ReverseEngineeringAndroidMalware
This contains notes and slides for my talk on Reverse Engineering Android Malware
Install / Use
/learn @LaurieWired/ReverseEngineeringAndroidMalwareREADME
</div>
Reverse Engineering Android Malware
During this talk, I introduce the flow of malware analysis from the discovery to the reverse engineering phase. I show how to reverse engineer malicious Android applications and even look at a case study of the notorious SpyNote malware. Together we locate the malicious C2 server hidden inside of the Android application's resources.
Bonus Challenge
Caution, this is real malware
Can you find the malicious C2 server inside this similar SpyNote sample?
- MalwareBazaar File Profile
- SHA256: 5c01f7727c78dea9c89dccf92b01b4c45e69406e6462340779401497bf4d4589
Hint! It may be encoded
Related Skills
node-connect
337.1kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
83.1kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
337.1kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
83.1kCommit, push, and open a PR
Security Score
Audited on Mar 26, 2026
