Malcore: Simple File Analysis
  • Malcore API docs
  • Packer Checking
  • Deep Static Analysis
  • PCAP diffing
  • Gather sections
  • Shellcode Emulation
  • Executable File Analysis
  • Binary Diffing
  • Script Analysis
  • Ransom Note Comparison
  • PCAP Analysis
  • Snort Rule Generation
  • Hash Checksum
  • Strings
  • Imports and Exports
  • Status Check
  • Yara Rule Scanning
  • Parse Exif Data
  • Domain Analysis
  • Threat Score
  • Execute From URL
  • Document File Analysis
  • URL Checking
  • Browser Extension Analysis
  • Android Permission Lookup
  • AndroidManifest Parsing
  • Phone Application Analysis
  • Dynamic Analysis
  • Threat Feed
  • AI Classifier
  • Scan Results Manipulation
Powered by GitBook
On this page
  • [ POST ] https://api.malcore.io/api/phoneapp
  • Query Params
  • Headers
  • Request
  • Response

Phone Application Analysis

[ POST ] https://api.malcore.io/api/phoneapp

Perform analysis on a phone application, this endpoint accepts IPA and APK files


Query Params

  • filename1 file

Headers

  • apiKey string Malcore API key

  • X-No-Poll string


Request

curl -X POST  https://api.malcore.io/api/phoneapp \
	-F "filename1=@/path/to/phone/app" \
	-H "X-No-Poll: true" \
  -H "apiKey: my-api-key" \

Response

🟢 200

{'status': 'running',
          'uuid': '...',
          'scan_id': '...',
          'scan_url': '...',
          'report_id': '...'},
          'isMaintenance': False,
          'success': True,
          'messages': [{
	          'type': 'success',
			  'code': 200,
			  'message': 'Scan is running'
	        }]
}

🔴 400

{}
PreviousAndroidManifest ParsingNextDynamic Analysis

Last updated 1 year ago