Skip to content

LaurieWired/StrangeLoop

Repository files navigation

godfather_art1

Unmasking the Godfather

Welcome to a deep-dive analysis of the notorious Godfather Android banking trojan. This repository contains notes, slides, and code related to my Strange Loop 2023 talk "Unmasking the Godfather".

In this presentation, I provide a reverse-engineering walkthrough to demystify one of the most contemporary threats in the mobile banking industry.


⚙️ Prerequisites

If you'd like to follow the session interactively, ensure you have these tools installed and their respective source codes downloaded:

  • JADX - Java Decompiler/Disassembler for Android. Available here.
  • Ghidra - C/C++ Decompiler/Disassembler. Available here.
  • Docker-Android - A reliable Android emulator. Available here.
  • Recaf - An emerging Java bytecode editor. Available here.

📋 Presentation Slides

The slides accompanying the talk can be found in the repository at the following link:


🐛 Marked Up Sample

My fully marked up Godfather Sample can be found at the following link:


📖 Supplementary Resources

Additional references to supplement the content of this talk:


🔬 Malware Sample Links

Explore and analyze these real-world samples of the Godfather and other Android banking trojans:

Godfather Samples

Other Android Banking Trojans

Cerberus

Anubis

Sharkbot


🔒 Anubis Leaked Source Code

Access the complete Android Anubis source code here.

Archive Password: infected

About

This contains notes, slides, and code for my Strange Loop talk

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published