Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Manipulating Malware: Forcing Android Malware to Self-Unpack

Recon Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Discover an innovative approach to Android malware analysis in this 31-minute conference talk from Recon 2024, where Laurie Kirk presents a groundbreaking technique for forcing packed Android malware to reveal its hidden payloads. Learn about an automated, platform-independent method that leverages the malware's own code against itself, eliminating the need for custom decryptors while remaining packer-agnostic. Follow the detailed process of extracting and translating Dalvik Bytecode, resources, and native code from malicious stubs into self-unpacking entities, with two possible output formats: pure Java applications that bypass Android emulator requirements or defanged versions of the original APKs. Get introduced to BadUnboxing, an open-source tool that automatically generates benign versions of Android malware to expose malicious payloads, along with methodologies for repackaging defanged APKs. Presented by Laurie Kirk, a Reverse Engineer specializing in cross-platform malware analysis with a focus on mobile threats, who runs the YouTube channel @LaurieWired and has spoken at numerous security conferences including DEFCON, TROOPERS23, and BlueHat.

Syllabus

Recon 2024 - Laurie Kirk - Manipulating Malware: Forcing Android Malware to Self-Unpack

Taught by

Recon Conference

Reviews

Start your review of Manipulating Malware: Forcing Android Malware to Self-Unpack

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.