F-droid Malware Internals

Static and Dynamic Analysis.

In this blog i will be taking you through the tour of reversing the alleged malware app F-droid.

Analysis: Hammering off “F-droid” app

Static Analysis:-[Basic]

Hash’s:

Information about app :

Certificate Info:

App Permissions:

Obfuscation and Anti-VM Code:

Code Analysis:

App logs into the sensitive information, has weak hash’s, sensitive to SQL injection, app files contains hard-coded usernames and passwords, consists of insecure RNG and discloses the IP address.

Urls:

Activities Run by App:

Services run by App:

Receivers:

Dynamic Analysis:-

URLs:

Emails:

C2 Server:

148[.]251[.]140[.]42 & 217[.]160[.]165[.]113

Communicating Files with C2 Server:

YARA Signature:

Conclusion:

C2 server of F-droid app is hosting many apps that are legit hacking tools malware.

That’s all for today.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store