You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
I was wondering if it is possible in droidbox 2.3 to discriminate between
simple file activity and an 'install apk' activity,
when the file that is accessed is an apk and the malware actually installs it
on the emulator.
I was monitoring the activity of the malware D13D1BC63026B9C26C7CD4946B1BAE0
com.bntsxdn.pic.apk (an MSZombie.A sample from contagio) inside droidbox, and
I've noticed that the installation of the new package a33.jpg.apk was reported
as a file activity... But, indeed, it is a bit more dangerous that a simple
file activity.
Do you have any clue on how to intercept package installations in droidbox?
Thank you very much!
Madalina
Original issue reported on code.google.com by madalina...@telecomitalia.it on 18 Sep 2012 at 1:59
The text was updated successfully, but these errors were encountered:
Original issue reported on code.google.com by
madalina...@telecomitalia.it
on 18 Sep 2012 at 1:59The text was updated successfully, but these errors were encountered: