ANDROID STATIC ANALYSIS REPORT
GPS Setter (1.2.8)
File Name: GPS-setter.apk
Package Name: com.android1500.gpssetter
Scan Date: June 11, 2025, 10:31 a.m.
App Security Score: 64/100 (LOW RISK)
Grade:
A
FINDINGS SEVERITY
HIGH MEDIUM INFO SECURE HOTSPOT
0 4 2 1 1
FILE INFORMATION
File Name: GPS-setter.apk
Size: 6.02MB
MD5: b0adc4bf8abe47f36dae95427c3a63ff
SHA1: cad738d7607bdfd2a55f348cca0540cca822d518
SHA256: 9696b9011f5135ed1591140e57566e4f4ca1e4344a1d9918d2b2210a7726b879
APP INFORMATION
App Name: GPS Setter
Package Name: com.android1500.gpssetter
Main Activity: com.android1500.gpssetter.ui.MainActivity
Target SDK: 33
Min SDK: 27
Max SDK:
Android Version Name: 1.2.8
Android Version Code: 128
APP COMPONENTS
Activities: 2
Services: 1
Receivers: 0
Providers: 2
Exported Activities: 0
Exported Services: 0
Exported Receivers: 0
Exported Providers: 0
CERTIFICATE INFORMATION
Binary is signed
v1 signature: False
v2 signature: True
v3 signature: False
v4 signature: False
X.509 Subject: CN=Android1500
Signature Algorithm: rsassa_pkcs1v15
Valid From: 2022-08-12 17:55:20+00:00
Valid To: 2047-08-06 17:55:20+00:00
Issuer: CN=Android1500
Serial Number: 0x14d219b9
Hash Algorithm: sha256
md5: be34efa3d0beb81dcf53580f8a35ba50
sha1: b681e33720d77b35a02c52a53d2a576ecfbb18f6
sha256: b689e5492bef4928606f78a803b1ac9e5dd86278aa4389fa3135d664c71ee7b7
sha512: 2197398d434939d254f3c59e8204e9e51dc93f1a65a59ba101ba89930cde09833e461c67fcea60d264bb16e43f5f7947258d96bf4db83179296c286d6027f903
PublicKey Algorithm: rsa
Bit Size: 2048
Fingerprint: 1e60c05258a7ea2c142a873cd33f0a98f0e6d3c5d1138495aa3fbfca7fc23de9
Found 1 unique certificates
APPLICATION PERMISSIONS
PERMISSION STATUS INFO DESCRIPTION
Access coarse location sources, such as the mobile
coarse
network database, to determine an approximate
(network-
android.permission.ACCESS_COARSE_LOCATION dangerous phone location, where available. Malicious
based)
applications can use this to determine
location
approximately where you are.
Access fine location sources, such as the Global
Positioning System on the phone, where available.
fine (GPS)
android.permission.ACCESS_FINE_LOCATION dangerous Malicious applications can use this to determine
location
where you are and may consume additional
battery power.
view
Allows an application to view the status of all
android.permission.ACCESS_NETWORK_STATE normal network
networks.
status
full
android.permission.INTERNET normal Internet Allows an application to create network sockets.
access
read
external Allows an application to read from external
android.permission.READ_EXTERNAL_STORAGE dangerous
storage storage.
contents
Allows an
application
Malicious applications can use this to try and trick
android.permission.REQUEST_INSTALL_PACKAGES dangerous to request
users into installing additional malicious packages.
installing
packages.
PERMISSION STATUS INFO DESCRIPTION
Unknown
com.android1500.gpssetter.DYNAMIC_RECEIVER_NOT_EXPORTED_PERMISSION unknown Unknown permission from android reference
permission
APKID ANALYSIS
FILE DETAILS
FINDINGS DETAILS
Build.FINGERPRINT check
classes.dex Anti-VM Code Build.MANUFACTURER check
Build.BRAND check
Compiler r8 without marker (suspicious)
FINDINGS DETAILS
classes2.dex
Compiler r8 without marker (suspicious)
NETWORK SECURITY
NO SCOPE SEVERITY DESCRIPTION
CERTIFICATE ANALYSIS
HIGH: 0 | WARNING: 0 | INFO: 1
TITLE SEVERITY DESCRIPTION
Signed Application info Application is signed with a code signing certificate
MANIFEST ANALYSIS
HIGH: 0 | WARNING: 2 | INFO: 0 | SUPPRESSED: 0
NO ISSUE SEVERITY DESCRIPTION
App can be installed on a
This application can be installed on an older version of android that has multiple vulnerabilities.
1 vulnerable Android version warning
Support an Android version => 10, API 29 to receive reasonable security updates.
Android 8.1, minSdk=27]
Application Data can be Backed
This flag allows anyone to backup your application data via adb. It allows users who have enabled USB
2 up warning
debugging to copy application data off of the device.
[android:allowBackup=true]
CODE ANALYSIS
HIGH: 0 | WARNING: 1 | INFO: 2 | SECURE: 0 | SUPPRESSED: 0
NO ISSUE SEVERITY STANDARDS FILES
by/kirich1409/viewbindingdelegate/LifecycleView
BindingProperty.java
CWE: CWE-532: Insertion of Sensitive org/lsposed/hiddenapibypass/HiddenApiBypass.j
The App logs information. Sensitive
1 info Information into Log File ava
information should never be logged.
OWASP MASVS: MSTG-STORAGE-3 rikka/material/app/DayNightDelegate.java
rikka/material/internal/TwilightManager.java
timber/log/Timber.java
CWE: CWE-276: Incorrect Default
App can read/write to External
Permissions rikka/core/content/FileProvider.java
2 Storage. Any App can read data warning
OWASP Top 10: M2: Insecure Data Storage rikka/core/util/ContextUtils.java
written to External Storage.
OWASP MASVS: MSTG-STORAGE-2
This App copies data to clipboard.
Sensitive data should not be copied
3 info rikka/core/util/ClipboardUtils.java
to clipboard as other applications can OWASP MASVS: MSTG-STORAGE-10
access it.
NIAP ANALYSIS v1.3
NO IDENTIFIER REQUIREMENT FEATURE DESCRIPTION
BEHAVIOUR ANALYSIS
RULE ID BEHAVIOUR LABEL FILES
RULE ID BEHAVIOUR LABEL FILES
okio/Okio.java
00013 Read file and put it into a stream file
rikka/core/os/FileUtils.java
00147 Get the time of current location collection location rikka/material/internal/TwilightManager.java
00075 Get location of the device collection location rikka/material/internal/TwilightManager.java
00115 Get last known location of the device collection location rikka/material/internal/TwilightManager.java
ABUSED PERMISSIONS
TYPE MATCHES PERMISSIONS
android.permission.ACCESS_COARSE_LOCATION, android.permission.ACCESS_FINE_LOCATION,
Malware
6/25 android.permission.ACCESS_NETWORK_STATE, android.permission.INTERNET, android.permission.READ_EXTERNAL_STORAGE,
Permissions
android.permission.REQUEST_INSTALL_PACKAGES
Other
Common 0/44
Permissions
Malware Permissions:
Top permissions that are widely abused by known malware.
Other Common Permissions:
Permissions that are commonly abused by known malware.
OFAC SANCTIONED COUNTRIES
This app may communicate with the following OFAC sanctioned list of countries.
DOMAIN COUNTRY/REGION
DOMAIN MALWARE CHECK
DOMAIN STATUS GEOLOCATION
IP: 140.82.121.6
Country: United States of America
Region: California
api.github.com ok City: San Francisco
Latitude: 37.775700
Longitude: -122.395203
View: Google Map
IP: 140.82.121.3
Country: United States of America
Region: California
github.com ok City: San Francisco
Latitude: 37.775700
Longitude: -122.395203
View: Google Map
HARDCODED SECRETS
POSSIBLE SECRETS
258EAFA5-E914-47DA-95CA-C5AB0DC85B11
POSSIBLE SECRETS
583cba23971d0c9f5db7bc40a0f28bd8
74b6372e4abd6cef328a57fc544cb981
SCAN LOGS
Timestamp Event Error
2025-06-11 10:32:42 Generating Hashes OK
2025-06-11 10:32:42 Extracting APK OK
2025-06-11 10:32:42 Unzipping OK
2025-06-11 10:32:42 Parsing APK with androguard OK
2025-06-11 10:32:43 Extracting APK features using aapt/aapt2 OK
2025-06-11 10:32:43 Getting Hardcoded Certificates/Keystores OK
2025-06-11 10:32:46 Parsing AndroidManifest.xml OK
2025-06-11 10:32:47 Extracting Manifest Data OK
2025-06-11 10:32:47 Manifest Analysis Started OK
2025-06-11 10:32:47 Performing Static Analysis on: GPS Setter (com.android1500.gpssetter) OK
2025-06-11 10:32:47 Fetching Details from Play Store: com.android1500.gpssetter OK
2025-06-11 10:32:47 Checking for Malware Permissions OK
2025-06-11 10:32:47 Fetching icon path OK
2025-06-11 10:32:47 Library Binary Analysis Started OK
2025-06-11 10:32:48 Reading Code Signing Certificate OK
2025-06-11 10:32:48 Running APKiD 2.1.5 OK
2025-06-11 10:32:51 Detecting Trackers OK
OK
2025-06-11 10:32:54 Decompiling APK to Java with JADX
2025-06-11 10:33:29 Converting DEX to Smali OK
2025-06-11 10:33:29 Code Analysis Started on - java_source OK
2025-06-11 10:33:31 Android SBOM Analysis Completed OK
2025-06-11 10:33:34 Android SAST Completed OK
2025-06-11 10:33:34 Android API Analysis Started OK
2025-06-11 10:33:37 Android API Analysis Completed OK
2025-06-11 10:33:38 Android Permission Mapping Started OK
2025-06-11 10:33:40 Android Permission Mapping Completed OK
2025-06-11 10:33:40 Android Behaviour Analysis Started OK
2025-06-11 10:34:12 Android Behaviour Analysis Completed OK
2025-06-11 10:34:12 Extracting Emails and URLs from Source Code OK
2025-06-11 10:34:13 Email and URL Extraction Completed OK
2025-06-11 10:34:13 Extracting String data from APK OK
2025-06-11 10:34:13 Extracting String data from Code OK
2025-06-11 10:34:13 Extracting String values and entropies from Code OK
2025-06-11 10:34:18 Performing Malware check on extracted domains OK
2025-06-11 10:34:18 Saving to Database OK
Report Generated by - MobSF v4.3.3
Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment
framework capable of performing static and dynamic analysis.
© 2025 Mobile Security Framework - MobSF | Ajin Abraham | OpenSecurity.