final config =TalsecConfig( androidConfig:AndroidConfig( malwareConfig:MalwareConfig( blacklistedPackageNames: ['com.wultra.app.screenlogger'], ),// Other config data ),// Other config data);
constconfig= { androidConfig: { malwareConfig: { blacklistedPackageNames: ['com.wultra.app.screenlogger'], },// Other config data }// Other config data}
constconfig= { androidConfig: { malwareConfig: { blacklistedPackageNames: ['com.wultra.app.screenlogger'], },// Other config data }// Other config data}
constconfig= { androidConfig: { malwareConfig: { blacklistedPackageNames: ['com.wultra.app.screenlogger'], },// Other config data }// Other config data}
Hash Based Blacklist
A hash-based blacklist contains a list of SHA-256 hashes of the application APK which you consider as suspicious (or malware).
Each application, whose APK hash is defined in the blacklist and is found on the device, is returned in the scan results.
Scanning may take longer when using a hash-based blacklist, as the APK hash must be computed for each app on the device, which can be an expensive operation.
If the application is flagged as suspicious, the scan result will show reasonvalue set as blacklist.
final config =TalsecConfig( androidConfig:AndroidConfig( malwareConfig:MalwareConfig( blacklistedHashes: ['blockedHash'], ),// Other config data ),// Other config data);
constconfig= { androidConfig: { malwareConfig: { blacklistedHashes: ['blockedHash'], },// Other config data }// Other config data}
constconfig= { androidConfig: { malwareConfig: { blacklistedHashes: ['blockedHash'], },// Other config data }// Other config data}
constconfig= { androidConfig: { malwareConfig: { blacklistedHashes: ['blockedHash'], },// Other config data }// Other config data}
Calculating Hash of the APK
There are many ways how to compute the SHA-256 hash of the APK; for instance, on Unix, you can use:
shasum-a256yourfile.apk
Suspicious Permissions list
A suspicious permissions list contains a list of permission lists which you consider suspicious when granted to an application.
The suspicious permissions have to be granted, not just requested by the application, for it to be considered suspicious and returned in the scan results.
Each list contains a group of permissions. For an application to be marked as suspicious, all permissions in given group must be granted:
// Blocklist of permissions
[
// List (group) of permissions
// Application is suspicious if it has *GRANTED* all of permissions from
// given group
["android.provider.Telephony.SMS_RECEIVED", "android.permission.SEND_SMS"]
["android.permission.READ_CALL_LOG"]
]
If the application is flagged as suspicious, the scan result will show reasonvalue set as suspiciousPermission.
To reduce the amount of false positives, we also check whether the application with suspicious permissions is installed from an untrusted installation source.
Untrusted installation source is a source that was not whitelisted using installation source whitelist. More about whitelists here.
final config =TalsecConfig( androidConfig:AndroidConfig( malwareConfig:MalwareConfig( suspiciousPermissions: ['blockedHash'], ),// Other config data ),// Other config data);
constconfig= { androidConfig: { malwareConfig: { suspiciousPermissions: ['blockedHash'], },// Other config data }// Other config data}
constconfig= { androidConfig: { malwareConfig: { suspiciousPermissions: ['blockedHash'], },// Other config data }// Other config data}
constconfig= { androidConfig: { malwareConfig: { suspiciousPermissions: ['blockedHash'], },// Other config data }// Other config data}