
Android Malware Sandbox
#Security Testing#Malware Analysis
UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.
This project provides a simple and adaptable sandbox for testing Android malware
This project provides a simple, configurable, and modular sandbox that allows for the quick testing of both known and unknown families of Android malware.
Demo Installation:
To get started, you first need to install Android Studio or another tool that can launch the Android Virtual Device (AVD).
Requirements:
1. Keep all technical terms and concepts exactly as they are
2. Make the language clearer and more accessible
3. Keep the same content structure and format
4. Do not add or remove any information
5. Maintain similar length if very small length of content then add little more content
Next, you'll need to create the AVD for sample execution
Next, you will need to create the AVD (Android Virtual Device) that you intend to use for running the samples.
Following that, you will have to install the required dependencies:
python3 -m venv env
source env/bin/activate
apt install -y liblzma-dev
pip install -r requirements.txt
pip install frida-push
npm install
npm install -g frida-compile
Next, Configure config.ini
Update adb_path and emulator_path with the locations of your binaries.
Now, you need to set up the emulator in config.ini:
[EMULATOR]
vm_name = Nexus_5X_API_28
snapshot_name =
use_snapshot = no
show_window = yes
wipe_data = yes
Additionally, modify the output database file.
Exploring Additional Options
There are many additional options available in the config file, so feel free to modify them as you see fit.
Everything is set up, and you can now start your analysis by running:
python main.py
To customize your run, adjust the settings in config.ini.
Reporting:
Once
Requirements: