Detecting Dynamic Loading in Android Applications With /proc/maps

TL;DR: Through dynamic loading, malware authors can covertly load malicious code into their application in order to avoid detection. We can detect such loading through the application’s /proc/[PID]/maps kernel generated file.Recently, we created a simple script that allows us to detect dynamic loading in Android apps. This presented us with a good opportunity to discuss […]

A Technical Analysis of the 4k Facebook Scam

tl;dr: Don’t trust webview logins on native apps, they can read your cookies and use them to their advantage. Following the Hacker News thread “How I lost €4k in a Facebook scam“, we reverse engineered the app to see how this happens. The new phishing wave Phishing. We all know it, we all hate it. […]

Tracing Android Applications With Termux and Linux Utilities

The following article will demonstrate how to use “old fashioned” Linux utilities and Termux to trace Android apps. We’ll use Termux linux VM inside an Android device in order to install common Linux utils alongside Android Apps. The main tools we will use are: Strace Jtrace Inotifywatch *Rooted device is needed What is Termux Termux […]

Debugging 3rd Party Android Apps

While reverse engineer Android apps it’s relatively common to perform dynamic analysis in conjunction to static analysis in order to gain runtime information of the app. There are many ways to get this information from 3rd party apps Use Frida hooks to print function arguments Patch the app to be debuggable Patch the app to […]

Using ByteCode-Viewer for Malware Analysis

Overview  Why to use ByteCode-viewer for malware analysis? Bytecode viewer is a decompiler whose most relevant feature for malware analysis is the ability to decompile using six different decompilers. In addition, the bytecode viewer is also able to compile and edit code. When to use ByteCode-Viewer ? As we all know every standalone decompiler fails […]