PENERAPAN TOOLS JADX PADA SERANGAN MALWARE BERBASIS ANDROID MENGGUNAKAN METODE NIST : STUDI KASUS UNDANGAN.APK

Bashor Fauzan Muthohirin, Alfin Zahrotun Nasuhah, Denar Regata Akbi

Abstract


Perkembangan teknologi smartphone dengan sistem operasi Android yang pesat telah membuat pengguna menghabiskan rata-rata 5,3 jam per hari. Hal tersebut menjadikan smartphone dengan sistem operasi Android rentan terhadap ancaman malware, termasuk serangan melalui aplikasi berbahaya seperti Undang.apk yang didistribusikan melalui pesan WhatsApp. Serangan ini menggunakan teknik sosial engineering untuk melakukan menipuan, mencuri data pribadi, dan menyebabkan kerugian material kepada korban. Penelitian ini bertujuan untuk menganalisis malware Undang.apk menggunakan metode forensik NIST, Proses awal investigasi dilakukan dengan melakukan akuisisi barang bukti digital menggunakan MOBILedit Forensic Tool, identifikasi malware melalui VirusTotal, serta analisis struktur kode APK menggunakan JADX GUI. Hasil penelitian menunjukkan bahwa malware tersebut memanfaatkan izin berbahaya untuk membaca dan mengirim pesan korban ke bot Telegram milik pelaku. Laporan akhir menyajikan temuan penting yang tidak hanya dapat digunakan sebagai bukti dalam proses hukum, tetapi juga sebagai panduan mitigasi untuk mencegah ancaman serupa di masa mendatang.

 Kata Kunci: Malware, Android, JADX, Forensics, NIST.

  

ABSTRACT

 The rapid development of smartphone technology with the Android operating system has made users spend an average of 5.3 hours per day. This makes smartphones with the Android operating system vulnerable to malware threats, including attacks through malicious applications such as Undang.apk which are distributed via WhatsApp messages. This attack uses social engineering techniques to commit fraud, steal personal data, and cause material losses to victims. This study aims to analyze the Undang.apk malware using the NIST forensic method. The initial investigation process was carried out by acquiring digital evidence using the MOBILedit Forensic Tool, identifying malware through VirusTotal, and analyzing the APK code structure using JADX GUI. The results of the study showed that the malware utilized dangerous permissions to read and send victim messages to the perpetrator's Telegram bot. The final report presents important findings that can not only be used as evidence in legal proceedings, but also as a mitigation guide to prevent similar threats in the future.

 Keywords: Malware, Android, JADX, Forensics, NIST.


References


“Indonesia Jadi Negara Paling Kecanduan HP di 2023 - GoodStats Data.” Accessed: Dec. 06, 2024. [Online]. Available: https://data.goodstats.id/statistic/indonesia-jadi-negara-paling-kecanduan-hp-di-2023-BH8MU

“5 Ransomware Paling Banyak Ditemukan di Indonesia | Databoks.” Accessed: Oct. 26, 2024. [Online]. Available: https://databoks.katadata.co.id/teknologi-telekomunikasi/statistik/8356afa334da6d9/5-ransomware-paling-banyak-ditemukan-di-indonesia

A. Mutia, “Kerugian Akibat Kebocoran Data Financial (2021),” databoks.katadata.co.id, 2022. [Online]. Available: https://databoks.katadata.co.id/layanan-konsumen-kesehatan/statistik/83e746437b06b9c/ini-sederet-kerugian-yang-dialami-publik-akibat-kebocoran-data-finansial

M. Wade, “Digital hostages: Leveraging ransomware attacks in cyberspace,” Business Horizons, vol. 64, no. 6, pp. 787–797, Nov. 2021, doi: 10.1016/j.bushor.2021.07.014.

A. Salem, S. Banescu, and A. Pretschner, “Maat: Automatically Analyzing VirusTotal for Accurate Labeling and Effective Malware Detection,” ACM Trans. Priv. Secur., vol. 24, no. 4, pp. 1–35, Nov. 2021, doi: 10.1145/3465361.

R. M. Abou-Elzahab, M. F. Al Rahmawy, and T. T. Hamza, “Comparative Study of Different Mobile Forensic Tools for Extracting Evidence from Android Devices,” Mansoura Journal for Computer and Information Sciences, vol. 16, no. 1, pp. 1–12, Jun. 2020, doi: 10.21608/mjcis.2020.321070.

M. R. Khan, “Network Traffic Based Detection of Repackaged Android Apps via Mobile Fog Computing,” International Journal of Future Generation Communication and Networking, vol. 14, no. 1, 2021.

P. Agrawal and B. Trivedi, “Unstructured Data Collection from APK files for Malware Detection,” IJCA, vol. 176, no. 28, pp. 42–45, Jun. 2020, doi: 10.5120/ijca2020920308.

M. Koprawi and F. D. Ikram, “Forensic analysis on discord application using the National Institute of Standards and Technology (NIST) Method,” Jurnal Mandiri IT, vol. 12, no. 1, Art. no. 1, Aug. 2023, doi: 10.35335/mandiri.v12i1.224.

A. M. Afdal, Y. Salim, and A. R. Manga, “ANALISIS BUKTI DIGITAL FORENSIK PADA DISCORD MENGGUNAKAN METODE NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY,” BUSITI, vol. 3, no. 4, pp. 293–300, Nov. 2022, doi: 10.33096/busiti.v3i4.1425.

R. Umar, I. Riadi, and B. F. Muthohirin, “Acquisition of Email Service Based Android Using NIST,” Kinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, pp. 263–270, Jul. 2018, doi: 10.22219/kinetik.v3i3.637.




DOI: https://doi.org/10.46576/syntax.v5i2.5489

Article Metrics

Abstract view : 2 times
PDF (Bahasa Indonesia) – 1 times

Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

INDEXING:

 

Lisensi Creative Commons

Syntax: Journal of Software Engineering, Computer Science and Information Technology

Ciptaan disebarluaskan di bawah Lisensi Creative Commons Atribusi 4.0 Internasional.