
169
Building your own sandBox
#-----------------------------------------------------
def emulate_call(self, tel, duration_sec=5):
“””
Args:
Returns:
“””
# KEYCODE_CALL=5
self.send_event(AdbManage.KEYCODE_CALL)
for n in tel:
#KEYCODE_0=7
event=int(n) + AdbManage.KEYCODE_0
self.send_event(event)
self.send_event(AdbManage.KEYCODE_CALL)
time.sleep(duration_sec)
KEYCODE_ENDCALL=6
self.send_event(AdbManage.KEYCODE_ENDCALL)
return imp_runner, add_runner, mod_runner
Presently, this includes all traces of the system so that you can then
look for the most interesting interactions made by the malware.
Image 8.8 Android Malware Analyzer System running apk s ...