betillogalvanfbc / ReverseEngineeringAndroidMalware

This contains notes and slides for my talk on Reverse Engineering Android Malware

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

logo


GitHub stars GitHub forks GitHub contributors Follow @lauriewired on Twitter


Reverse Engineering Android Malware 🤖

During this talk, I introduce the flow of malware analysis from the discovery to the reverse engineering phase. I show how to reverse engineer malicious Android applications and even look at a case study of the notorious SpyNote malware. Together we locate the malicious C2 server hidden inside of the Android application's resources.

Bonus Challenge 🔍

⚠️ Caution, this is real malware ⚠️

Can you find the malicious C2 server inside this similar SpyNote sample?

Hint! It may be encoded

About

This contains notes and slides for my talk on Reverse Engineering Android Malware