0% found this document useful (0 votes)
44 views18 pages

Download

The Android static analysis report for the app HMAL (version 4.1.r44) indicates a medium risk with an app security score of 52/100. The analysis revealed 1 high severity issue related to installation on vulnerable Android versions, alongside several warnings regarding data exposure and permissions. The app has been signed and includes various components, but it also has potential security concerns such as logging sensitive information and using an insecure random number generator.

Uploaded by

ameliathomasxe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
44 views18 pages

Download

The Android static analysis report for the app HMAL (version 4.1.r44) indicates a medium risk with an app security score of 52/100. The analysis revealed 1 high severity issue related to installation on vulnerable Android versions, alongside several warnings regarding data exposure and permissions. The app has been signed and includes various components, but it also has potential security concerns such as logging sensitive information and using an insecure random number generator.

Uploaded by

ameliathomasxe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

ANDROID STATIC ANALYSIS REPORT

 HMAL (4.1.r44)
File Name: HMAL-V4.1.r44-release.apk

Package Name: com.google.android.hmal

Scan Date: June 11, 2025, 10:03 a.m.

App Security Score: 52/100 (MEDIUM RISK)

Grade:
B
 FINDINGS SEVERITY

 HIGH  MEDIUM  INFO  SECURE  HOTSPOT

1 6 2 1 1

 FILE INFORMATION
File Name: HMAL-V4.1.r44-release.apk
Size: 2.5MB
MD5: 13c1a3fc1c103b76883891811610308e
SHA1: c98ec01a70b879ad2fa529fbe4caabcfe812a89d
SHA256: 5eae070fd6e1b1c41b22f7d7e90fedab9df7c9172f733f69e04a0ba96731d9a4

 APP INFORMATION
App Name: HMAL
Package Name: com.google.android.hmal
Main Activity: icu.nullptr.hidemyapplist.ui.activity.MainActivity
Target SDK: 35
Min SDK: 24
Max SDK:
Android Version Name: 4.1.r44
Android Version Code: 44
 APP COMPONENTS
Activities: 2
Services: 0
Receivers: 1
Providers: 2
Exported Activities: 1
Exported Services: 0
Exported Receivers: 1
Exported Providers: 1

 CERTIFICATE INFORMATION
Binary is signed
v1 signature: False
v2 signature: True
v3 signature: False
v4 signature: False
X.509 Subject: C=US, ST=Debug, L=Debug, O=Debug, OU=Debug, CN=Debug
Signature Algorithm: rsassa_pkcs1v15
Valid From: 2024-03-22 07:14:35+00:00
Valid To: 2051-08-08 07:14:35+00:00
Issuer: C=US, ST=Debug, L=Debug, O=Debug, OU=Debug, CN=Debug
Serial Number: 0x6dde76d4
Hash Algorithm: sha256
md5: 69c0dd146b416e1b87653f84aba30994
sha1: 19cb2672a27da40c2e369526ec6bfcda65794ea9
sha256: 0b0c6311d4dc7a4c28e8679bb876aeaa6ace79b421873750f79ce9beaa23c739
sha512: b5f94dac8fadb664c5dfbed1fff02772d658452f94ac1242dd8defedd2141f3e305bbbc33eca557577a8da1c0bad3f2d2cff16ca5dd5a49aeb386f43d4d3ece4
PublicKey Algorithm: rsa
Bit Size: 2048
Fingerprint: 5e3c129f790beb83653b516a15a181df9f4b04b7fd2e1e0f418475bbc3d27fe3
Found 1 unique certificates
 APPLICATION PERMISSIONS

PERMISSION STATUS INFO DESCRIPTION

enables querying any Allows query of any normal app on the


android.permission.QUERY_ALL_PACKAGES normal normal app on the device, regardless of manifest
device. declarations.

Unknown permission from android


com.google.android.hmal.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION unknown Unknown permission
reference

 APKID ANALYSIS

FILE DETAILS

FINDINGS DETAILS

classes.dex Build.FINGERPRINT check


Anti-VM Code
Build.MANUFACTURER check

Compiler r8 without marker (suspicious)

 NETWORK SECURITY
NO SCOPE SEVERITY DESCRIPTION

 CERTIFICATE ANALYSIS
HIGH: 0 | WARNING: 0 | INFO: 1

TITLE SEVERITY DESCRIPTION

Signed Application info Application is signed with a code signing certificate

 MANIFEST ANALYSIS
HIGH: 1 | WARNING: 4 | INFO: 0 | SUPPRESSED: 0

NO ISSUE SEVERITY DESCRIPTION

This application can be installed on an older version of android that has multiple
App can be installed on a vulnerable unpatched
unfixed vulnerabilities. These devices won't receive reasonable security updates from
1 Android version high
Google. Support an Android version => 10, API 29 to receive reasonable security
Android 7.0, [minSdk=24]
updates.

Application Data can be Backed up This flag allows anyone to backup your application data via adb. It allows users who
2 warning
[android:allowBackup=true] have enabled USB debugging to copy application data off of the device.

Activity-Alias
(com.google.android.hmal.MainActivityLauncher) An Activity-Alias is found to be shared with other apps on the device therefore
3 warning
is not Protected. leaving it accessible to any other application on the device.
[android:exported=true]
NO ISSUE SEVERITY DESCRIPTION

Content Provider
(icu.nullptr.hidemyapplist.service.ServiceProvider) A Content Provider is found to be shared with other apps on the device therefore
4 warning
is not Protected. leaving it accessible to any other application on the device.
[android:exported=true]

A Broadcast Receiver is found to be shared with other apps on the device therefore
Broadcast Receiver
leaving it accessible to any other application on the device. It is protected by a
(androidx.profileinstaller.ProfileInstallReceiver) is
permission which is not defined in the analysed application. As a result, the
Protected by a permission, but the protection
5 warning protection level of the permission should be checked where it is defined. If it is set to
level of the permission should be checked.
normal or dangerous, a malicious application can request and obtain the permission
Permission: android.permission.DUMP
and interact with the component. If it is set to signature, only applications signed with
[android:exported=true]
the same certificate can obtain the permission.

 CODE ANALYSIS
HIGH: 0 | WARNING: 2 | INFO: 2 | SECURE: 0 | SUPPRESSED: 0

NO ISSUE SEVERITY STANDARDS FILES

A/d.java
A/e.java
A/n.java
A0/c.java
A1/u.java
A2/b.java
C/b.java
C/j.java
C/q.java
D/f.java
D/g.java
D/h.java
D/i.java
D/j.java
D/k.java
D/k.java
D/l.java
NO ISSUE SEVERITY STANDARDS FILES
E0/a.java
G0/a.java
H/j.java
I/a.java
I/b.java
J1/C0013a.java
K0/j.java
L/C0017b.java
L/C0034o.java
L/G.java
L/T.java
L/X.java
L/o0.java
L/p0.java
L/u0.java
L0/a.java
R/r.java
R0/b.java
S/d.java
U/e.java
Y/d.java
by/kirich1409/viewbindingdelegate/c.java
c0/C0117c.java
c0/C0128n.java
c0/C0130p.java
c0/H.java
com/github/kyuubiran/ezxhelper/utils/FieldUtils
Kt.java
com/github/kyuubiran/ezxhelper/utils/HookUtils
Kt.java
com/github/kyuubiran/ezxhelper/utils/Logger.ja
va
com/github/kyuubiran/ezxhelper/utils/MethodU
tilsKt.java
CWE: CWE-532: Insertion of Sensitive com/github/kyuubiran/ezxhelper/utils/UtilsKt.jav
The App logs information. Sensitive
1 info Information into Log File a
information should never be logged.
OWASP MASVS: MSTG-STORAGE-3 com/github/kyuubiran/ezxhelper/utils/parasitics
/ActivityHelper.java
com/github/kyuubiran/ezxhelper/utils/parasitics
/MyHandler.java
/MyHandler.java
e/AbstractActivityC0163k.java
NO ISSUE SEVERITY STANDARDS FILES
e/AbstractC0168p.java
e/LayoutInflaterFactory2C0148A.java
e/w.java
e0/d.java
e0/f.java
e0/i.java
g0/D.java
g0/x.java
h0/e.java
i/C0249h.java
i/C0250i.java
j/ViewOnKeyListenerC0275g.java
j/m.java
j0/C0300w.java
j0/J.java
j0/T.java
j0/Y.java
j1/AbstractC0306c.java
k/AbstractC0340j0.java
k/C0348n0.java
k/C0362v.java
k/C0366x.java
k/C1.java
k/L0.java
k/N.java
k/R0.java
k/V.java
k/g1.java
k/j1.java
k/y1.java
l1/d.java
l2/a.java
l2/b.java
m1/AbstractC0388a.java
m2/d.java
o1/e.java
o1/h.java
q0/p.java
t1/j.java
u/C0477e.java
u/C0477e.java
NO ISSUE SEVERITY STANDARDS v1/d.java
FILES
w/AbstractC0488c.java
w/C0492g.java
w/C0494i.java
w/m.java
w0/p.java

A2/b.java
CWE: CWE-330: Use of Insufficiently
G1/a.java
Random Values
The App uses an insecure Random Z1/a.java
2 warning OWASP Top 10: M5: Insufficient
Number Generator. Z1/b.java
Cryptography
Z1/c.java
OWASP MASVS: MSTG-CRYPTO-6
a2/C0056a.java

CWE: CWE-200: Information Exposure


3 IP Address disclosure warning w0/p.java
OWASP MASVS: MSTG-CODE-2

This App copies data to clipboard.


Sensitive data should not be copied
4 info g0/o.java
to clipboard as other applications can OWASP MASVS: MSTG-STORAGE-10
access it.

 NIAP ANALYSIS v1.3

NO IDENTIFIER REQUIREMENT FEATURE DESCRIPTION

 BEHAVIOUR ANALYSIS
RULE ID BEHAVIOUR LABEL FILES

A1/C0004e.java
D/j.java
D/k.java
E0/a.java
00013 Read file and put it into a stream file
U1/i.java
h0/C0197a.java
h0/e.java
h0/j.java

Query the list of the installed


00035 reflection F1/c.java
packages

K0/g.java
K0/i.java
Implicit intent(view a web page, make
00063 control K0/q.java
a phone call, etc.)
c0/C0115a.java
c0/C0117c.java

K0/g.java
K0/i.java
Implicit intent(view a web page, make
00051 control K0/q.java
a phone call, etc.) via setData
c0/C0115a.java
c0/C0117c.java

00191 Get messages in the SMS inbox sms k/g1.java

Get resource file from res/raw c0/C0115a.java


00036 reflection
directory k/g1.java

Open a file from given absolute path icu/nullptr/hidemyapplist/MyApp.java


00022 file
of the file y1/C0520b.java

00147 Get the time of current location collection location e/w.java


RULE ID BEHAVIOUR LABEL FILES

00075 Get location of the device collection location e/w.java

00115 Get last known location of the device collection location e/w.java

 ABUSED PERMISSIONS

TYPE MATCHES PERMISSIONS

Malware Permissions 0/25

Other Common Permissions 0/44

Malware Permissions:
Top permissions that are widely abused by known malware.
Other Common Permissions:
Permissions that are commonly abused by known malware.

 OFAC SANCTIONED COUNTRIES


This app may communicate with the following OFAC sanctioned list of countries.

DOMAIN COUNTRY/REGION
DOMAIN COUNTRY/REGION

IP: 220.197.201.184
Country: China
www.coolapk.com
Region: Guizhou
City: Guiyang

 DOMAIN MALWARE CHECK

DOMAIN STATUS GEOLOCATION

IP: 220.197.201.184
Country: China
Region: Guizhou
www.coolapk.com ok City: Guiyang
Latitude: 26.583330
Longitude: 106.716667
View: Google Map

IP: 63.33.88.220
Country: Ireland
Region: Dublin
youtrack.jetbrains.com ok City: Dublin
Latitude: 53.343990
Longitude: -6.267190
View: Google Map

schemas.android.com ok No Geolocation information available.


DOMAIN STATUS GEOLOCATION

IP: 140.82.121.4
Country: United States of America
Region: California
github.com ok City: San Francisco
Latitude: 37.775700
Longitude: -122.395203
View: Google Map

 SCAN LOGS

Timestamp Event Error

2025-06-11 10:04:56 Generating Hashes OK

2025-06-11 10:04:56 Extracting APK OK

2025-06-11 10:04:56 Unzipping OK

2025-06-11 10:04:56 Parsing APK with androguard OK

2025-06-11 10:04:57 Extracting APK features using aapt/aapt2 OK


2025-06-11 10:04:57 Getting Hardcoded Certificates/Keystores OK

2025-06-11 10:05:01 Parsing AndroidManifest.xml OK

2025-06-11 10:05:01 Extracting Manifest Data OK

2025-06-11 10:05:01 Manifest Analysis Started OK

2025-06-11 10:05:01 Performing Static Analysis on: HMAL (com.google.android.hmal) OK

2025-06-11 10:05:01 Fetching Details from Play Store: com.google.android.hmal OK

2025-06-11 10:05:01 Checking for Malware Permissions OK

2025-06-11 10:05:01 Fetching icon path OK

2025-06-11 10:05:01 Library Binary Analysis Started OK

2025-06-11 10:05:01 Reading Code Signing Certificate OK

2025-06-11 10:05:02 Running APKiD 2.1.5 OK


2025-06-11 10:05:03 Detecting Trackers OK

2025-06-11 10:05:04 Decompiling APK to Java with JADX OK

2025-06-11 10:05:19 Converting DEX to Smali OK

2025-06-11 10:05:19 Code Analysis Started on - java_source OK

2025-06-11 10:05:20 Android SBOM Analysis Completed OK

2025-06-11 10:05:24 Android SAST Completed OK

2025-06-11 10:05:24 Android API Analysis Started OK

2025-06-11 10:05:26 Android API Analysis Completed OK

2025-06-11 10:05:26 Android Permission Mapping Started OK

2025-06-11 10:05:28 Android Permission Mapping Completed OK


2025-06-11 10:05:28 Android Behaviour Analysis Started OK

OK
2025-06-11 10:05:31 Android Behaviour Analysis Completed

2025-06-11 10:05:31 Extracting Emails and URLs from Source Code OK

2025-06-11 10:05:32 Email and URL Extraction Completed OK

2025-06-11 10:05:32 Extracting String data from APK OK

2025-06-11 10:05:32 Extracting String data from Code OK

2025-06-11 10:05:32 Extracting String values and entropies from Code OK

2025-06-11 10:05:32 Performing Malware check on extracted domains OK

2025-06-11 10:05:34 Saving to Database OK

Report Generated by - MobSF v4.3.3


Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment
framework capable of performing static and dynamic analysis.
© 2025 Mobile Security Framework - MobSF | Ajin Abraham | OpenSecurity.

You might also like