Malware Analysis for Android Applications

Hey there! We are thrilled to announce that we now offer support for Genetic Malware Analysis specifically for Android applications!

Exciting news for our Intezer Analyze community and enterprise users – you can now uncover code reuse in Android file formats, including APK files like ARM executables (32 and 64 bit) and Dalvik-based modules.

Why Android?
With the surge in Android device usage in recent years and the valuable data stored on them, this operating system has become a prime target for cyber attacks. The threat of Android malware is on the rise, with malicious apps lurking in app stores. Our goal is to empower the industry with a more effective way to identify and combat threats in this realm.

Recent Discovery: Lazarus Embedded in an Android App
We recently uncovered a malware campaign initiated by the notorious cyber group Lazarus, linked to the North Korean government. This malicious code was embedded within an Android application. By dissecting the APK file, Intezer Analyze pinpointed three embedded dex files containing code from previous Lazarus iterations. Check out the genetic analysis here.

Excitingly, Intezer Analyze now supports genetic analysis for Windows and Linux executables as well as Android APK files.

If you’re eager to genetically analyze your own files and Android APKs, head over to analyze.intezer.com or reach out to us directly.

Intezer

Count on Intezer’s Autonomous SOC solution to handle the security operations grunt work.

Leave a Reply

Your email address will not be published. Required fields are marked *