themalwarebugAnalysis of undetected dropper on Playstore aka CoperHello everyone,I hope all are doing well. First of all thank you everyone for huge support given for the writeup on Joker malware.If you…Jul 29, 20231Jul 29, 20231
themalwarebugHow does a modded crypto wallet steal credentials of an user?Hey readers,Hope everyone are safe. This time I am back with another blog after a long time regarding a modded crypto wallet application…Apr 30, 2023Apr 30, 2023
themalwarebugHow does an android app phish Facebook credentials of an user?Hey guys,I am back with another malware this time which was named Facestealer malware which targets Facebook users exfiltrating their…Apr 7, 20232Apr 7, 20232
themalwarebugReverse engineering of Joker MalwareHello guys,Hope you are doing good.Here is technical analysis of another android malware named Joker also known as bread toll_fraud,which…Mar 20, 2023Mar 20, 2023
themalwarebugReverse engineering of Harly TrojanHello guys,Hope you are doing good. Here is another blog about a Harly an android trojan which was removed from playstore recently.I will…Mar 18, 2023Mar 18, 2023
themalwarebugReverse engineering of an android RansomwareHi guys,Hope you are doing great.Here is another blog on reverse engineering of a simple ransomware(trojan locker) which locks user’s…Feb 25, 2023Feb 25, 2023
themalwarebugReverse Engineering of Android malware (IDFC bank)Hi guys,Hope you are doing great.Here is a simple blog explaining reverse engineering of an android malware using static and dynamic…Feb 20, 2023Feb 20, 2023