2013-8-3 13:19
是简单了点,通过jd,你很难找出调用序列的
在smali上做更好点,对于这个,我们倒是也有个检测结果:
**********************************
Malicious Operation Analysis BEGIN
**********************************
Output:
Find malicious operation 1 at:
- dex file name: com/plankton/device/android/service/g.ddx
- dex file offset: 75...76
- src file offset: -1
- description: Dynamic loading class
- risk level: MEDIUM
Total confirmed malicious operations: 1
**********************************
Malicious Operation Analysis END
**********************************
使用了这样的一条规则:
dalvik/system/DexClassLoader/loadClass(Ljava/lang/String;)
dalvik/system/DexClassLoader
1
Dynamic loading class