Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk)
Abstract
The development of smartphone technology with the Android platform has made very rapid progress. Smartphones help and facilitate daily human work such as communicating, shopping, and financial transactions. However, because android is an open- source system, anyone can easily develop android applications that can be downloaded on the android app market. Including applications that have been inserted by malware by application developers, one of which is the Trojan downloader malware. The analysis was carried out by implementing the Trojan downloader malware infection in the health dictionary application using the reverse engineering method. Trojan downloader malware infection uses metasploit framework tools. The application will be infected with the payload created from the metasploit framework. This study will analyze the health dictionary application before and after being infected with the Trojan downloader malware using the reverse engineering method. The results of the analysis on the health dictionary application found that the difference in the size of the application was 10.17 MB, which previously was 10.05 MB. Of course, by changing the file size, the SHA256 hashing changes automatically. In the permissions section, it was found that there were only 9 permissions before being infected, but after being infected, we found 18 additional permissions, bringing the total to 27 permissions
Downloads
References
G. Statcounter, ‘Mobile Operating System Market Share Worldwide’, 2020. [Online]. Available: Https://Gs.Statcounter.Com/Os-Market-Share/All/Worldwide/2020
Ao Kaspersky Lab, ‘It Threat Evolution Q3 2020 Mobile Statistics’, Securelist, 2020. [Online]. Available: Https://Securelist.Com/It-Threat-Evolution-Q3-2020-Mobile-Statistics/99461/
A. N. Iman And A. Budiyono, ‘Analisis Malware Pada Sistem Operasi Android Menggunakan Permission-Based’, P. 7.
T. P. Setia, A. P. Aldya, And N. Widiyasono, ‘Reverse Engineering Untuk Analisis Malware Remote Access Trojan’, J. Edukasi Dan Penelit. Inform. Jepin, Vol. 5, No. 1, P. 40, Apr. 2019, Doi: 10.26418/Jp.V5i1.28214.
S. Megira, A. R. Pangesti, And F. W. Wibowo, ‘Malware Analysis And Detection Using Reverse Engineering Technique’, J. Phys. Conf. Ser., Vol. 1140, P. 012042, Dec. 2018, Doi: 10.1088/1742-6596/1140/1/012042.
T. Pajar Setia, N. Widiyasono, And A. Putra Aldya, ‘Analysis Malware Flawed Ammyy Rat Dengan Metode Reverse Engineering’, J. Inform. J. Pengemb. It, Vol. 3, No. 3, Pp. 371–379, Oct. 2018, Doi: 10.30591/Jpit.V3i3.1019.
T. A. Cahyanto, V. Wahanggara, And D. Ramadana, ‘Analisis Dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis Dan Malware Analisis Statis’, Vol. 2, No. 1, P. 12, 2017.
S. M. Myat And M. T. Kyaw, ‘Analysis Of Android Applications By Using Reverse Engineering Techniques’, Vol. 4, No. 3, P. 8, 2019.
G. Developers, ‘What Is Android’, 2021. [Online]. Available: Https://Www.Android.Com/What-Is-Android/
Sugiyono, Metode Penelitian Pendidikan Pendekatan Kuantitatif, Kualitatif, Dan R&D. Bandung: Alfabeta, 2017.
F. Corella And K. Lewison, ‘An Omission-Tolerant Cryptographic Checksum’, P. 30.
Yumnun, L., Kusyanti, A., & Kartikasari, D. (2020). Implementasi Owasp Mobile Security Testing Guide (Mstg) Untuk Pengujian Keamanan Pada Aplikasi Berbasis Android. Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 3, 10579–10585.
Blake E. Strom Et Al. 2018. Mitre Att&Cktm: Design And Philosophy. Mclean, Va. [Online] Available: Https://Www.Mitre.Org/Sites/Default/Files/Publications/Pr-18-0944-11-Mitre-Attack-Design-And-Philosophy.Pdf
Dwiananda, Rizky & Mardianto, Is. (2019). Exploitation With Reverse_Tcp Method On Android Device Using Metasploit. Jurnal Edukasi Dan Penelitian Informatika (Jepin). 5. 106. 10.26418/Jp.V5i1.26893.
Prathivi, Rastri & Vydia, Vensy. (2017). Analisa Pendeteksian Worm Dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalsifikasi Pada Data Mining C45 Dan Bayesian Network. Jurnal Transformatika. 14. 77. 10.26623/Transformatika.V14i2.440.
Yantu, Ramdan. (2014). Tutorial Celah Keamanan Pada Php Scripts. Available: Https://Dl.Packetstormsecurity.Net/Papers/General/Phpbugs-Tutorial.Pdf (Diakses Pada Tanggal 15 Februari 2022).
L. Whitney, "Almost No One Is Using Android Marshmallow, Still," Cnet, 2016. [Online]. Available: Http://Www.Cnet.Com/News/Almost-No- One-Is-Using-Androidmarshmallow-Still. (Diakses Pada Tanggal 11 Februari 2022).
V. Savov, "Only 7.5 Percent Of Android Phones Are Running Marshmallow," The Verge, 2016. [Online]. Available: Http://Www.Theverge.Com/Circuitbreaker/2016/5/4/1 1589630/ Android-6-Marshmallow-Os-Distribution- Statistics. (Diakses Pada Tanggal 15 Februari 2022).
Normal Permissions,". [Online]. Available: Https://Developer.Android.Com/Guide/Topics/Security /Normalpermissions. Html (Diakses Pada Tanggal 10 Januari 2022).
Dangerous Permissions,". [Online]. Available: Https://Developer.Android.Com/Guide/Topics/Security /Permissions.Html#Normal-Dangerous. (Diakses Pada Tanggal 14 Desember 2021).
Bila bermanfaat silahkan share artikel ini
Berikan Komentar Anda terhadap artikel Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk)
Pages: 69-79
Copyright (c) 2022 Andriyan Dwi Putra, Joko Dwi Santoso, Ipung Ardiansyah

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under Creative Commons Attribution 4.0 International License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (Refer to The Effect of Open Access).





















