0% found this document useful (0 votes)
126 views12 pages

Safe Note

The static analysis report for the SafeNote app (version 1.0) indicates a critical security risk with an app security score of 29/100, resulting in a grade of F. The analysis identified 6 high severity findings, including the use of a debug certificate and vulnerabilities related to weak cryptographic algorithms. Additionally, the app can be installed on outdated Android versions, which may expose users to unpatched vulnerabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
126 views12 pages

Safe Note

The static analysis report for the SafeNote app (version 1.0) indicates a critical security risk with an app security score of 29/100, resulting in a grade of F. The analysis identified 6 high severity findings, including the use of a debug certificate and vulnerabilities related to weak cryptographic algorithms. Additionally, the app can be installed on outdated Android versions, which may expose users to unpatched vulnerabilities.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

ANDROID STATIC ANALYSIS REPORT

 SafeNote (1.0)
File Name: SafeNote.apk

Package Name: com.els.safenote

Scan Date: April 10, 2025, 6 p.m.

App Security Score: 29/100 (CRITICAL RISK)

Grade:
F
 FINDINGS SEVERITY

 HIGH  MEDIUM  INFO  SECURE  HOTSPOT

6 4 0 1 0

 FILE INFORMATION
File Name: SafeNote.apk
Size: 1.43MB
MD5: 3ea6097be40583e9f11a940afbe02fcc
SHA1: 950c546d2555f36579d0731d519735bc10fe220c
SHA256: a1728c0740bb6e0d3fe8241c6418201a9e9927a90c9245de6bc73ac75a3a6fcd

 APP INFORMATION
App Name: SafeNote
Package Name: com.els.safenote
Main Activity: com.els.safenote.Login
Target SDK: 24
Min SDK: 16
Max SDK:
Android Version Name: 1.0
Android Version Code: 1
 APP COMPONENTS
Activities: 4
Services: 0
Receivers: 0
Providers: 1
Exported Activities: 0
Exported Services: 0
Exported Receivers: 0
Exported Providers: 1

 CERTIFICATE INFORMATION
Binary is signed
v1 signature: True
v2 signature: True
v3 signature: False
v4 signature: False
X.509 Subject: CN=Android Debug, O=Android, C=US
Signature Algorithm: rsassa_pkcs1v15
Valid From: 2016-07-21 14:10:47+00:00
Valid To: 2046-07-14 14:10:47+00:00
Issuer: CN=Android Debug, O=Android, C=US
Serial Number: 0x1
Hash Algorithm: sha1
md5: fec799d4493392ebd1b1fd0067c9315b
sha1: 335b51e54f55024e79f7460a83dbf47df7d8c928
sha256: 5ac51a4d016bfdc134271df199c6a9a862af4aa2760086c0f1d8850d2e298c82
sha512: ce5d70ea21144d16feab7bed52e9419288c6b33b9f400bb50fcc6b891204a51b8a1b1beb660ee7b74223e6d6cb1dafacf2682811e8f85010b2a12a2e18b5f8c5
PublicKey Algorithm: rsa
Bit Size: 1024
Fingerprint: 99e844884ac9897c000f3efd13888c360007f49cb6cf6e52b0a7620fbaa577fb
Found 1 unique certificates
 APKID ANALYSIS

FILE DETAILS

FINDINGS DETAILS

classes.dex Compiler dx (possible dexmerge)

Manipulator Found dexmerge

 NETWORK SECURITY

NO SCOPE SEVERITY DESCRIPTION

 CERTIFICATE ANALYSIS
HIGH: 2 | WARNING: 1 | INFO: 1

TITLE SEVERITY DESCRIPTION

Signed Application info Application is signed with a code signing certificate

Application is signed with v1 signature scheme, making it vulnerable to Janus vulnerability on Android 5.0-8.0, if signed
Application vulnerable
warning only with v1 signature scheme. Applications running on Android 5.0-7.0 signed with v1, and v2/v3 scheme is also
to Janus Vulnerability
vulnerable.
TITLE SEVERITY DESCRIPTION

Application signed with


high Application signed with a debug certificate. Production application must not be shipped with a debug certificate.
debug certificate

Certificate algorithm
vulnerable to hash high Application is signed with SHA1withRSA. SHA1 hash algorithm is known to have collision issues.
collision

 MANIFEST ANALYSIS
HIGH: 2 | WARNING: 2 | INFO: 0 | SUPPRESSED: 0

NO ISSUE SEVERITY DESCRIPTION

This application can be installed on an older version of android that has


App can be installed on a vulnerable upatched Android
multiple unfixed vulnerabilities. These devices won't receive reasonable
1 version high
security updates from Google. Support an Android version => 10, API 29 to
Android 4.1-4.1.2, [minSdk=16]
receive reasonable security updates.

Debugging was enabled on the app which makes it easier for reverse
Debug Enabled For App
2 high engineers to hook a debugger to it. This allows dumping a stack trace and
[android:debuggable=true]
accessing debugging helper classes.

Application Data can be Backed up This flag allows anyone to backup your application data via adb. It allows users
3 warning
[android:allowBackup=true] who have enabled USB debugging to copy application data off of the device.

Content Provider
(com.els.safenote.contentprovider.notecontentprovider) A Content Provider is found to be shared with other apps on the device
4 warning
is not Protected. therefore leaving it accessible to any other application on the device.
[android:exported=true]
 CODE ANALYSIS
HIGH: 2 | WARNING: 1 | INFO: 0 | SECURE: 0 | SUPPRESSED: 0

NO ISSUE SEVERITY STANDARDS FILES

Calling Cipher.getInstance("AES") will


CWE: CWE-327: Use of a Broken or Risky Cryptographic
return AES ECB mode by default. ECB
Algorithm
1 mode is known to be weak as it high com/els/safenote/Utilities.java
OWASP Top 10: M5: Insufficient Cryptography
results in the same ciphertext for
OWASP MASVS: MSTG-CRYPTO-2
identical blocks of plaintext.

CWE: CWE-327: Use of a Broken or Risky Cryptographic


MD5 is a weak hash known to have Algorithm
2 warning com/els/safenote/Utilities.java
hash collisions. OWASP Top 10: M5: Insufficient Cryptography
OWASP MASVS: MSTG-CRYPTO-4

Debug configuration enabled. CWE: CWE-919: Weaknesses in Mobile Applications


com/els/safenote/BuildConfig.ja
3 Production builds must not be high OWASP Top 10: M1: Improper Platform Usage
va
debuggable. OWASP MASVS: MSTG-RESILIENCE-2

 NIAP ANALYSIS v1.3

NO IDENTIFIER REQUIREMENT FEATURE DESCRIPTION

 BEHAVIOUR ANALYSIS
RULE ID BEHAVIOUR LABEL FILES

Implicit intent(view a web page, make


00063 control com/els/safenote/NoteList.java
a phone call, etc.)

Implicit intent(view a web page, make


00051 control com/els/safenote/NoteList.java
a phone call, etc.) via setData

 ABUSED PERMISSIONS

TYPE MATCHES PERMISSIONS

Malware Permissions 0/25

Other Common Permissions 0/44

Malware Permissions:
Top permissions that are widely abused by known malware.
Other Common Permissions:
Permissions that are commonly abused by known malware.

 HARDCODED SECRETS

POSSIBLE SECRETS

8323f649e9b04dd5b428d246db5430f2
 SCAN LOGS

Timestamp Event Error

2025-04-10 18:39:21 Generating Hashes OK

2025-04-10 18:39:21 Extracting APK OK

2025-04-10 18:39:21 Unzipping OK

2025-04-10 18:39:21 Parsing APK with androguard OK

2025-04-10 18:39:21 Extracting APK features using aapt/aapt2 OK

2025-04-10 18:39:21 Getting Hardcoded Certificates/Keystores OK

2025-04-10 18:39:24 Parsing AndroidManifest.xml OK

2025-04-10 18:39:24 Extracting Manifest Data OK

2025-04-10 18:39:24 Manifest Analysis Started OK


2025-04-10 18:39:24 Performing Static Analysis on: SafeNote (com.els.safenote) OK

2025-04-10 18:39:24 Fetching Details from Play Store: com.els.safenote OK

2025-04-10 18:39:24 Checking for Malware Permissions OK

2025-04-10 18:39:24 Fetching icon path OK

2025-04-10 18:39:24 Library Binary Analysis Started OK

2025-04-10 18:39:24 Reading Code Signing Certificate OK

2025-04-10 18:39:25 Running APKiD 2.1.5 OK

2025-04-10 18:39:26 Updating Trackers Database.... OK

2025-04-10 18:39:26 Detecting Trackers OK

2025-04-10 18:39:27 Decompiling APK to Java with JADX OK

2025-04-10 18:39:37 Converting DEX to Smali OK


2025-04-10 18:39:37 Code Analysis Started on - java_source OK

2025-04-10 18:39:37 Android SBOM Analysis Completed OK

2025-04-10 18:40:08 Android SAST Completed OK

2025-04-10 18:40:08 Android API Analysis Started OK

2025-04-10 18:40:10 Android API Analysis Completed OK

2025-04-10 18:40:10 Android Behaviour Analysis Started OK

2025-04-10 18:40:12 Android Behaviour Analysis Completed OK

2025-04-10 18:40:12 Extracting Emails and URLs from Source Code OK

2025-04-10 18:40:12 Email and URL Extraction Completed OK

2025-04-10 18:40:12 Extracting String data from APK OK

2025-04-10 18:40:12 Extracting String data from Code OK


2025-04-10 18:40:12 Extracting String values and entropies from Code OK

2025-04-10 18:40:12 Performing Malware check on extracted domains OK

2025-04-10 18:40:12 Saving to Database OK

Report Generated by - MobSF v4.3.2


Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment
framework capable of performing static and dynamic analysis.

© 2025 Mobile Security Framework - MobSF | Ajin Abraham | OpenSecurity.

You might also like