Vidos.Top
2023-03-07 07:51:08

Android Banker Deep Dive (Part 3)

Part 3 of our Banker Deep Dive. We analyze the code prior to the call to DexClassLoader, and discover an interesting WebView object. We also find that the method containing the code that writes the loaded APK to disk appears to be dead. --- In this [RE]laxing new series, I fully reverse a difficult Android Banker trojan from start to finish. These extensive "Deep Dive" segments concentrate on dissecting malware specimens and delving into the individual approaches employed to fully reverse them. Throughout the journey, I attempt to provide explanations of my techniques as much as possible, however, if any ambiguities arise, please feel free to post a comment below. Timestamps: 00:00 Intro 00:54 Begin Analysis 02:20 Looking at Malicious Class 04:29 Editing Shared Preferences 07:12 ...
Тривалість: 00:37:07
Переглядів на youtube: 1243
Автор: LaurieWired

Коментарі

Завантажити/Подивитися це відео [mp4] >
640p 1280p
Завантажити/Послухати аудіо [mp3][m4a] >
Audio