HTB SAW
Challenge Description The malware forensics lab identified a new technique for hiding and executing code dynamically. A sample that seems to use this technique has just arrived in their queue. Can you help them? SAW.apk Solution This is something that I think quite hard but yea another fun challenge. Static Analysis As usual, I started with jadx-gui for reading the decompiled Java code. 1 2 3 4 5 6 <activity android:name="com.stego.saw.MainActivity"> <intent-filter> <action android:name="android.intent.action.MAIN"/> <category android:name="android.intent.category.LAUNCHER"/> </intent-filter> </activity> It seems like there’s only one activity to focus on. I then have a look in it. Inside the MainActivity.java, there’s a few that I think its interesting and useful. ...