Automated Malware Analysis Report for Azditdeshm

Total Page:16

File Type:pdf, Size:1020Kb

Automated Malware Analysis Report for Azditdeshm ID: 181195 Sample Name: azDiTDeshm.apk Cookbook: defaultandroidfilecookbook.jbs Time: 04:22:31 Date: 08/10/2019 Version: 27.0.0 Red Agate Table of Contents Table of Contents 2 Analysis Report azDiTDeshm.apk 4 Overview 4 General Information 4 Detection 4 Confidence 4 Classification 5 Analysis Advice 5 Mitre Att&ck Matrix 5 Signature Overview 5 AV Detection: 6 Location Tracking: 6 Exploits: 6 Spreading: 6 Networking: 6 Key, Mouse, Clipboard, Microphone and Screen Capturing: 6 E-Banking Fraud: 6 Spam, unwanted Advertisements and Ransom Demands: 7 Operating System Destruction: 7 Change of System Appearance: 7 System Summary: 7 Data Obfuscation: 7 Persistence and Installation Behavior: 7 Boot Survival: 7 Hooking and other Techniques for Hiding and Protection: 7 Malware Analysis System Evasion: 7 HIPS / PFW / Operating System Protection Evasion: 7 Language, Device and Operating System Detection: 8 Stealing of Sensitive Information: 8 Remote Access Functionality: 8 Antivirus, Machine Learning and Genetic Malware Detection 8 Initial Sample 8 Dropped Files 8 Domains 8 URLs 8 Yara Overview 8 Initial Sample 8 PCAP (Network Traffic) 8 Dropped Files 8 Joe Sandbox View / Context 9 IPs 9 Domains 9 ASN 9 JA3 Fingerprints 10 Dropped Files 10 Created / dropped Files 10 Domains and IPs 10 Contacted Domains 10 URLs from Memory and Binaries 10 Contacted IPs 11 Public 11 Static File Info 11 General 12 File Icon 12 Static APK Info 12 General 12 Activities 12 Receivers 13 Services 13 Permission Requested 13 Copyright Joe Security LLC 2019 Page 2 of 41 Certificate 14 Resources 14 Network Behavior 40 TCP Packets 40 APK Behavior 41 Installation 41 Miscellaneous 41 System Calls 41 By Permission (executed) 41 By Permission (non-executed) 41 Disassembly 41 0 Executed Methods 41 0 Non-Executed Methods 41 Copyright Joe Security LLC 2019 Page 3 of 41 Analysis Report azDiTDeshm.apk Overview General Information Joe Sandbox Version: 27.0.0 Red Agate Analysis ID: 181195 Start date: 08.10.2019 Start time: 04:22:31 Joe Sandbox Product: CloudBasic Overall analysis duration: 0h 2m 20s Hypervisor based Inspection enabled: false Report type: light Sample file name: azDiTDeshm.apk Cookbook file name: defaultandroidfilecookbook.jbs Analysis system description: Android 6.0 APK Instrumentation enabled: true Detection: MAL Classification: mal48.spyw.andAPK@0/251@0/0 Warnings: Show All Excluded IPs from analysis (whitelisted): 216.58.201.99 Excluded domains from analysis (whitelisted): connectivitycheck.gstatic.com No dynamic data available No interacted views No simulation commands forwarded to apk Not all non-executed APIs are in report Not all resource files were parsed Not all resource strings were parsed Report size exceeded maximum capacity and may have missing disassembly code. Report size exceeded maximum capacity and may have missing dynamic data code. Errors: Setup command "_JBInstallAPK" failed: INSTALL_FAILED_UPDATE_INCOMPATIBLE Detection Strategy Score Range Reporting Whitelisted Detection Threshold 48 0 - 100 false Confidence Strategy Score Range Further Analysis Required? Confidence Threshold 5 0 - 5 false Copyright Joe Security LLC 2019 Page 4 of 41 Classification Ransomware Miner Spreading mmaallliiiccciiioouusss malicious Evader Phishing sssuusssppiiiccciiioouusss suspicious cccllleeaann clean Exploiter Banker Spyware Trojan / Bot Adware Analysis Advice Unable to instrument or execute APK, no dynamic information has been logged Mitre Att&ck Matrix Signature Overview Copyright Joe Security LLC 2019 Page 5 of 41 • AV Detection • Location Tracking • Exploits • Spreading • Networking • Key, Mouse, Clipboard, Microphone and Screen Capturing • E-Banking Fraud • Spam, unwanted Advertisements and Ransom Demands • Operating System Destruction • Change of System Appearance • System Summary • Data Obfuscation • Persistence and Installation Behavior • Boot Survival • Hooking and other Techniques for Hiding and Protection • Malware Analysis System Evasion • HIPS / PFW / Operating System Protection Evasion • Language, Device and Operating System Detection • Stealing of Sensitive Information • Remote Access Functionality Click to jump to signature section AV Detection: Multi AV Scanner detection for submitted file Location Tracking: Queries the phones location (GPS) Exploits: Might use exploit to break dedexer tools Spreading: Has permission to change the WIFI configuration including connecting and disconnecting Has permission to download files without notification Accesses external storage location Networking: Checks an internet connection is available Opens an internet connection Performs DNS lookups (Java API) Connects to IPs without corresponding DNS lookups Found strings which match to known social media urls Urls found in memory or binary data Uses HTTP for connecting to the internet Key, Mouse, Clipboard, Microphone and Screen Capturing: Has permission to take photos E-Banking Fraud: Has functionality to send UDP packets Has functionalty to add an overlay to other apps Has permission to query the list of currently running applications May query for the most recent running application (usually for UI overlaying) Copyright Joe Security LLC 2019 Page 6 of 41 Spam, unwanted Advertisements and Ransom Demands: Loads advertisement Operating System Destruction: Has permission to delete other packages Lists and deletes files in the same context Change of System Appearance: May access the Android keyguard (lock screen) Acquires a wake lock Sets a repeating alarm System Summary: Executes native commands Requests permissions only permitted to signed APKs or APKs which are within the system image Requests potentially dangerous permissions Classification label Reads shares settings Data Obfuscation: Obfuscates method names Uses reflection Persistence and Installation Behavior: Has permission to install other packages Sets an intent to the APK data type (used to install other APKs) Boot Survival: Has permission to execute code after phone reboot Installs a new wake lock (to get activate on phone screen on) Starts/registers a service/receiver on phone boot (autostart) Hooking and other Techniques for Hiding and Protection: Has permission to draw over other applications or user interfaces Has permission to query the list of currently running applications Has permission to terminate background processes of other applications Queries list of running processes/tasks Uses Crypto APIs Malware Analysis System Evasion: Accesses android OS build fields Checks if the Android Monkey is running (UI Automation) Queries the unique operating system id (ANDROID_ID) May try to detect the virtual machine to hinder analysis (VM artifact strings found in memory) HIPS / PFW / Operating System Protection Evasion: Copyright Joe Security LLC 2019 Page 7 of 41 Uses the DexClassLoader (often used for code injection) Language, Device and Operating System Detection: Queries the SIM provider ISO country code Queries the WIFI MAC address Queries the network operator ISO country code Queries the network operator name Queries the network operator numeric MCC+MNC (mobile country code + mobile network code) Queries the unqiue device ID (IMEI, MEID or ESN) Stealing of Sensitive Information: Has an unnatural receiver priority (often indicator for malware) Has permission to read the phones state (phone number, device IDs, active call ect.) Has permissions to create, read or change account settings (inlcuding account password settings) Queries camera information Queries stored mail and application accounts (e.g. Gmail or Whatsup) Has permission to query the current location Remote Access Functionality: Uses DownloadManager to fetch additional components Antivirus, Machine Learning and Genetic Malware Detection Initial Sample Source Detection Scanner Label Link azDiTDeshm.apk 28% Virustotal Browse azDiTDeshm.apk 10% Metadefender Browse Dropped Files No Antivirus matches Domains No Antivirus matches URLs No Antivirus matches Yara Overview Initial Sample No yara matches PCAP (Network Traffic) No yara matches Dropped Files No yara matches Copyright Joe Security LLC 2019 Page 8 of 41 Joe Sandbox View / Context IPs Match Associated Sample Name / URL SHA 256 Detection Link Context 74.125.71.188 ths55y8JeZ Get hash malicious Browse 9AMSXRjMZA Get hash malicious Browse 4NXtXHjdFe Get hash malicious Browse GTA5.apk Get hash malicious Browse app-debug-v1.apk Get hash malicious Browse dodol Phone data_v3.1.31_apkpure.com.apk Get hash malicious Browse cG4A4oxKOJ Get hash malicious Browse 67Y92rfSsK.apk Get hash malicious Browse tim_0.apk Get hash malicious Browse BmhhKu9HET.apk Get hash malicious Browse pc4.apk Get hash malicious Browse [email protected] Get hash malicious Browse O0U0nWqODf.apk Get hash malicious Browse 6z608hCBZv.apk Get hash malicious Browse 15nP5x6Ecu Get hash malicious Browse SDiQ0hSROS Get hash malicious Browse QEn8J8U1N2 Get hash malicious Browse qznoPKRqCs Get hash malicious Browse 8bxy5FTnVB Get hash malicious Browse o0Rfm8ceoi Get hash malicious Browse Domains No context ASN Match Associated Sample Name / URL SHA 256 Detection Link Context unknown http://r20.rs6.net/tn.jsp?f=001Z0bEOB6AoZqPuhZS3Fd Get hash malicious Browse 208.75.122.11 x7sFpTFEXISG2a69t7hU2J0MMRvp0ftn7qN2mEg6 DQdvkK0rLLVz8dSi_iaewa1fVIJDPMjkY2S8DlNs ZQaO3pXlxQssN4mO7HYYEqzsuLyTqDVwLXuP1WxH cvE3YFM-hbcSYTfUmBWaWRETtzCUD2IIDCO683L8 LIg==&c=6OMnu8tQW-MdwHHdayL1890e99UBLGnt g6HGu3RHAMdOKwT1L-ObIA==&ch=KH0hHDCIa6JO wgQWOuyLFppYls_Sc9MSypGQw3vXJ89qBph_rlybgQ== LeGLGwbao8.exe Get hash malicious Browse 85.25.237.225
Recommended publications
  • 7.4, Integration with Google Apps Is Deprecated
    Google Search Appliance Integrating with Google Apps Google Search Appliance software version 7.2 and later Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com GSA-APPS_200.03 March 2015 © Copyright 2015 Google, Inc. All rights reserved. Google and the Google logo are, registered trademarks or service marks of Google, Inc. All other trademarks are the property of their respective owners. Use of any Google solution is governed by the license agreement included in your original contract. Any intellectual property rights relating to the Google services are and shall remain the exclusive property of Google, Inc. and/or its subsidiaries (“Google”). You may not attempt to decipher, decompile, or develop source code for any Google product or service offering, or knowingly allow others to do so. Google documentation may not be sold, resold, licensed or sublicensed and may not be transferred without the prior written consent of Google. Your right to copy this manual is limited by copyright law. Making copies, adaptations, or compilation works, without prior written authorization of Google. is prohibited by law and constitutes a punishable violation of the law. No part of this manual may be reproduced in whole or in part without the express written consent of Google. Copyright © by Google, Inc. Google Search Appliance: Integrating with Google Apps 2 Contents Integrating with Google Apps ...................................................................................... 4 Deprecation Notice 4 Google Apps Integration 4
    [Show full text]
  • Com Google Gdata Client Spreadsheet Maven
    Com Google Gdata Client Spreadsheet Maven Merriest and kinkiest Casey invent almost accelerando, though Todd sucker his spondulicks hided. Stupefied and microbiological Ethan readies while insecticidal Stephen shanghais her lichee horribly and airts cherubically. Quietist and frostbitten Waiter never nest antichristianly when Stinky shook his seizin. 09-Jun-2020 116 24400 google-http-java-client-findbugs-1220-lp1521. It just gives me like a permutation code coverage information plotted together to complete output panel making mrn is com google gdata client spreadsheet maven? Chrony System EnvironmentDaemons 211-1el7centos An NTP client. Richard Huang contact-listgdata. Gdata-mavenmaven-metadataxmlmd5 at master eburtsev. SpreadsheetServiceVersionsclass comgooglegdataclientspreadsheet. Index of sitesdownloadeclipseorgeclipseMirroroomph. Acid transactions with maven coordinates genomic sequences are required js code coverage sequencing kits and client library for com google gdata client spreadsheet maven project setup and table of users as. Issues filed for googlegdata-java-client Record data Found. Uncategorized Majecek's Weblog. API using Spring any Spring Data JPA Maven and embedded H2 database. GData Spreadsheet1 usages comgooglegdataclientspreadsheet gdata-spreadsheet GData Spreadsheet Last feather on Feb 19 2010. Maven dependency for Google Spreadsheet Stack Overflow. Httpmavenotavanopistofi7070nexuscontentrepositoriessnapshots false. Gdata-spreadsheet-30jar Fri Feb 19 105942 GMT 2010 51623. I'm intern to use db2triples for the first time fan is a java maven project. It tries to approve your hours of columns throughout the free software testing late to work. Maven Com Google Gdata Client Spreadsheet Google Sites. Airhacksfm podcast with adam bien Apple. Unable to build ODK Aggregate locally Development ODK. Bmkdep bmon bnd-maven-plugin BNFC bodr bogofilter boinc-client bomber bomns bonnie boo books bookworm boomaga boost1710-gnu-mpich-hpc.
    [Show full text]
  • Download the Index
    Dewsbury.book Page 555 Wednesday, October 31, 2007 11:03 AM Index Symbols addHistoryListener method, Hyperlink wid- get, 46 $wnd object, JSNI, 216 addItem method, MenuBar widget, 68–69 & (ampersand), in GET and POST parameters, addLoadListener method, Image widget, 44 112–113 addMessage method, ChatWindowView class, { } (curly braces), JSON, 123 444–445 ? (question mark), GET requests, 112 addSearchResult method JUnit test case, 175 SearchResultsView class, 329 A addSearchView method, MultiSearchView class, 327 Abstract Factory pattern, 258–259 addStyleName method, connecting GWT widgets Abstract methods, 332 to CSS, 201 Abstract Window Toolkit (AWT), Java, 31 addToken method, handling back button, 199 AbstractImagePrototype object, 245 addTreeListener method, Tree widget, 67 Abstraction, DAOs and, 486 Adobe Flash and Flex, 6–7 AbstractMessengerService Aggregator pattern Comet, 474 defined, 34 Jetty Continuations, 477 Multi-Search application and, 319–321 action attribute, HTML form tag, 507 sample application, 35 Action-based web applications Aggregators, 320 overview of, 116 Ajax (Asynchronous JavaScript and XML) PHP scripts for building, 523 alternatives to, 6–8 ActionObjectDAO class, 527–530 application development and, 14–16 Actions, server integration with, 507–508 building web applications and, 479 ActionScript, 6 emergence of, 3–5 ActiveX, 7 Google Gears for storage, 306–309 Add Import command Same Origin policy and, 335 creating classes in Eclipse, 152 success and limitations of, 5–6 writing Java code using Eclipse Java editor,
    [Show full text]
  • Ray Cromwell
    Building Applications with Google APIs Ray Cromwell Monday, June 1, 2009 “There’s an API for that” • code.google.com shows 60+ APIs • full spectrum (client, server, mobile, cloud) • application oriented (android, opensocial) • Does Google have a Platform? Monday, June 1, 2009 Application Ecosystem Client REST/JSON, GWT, Server ProtocolBuffers Earth PHP Java O3D App Services Media Docs Python Ruby Utility Blogger Spreadsheets Maps/Geo JPA/JDO/Other Translate Base Datastore GViz Social MySQL Search OpenSocial Auth FriendConnect $$$ ... GData Contacts AdSense Checkout Monday, June 1, 2009 Timefire • Store and Index large # of time series data • Scalable Charting Engine • Social Collaboration • Story Telling + Video/Audio sync • Like “Google Maps” but for “Time” Monday, June 1, 2009 Android Version 98% Shared Code with Web version Monday, June 1, 2009 Android • Full API stack • Tight integration with WebKit browser • Local database, 2D and 3D APIs • External XML UI/Layout system • Makes separating presentation from logic easier, benefits code sharing Monday, June 1, 2009 How was this done? • Google Web Toolkit is the Foundation • Target GWT JRE as LCD • Use Guice Dependency Injection for platform-specific APIs • Leverage GWT 1.6 event system Monday, June 1, 2009 Example App Code Device/Service JRE interfaces Guice Android Browser Impl Impl Android GWT Specific Specific Monday, June 1, 2009 Shared Widget Events interface HasClickHandler interface HasClickHandler addClickHandler(injectedHandler) addClickHandler(injectedHandler) Gin binds GwtHandlerImpl
    [Show full text]
  • Building the Polargrid Portal Using Web 2.0 and Opensocial
    Building the PolarGrid Portal Using Web 2.0 and OpenSocial Zhenhua Guo, Raminderjeet Singh, Marlon Pierce Community Grids Laboratory, Pervasive Technology Institute Indiana University, Bloomington 2719 East 10th Street, Bloomington, Indiana 47408 {zhguo, ramifnu, marpierc}@indiana.edu ABSTRACT service gateway are still useful, it is time to revisit some of the Science requires collaboration. In this paper, we investigate the software and standards used to actually build gateways. Two feasibility of coupling current social networking techniques to important candidates are the Google Gadget component model science gateways to provide a scientific collaboration model. We and the REST service development style for building gateways. are particularly interested in the integration of local and third Gadgets are attractive for three reasons. First, they are much party services, since we believe the latter provide more long-term easier to write than portlets and are to some degree framework- sustainability than gateway-provided service instances alone. Our agnostic. Second, they can be integrated into both iGoogle prototype use case for this study is the PolarGrid portal, in which (Google’s Start Page portal) and user-developed containers. we combine typical science portal functionality with widely used Finally, gadgets are actually a subset of the OpenSocial collaboration tools. Our goal is to determine the feasibility of specification [5], which enables developers to provide social rapidly developing a collaborative science gateway that networking capabilities. Standardization is useful but more incorporates third-party collaborative services with more typical importantly one can plug directly into pre-existing social networks science gateway capabilities. We specifically investigate Google with millions of users without trying to establish a new network Gadget, OpenSocial, and related standards.
    [Show full text]
  • IST687 - Viz Map HW: Median Income John Fields 5/14/2019
    IST687 - Viz Map HW: Median Income John Fields 5/14/2019 Download the dataset from the LMS that has median income by zip code (an excel file). Step 1: Load the Data 1) Read the data – using the gdata package we have previously used. 2) Clean up the dataframe a. Remove any info at the front of the file that’s not needed b. Update the column names (zip, median, mean, population) library(gdata) ## gdata: read.xls support for 'XLS' (Excel 97-2004) files ENABLED. ## ## gdata: read.xls support for 'XLSX' (Excel 2007+) files ENABLED. ## ## Attaching package: 'gdata' ## The following object is masked from 'package:stats': ## ## nobs ## The following object is masked from 'package:utils': ## ## object.size ## The following object is masked from 'package:base': ## ## startsWith rawdata <- read.xls("/Users/johnfields/Library/Mobile Documents/com~apple~CloudDocs/Syracuse/IST687/Homework + Live Video Code/Week 7/MedianZIP_2_2.xls",skip=1) #Rename the columns namesOfColumns<-c("zip","median","mean","population") cleandata<-function(rawdata,namesOfColumns) {colnames(rawdata)<-namesOfColumns return(rawdata) } results<-cleandata(rawdata,namesOfColumns) head(results) ## zip median mean population ## 1 1001 56,663 66,688 16,445 ## 2 1002 49,853 75,063 28,069 ## 3 1003 28,462 35,121 8,491 ## 4 1005 75,423 82,442 4,798 ## 5 1007 79,076 85,802 12,962 ## 6 1008 63,980 78,391 1,244 3) Load the ‘zipcode’ package 1 4) Merge the zip code information from the two data frames (merge into one dataframe) 5) Remove Hawaii and Alaska (just focus on the ‘lower 48’ states)
    [Show full text]
  • Google Loader Developer's Guide
    Google Loader Developer's Gui... Thursday, November 11, 2010 18:30:23 PM Google Loader Developer's Guide In order to use the Google APIs, you must import them using the Google API loader in conjunction with the API key. The loader allows you to easily import one or more APIs, and specify additional settings (such as language, location, API version, etc.) applicable to your needs. In addition to the basic loader functionality, savvy developers can also use dynamic loading or auto-loading to enhance the performance of your application. Table of Contents Introduction to Loading Google APIs Detailed Documentation google.load Versioning Dynamic Loading Auto-Loading Available APIs Introduction to Loading Google APIs To begin using the Google APIs, first you need to sign up for an API key. The API key costs nothing, and allows us to contact you directly if we detect an issue with your site. To load the APIs, include the following script in the header of your web page. Enter your Google API key where it says INSERT-YOUR-KEY in the snippet below. Warning: You need your own API key in order to use the Google Loader. In the example below, replace "INSERT- YOUR-KEY" with your own key. Without your own key, these examples won't work. <script type="text/javascript" src="https://www.google.com/jsapi?key=INSERT-YOUR- KEY"></script> Next, load the Google API with google.load(module, version), where • module calls the specific API module you wish to use on your page. • version is the version number of the module you wish to load.
    [Show full text]
  • Youtube Apis the Refresher Data Apis Player Apis Creation
    Developers #io12 Mobile YouTube API Apps for Content Creators, Curators and Consumers Andrey Doronichev, Shannon - JJ Behrens, Jarek Wilkiewicz (YouTube) Arthur van Hoff, Jason Culverhouse (Flipboard) Kiran Bellubbi (955 Dreams), Krishna Menon (WeVideo) v00.13 Agenda • The Opportunity • Creation • Curation • Consumption • Panel Discussion and Q&A 3 The Opportunity YT Mobile is growing up 5 Mobile Usage: 3X Growth YoY 600M playbacks 3 hours uploaded per day every minute 6 Keep up with your favorite YouTube channels and access the world’s videos, anywhere 7 Strategy 2012 1. Consumption 2. Monetization 3. API 8 Consumption Guide 9 Consumption Guide Pre-loading 10 Consumption ;"2"5,$(5+""& F<LMD DLEFLHG :*'($7*)&" !"#$ *'+,('- %$&&'"() N',5*"&$:? !"#$%&'()%'*%"(+,-.*'(/0(1-2-3.(+#"('*%( 4'"1'#45*%"%6(78985 <.=>=.><= ?@AB;O'%'&4+))3 H$7")72"$J$FK0$,*'(9 5*/+2'"'(5))22'8" C5,)-"+$DE.$DEFF G.HD<$2'8"(.$IH>$0'(2'8"( !""#$%"&'()&$(*)+,$+'-(.$/&0)1'22"$*/3$-'2,)&4$5)6$ ,)&41"$7)+8$2)'&$#2/&8$7/&5",,/$*/3$*)589$:/'2$ 5*'58"&$%"&'()&$(6'&"9$;*)120"+$(*/&82"$#'2"9 Guide Pre-loading Remote 11 Monetization • Enabler for full catalog on mobile • Advertisers use video to tell a powerful story • Partners earn higher revenue for their content • Viewers choose to watch relevant ads 12 API: We Want To Share The Success Don’t Do • Build YouTube copycat apps • Embed video content in your app • Build content downloaders • Explore new ways of video discovery • Build audio only / background players • Build apps for creation and curation 13 YouTube APIs The Refresher
    [Show full text]
  • Prpl: a Decentralized Social Networking Infrastructure
    PrPl: A Decentralized Social Networking Infrastructure Seok-Won Seong Jiwon Seo Matthew Nasielski Debangsu Sengupta Sudheendra Hangal Seng Keat Teh Ruven Chu Ben Dodson Monica S. Lam Computer Science and Electrical Engineering Departments Stanford University Stanford, CA 94305 ABSTRACT To be commercially viable, an advertisement-supported This paper presents PrPl, a decentralized infrastructure that social networking portal must attract as many targeted ad lets users participate in online social networking without impressions as possible. This means that this type of ser- loss of data ownership. PrPl, short for private-public, has a vice typically aims to encourage a network effect, in order to person-centric architecture–each individual uses a Personal- gather as many people’s data as possible. It is in their best Cloud Butler service that provides a safe haven for one’s interest to encourage users to share all their data publicly, personal digital assets and supports sharing with fine-grain lock this data in to restrict mobility, assume ownership of access control. A user can choose to run the Butler on a it, and monetize it by selling such data to marketers. Social home server, or use a paid or ad-supported vendor of his networking portals often either claim full ownership of all choice. Each Butler provides a federation of data storage; user data through their seldom-read end user license agree- it keeps a semantic index to data that can reside, possibly ments (EULA), or stipulate that they reserve the right to encrypted, in other storage services. It uses the standard, change their current EULA.
    [Show full text]
  • Xmljson Documentation Release 0.2.0
    xmljson Documentation Release 0.2.0 S Anand Nov 21, 2018 Contents 1 About 3 2 Convert data to XML 5 3 Convert XML to data 7 4 Conventions 9 5 Options 11 6 Installation 13 7 Simple CLI utility 15 8 Roadmap 17 9 More information 19 9.1 Contributing............................................... 19 9.2 Credits.................................................. 21 9.3 History.................................................. 22 9.4 Indices and tables............................................ 23 i ii xmljson Documentation, Release 0.2.0 xmljson converts XML into Python dictionary structures (trees, like in JSON) and vice-versa. Contents 1 xmljson Documentation, Release 0.2.0 2 Contents CHAPTER 1 About XML can be converted to a data structure (such as JSON) and back. For example: <employees> <person> <name value="Alice"/> </person> <person> <name value="Bob"/> </person> </employees> can be converted into this data structure (which also a valid JSON object): { "employees": [{ "person":{ "name":{ "@value":"Alice" } } }, { "person":{ "name":{ "@value":"Bob" } } }] } This uses the BadgerFish convention that prefixes attributes with @. The conventions supported by this library are: • Abdera: Use "attributes" for attributes, "children" for nodes • BadgerFish: Use "$" for text content, @ to prefix attributes 3 xmljson Documentation, Release 0.2.0 • Cobra: Use "attributes" for sorted attributes (even when empty), "children" for nodes, values are strings • GData: Use "$t" for text content, attributes added as-is • Parker: Use tail nodes for text content, ignore attributes • Yahoo Use "content" for text content, attributes added as-is 4 Chapter 1. About CHAPTER 2 Convert data to XML To convert from a data structure to XML using the BadgerFish convention: >>> from xmljson import badgerfish as bf >>> bf.etree({'p':{'@id':'main','$':'Hello','b':'bold'}}) This returns an array of etree.Element structures.
    [Show full text]
  • Remote Operations on 16-IDB Laser Heating 2020-3
    2020-3 USER CYCLE REMOTE OPERATIONS OF 16-ID-B-LH Dean smith DEAN SMITH YUE MENG ROSS HRUBIAK HPCAT, X-Ray Science Division 2020-09-28 D-BADGE Credentials for remote connectivity and data access d123456 ▪ Verify d-badge credentials at APS Beamline User Portal ▪ Password should be the same as APS web password – Otherwise, reset password using link at User Portal ▪ Used for NoMachine access as well as Globus data management service 2 NOMACHINE NX server for remote access to beamline delos.aps.anl.gov ▪ Accessible via Google Chrome or Chromium-based browser ▪ Connect using d-badge credentials ▪ HPCAT will provide a local machine for testing NX before experiments 3 NOMACHINE Recommendations for smooth remote experiment ▪ We recommend at least one monitor at 1080p or above ▪ Multiple instances of NoMachine possible, e.g. separate tabs in Chrome for separate connections to beamline PCs ▪ NoMachine is reasonably taxing, we recommend a PC with plenty of processing power and RAM ▪ Reliable, high-speed internet is a must ▪ Mac users may be required to use NoMachine desktop client – coordinate with beamline staff ▪ Working in pairs is a good idea 4 NOMACHINE User-available machines and their intended uses SEC16PC19 SEC16PC10 ▪ Beamline controls ▪ Temperature measurement – Diptera – T-View – Pilatus ADL ▪ Data analysis – LH and temperature ADL – Dioptas – LH visualisation cameras – xdi ▪ Pressure control ▪ Pressure control – Membrane ADL – Membrane ADL ▪ 3× 1080p monitors ▪ 1× 1080p monitor 5 LH AND TEMPERATURE ADL 6 LH VISUALISATION CAMERAS ▪ Imaging
    [Show full text]
  • Analysis of Android Intent Effectiveness in Malware Detection
    AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection Ali Feizollaha,1, Nor Badrul Anuara, 1, Rosli Salleha, Guillermo Suarez-Tangilb,2, Steven Furnellc aDepartment of Computer System and Technology, Faculty of Computer Science and Information Technology, University of Malaya, 50603, Kuala Lumpur, Malaysia bComputer Security (COSEC) Lab, Department of Computer Science, Universidad Carlos III de Madrid, 28911 Leganes, Madrid, Spain cCentre for Security, Communications and Network Research, School of Computing, Electronics and Mathematics, Plymouth University, Drake Circus, Plymouth, PL4 8AA, UK Abstract The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android framework that facilitates the incorporation of third-party applications running on top of any Android device. Inter-process communication is one of the most notable features of the Android framework as it allows the reuse of components across process boundaries. This mechanism is used as gateway to access different sensitive services in the Android framework. In the Android platform, this communication system is usually driven by a late runtime binding messaging object known as Intent. In this paper, we evaluate the effectiveness of Android Intents (explicit and implicit) as a distinguishing feature for identifying malicious applications. We show that Intents are semantically rich features that are able to encode the intentions of malware when compared to other well-studied features such as permissions. We also argue that these type of feature is not the ultimate solution. It should be used in conjunction with other known features. We conducted experiments using a dataset containing 7,406 applications that comprise of 1,846 clean and 5,560 infected applications.
    [Show full text]