During this talk, I introduce the flow of malware analysis from the discovery to the reverse engineering phase. I show how to reverse engineer malicious Android applications and even look at a case study of the notorious SpyNote malware. Together we locate the malicious C2 server hidden inside of the Android application's resources.
Can you find the malicious C2 server inside this similar SpyNote sample?
- MalwareBazaar File Profile
- SHA256: 5c01f7727c78dea9c89dccf92b01b4c45e69406e6462340779401497bf4d4589
Hint!
It may be encoded