In particular, we worked out its string encryption process, which is illustrated in Figure 1. Figure 1: String encryption process used in APK Protect-ed malware. To decrypt an encrypted string, one must: 1. Swap the first and last two bytes. 2. Base64 decode the string. Actually, the ...
In particular, we worked out its string encryption process, which is illustrated in Figure 1. Figure 1: String encryption process used in APK Protect-ed malware. To decrypt an encrypted string, one must: 1. Swap the first and last two bytes. 2. Base64 decode the string. Actually, the ...