Search Based on Android Suspicious Actions

You can now find samples based on the suspicious actions performed by an Android application during WildFire analysis of the samples.
  1. Start or continue an AutoFocus search.
  2. Add a search condition with the artifact type
    APK Suspicious Action
    :
    apk-suspicious-action.png
  3. View samples matched to yoursearch, and select a sample hash to view the file analysis details for that sample.
    The file analysis details include the
    Suspicious Action
    details, and the results matched to your search condition are highlighted.
    apk-suspicious-action-2.png
  4. Next steps:

Related Documentation