Possibly tries to implement anti-virtualization techniquesĪdversaries may target user email to collect sensitive information.įound a potential E-Mail address in binary/memoryĪdversaries may leverage information repositories to mine valuable information.Īdversaries may capture audio to collect information by leveraging standard operating system APIs of a mobile device.Īdversaries may employ a known encryption algorithm to conceal command and control traffic rather than relying on any inherent protections provided by a communication protocol. Has the ability to execute code after rebootĪdversaries may attempt to make an executable or file difficult to discover or analyze by encrypting, encoding, or otherwise obfuscating its contents on the system or in transit.Īdversaries may employ various means to detect and avoid virtualization and analysis environments. An intent is a message passed between Android application or system components.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |