifically to UltimaROM, does it have to be odex ?
2.- When it says I should do it after I have the Rom as I want it, it does not interfere with installing apps right?
Tuckycv said:
I'm kind of new to this things and have to questions;
1.- First specifically to UltimaROM, does it have to be odex ?
2.- When it says I should do it after I have the Rom as I want it, it does not interfere with installing apps right?
Click to expand...
Click to collapse
You do not have to odex if you don't want to, but I personally recommend it.
And installing apps from the Play Store will be 100% fine on an odex'd ROM.
However, ANY mod that changes a system app is likely to interfer. In this case you can deodex, then flash the mod, then reodex (optional).
This is mainly for those that flash, then don't mod. However modding is not impossible and it's worth the extra 10 minutes to do this.
I have installed everything according to the tutorial. But in the cmd window..its written Your Kernel does not support this feature [adb remount]
I am using the perseus Kernel. I insecured the kernel using "adb insecure" from chainfire. I think it was not needed but i did it when nothing was working. It still does not work
any help?
P.S. debugging is enabled
EDIT : SOLVED -------> USING THIS http://forum.xda-developers.com/showpost.php?p=39378436&postcount=164
Dang it, I feel like an idiot. I cannot figure out how to setup the variable path from the instructions. Do I need to make a new one in both system and user, or do I edit one that is already there?
What do I name them?
I tried to reodex UltimaRom v11 and had to modify the script too (set remountavlible=yes) in order to see option 22 so you might want to write that in the OP Kryten, it could prevent the question from being asked over and over
Maybe it is specific to some roms ?
I do everything as I should,but after I press any button after it says "Press any key to continue" at the screen with the snake head (Or whatever that is),it will give me an empty command prompt.No menu,no nothing.Any ideas guys?It's really starting to get on my nerves...
How to know if my phone was odexed?
After running script it says:
The phone rebooted, but there is no *odex files in System/App. Strange..
Hey there! Just want to confirm something.. It is said in the OP that we have to "deodex" to flash a new mod or patch. Is a ROM upgrade considered a patch? Do I have to deodex first to flash a new ROM version? Or it is safe to just flash the new ROM version while I'm still odexed and just re-odex after upgrading the ROM?
Thanks!
I have an odex folder on my internal SD card. Folder size is almost 500mb. Can I delete this folder.
Sent from my GT-I9300 using Tapatalk 2
I can't seem to make it work.. It is always saying it can't find the Android SDK (look at the attached photo), but I've already installed everything. Java and Android SDK. What could be the problem? Both Java and SDK are installed in C:/
flipward said:
I can't seem to make it work.. It is always saying it can't find the Android SDK (look at the attached photo), but I've already installed everything. Java and Android SDK. What could be the problem? Both Java and SDK are installed in C:/
Click to expand...
Click to collapse
http://forum.xda-developers.com/showpost.php?p=39378436&postcount=164

Jiayu G4S TROJAN/MALWARE WARNING for custom and stock ROMs May/June

Hi all Jiayu users,
a recent stock ROM and many custom ROMs based on it, have been reported to have at least 2 trojans integrated.
Organizational:This has already been discussed in this general thread: http://forum.xda-developers.com/showthread.php?t=2746900&page=33
But there it goes out of sight very quickly so we should use this new thread to discuss security concerns with Jiayu ROMs in general.
I will update the thread title as soon as other models are reported to have it, too (that is likely).
I will also update the title if we find it is a false alarm (which I stopped to hope).
Any suggestions to improve this posting, or to move it to a better forum, are very appreciated.
It would be nice, if everyone could try not to clutter this thread with unnecessary things. For example, if you have suggestions what I should edit here, better contact me directly, instead of posting a reply that becomes obsolete quickly.​I've downloaded G4S-20140609-211642-SD.rar and G4SL-20140618-194209-SD.rar from needrom and verified the following facts myself. I did not test the stock ROMs, but in the general thread others reported that they have it, too. I don't know if they really came from an official source. April ROMs seem not to have it.
Many trustworthy virus/malware scanners detect trojans in system/app/ - see a list of reports in the virustotal links:
fonts 6.26
com.lovelyfonts
lovelyfonts_vanzo_noicon_6.26.apk
http://www.avgthreatlabs.com/android-app-reports/app/com.lovelyfonts/
https://www.virustotal.com/en/file/...e90eaa5e9e8a1dec4db0d4ece4a82be1185/analysis/
Unlock 2.144
com.yunlan.syslockmarket
SysMarket_92_NoIcon.apk
https://www.virustotal.com/en/file/...cd75a5543725b049c974735dcc66c526940/analysis/
Maybe one of them seems to download a third one and does it again if I delete it, which is clearly malicious behavior:
com.skymobi.pay.plugin 2.0.0.6
placed here: /storage/sdcard0/Android/data/com.skymobi.pay.app/plugins/com.skymobi.pay.opplugin_V2006.apk 174.95 KB
http://www.avgthreatlabs.com/android-app-reports/app/com.skymobi.pay.opplugin_v2006.apk/
https://www.virustotal.com/en/file/...19bf34f6884fa397f062e9b9e4ee4d9be0a/analysis/​I was able to delete both apps using Titanium Backup. Everything still works and the third app didn't come back anymore.
After deletion of the "fonts" app, without reboot, a chinese menu entry appears under settings/display. It translates to "font settings" and crashes when tapped. Maybe that's interesting.
Both apps caused wakelocks, consumed battery and sent data to the internet. They have lots of rights, and their names alone are suspicious.
Other Jiayu users with ROMs of May or June should check for these apps, too. Please report your results here. You can extract the ROM file on your PC and scan it with a virus scanner, or submit above apk files to virustotal or other online services.
Or, on your device, check for existence of the "fonts" and "Unlock" apps. You can do so under Settings/Apps, or in Titanium Backup, or Wakelockdetector and so on.
-Alex
Can you suggest tools to analyze what goes on on my device? Like a good task manager with lots of features showing useful info.
I would also like to see a list of open connections, and who caused them, is that possible?
I just downloaded and installer titanium to check for that apps, i dont seem to have any of those installed.
The rom i have its the official from jiayu.es, based on the 20140418-120537.
Anyways i wanted to check it manually, should I upload all my rom to virustotal?
Thanks
petete159 said:
I just downloaded and installer titanium to check for that apps, i dont seem to have any of those installed.
The rom i have its the official from jiayu.es, based on the 20140418-120537.
Anyways i wanted to check it manually, should I upload all my rom to virustotal?
Click to expand...
Click to collapse
This is an April ROM, and there are also other reports that they are not affected.
Since a few days, jiayu.es also has the June ROM for download.
No, you can't upload the whole ROM. You can unrar/unzip it on a PC and upload single apk files from /system/app/ - or directly upload from your phone (you can use ES file explorer to access that directory).
This warning is now in multiple forums, but no one seems to really care.
Where should I post to get attention?
Some say, I should just delete the suspicious apps and everything is ok. I did that, but I'm not feeling safe, of course. How can we find out more?
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
I found this out also.
I've checked the app and it has suspiciously many rights...
mainstreamer said:
I found this out also.
I've checked the app and it has suspiciously many rights...
Click to expand...
Click to collapse
Thanks a lot, can you tell what ROM version you use and where you got it from. And if not G4S, what model?
What about the other 2 apps?
Stock Rom from jiayu.es (the latest). I have the g4s.
mainstreamer said:
Stock Rom from jiayu.es (the latest). I have the g4s.
Click to expand...
Click to collapse
for the records, that is:
(4.2.2)Rom Oficial Jiayu China 20140609-211642
http://www.jiayu.es/software.php?soft&jiayu=G4S
Alex1a said:
for the records, that is:
(4.2.2)Rom Oficial Jiayu China 20140609-211642
http://www.jiayu.es/software.php?soft&jiayu=G4S
Click to expand...
Click to collapse
Indeed. Somehow it's already included in the official rom.
Maybe it's time to contact jiayu directly?
mainstreamer said:
Indeed. Somehow it's already included in the official rom. Maybe it's time to contact jiayu directly?
Click to expand...
Click to collapse
I contacted jiayu.de at 30.6., they think it's harmless, but are looking at it - no further info until now.
I then contacted jiayu.es yesterday, but got no answer at all until now.
The latest official software posted on http://www.ejiayu.com/en/News.html is from April. How do we know, that 0609 and so on is really officially from them? Is there another official source?
I sent a detailed email to ejiayu.com and will post any comments here.
Answer from Jiayu Official Store España:
"Hello. We do not know anything about this issue because it is working right at this moment. Please contact to Jiayu China or ejiayu to talk about this issue with them."
EDIT: I then asked for help contacting Jiayu China and got this reply after some days:
"Hi. This rom is made bu Jiayu China not by us. We do not know anything from that,. Try to keep in contact with them because we can do nothinfg to fix it."
Hmm ok thanks.
Strange that nobody knows what might be going on. Is the latest rom maybe bogus?
Anyone got a good rom alternative for my jiayu g4s?
Here are the details:
http://securelist.com/blog/virus-watch/59356/caution-malware-pre-installed/
Zopo also does this: recent official KitKat has the fonts troyan, and it is embedded into Settings!
This is clearly intentionally done.
We, simple people, think we pay less for decent phones, and in fact, phone sellers and manufacturers sell out secrets to 3rd party without asking us.
Latest info: there's a new official kitkat ROM for this phone, and it has exactly the same 2 trojans
I really wonder why this security thread is that short. Is it the wrong place here, or doesn't anyone care? I don't feel secure after deleting those apps and don't want to use such ROM. So I restored the april stock ROM...
From official sources nothing new about this issue.
answer from german flagship store
Alex1a said:
From official sources nothing new about this issue.
Click to expand...
Click to collapse
I received an answer from the German branch (flagship store in germany: url jiayu dot de).
The applications are designed for remote maintenance.
I hope they are right.
cepria said:
I received an answer from the German branch (flagship store in germany: url jiayu dot de).
The applications are designed for remote maintenance.
I hope they are right.
Click to expand...
Click to collapse
Never ever, german store is more or less just a reseller with the same poor customer service than a chinese one, why should they confirm that the company who they earn the money with is distributing malware, this would kill their Business immediately
any news on this issue?
I'm planning to buy this phone, but only if the malware is 100% removable.
Can someone confirm that simply removing the APKs does the trick?
Are they located in /system/apps/?
Confirmed, or just flash a different rom, can suggest borx rom gold v3

S7-931w - Failed to update modem - S7-931u

So I'm the owner of the infamous MediaPad 7 Lite [WiFi only] or S7-931w and there is hacking challenge ahead.
As Huawei rarely updates FW for S7-931w and original FW is buggy, I decided to experiment in some way: I put S7-931u FW on S7-931w tablet.
That should work perfectly as both tablets are same by hardware, except that S7-931u have 3G modem.
So after flashing and tablet boot, everything is perfect but there is annoying message on the screen: "Failed to update modem" that will sit on the screen and not go away.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Now, I seeking for a way to remove that message. As I'm not very experienced android developer, I have no idea how to remove it. Maybe to remove modem driver? Or some modifications on firmware before flashing?
I would like to stay on this firmware as it's seems to be more stable and faster than one for S7-931w.
Thanks in advance.
Well I'm not sure that removing modem driver is an easy task.. because the firmware of this tablet is a real mess - but you can try.. because you said you are experimenting. That probably includes rooting of the device, and/or maybe even custom ROM-ing
I own S7-931U with SP19 firmware version and it is not stable at all - at least on my tablet
Wifi version that you have has only reached SP01 version as you can see on this link.
But if you really want to experiment (and don't mind translating from russian) do check 4PDA forum.. they also have some stuff for MediaPad 7 Lite tablets.
Good luck.
prometej-zg said:
Well I'm not sure that removing modem driver is an easy task.. because the firmware of this tablet is a real mess - but you can try.. because you said you are experimenting. That probably includes rooting of the device, and/or maybe even custom ROM-ing
I own S7-931U with SP19 firmware version and it is not stable at all - at least on my tablet
Wifi version that you have has only reached SP01 version as you can see on this link.
But if you really want to experiment (and don't mind translating from russian) do check 4PDA forum.. they also have some stuff for MediaPad 7 Lite tablets.
Good luck.
Click to expand...
Click to collapse
It's already rooted. But I do not have experience with removing drivers on android, so yes, it will be tricky.
Ohh I see that you are also from Croatia, that explains why we both have MediaPad 7 Lite. This tablet is pure crap, but for basic task can be a bit frustrating because of it's "awesome speed". Maybe it can be less useless with better firmware.
I'll check that Russian stuff, it may help.
EDIT: I checked but I don't see anything useful. I would like to know how to edit Huawei firmware by my self like Russian guy did. I managed to open update.app with 7-zip and check all 3 archives (931U.zip, 932U.zip, 933U.zip) contained in it.
Each archive contains 2 files:
- MOBILE_CONNECT.BIN
- UpdateWizard (No extension) - File seems to be an ELF file determined by header.
I have no idea how I should edit anything of that.
This firmware is become open source but I don't know how to edit it either.
I would appreciate if someone can explain me or provide me some tutorial for such, If I get involved and done something, I'll publish it so others may also enjoy the benefits.
Well most of us got this tablet for an "T-Contract"
I don't have enough experience with customizing ROM-s, so I'm not much of a help, but here are two links which may help you disassemble original ROM.
[GUIDE] How to extract Huawei firmware (update.app)
[TOOL] Huawei Update Extractor [UPDATED: v0.9.8.0]
App on the second link is a believe easier to setup if you are on windows platform.
Btw.. you are probably on your own on this experiment, because I've search for some answers on the subject of this tablet, and got none (even nothing from Huawei!)... That is why a gave up trying.. Only thing I've seen new is open source stuff on Huawei pages.
I guess people (or even worse Huawei) are just not interested to create something better for this tablet.
At least some users on this forum and Freaktab.com, helped with rooting and TWRP custom recovery... I can only thank them for their effort
prometej-zg said:
Well most of us got this tablet for an "T-Contract"
I don't have enough experience with customizing ROM-s, so I'm not much of a help, but here are two links which may help you disassemble original ROM.
[GUIDE] How to extract Huawei firmware (update.app)
[TOOL] Huawei Update Extractor [UPDATED: v0.9.8.0]
App on the second link is a believe easier to setup if you are on windows platform.
Btw.. you are probably on your own on this experiment, because I've search for some answers on the subject of this tablet, and got none (even nothing from Huawei!)... That is why a gave up trying.. Only thing I've seen new is open source stuff on Huawei pages.
I guess people (or even worse Huawei) are just not interested to create something better for this tablet.
At least some users on this forum and Freaktab.com, helped with rooting and TWRP custom recovery... I can only thank them for their effort
Click to expand...
Click to collapse
Yeah "T-Contract", as 80% of Croats, me included.
But you helped me a lot, you bring me things I didn't even known that are exist for this tablet.
If I make some success, I'll post about it.
And yes, Huawei have NO interest for it - They even removed S7-931w support from their site - SHAME.
It's a bad tablet, slow and as you said with messy firmware, that's probable reason why almost nobody works on it, or maybe nobody have enough courage to challenge Huawei MediaPad 7 Lite? Who knows
Some update, I used extractor to extract the firmware, after extraction I extracted system.img and under bin directory found guilty script:
modem_update
The problem is that this script is probably called by another, so how to stop that chain....
I have attached recovery log file from mine S7-931u model using SP19 firmware.
Maybe it can be helpful to you, because it contains some stuff near the end of the file related to modem installation and partitions (?!)
EDIT: I forgot to mention... as I understand (not excatly sure about details!) rild is command/daemon that helps communication between modem device and Android code (I believe there is something about that on Stackoverflow forum).. so maybe this may also be your point of interest.?
As I see by viewing the log you shared, it even creates special "modem" partition.
This maybe even complicates the things, maybe I could change creating modem partition.
As experimenting with Android partitions is never good idea, I need to be extremely careful as there is possibility of bricking device.
Do you maybe know where I can find script which handles installation process?
Sorry I haven't investigate Android very deep so I don't know what is the script in charge of installation procedure.
Maybe if you check init.rc and/or init.<machine_name>.rc scripts/service or maybe even updater_script... maybe you can find some more clues, about what is going on during boot procedure and/or installation.
Okay, I'll look into it when I got some time, and I'll keep updated.
Success!
After a while, I finally managed to get some time and will to work on our poor S7-931w, and I comming with a good news!
I finally managed to remove permanent "Failed to update modem" message.
Message is caused by system application HuaweiInit.apk which I found safe to remove after message appears, as after removal there is no annoying message nor bugs.
Also, now all telephony apps could be removed since S7-931w doesn't have any way to use it.
Now we can have S7-931u firmware on our S7-931w. For me, it seems that u firmware is more responsive.
Using S7-931u firmware also brings back USB Mass storage mode which was removed in latest S7-931w firmware.
However, it's still a lot of thing to done, there is annoying empty(gray) GSM signal icon next to the battery, and we should do something more serious with it like optimizing it.
Later I'll post brief tutorial, and maybe release modded S7-931u rom for S7-931w.

Support Thread for DSA Rom`s (4.4+5.1)

Hi Community,
this is a support thread for DSA Rom`s
The reason for this here is, that all DSA threads on XDA are closed and I dont know where to share experiance and bugs for the DSA Roms.
First of all, a big thanks to DSA for sharing your Roms.
I am using the 4.4 Rom, and what should I say?
Fast, stable and clean....simple perfect
I've combined the DSA Rom with Malaysk parts to get screensafer working.
What experiance do you have with DSA Roms ?
Please share it with us
Best regards
By far the best ROM's for these units in my opinion. I'm currently stripping down DSA's 4.4.4 ROM, removing all unnecessary APK's for my system and use case, completely removing Google Play, and it boots quickly and loads nav quickly as well.
I made @dsa8310 lollipop lite by unninstalling all unusefull apps and I got it usable on 1Gb ram, much better then kitkat, because the programs run better for me and everything works... (mtc-keys, mtc manager etc.)
Was planing to make the lite update.img file to install with changed logo and removed apps, but when I was building an image it gets bigger then dsa's one, don't know why... If I tried booroondoks one, it is smaller as it should be.
If anyone knows all the apps which can be removed or just the explanation of apps it will help to build an image.
Now I totally have more than 65 apps removed and the system is fully responsive with google maps and google play included (the only problem is that removing apps from folders on computer that there is not the same package names like the apps names itself.)
Johny DJ said:
I made @dsa8310 lollipop lite by unninstalling all unusefull apps and I got it usable on 1Gb ram, much better then kitkat, because the programs run better for me and everything works... (mtc-keys, mtc manager etc.)
Was planing to make the lite update.img file to install with changed logo and removed apps, but when I was building an image it gets bigger then dsa's one, don't know why... If I tried booroondoks one, it is smaller as it should be.
If anyone knows all the apps which can be removed or just the explanation of apps it will help to build an image.
Now I totally have more than 65 apps removed and the system is fully responsive with google maps and google play included (the only problem is that removing apps from folders on computer that there is not the same package names like the apps names itself.)
Click to expand...
Click to collapse
Do you have a version to share? Would love to try it out
tariqkhan.co.uk said:
Do you have a version to share? Would love to try it out
Click to expand...
Click to collapse
Not yet, I optimized car version not image one yet... I also removed all google playstore services and replaced with different ones so everything is working but faster boot and performance.
Johny DJ said:
Not yet, I optimized car version not image one yet... I also removed all google playstore services and replaced with different ones so everything is working but faster boot and performance.
Click to expand...
Click to collapse
Can't wait to give it a go... give me a shout when you have something ready?
Johny DJ said:
Not yet, I optimized car version not image one yet... I also removed all google playstore services and replaced with different ones so everything is working but faster boot and performance.
Click to expand...
Click to collapse
Will love to have it too.
Sent from my Robin using XDA-Developers Legacy app
I would like to have the DSA-ROM, but don´t know why there are two update img (part1 and part2)?
How do I install the two img? Do i need both of them?
Do anyone have some screenshots of the DSA-ROM?
My HU:
MTCB JY v.2.86, RK3188, 1024x600, Android 5.1.1
Thodai said:
I would like to have the DSA-ROM, but don´t know why there are two update img (part1 and part2)?
How do I install the two img? Do i need both of them?
Do anyone have some screenshots of the DSA-ROM?
My HU:
MTCB JY v.2.86, RK3188, 1024x600, Android 5.1.1
Click to expand...
Click to collapse
He @dsa8310) split the file in half. when you run the 1st part, it will join part1 and part2 when it makes the update.img (Use 7zip or unrar
Thank´s a lot, Oldpapa49!
Did you, or did you ever have the DSA-ROM?
How is the subjective compared to a Malaysk-ROM?
Actually, Malaysk-ROM runs on my HU quite well, but I´am too curious as the ROM of dsa8310 is
Have a nice day!
Thomas
Thodai said:
Thank´s a lot, Oldpapa49!
Did you, or did you ever have the DSA-ROM?
How is the subjective compared to a Malaysk-ROM?
Actually, Malaysk-ROM runs on my HU quite well, but I´am too curious as the ROM of dsa8310 is
Have a nice day!
Thomas
Click to expand...
Click to collapse
DSA8310 rom does very well (5.1.1) which currently I'm using now. He just makes it very basic. Boots fast and is not a FUSE type rom (FUSE uses all memory for APPs)
Malasky is a feature rom, he puts some apps in it to his liking. It is FUSE type to no limit to the amount of apps.
I like to have a speedometer on main display (mal's does this) so I install a launcher that I can put what I want on the main screen.
I have the speed I want with the weather on main.
And I like apps, so I will have to limit my apps.
One question, bevore i install it:
The ROM is named xupdateKLD....
I'm worried that the "KLD" is not compatible with my JY. The ROM is not just for Klyde Head Units and universally applicable?
Thodai said:
One question, bevore i install it:
The ROM is named xupdateKLD....
I'm worried that the "KLD" is not compatible with my JY. The ROM is not just for Klyde Head Units and universally applicable?
Click to expand...
Click to collapse
The only constrain to install DSA Rom is to have an MTCB Head unit and not MTCD or Intel! (I have a JY MTCB and this ROM is doing great)
I've tried to unzip the part2 of dsa ROM. It shows two errors. Whats wrong?
Edit:
No matter what 2nd part of any DSA-ROM I try to unpack, there are always 2 errors
I'm scared to destroy something on my Head-Unit when I'm flashing this update.img!
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Thodai said:
I've tried to unzip the part2 of dsa ROM. It shows two errors. Whats wrong?
Edit:
No matter what 2nd part of any DSA-ROM I try to unpack, there are always 2 errors
I'm scared to destroy something on my Head-Unit when I'm flashing this update.img!
Click to expand...
Click to collapse
I downloaded the December xupdate rar files.
I placed both files in a folder and ran 7Zip and selected the 1st file (204,800KB) and had it extract the files. 7Zip will extract both part1 and part2 at the same time.
The extracted file will be filename update.img size of 818.159KB.
If you try extracting the part2, you will get an error. The pointers are in part1.
Done.... Oldpapa49, you are my hero!
Oldpapa49 said:
I downloaded the December xupdate rar files.
Click to expand...
Click to collapse
Then you have an MTCC?
I have a MTCB and here is the last ROM from 05.08.2016.
What actually means "prerootet"?
Is the ROM now rooted or not?
Thodai said:
Done.... Oldpapa49, you are my hero!
Then you have an MTCC?
I have a MTCB and here is the last ROM from 05.08.2016.
What actually means "prerootet"?
Is the ROM now rooted or not?
Click to expand...
Click to collapse
Mine is a MTCB KLD6 800*480 that was 4.4.4....
I do on occasion, while driving or not, flash Mal ROM, DSA8310 ROM, Boonoorook ROM and factory. Was on DSA8310 until yesterday, now on latest 4.4.4 of Mal's. Who know what tomorrow will bring.
So far for flashing, I have done it all.
I have backups of the launcher that I like, (It historic where I can add my own stuff)
I want on my main page Speed, Weather and a few apps I like (Sirius is one).
I save my stuff via Titanium and recover apps that way.
I have like 20 USB Flash drives with all different update images.
I'm crazy.. Love it..
Hahah....., yes, you´re crazy!
The flashing of the DSA-ROM was not successful. For 10 minutes just black screen.
Is it the first time so long?
Thodai said:
The flashing of the DSA-ROM was not successful. For 10 minutes just black screen.
Is it the first time so long?
Click to expand...
Click to collapse
Steps are:
Flash update.img via MicroSD card in GPS slot or USB flash drive in USB slot with clear option.
After, got to second option from bottom to clear CACHE and all. The reboot unit. Should see dancing androids for a long time.
IT will the start the home screen.. Leave the unit alone, it will reboot to setup more stuff. reboot is 2 times.
Second time you should be good.

Virus / trojan / malware in the official Zopo Speed 7 / 7+ ROM from 2016-09-21

Some weeks ago, a virus appeared a second time on my Speed 7, which is not removable and at the end requires a full re-flash of the device.
Symptoms: every couple of hours two apps with the name "Settings" are getting installed. The virus scanner (I used "Sophos") detect the viruses which belong to the "Triada" class; I can remove them, but after a while they reappear again.
To find out if the malware comes from "outside" (for example by installing a malicious app) or is already pre-installed in the ROM I performed the following investigation:
1) Downloaded the latest ROM for Speed 7 (from 2016-09-21, MD5 sum 8dfa789e1e795f285b4c6a9a65433943) to a Linux PC
2) Unzipped the file, converted "system.img" to a raw image file (with simg2img)
3) mounted the raw image file
4) uploaded the file system/priv-app/System-UI/SystemUI.apk (MD5 sum 55169441bfb82af77f2187614e5d2c1c) to virustotal.com
13 of 59 virus scanners detect a problem:
AegisLab: Android.Troj.Ztorg!c
Arcabit: Android.Trojan.Ztorg.GC
BitDefender: Android.Trojan.Ztorg.GC
ClamAV: Java.Malware.Agent-6331114-0
Emsisoft: Android.Trojan.Ztorg.GC (B)
GData: Android.Trojan.Ztorg.GC
K7GW: Trojan ( 0001140e1 )
MAX: malware (ai score=81)
McAfee: Artemis!55169441BFB8
Qihoo-360: Trojan.Android.Gen
Sophos AV: Andr/Dropr-FY
TrendMicro-HouseCall: Suspicious_GEN.F47V1015
WhiteArmor: Malware.HighConfidence
Conclusion: the latest ROM image for the Speed 7 is infected by a virus / trojan that can not be removed from the system. The purpose of this virus is not obvious to me, but it installs other trojans of the "Triada" class (using the camouflage name "Settings"). In my opinion it is a very serious problem affecting the integrity of private user data and credentials. I also checked the latest ROM images of the Speed 7 plus and Speed 7C models, they are also infected.
Second investigation:
I rooted the phone and installed afwall+, hoping that the firewall will block downloading of additional virus components (beside the already installed system app SystemUI). The log file entries of afwall+ show that SystemUI tries to connect to two different servers, usually several times per minute:
First: 54.169.134.231:80 (name "ec2-54-169-134-231.ap-southeast-1.compute.amazonaws.com")
Since port 80 is HTTP protocol I opened the web page in a browser. It simply shows a page with one single word: "prabat". Maybe a password to access other malware???
Second: 221.130.182.169:80 (no nameserver entry)
Opening this address shows a page with chinese letters only and several links, which are always the same and point to an Android app named NanoLauncher.apk"
Downloading the APK and uploading it to virustotal.com shows that 10 of 62 scanners detect
a virus. Here is the list (only positives):
AegisLab: SUSPICIOUS
AVware: Trojan.AndroidOS.Generic.A
CAT-QuickHeal: Android.Cooee.Ee670 (PUP)
Cyren: AndroidOS/GenPua.185A3C66!Olympus
ESET-NOD32: a variant of Android/Cooee.E potentially unsafe
Fortinet: Riskware/Cooee_E!Android
Ikarus: AdWare.AndroidOS.Cooee
McAfee: Artemis!185A3C66DFD3
McAfee-GW-Edition: Artemis
Symantec Mobile Insight: AppRisk:Generisk
This confirms that the system app SystemUI of the latest official ROM is infected by a severe virus.
I posted my finding also on the ZOPO forum, but after several posts they do not accept messages any more claiming that they will be checked by the moderator.
I also recevied an email by ZOPO with the following answer:
Dear User
As we have told you before, if you flashed the software from our website, then it is ok.
Before we published, we would do full test, and it is no problem.
Thank you.
If you also can not accept this situation, please contact "[email protected]" and request a virus-free image.
{
"lightbox_close": "Close",
"lightbox_next": "Next",
"lightbox_previous": "Previous",
"lightbox_error": "The requested content cannot be loaded. Please try again later.",
"lightbox_start_slideshow": "Start slideshow",
"lightbox_stop_slideshow": "Stop slideshow",
"lightbox_full_screen": "Full screen",
"lightbox_thumbnails": "Thumbnails",
"lightbox_download": "Download",
"lightbox_share": "Share",
"lightbox_zoom": "Zoom",
"lightbox_new_window": "New window",
"lightbox_toggle_sidebar": "Toggle sidebar"
}
Yes, I found this
https://photos.app.goo.gl/NYz1VRMQrZXOWDIj1
Thanks a lot for the useful hint!
I also checked my /system/lib/libandroid_runtime.so (directly from my phone) with virustotal.com: 18 of 59 engines detect a virus of the Triada class.
Then I checked the same file from the Speed 7 system image (from 2016-09-21). The file on the ROM image and on my phone are identical, so it has not been modified "from outside" (maybe by another malware). So the virus is definitely pre-installed on the latest ROM image on a system library level (which makes things even worse)!
BTW: which virus scanner did you use to get your results? None of the ones I used up to now detected the problem in libandroid_runstime.so
Dr web or Norton. I have my own port now. Zopo stock is not safe
Zopo Speed 7 / 7+ ROM from 2016-09-21
two installations will always appear after a while "youtube stopped working"
complete blocking of your mobile. I installed Zopo Speed 7+ ROM Ghost45 here is OK.
This is also quite funny: beside the latest ROM images for the Zopo 7 / 7+ / 7C, also the Forum App provided on zopomobile.com is infected with malware!
If the APK file (ZOPO-Forum_APP.apk) is scanned with virustotal.com, 12 of 62 engines detect malware.
After complaining about this on the zopomobile.com forum, all my threads located there were removed and they removed my permission to post anything.
My conclusions for the future: I will never buy ZOPO products again. I will think twice before I will buy a cheap chinaphone again.
si1 said:
This is also quite funny: beside the latest ROM images for the Zopo 7 / 7+ / 7C, also the Forum App provided on zopomobile.com is infected with malware!
If the APK file (ZOPO-Forum_APP.apk) is scanned with virustotal.com, 12 of 62 engines detect malware.
After complaining about this on the zopomobile.com forum, all my threads located there were removed and they removed my permission to post anything.
My conclusions for the future: I will never buy ZOPO products again. I will think twice before I will buy a cheap chinaphone again.
Click to expand...
Click to collapse
Hi, never ever buy ZOPO!
They remove again all posts frome zopo forum
Try my PORT, https://forum.xda-developers.com/sp...t-port-umi-touch-speed7-t3704343/post74498536
mstdzw said:
Hi, never ever buy ZOPO!
They remove again all posts frome zopo forum
Try my PORT, https://forum.xda-developers.com/sp...t-port-umi-touch-speed7-t3704343/post74498536
Click to expand...
Click to collapse
Dear mstdzw,
thanks a lot for the offer! Your port is for the Speed 7+ (ZP952), I own a Speed 7 (ZP951). Can I also install your port on the ZP951 without problems or does one have to modify the ROM image?
Thanks in advance!
si1 said:
Dear mstdzw,
thanks a lot for the offer! Your port is for the Speed 7+ (ZP952), I own a Speed 7 (ZP951). Can I also install your port on the ZP951 without problems or does one have to modify the ROM image?
Thanks in advance!
Click to expand...
Click to collapse
I think this should work. Added zip with zp951 kernel.
mstdzw said:
I think this should work. Added zip with zp951 kernel.
Click to expand...
Click to collapse
Thanks a lot - I will give it a try during the next weeks!
Did it work? My ZP951 is still stock, what is this android version?
thanks

Categories

Resources