x

Hacking the fake phone

Advertised as Android 9 / A9s

build.prop

ro.build.version.release = 5.1
ro.build.id=LMY47I
ro.build.flavor=full_yuanda6580_we_l-user

ro.product.model=A9s
ro.product.brand=A9s
ro.product.name=A9s
ro.product.device=A9s
ro.product.board=MTK

ro.product.manufacturer=A9s
ro.board.platform=mt6580
# ro.build.product is obsolete; use ro.product.device
ro.build.product=yuanda6580_we_l
# do not try to parse description, fingerprint or thumbprint
ro.build.description=full_yuanda6580_we_l-user 5.1 LMY47I 1561359554 release-keys
ro.build.fingerprint=alps/full_yuanda6580_we_l/yuanda6580_we_l:5.1/LMY47I/1561359554:user/release-keys

persisit.sys.timezone=Asia/Shanghai
persist.sys.ram=1
persist.sys.devicememory=1
persist.sys.FrontCamera=3
persist.sys.BackCamera=5

system.prop

# system.prop for generic sdk

ro.mediatek.version.release=ALPS.L1.MP6.V2_YUANDA6580.WE.L

mediatek.wlan.chip=CONSYS_MT6735
ro.com.google.gmsversion=5.1

What we can infer

@@Real Data

  • Android Version: 5.1 Lollipop
  • Android Build: LMY47I
  • Manufacturer (Real): alps
  • Device Name (Real): yuanda6580_we_l
  • SoC: MediaTek MT6580
  • Device Build: ALPS.L1.MP6.V2_YUANDA6580.WE.L
  • Battery: 1000 mAh, 3.47V

@@Fake Data

  • Manufacturer (Advertised): A9s
  • Device (Advertised): A9s
  • Name (Advertised): A9s

@@Specs

  • RAM: 1 GP LPDDR2
  • Internal Storage: 1.61 GB (1.01 GB available to user)
  • WLAN Chip: CONSYS_MT6735 (only 2.4 GHz)
  • Touchscreen: ft6636_gesture / GT9XX
  • Resolution: 1014x480
  • Sound: amp_6323pmic_spk
  • Lens AF: dw9714af
  • Modem: yuanda6580_weg_l_hspa_850_2100_simhotswap
  • Camera 0: Sony IMX190 (imx190mipiraw)
  • Camera 1: GalaxyCore GC2235 (gc2235mipisubraw) 2.0 MP
  • Camera List (Visible 3+1, Listed 6):
    • GC2235
    • GC2385
    • OV9760
    • OV9762
    • IMX190
    • OV5648

@@Miscellaneous Specs

  • Codecs: Several codecs from MTK and Google by the OpenMAX (OMX) framework (e.g. OMX.MTK.AUDIO.DECODER.XX)

@@Partitions

Known Partitions and their Mount Locations

Name Block Name Mount Location
proinfo mcblk0p1
nvram mcblk0p2
shcy mcblk0p3
protect1 mcblk0p4 /protect_f
protect2 mcblk0p5 /protect_s
seccfg mcblk0p6
lk mcblk0p7
boot mcblk0p8
recovery mcblk0p9
para mcblk0p10
logo mcblk0p11
expdb mcblk0p12
frp mcblk0p13
nvdata mcblk0p14 /nvdata
metadata mcblk0p15
oemkeystore mcblk0p16
secro mcblk0p17
keystore mcblk0p18
system mcblk0p19 /system
cache mcblk0p20 /cache
userdata mcblk0p21 /data
flashinfo mcblk0p22
### Other File System Mounts
  • rootfs (/)
  • tmpfs (/dev)
  • devpts (/dev/pts)
  • adb (/dev/usb-ffs/adb)
  • proc (/proc)
  • sysfs (/sys)
  • selinuxfs (/sys/fs/selinux)
  • pstore (/sys/fs/pstore)
  • debugfs (/sys/kernel/debug)
  • tmpfs (/mnt/asec)
  • tmpfs (/mnt/obb)
  • loop0 (/mnt/cdrom)
  • fuse (/storage/sdcard0)

Plan to Fix POCO

  • Goal: Get Files

  • Plan

    • Use MTK Exploit to either access ADB or Unlock Bootloader
    • Flash PBRP
    • Backup /data

    Plan to Fix this

  • Goal

Left-click: follow link, Right-click: select node, Scroll: zoom
x