Digital Forensics on APK Files: A Combined Approach Using MobSF and GHIDRA

Authors

  • Fariz Maulana Rizki Department of Informatics, Universitas Muhammadiyah Purwokerto, Banyumas, Indonesia
  • Mukhlis Prasetyo Aji Department of Informatics, Universitas Muhammadiyah Purwokerto, Banyumas, Indonesia
  • Ermadi Satriya Wijaya Department of Informatics, Universitas Muhammadiyah Purwokerto, Banyumas, Indonesia
  • Harjono Department of Informatics, Universitas Muhammadiyah Purwokerto, Banyumas, Indonesia

DOI:

https://doi.org/10.12928/mf.v7i2.14088

Keywords:

Forensics, MobSF, GHIDRA, Reverse Engineering, Analysis

Abstract

The rapid growth of Android smartphones has increased user convenience but also elevated the risk of cybercrime, especially malware attacks using complex obfuscation techniques that hinder detection and analysis. Traditional methods are often insufficient to address these evolving threats. This study integrates automated and manual analysis on APK files using Mobile Security Framework (MobSF) and GHIDRA through reverse engineering. MobSF performs automated static analysis to identify vulnerabilities and security indicators, while GHIDRA is used to decompile binary code into pseudocode for in-depth manual verification. The analysis of the “Pencairan Hadiah” (Prize Disbursement) application revealed dangerous permissions such as RECEIVE_SMS, READ_PHONE_STATE, and SYSTEM_ALERT_WINDOW. Manual inspection with GHIDRA confirmed API calls like getImei() and access to the Telegram API for automated data transmission. Although the bot token was inactive, the findings indicate an intent to exfiltrate sensitive data. The integration of MobSF and GHIDRA provides a deeper understanding and concrete evidence of malicious behavior in APK files, demonstrating the effectiveness of combining automated and manual approaches in digital forensic analysis.

References

C. A. Teodorescu, A.-N. Ciucu Durnoi, and V. M. Vargas, “The Rise of the Mobile Internet: Tracing the Evolution of Portable Devices,” Proc. Int. Conf. Bus. Excell., vol. 17, no. 1, pp. 1645–1654, July 2023, doi: 10.2478/picbe-2023-0147.

S. L. Sanna, D. Soi, D. Maiorca, G. Fumera, and G. Giacinto, “A risk estimation study of native code vulnerabilities in Android applications,” J. Cybersecurity, vol. 10, no. 1, p. tyae015, Jan. 2024, doi: 10.1093/cybsec/tyae015.

Nurul Qomariah, Erick Irawadi Alwi, and Muhammad Arfah Asis, “Analisis Malware Hummingbad Dan Copycat Pada Android Menggunakan Metode Hybrid,” Cyber Secur. Dan Forensik Digit., vol. 6, no. 2, pp. 39–47, Feb. 2024, doi: 10.14421/csecurity.2023.6.2.4180.

M. W. A. Prastya et al., “Analisis Ancaman Pishing melalui Aplikasi WhatsApp: Review Metode Studi Literatur,” J. Nas. Komputasi Dan Teknol. Inf. JNKTI, vol. 7, no. 3, pp. 190–197, June 2024, doi: 10.32672/jnkti.v7i3.7551.

K. Ibrahim, F. Dewanta, and N. D. W. Cahyani, “Analisis Perilaku Malware Malware Menggunakan Metode Analisis Dinamis,” EProceedings Eng., vol. 10, no. 5, 2023.

I. Himawan, K. Septianzah, and I. Setiadi, “Analisa Resiko Malware dengan Static MobSF Terhadap Aplikasi Android APK,” Technol. J. Ilm., vol. 14, no. 4, p. 364, Oct. 2023, doi: 10.31602/tji.v14i4.11460.

A. R. Damanik, H. B. Seta, and T. Theresiawati, “Analisis Trojan dan Spyware Menggunakan Metode Hybrid Analysis,” J. Ilm. Matrik, vol. 25, no. 1, pp. 89–97, May 2023, doi: 10.33557/jurnalmatrik.v25i1.2327.

R. N. Yasa and A. C. F. Nugraha, “Perbandingan Keamanan Aplikasi Pesan Instan Android Menggunakan MobSF (Mobile Security Framework) Berdasarkan Beberapa Standar,” Info Kripto, vol. 18, no. 1, pp. 9–14, May 2024, doi: 10.56706/ik.v18i1.88.

W. K. Wong et al., “DecLLM: LLM-Augmented Recompilable Decompilation for Enabling Programmatic Use of Decompiled Code,” Proc. ACM Softw. Eng., vol. 2, no. ISSTA, pp. 1841–1864, June 2025, doi: 10.1145/3728958.

R. Almohaini, I. Almomani, and A. AlKhayer, “Hybrid-Based Analysis Impact on Ransomware Detection for Android Systems,” Appl. Sci., vol. 11, no. 22, p. 10976, Nov. 2021, doi: 10.3390/app112210976.

Y. Agman and D. Hendler, “BPFroid: Robust Real Time Android Malware Detection Framework,” 2021, arXiv. doi: 10.48550/ARXIV.2105.14344.

X. Zhang, F. Breitinger, E. Luechinger, and S. O’Shaughnessy, “Android application forensics: A survey of obfuscation, obfuscation detection and deobfuscation techniques and their impact on investigations,” Forensic Sci. Int. Digit. Investig., vol. 39, p. 301285, Dec. 2021, doi: 10.1016/j.fsidi.2021.301285.

Frenvol De Santonario Magno Moises and Joko Dwi Santoso, “Analisis Malware Android Menggunakan Metode Reverse Engineering,” J. Ilm. Dan Karya Mhs., vol. 1, no. 2, pp. 41–53, Apr. 2023, doi: 10.54066/jikma-itb.v1i2.169.

R. T. Amdani, H. Hafidudin, and M. Iqbal, “Analisis Dan Deteksi Malware Poison Ivy Dengan Metode Malware Analisis Dinamis Dan Malware Analisis Statis,” EProceedings Appl. Sci., vol. 7, no. 2, Apr. 2021, Accessed: Aug. 12, 2025. [Online]. Available: https://openlibrarypublications.telkomuniversity.ac.id/index.php/appliedscience/article/view/14423

G. S. Agung, “Analisis Malware Trojan Dalam File Undangan Pernikahan.Apk Pada Smartphone Android Dengan Metode Hybrid Analysis,” EProceedings Eng., vol. 12, no. 2, pp. 1–6, May 2025.

G. Nenz, T. Kleb, and R. Müller, “Reverse Engineering Labs (Folgearbeit),” other, OST Ostschweizer Fachhochschule, 2023. Accessed: Aug. 12, 2025. [Online]. Available: https://eprints.ost.ch/id/eprint/1140/

T. Sutter, T. Kehrer, M. Rennhard, B. Tellenbach, and J. Klein, “Dynamic Security Analysis on Android: A Systematic Literature Review,” IEEE Access, vol. 12, pp. 57261–57287, 2024, doi: 10.1109/ACCESS.2024.3390612.

S. A. Khan et al., “An Android Applications Vulnerability Analysis Using MobSF,” in 2024 International Conference on Engineering & Computing Technologies (ICECT), Islamabad, Pakistan: IEEE, May 2024, pp. 1–7. doi: 10.1109/ICECT61618.2024.10581312.

A. Basak and D. Tiwari, “API security risk and resilience in financial institutions.” Accessed: Aug. 12, 2025. [Online]. Available: http://www.theseus.fi/handle/10024/883344

S. U. Kusreynada and A. S. Barkah, “Android Apps Vulnerability Detection with Static and Dynamic Analysis Approach using MOBSF,” J. Comput. Sci. Eng. JCSE, vol. 5, no. 1, pp. 46–63, Apr. 2024, doi: 10.36596/jcse.v5i1.789.

A. Iftikhar et al., “Quality Assurance in Digital Forensic Investigations: Optimal Strategies and Emerging Innovations,” Austin J. Forensic Sci. Criminol., vol. 10, no. 2, Oct. 2023, doi: 10.26420/AustinJForensicSciCriminol.2023.1097.

A. R. AlMhanawi and B. M. Nema, “Instant Messaging Security: A Comprehensive Review of Behavior Patterns, Methodologies, and Security Protocols,” J. Al-Qadisiyah Comput. Sci. Math., vol. 16, no. 1, Mar. 2024, doi: 10.29304/jqcsm.2024.16.11440.

A. D. Putra, J. D. Santoso, and I. Ardiansyah, “Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk),” Build. Inform. Technol. Sci. BITS, vol. 4, no. 1, pp. 69–79, June 2022, doi: 10.47065/bits.v4i1.1515.

Permission results with MobSF

Downloads

Published

2025-07-30

Issue

Section

Articles