Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk)


  • Andriyan Dwi Putra * Mail Universitas AMIKOM, Yogyakarta, Indonesia
  • Joko Dwi Santoso Universitas AMIKOM, Yogyakarta, Indonesia
  • Ipung Ardiansyah Universitas AMIKOM, Yogyakarta, Indonesia
  • (*) Corresponding Author
Keywords: Malware; Trojan Downloader; Reverse Engineering; Metasploit Framework; Android

Abstract

The development of smartphone technology with the Android platform has made very rapid progress. Smartphones help and facilitate daily human work such as communicating, shopping, and financial transactions. However, because android is an open- source system, anyone can easily develop android applications that can be downloaded on the android app market. Including applications that have been inserted by malware by application developers, one of which is the Trojan downloader malware. The analysis was carried out by implementing the Trojan downloader malware infection in the health dictionary application using the reverse engineering method. Trojan downloader malware infection uses metasploit framework tools. The application will be infected with the payload created from the metasploit framework. This study will analyze the health dictionary application before and after being infected with the Trojan downloader malware using the reverse engineering method. The results of the analysis on the health dictionary application found that the difference in the size of the application was 10.17 MB, which previously was 10.05 MB. Of course, by changing the file size, the SHA256 hashing changes automatically. In the permissions section, it was found that there were only 9 permissions before being infected, but after being infected, we found 18 additional permissions, bringing the total to 27 permissions

Downloads

Download data is not yet available.

References

G. Statcounter, ‘Mobile Operating System Market Share Worldwide’, 2020. [Online]. Available: Https://Gs.Statcounter.Com/Os-Market-Share/All/Worldwide/2020

Ao Kaspersky Lab, ‘It Threat Evolution Q3 2020 Mobile Statistics’, Securelist, 2020. [Online]. Available: Https://Securelist.Com/It-Threat-Evolution-Q3-2020-Mobile-Statistics/99461/

A. N. Iman And A. Budiyono, ‘Analisis Malware Pada Sistem Operasi Android Menggunakan Permission-Based’, P. 7.

T. P. Setia, A. P. Aldya, And N. Widiyasono, ‘Reverse Engineering Untuk Analisis Malware Remote Access Trojan’, J. Edukasi Dan Penelit. Inform. Jepin, Vol. 5, No. 1, P. 40, Apr. 2019, Doi: 10.26418/Jp.V5i1.28214.

S. Megira, A. R. Pangesti, And F. W. Wibowo, ‘Malware Analysis And Detection Using Reverse Engineering Technique’, J. Phys. Conf. Ser., Vol. 1140, P. 012042, Dec. 2018, Doi: 10.1088/1742-6596/1140/1/012042.

T. Pajar Setia, N. Widiyasono, And A. Putra Aldya, ‘Analysis Malware Flawed Ammyy Rat Dengan Metode Reverse Engineering’, J. Inform. J. Pengemb. It, Vol. 3, No. 3, Pp. 371–379, Oct. 2018, Doi: 10.30591/Jpit.V3i3.1019.

T. A. Cahyanto, V. Wahanggara, And D. Ramadana, ‘Analisis Dan Deteksi Malware Menggunakan Metode Malware Analisis Dinamis Dan Malware Analisis Statis’, Vol. 2, No. 1, P. 12, 2017.

S. M. Myat And M. T. Kyaw, ‘Analysis Of Android Applications By Using Reverse Engineering Techniques’, Vol. 4, No. 3, P. 8, 2019.

G. Developers, ‘What Is Android’, 2021. [Online]. Available: Https://Www.Android.Com/What-Is-Android/

Sugiyono, Metode Penelitian Pendidikan Pendekatan Kuantitatif, Kualitatif, Dan R&D. Bandung: Alfabeta, 2017.

F. Corella And K. Lewison, ‘An Omission-Tolerant Cryptographic Checksum’, P. 30.

Yumnun, L., Kusyanti, A., & Kartikasari, D. (2020). Implementasi Owasp Mobile Security Testing Guide (Mstg) Untuk Pengujian Keamanan Pada Aplikasi Berbasis Android. Jurnal Pengembangan Teknologi Informasi Dan Ilmu Komputer, 3, 10579–10585.

Blake E. Strom Et Al. 2018. Mitre Att&Cktm: Design And Philosophy. Mclean, Va. [Online] Available: Https://Www.Mitre.Org/Sites/Default/Files/Publications/Pr-18-0944-11-Mitre-Attack-Design-And-Philosophy.Pdf

Dwiananda, Rizky & Mardianto, Is. (2019). Exploitation With Reverse_Tcp Method On Android Device Using Metasploit. Jurnal Edukasi Dan Penelitian Informatika (Jepin). 5. 106. 10.26418/Jp.V5i1.26893.

Prathivi, Rastri & Vydia, Vensy. (2017). Analisa Pendeteksian Worm Dan Trojan Pada Jaringan Internet Universitas Semarang Menggunakan Metode Kalsifikasi Pada Data Mining C45 Dan Bayesian Network. Jurnal Transformatika. 14. 77. 10.26623/Transformatika.V14i2.440.

Yantu, Ramdan. (2014). Tutorial Celah Keamanan Pada Php Scripts. Available: Https://Dl.Packetstormsecurity.Net/Papers/General/Phpbugs-Tutorial.Pdf (Diakses Pada Tanggal 15 Februari 2022).

L. Whitney, "Almost No One Is Using Android Marshmallow, Still," Cnet, 2016. [Online]. Available: Http://Www.Cnet.Com/News/Almost-No- One-Is-Using-Androidmarshmallow-Still. (Diakses Pada Tanggal 11 Februari 2022).

V. Savov, "Only 7.5 Percent Of Android Phones Are Running Marshmallow," The Verge, 2016. [Online]. Available: Http://Www.Theverge.Com/Circuitbreaker/2016/5/4/1 1589630/ Android-6-Marshmallow-Os-Distribution- Statistics. (Diakses Pada Tanggal 15 Februari 2022).

Normal Permissions,". [Online]. Available: Https://Developer.Android.Com/Guide/Topics/Security /Normalpermissions. Html (Diakses Pada Tanggal 10 Januari 2022).

Dangerous Permissions,". [Online]. Available: Https://Developer.Android.Com/Guide/Topics/Security /Permissions.Html#Normal-Dangerous. (Diakses Pada Tanggal 14 Desember 2021).


Bila bermanfaat silahkan share artikel ini

Berikan Komentar Anda terhadap artikel Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk)

Dimensions Badge
Article History
Submitted: 2022-04-18
Published: 2022-06-29
Abstract View: 55 times
PDF Download: 43 times
How to Cite
Putra, A., Santoso, J., & Ardiansyah, I. (2022). Analisis Malicious Software Trojan Downloader Pada Android Menggunakan Teknik Reverse Engineering (Studi Kasus: Kamus Kesehatan v2.apk). Building of Informatics, Technology and Science (BITS), 4(1), 69-79. https://doi.org/10.47065/bits.v4i1.1515
Section
Articles