Generate interlinked wiki from master inventory: 397 tool pages, 15 workflow pages, 27 recipe pages, 33 category pages, plus index. All pages use [[wiki-links]] for cross-navigation between tools, workflows, recipes, and categories (1782 links total). Install zk for interactive browsing with fzf search, tag filtering, and backlink discovery. Add 'fhelp wiki' command and Makefile target. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
2.0 KiB
Android Malware Analysis
Analyze suspicious Android APK files using static and dynamic techniques available in REMnux.
Steps
Step 1: APK Triage
Tools: tools/file, tools/apkid
Verify file type and check for packers/obfuscators. APKiD detects: known packers (DexGuard, Bangcle), obfuscators, anti-debug techniques.
file specimen.exe
Step 2: Manifest Analysis
Tools: tools/apktool
Decompile APK: apktool d -o output/. Examine AndroidManifest.xml for: excessive permissions, receivers, services, exported components, intent filters.
apktool d <app.apk> -o output/
Step 3: Source Code Recovery
Tools: tools/jadx
Decompile DEX to Java: jadx -d output/. Review source code for: C2 URLs, crypto operations, SMS interception, data exfiltration, root checks.
jadx <app.apk> -d output/
Step 4: Static Analysis
Tools: tools/androguard, tools/droidlysis
androguard: analyze APK structure, permissions, activities. droidlysis: automated static analysis with IOC extraction. Check for: hardcoded keys, URLs, suspicious API usage.
androguard analyze <app.apk>
Step 5: Native Library Analysis
Tools: tools/strings, tools/radare2
If APK contains .so libraries: extract from lib/ directory. Analyze with strings and radare2. Native code often hides C2 logic and crypto.
strings binary.exe
r2 specimen.exe
Step 6: Dynamic Instrumentation
Tools: tools/frida
Hook suspicious functions at runtime: frida -U -l hook.js . Intercept: crypto operations, network calls, file access, SMS operations.
frida -l hook.js <process_name>
Step 7: Document Findings
Record: package name, permissions abused, C2 infrastructure, data exfiltrated, persistence mechanism, targeted user data (SMS, contacts, location).
#android #apk #mobile #frida #jadx #apktool #workflow