Joe Sandbox Mobile analyzes APKs fully automated in a controlled Android environment and monitors the runtime behavior of the APK for suspicious activities. All activities are compiled into comprehensive and detailed analysis reports.
Analysis reports, which contain key information about potential threats, enable cyber-security professionals to deploy, implement and develop appropriate defense and protections.
Joe Sandbox Mobile enables you to install and use Joe Sandbox in your lab. Currently Joe Sandbox Mobile analyzes any malware targeting Android-based operating systems.
Joe Sandbox Mobile's architecture is modular. It consists of at least one controller machine running Linux and multiple connected analysis machines (with Android installed) hosted by virtualization products such as VMware or VirtualBox. APKs are submitted from a user or submission scripts and sent via the Joe Sandbox Mobile Web Interface to the controller's server. The Joe Sandbox Mobile server then stores the submissions in a local file database and forwards them to the connected analysis machines / phone, where the APK is installed and launched.
Joe Sandbox Mobile's configurable and efficient instrumentation engine analyzes any activities during the APK execution and reports back behavior data instantly to the controller. Click to read more about Joe Security's unique technologies to analyze APKs.
Static and dynamic data is evaluated, and results, statistics, activities and code functions are compiled into a detailed and well structured report.
Joe Sandbox Mobile's instrumentation engine enables monitoring of any Java/Android API call within an APK, local function or even data structure field access. The entire instrumentation behavior is highly configurable and relies on a transparent and open interface, making it extremely flexible and extendable. The engine resolves reflective API calls, which are often used to obfuscate Java code. In addition, the engine supports a sophisticated set of tricks to prevent emulator, VM and instrumentation detection.
In order to trigger even more malicious payload, Joe Sandbox Mobile automatically understands the view hierarchy of the running APK and clicks buttons in an intelligent manner to progress beyond dummy "I agree" windows or other GUI masks. APK's implementing receiver functionality such as SMS_RECEIVED or BOOT_COMPLETED are fed manually based on cookbooks or fully automated with simulated intents to trigger malicious behavior.
Joe Sandbox Mobile generates very detailed analysis reports about system, network, browser and tampering/code manipulation behavior. The report includes evaluations and additional data about strings, domains and file structures. Matching generic signatures highlight suspicious and malicious key behavior. Classification and threat scores help to detect sophisticated cyber-attacks quickly. A context based search enables to quickly navigate.
Joe Sandbox Mobile provides a MITRE ATT&CK matrix. With the matrix, analysts can easily compare adversary tactics and techniques. Joe Sandbox Mobile contains over 2089+ behavior signatures which are mapped to tactics and techniques.
Joe Sandbox Mobile allows to use Yara Rules for advanced malware detection. Joe Sandbox Mobile forwards all samples, downloaded files, resources as well as memory dumps to Yara. In addition Joe Sandbox Mobile features a nice web based Yara Rule editor. Tired of updating Yara rules? Joe Sandbox Mobile enables to automatically synchronize with GitHub repositories contain Yara rules.
Joe Sandbox Mobile allows to use Simga Rules for threat detection. Joe Sandbox currently supports many Sigma events including process_creation and Sysmon. In addition Joe Sandbox Mobile features a nice web based Sigma Rule editor. Tired of updating your Sigma rules? Joe Sandbox Mobile enables to automatically synchronize with GitHub repositories contain Simga rules.
Joe Sandbox Mobile has many Third Party Integrations. Detection results from Virustotal and MetaDefender are visualized in the analysis report. Joe Sandbox Mobile also integrates with Incident Response Solutions such as TheHive, Fame, MISP and CRITs. You can also use Joe Sandbox Mobile in the Security Automation & Orchestration Platform Phantom and Demisto. We also offer integration with additional tools such as Viper and Malsub.
Joe Sandbox Mobile enables to use a mix of virtual and physical analysis machines for analysis. Physical phones are very helpful in order to deal with evasive malware which may not run on virtual systems.
Joe Sandbox Mobile allows for seamless integration into existing security products. A .NET SDK, serving interfaces for automated file submissions and processors for handling generated analysis data is included. For bulk file submissions, Joe Sandbox Mobile provides a queuing system with load-balancing and prioritization mechanisms. OEM customer have full control over the solution, its generated data and configuration.
Joe Sandbox Mobile includes an intuitive web interface with features such as file and URL uploads, cookbook editor, user management and bulk upload/download and mail/syslog notifications.
Joe Sandbox Mobile is built as a modular and scalable system with many settings for advanced tuning. With its open SDK, behavior signatures and cookbooks, it enables performing advanced use cases to serve organizations' specific needs. Joe Sandbox Mobile supports multiple analysis machines with different applications/versions installed.
Joe Security provides excellent services, such as system installations, training, maintenance, customization and expert knowledge as an supplemental package to Joe Sandbox Mobile.
Joe Sandbox Mobile analyzes APK (Android Application Package) files.
Behavior reports in HTML, PDF, XML and JSON, dropped or downloaded files, strings, PCAP and screenshot.
Joe Sandbox Mobile uses a wide range of analysis technologies including dynamic, static as well as hybrid. Due to the use of several analysis techniques Joe Sandbox Mobile discovers more behavior than other solutions.
Behavior signatures are tiny scripts to rate data Joe Sandbox Mobile captures from the malware. Joe Sandbox Mobile extracts any API call executed by the malware. Joe Sandbox Mobile includes a steady raising number of 574+ signatures.
Joe Sandbox Mobile supports all virtualization products, including VirtualBox, VMware Workstation and VMware ESXi.
Yes, you install and run Joe Sandbox on the i3.metal instances.
Yes, Joe Sandbox Mobile enalbes to analyze malware on native phones.
All Android versions in English language.
Joe Sandbox Mobile runs on standard hardware with Linux as operating system (e.g. Ubuntu Server). For installation a single server is required.
Yes, Joe Sandbox Mobile can be run without any connection to the Internet or our Cloud.