{
	"id": "c1c6abc7-ab16-4bce-914c-fc19456757ff",
	"created_at": "2026-04-06T00:06:37.792634Z",
	"updated_at": "2026-04-10T13:12:06.722144Z",
	"deleted_at": null,
	"sha1_hash": "290d1b144895b31e7c58f4037133eaac7c84799a",
	"title": "GitHub - LaurieWired/StrangeLoop: This contains notes, slides, and code for my Strange Loop talk",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 808824,
	"plain_text": "GitHub - LaurieWired/StrangeLoop: This contains notes, slides,\r\nand code for my Strange Loop talk\r\nBy LaurieWired\r\nArchived: 2026-04-05 18:27:44 UTC\r\nUnmasking the Godfather\r\nWelcome to a deep-dive analysis of the notorious Godfather Android banking trojan. This repository contains\r\nnotes, slides, and code related to my Strange Loop 2023 talk \"Unmasking the Godfather\".\r\nIn this presentation, I provide a reverse-engineering walkthrough to demystify one of the most contemporary\r\nthreats in the mobile banking industry.\r\n⚙️ Prerequisites\r\nIf you'd like to follow the session interactively, ensure you have these tools installed and their respective source\r\ncodes downloaded:\r\nhttps://github.com/LaurieWired/StrangeLoop\r\nPage 1 of 3\n\nJADX - Java Decompiler/Disassembler for Android. Available here.\r\nGhidra - C/C++ Decompiler/Disassembler. Available here.\r\nDocker-Android - A reliable Android emulator. Available here.\r\nRecaf - An emerging Java bytecode editor. Available here.\r\n📋 Presentation Slides\r\nThe slides accompanying the talk can be found in the repository at the following link:\r\nUnmaskingTheGodfather.pdf\r\n🐛 Marked Up Sample\r\nMy fully marked up Godfather Sample can be found at the following link:\r\nmarked_up_godfather_jadx\r\n📖 Supplementary Resources\r\nAdditional references to supplement the content of this talk:\r\nComprehensive Anubis Banker Analysis (Work-in-Progress)\r\nHow to Hook Android Methods with Frida\r\nGuide to Running an Android ARM Emulator\r\n🔬 Malware Sample Links\r\nExplore and analyze these real-world samples of the Godfather and other Android banking trojans:\r\nGodfather Samples\r\nSample 1\r\nSample 2\r\nOther Android Banking Trojans\r\nCerberus\r\nSample\r\nAnubis\r\nSample\r\nhttps://github.com/LaurieWired/StrangeLoop\r\nPage 2 of 3\n\nSharkbot\r\nSample\r\n🔒 Anubis Leaked Source Code\r\nAccess the complete Android Anubis source code here.\r\nArchive Password: infected\r\nSource: https://github.com/LaurieWired/StrangeLoop\r\nhttps://github.com/LaurieWired/StrangeLoop\r\nPage 3 of 3",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://github.com/LaurieWired/StrangeLoop"
	],
	"report_names": [
		"StrangeLoop"
	],
	"threat_actors": [],
	"ts_created_at": 1775433997,
	"ts_updated_at": 1775826726,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/290d1b144895b31e7c58f4037133eaac7c84799a.pdf",
		"text": "https://archive.orkl.eu/290d1b144895b31e7c58f4037133eaac7c84799a.txt",
		"img": "https://archive.orkl.eu/290d1b144895b31e7c58f4037133eaac7c84799a.jpg"
	}
}