Dynamic analysis of patched EventBot allows us read its detailed debug logs while running | Trojan

Sdílet
Vložit
  • čas přidán 5. 07. 2020
  • Malware analysis of Android banking Trojan - EventBot
    Its encrypted payload has lots of detailed debug logs for almost every executed functionality, however not activated.
    So, I patched encrypted payload. It should help malware analyst to understand how EventBot works during dynamic analysis.
    Patched sample: koodous.com/apks/fb000d03383c...
    CZcams: / lukasstefankoinfosec
    Twitter: / lukasstefanko
    EventBot: www.cybereason.com/blog/event...
  • Věda a technologie

Komentáře • 6

  • @phongsitsingtotong1509

    I follow you, I come from Thailand

  • @nextwolf8936
    @nextwolf8936 Před 3 lety

    Great video! Can you share the Frida script? Thanks!!

  • @tuneit9
    @tuneit9 Před 3 lety

    knowledgeable video btw

  • @tuneit9
    @tuneit9 Před 3 lety

    Please make video on how to analyze if a genuine apk(google drive)is injected or not.

    • @mobilehacker
      @mobilehacker  Před 3 lety +1

      Thanks for the tip! You mean to analyze apk if it contains malicious code ?

    • @tuneit9
      @tuneit9 Před 3 lety

      @@mobilehacker yes!