Report 1
Report 1
• Version: 1.8.4
Summary Evaluation
Positive Observations
• The app does not request dangerous or invasive permissions commonly used to
access sensitive data such as contacts, SMS, location, or microphone.
• No network endpoints, trackers, or communication patterns associated with
known malware or suspicious behavior were detected.
Potential Concerns
1. Backup Enabled
o The app allows user data to be backed up via USB debugging. This
could enable data extraction if the device is physically accessed.
o The app supports Android 9 (API 28), which is outdated and contains
known security issues.
o At only 0.02 MB, the application is unusually small. This may indicate
the use of a minimal loader, encrypted payload, or remote resource
fetching.
o The APK was packaged in a way that did not match known compiler
signatures, potentially suggesting obfuscation or custom modification.
• The app is not inherently malicious, but its structure raises mild suspicion due
to its minimal size and potential obfuscation.
• The app appears safe under controlled conditions, but should be treated with
caution, especially if it was not obtained from a trusted source.
Application Details
• Version: 1.5.14
Summary Evaluation
• Evidence of Data Theft: None definitively proven, but potential exists due to
permissions, components, and exposed capabilities
Key Findings
Positive Observations
3. Exported Components
o Clipboard listening and copying may expose user data to other apps on
the device.
o Presence of RootTools and root check libraries suggests the app can
detect or request elevated privileges.
• Obfuscation
• Exposed components
Attribute Value
Package ID com.google.android.hmal
Version 4.1.r44
Target SDK 35
2. Risk Summary
• Grade: B
• Minimum SDK set to Android 7.0 (API 24), a version with known security
flaws.
2. Backup Enabled
• The allowBackup=true flag allows data extraction via ADB on rooted or debug-
enabled devices.
3. Exported Components
4. Sensitive Logging
5. Weak Cryptography
6. Clipboard Monitoring
• App writes sensitive data to the clipboard, potentially exposing it to other apps
on the device.
7. Anti-Reverse Engineering Features
8. Privacy-Related Behaviors
• App queries installed packages, reads SMS inbox, and accesses location—
behaviors that may be intrusive depending on context.
5. Conclusion
The HMAL app is not explicitly malicious but demonstrates multiple red flags related
to:
• Data handling,
• Component exposure,
• Cryptographic weakness,
1. Application Overview
Attribute Value
Package ID com.android1500.gpssetter
Version 1.2.8
Target SDK 33
2. Security Summary
• Grade: A
3. Positive Security Attributes
• allowBackup=true may allow extraction of app data via USB debug access.
• Read/write access to external storage may expose user data to other apps.
4. Clipboard Interaction
5. Logging Practices
8. OFAC Compliance
5. Conclusion
The GPS Setter application does not demonstrate malicious intent or known data
theft behaviors, but incorporates a range of privacy-relevant features and technical
flags:
1. Application Overview
Attribute Value
Package ID com.rifsxd.ksunext
Version v1.0.3-9-g5563145
Target SDK 35
2. Security Summary
• Grade: B
3. Positive Security Attributes
5. Clipboard Usage
• The app interacts with the clipboard, which can result in unintentional data
sharing with other apps.
8. Hardcoded Secrets
• Detected static identifiers and strings (e.g., SuperUser), which could pose a
security concern if reused for access control or verification.
o No stack canaries
o libmagiskboot.so
o libksud_overlayfs.so
o libksud_magic.so
5. Conclusion
KernelSU Next functions as a system-level tool likely intended for use on rooted or
development devices. While not exhibiting signs of malicious activity, it introduces
moderate security risks due to:
• Exported components
1. Application Overview
Attribute Value
Package ID bin.mt.plus
Version 2.16.7
Target SDK 30
2. Security Summary
o REQUEST_INSTALL_PACKAGES
o SYSTEM_ALERT_WINDOW
o MANAGE_EXTERNAL_STORAGE
2. Exported Components
4. Cryptographic Weaknesses
• Logs sensitive data, which may be visible to other apps or during debugging.
• One component disables SSL certificate validation, opening the door for
MITM attacks.
5. Conclusion
MT Manager (v2.16.7) is a technically advanced application with powerful system-
level capabilities. It is not overtly malicious, but presents multiple security risks due
to:
1. Application Overview
Attribute Value
Package ID com.oasisfeng.island
Version 6.2.1
Target SDK 31
2. Security Summary
1. Exported Components
2. Dangerous Permissions
3. Clipboard Access
4. Sensitive Logging
7. Hardcoded Secrets
• Firebase keys, API tokens, and feature flags found in source code.
8. Backward Compatibility
• Firebase Remote Config enabled; allows runtime logic changes without app
update.
1. Application Overview
Attribute Value
Package ID com.coderstory.toolkit
Version 4.6
Target SDK 35
2. Security Summary
• At 0.05 MB, the APK may function as a shell, stub, or code loader. Limited
static visibility raises questions about runtime behavior.
• Compiler and build patterns are inconsistent with mainstream tools, suggesting
obfuscation or a custom build system.
5. Conclusion
1. Application Overview
Attribute Value
Package ID io.github.vvb2060.keyattestation
Version 1.8.4
Target SDK 35
2. Security Summary
• Minimum SDK is Android 7.0 (API 24), which lacks modern security features.
3. Clipboard Access
5. Verbose Logging
5. Conclusion
Key Attestation is a focused, low-footprint utility. While not malicious, it introduces
minor risks around clipboard use, logging, and RNG security.
1. Application Overview
Attribute Value
Package ID icu.nullptr.nativetest
Target SDK 35
2. Security Summary
• Android 8.1 (API 27) support allows operation on less secure devices.
4. Exported Components
6. Insecure RNG
8. Ad Tracking Integration
• Requests ad ID and includes permissions for user profiling.