Maldrolyzer – Tool for Extracting Sensitive Data From Android Malware

Maldrolyzer - Tool for Extracting Sensitive Data From Android (Credit Card Details, Phone Numbers, etc)

In the dynamic and often perilous world of Android security, the ability to quickly and effectively analyze malware is essential. Maldrolyzer stands out as a robust framework designed specifically to extract actionable data such as Command and Control (C&C) details, phone numbers, and other sensitive information from Android. This powerful tool aids cybersecurity professionals, bug hunter, and forensic analysts in understanding and mitigating threats posed by malicious software on Android platforms.

Maldrolyzer

Maldrolyzer is an open-source framework developed to streamline the analysis of Android malware. By focusing on extracting “actionable” data from android, Maldrolyzer enables security professionals to quickly obtain sensitive information that can lead to faster response and mitigation strategies. This tool is particularly useful in situations where rapid analysis and data extraction are needed to prevent further damage.

Maldrolyzer automates the process of extracting sensitive data from infected Android applications. This includes Command and Control (C&C) details, phone numbers, email addresses, and other personal information that could be exploited by attackers.

Installation

You have to install the following packets before you start using this project:

  • Androguard
    • git clone https://github.com/androguard/androguard
    • cd androguard
    • sudo python setup.py install
  • PyCrypto
    • easy_install pycrypto
  • pyelftools
    • easy_install pyelftools
  • yara
    • easy_install yara

Architecture

Idea is really simple and modular. The project has couple of directories, which host a place for you static analysis or output processing:

  • plugins – this is were the code responsible for the malware identification and data extraction is. Every class has to inherit from Plugin class from templates.
  • Method recon idetifies the malware – put there all of the code you need to make sure you can extract the data.
  • Method extract does the usual extraction. There is no specific format for the extracted data, but it’s good to keep it in Python dictionary, so that the ouput processors could read it in a uniform way.
  • processing – this is were you put classes that inherit from OutputProcessor class. They are invoked after the data extraction and get the extracted info.
  • process method takes the data and produces some kind of a result (i.e. adds a file or C&C to you database, checks if the C&C is live etc.)

If you want to contribute, write a plugin that decodes some new malware family. It’s easy, just look at the existing plugins.

Usage

So, you have an APK sample and you don’t know what it is and where is the C&C? Type:

python maldrolyzer.py [sample_path]

If maldrolyzer knows the malware family it will display some useful information like:

{‘c2’: [‘http://esaphapss.net/bn/save_message.php’], ‘malware’: ‘xbot007’, ‘md5’: ‘ce17e4b04536deac4672b98fbee905e0’, ‘sha1’: ‘a48a2b8a5e1cae168ea42bd271f5b5a0c65f59a9’, ‘sha256’: ‘c3a24d1df11baf2614d7b934afba897ce282f961e2988ac7fa85e270e3b3ea7d’, ‘sha512’: ‘a47f3db765bff9a8d794031632a3cf98bffb3e833f90639b18be7e4642845da2ee106a8947338b9244f50b918a32f1a6a952bb18a1f86f8c176e81c2cb4862b9’}



Maldrolyzer - Tool for Extracting Sensitive Data From Android (Credit Card Details, Phone Numbers, etc)
Next Post

No more post

You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

16 + 20 =