{"id":4184,"date":"2016-08-09T01:13:07","date_gmt":"2016-08-08T17:13:07","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4184"},"modified":"2016-08-09T01:14:09","modified_gmt":"2016-08-08T17:14:09","slug":"cuckoodroid-automated-android-malware-analysis","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/08\/cuckoodroid-automated-android-malware-analysis\/","title":{"rendered":"CuckooDroid – Automated Android Malware Analysis"},"content":{"rendered":"
CuckooDroid is an extension of Cuckoo Sandbox<\/a> the Open Source software for automating analysis of suspicious files, for Android malware analysis. CuckooDroid brings to Cuckoo the capabilities of execution and analysis of android applications.<\/p>\n <\/p>\n CuckooDroid provides both static and dynamic APK inspection as well as evading certain VM-detection techniques, encryption key extraction, SSL inspection, API call trace, basic behavioural signatures and many other features.<\/p>\n The framework is highly customizable and extensible – leveraging the power of the large existing Cuckoo community.<\/p>\n You can download CuckooDroid here:<\/p>\nInstallation<\/h3>\n
git config --global user.email \"you@example.com\"\r\ngit config --global user.name \"Your Name\"\r\ngit clone --depth=1 https:\/\/github.com\/cuckoobox\/cuckoo.git cuckoo -b 1.2\r\ncd cuckoo\r\ngit remote add droid https:\/\/github.com\/idanr1986\/cuckoo-droid\r\ngit pull --no-edit -s recursive -X theirs droid master \r\ncat conf-extra\/processing.conf >> conf\/processing.conf\r\ncat conf-extra\/reporting.conf >> conf\/reporting.conf\r\nrm -r conf-extra\r\necho \"protobuf\" >> requirements.txt<\/pre>\n