Skip to content

agentzex/The-Nice-Dropper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 

Repository files navigation

The-Nice-Dropper

A code example of how an attacker can upload a benign app to Google Play, hiding it's malicious code remotely, then, at a specific time, downloading it using a dropper and dynamically loading it to the app from a .dex file (the dynamically loaded .dex lib can be found under TheNiceDropper/pwnage/)

Step ONE:
The user downloads a benign looking app, unknowing its malicious activities

Step TWO:
In the background the app downloads a pre-compiled .dex file made by the attacker (in order to do so, you need to create a separate module using Android studio, then convert the compiled .jar to .dex using:
dx.bat --dex --output payload.dex input.jar
On windows, the path to dx will be: <your-Android-path>\bin\build-tools<some-version>\ )
The .dex file is then loaded into memory and the malicious code starts running

About

An Android Dropper for remote code, loaded by .dex file

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published