Malware Unpacking Methods (Part 2): Weak Encryption Algorithms

Malware Unpacking Methods (Part 2): Weak Encryption Algorithms

A few days ago, I began writing a series of articles about tools and methods for unpacking malware. Each malware or packer is different, and sometimes general methods do not work for unpacking. However, common characteristics can sometimes be found among them. For example, packers often use weak encryption algorithms, which can be cracked. In … Read more

Analysis of the Android FART Unpacking Process

Analysis of the Android FART Unpacking Process

1. Introduction On the Android platform, the Java code written by programmers is ultimately compiled into bytecode that runs on the Android virtual machine. Since Android came into the public eye, decompilation tools such as apktool and jadx have emerged one after another, becoming increasingly powerful. The bytecode compiled from Java has become vulnerable in … Read more