Sandroid - Dexray Intercept Documentation

Version Python Version Platform

Welcome to the documentation for Sandroid - Dexray Intercept, a comprehensive Frida-based Android malware analysis tool designed to create runtime profiles that track application behavior in real-time.

Warning

This tool is designed for defensive security analysis only. The samples directory contains actual malware. Use with extreme caution in isolated environments.

What is Dexray Intercept?

Dexray Intercept is part of the dynamic analysis sandbox Sandroid. It uses Frida dynamic instrumentation to:

  • Monitor Android app behavior in real-time during execution

  • Intercept and log cryptographic operations, network traffic, file system access, and IPC communications

  • Bypass common anti-analysis techniques including root, Frida, debugger, and emulator detection

  • Generate comprehensive JSON profiles for further analysis and threat intelligence

  • Support custom hooks for specialized analysis requirements

Key Features

🔍 Comprehensive Monitoring
  • Cryptographic operations (AES, encodings, keystore)

  • Network communications (HTTP/HTTPS, WebSockets, sockets)

  • File system and database operations

  • Inter-process communication (intents, broadcasts, binder)

  • System services (location, camera, telephony, clipboard)

  • DEX unpacking and native library loading

🛡️ Anti-Analysis Bypass
  • Root detection bypass

  • Frida detection bypass

  • Debugger detection bypass

  • Emulator detection bypass

  • Hook framework detection bypass

🔧 Advanced Capabilities
  • TLS key extraction via integrated friTap

  • Custom Frida script loading

  • Selective hook configuration for performance

  • Real-time terminal output with structured JSON logging

  • Stack trace analysis for call origin tracking

📊 Output Formats
  • Structured JSON profiles with metadata

  • Real-time terminal logging

  • Integration with threat intelligence platforms

Quick Start

# Install the package
pip install -e .

# Basic usage - attach to running app
dexray-intercept com.example.app

# Spawn app with crypto and network hooks
dexray-intercept -s --hooks-crypto --hooks-network com.example.app

# Comprehensive analysis with bypass hooks
dexray-intercept -s --hooks-all --hooks-bypass com.example.app

# Custom analysis with TLS extraction
dexray-intercept -s --enable-fritap --custom-script ./my_hooks.js com.example.app

Architecture Overview

Dexray Intercept uses a dual-language architecture:

Python Frontend
  • CLI interface and argument parsing

  • Frida session management and device connection

  • Event processing and JSON profile generation

  • Result analysis and output formatting

TypeScript/JavaScript Backend
  • Frida hooks written in TypeScript

  • Compiled to JavaScript using frida-compile

  • Real-time instrumentation of Android applications

  • Structured message passing to Python frontend

Requirements

Runtime Requirements:
  • Python 3.6 or higher

  • Node.js (for TypeScript compilation)

  • Rooted Android device or emulator

  • frida-tools installed

Development Requirements:
  • TypeScript compiler

  • frida-compile for hook compilation

  • @types/frida-gum for TypeScript definitions

Contributing

Contributions are welcome! Please read our development guide for information on:

  • Creating new hooks

  • Adding parsers for new event types

  • Extending the CLI interface

  • Writing tests and documentation

License

This project is licensed under the MIT License. See the LICENSE file for details.

Support

For issues, questions, or contributions:

  • GitHub Issues: Report bugs and request features

  • Documentation: This comprehensive guide

  • Code Examples: See the user guide and API reference

Indices and Tables