The Path to the Payload: Android Edition

Presented at REcon 2019, June 28, 2019, 3:30 p.m. (30 minutes)

This talk go through each step of reverse-engineering a complex Android malware SDK that uses a lot of techniques to trick analysts. We will cover the multiple layers of obfuscation, anti-analysis checks, "confusion" techniques, and C2 communications that you must get through to finally discover the payloads.

This presentation will deep-dive into each step of reversing a complex Android malware SDK and each of its tricks and challenges along the way. We will walk through the multiple layers of obfuscation, anti-analysis checks, encrypted configuration for the SDK, and what it takes to get the C2 server to deliver the real commands. This malicious SDK did not just shutdown when it detected it was being analyzed. Instead it delivered fake, but realistic looking commands, in order to hide its real payloads.

This presentation will demonstrate how a sophisticated Android developer tries to hide its tracks using just Java and my path to get to the payloads they were trying so hard to hide. This SDK and techniques have never been discussed publicly previously.


Presenters:

  • Maddie Stone
    Maddie Stone is a Sr. Security Engineer and Tech Lead on Google’s Android Security team. She current spends most of her time trying to find the secrets that malware devs tries to hide. Maddie previously spent many years deep in the circuitry and firmware of embedded devices including 8051, ARM, C166, MIPS, PowerPC, BlackFin, the many flavors of Renesas, and more. Maddie has previously spoken at conferences including BlackHat USA, REcon Montreal, OffensiveCon, and more.

Links:

Similar Presentations: