Logo
Android Malware Sandbox

Android Malware Sandbox

#Security Testing#Malware Analysis

UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.

Visit Website

This project provides a simple and adaptable sandbox for testing Android malware

This project provides a simple, configurable, and modular sandbox that allows for the quick testing of both known and unknown families of Android malware. Demo Installation: To get started, you first need to install Android Studio or another tool that can launch the Android Virtual Device (AVD). Requirements: 1. Keep all technical terms and concepts exactly as they are 2. Make the language clearer and more accessible 3. Keep the same content structure and format 4. Do not add or remove any information 5. Maintain similar length if very small length of content then add little more content

Next, you'll need to create the AVD for sample execution

Next, you will need to create the AVD (Android Virtual Device) that you intend to use for running the samples. Following that, you will have to install the required dependencies: python3 -m venv env source env/bin/activate apt install -y liblzma-dev pip install -r requirements.txt pip install frida-push npm install npm install -g frida-compile

Next, Configure config.ini

Update adb_path and emulator_path with the locations of your binaries. Now, you need to set up the emulator in config.ini: [EMULATOR] vm_name = Nexus_5X_API_28 snapshot_name = use_snapshot = no show_window = yes wipe_data = yes Additionally, modify the output database file.

Exploring Additional Options

There are many additional options available in the config file, so feel free to modify them as you see fit. Everything is set up, and you can now start your analysis by running: python main.py To customize your run, adjust the settings in config.ini. Reporting: Once Requirements: