Analisis Malware Ahmyth pada Platform Android Menggunakan Metode Reverse Engineering

  • Widiyasono N
  • Mubarok H
  • Fatwa MF A
N/ACitations
Citations of this article
30Readers
Mendeley users who have this article in their library.

Abstract

Android is the most widely used operating system in the world with a percentage of 74.82% in the Android operating system market share. This fact makes malicious software (malware) developers make mobile phone users with the Android operating system the main target for malware attacks. Attackers can change the application code by entering malicious code, repackaging the application, and publishing the application on the android application market. This study aims to find out how the malware that has been inserted into the android application works by using dynamic analysis and extracting the dangerous licenses used by the ahmyth malware by using reverse engineering techniques. The results of the analysis show that the ahmyth malware will run its service after the device restarts and waits for commands from the C&C server to perform certain actions on the infected device.

Cite

CITATION STYLE

APA

Widiyasono, N., Mubarok, H., & Fatwa MF, A. (2022). Analisis Malware Ahmyth pada Platform Android Menggunakan Metode Reverse Engineering. Generation Journal, 6(2), 73–82. https://doi.org/10.29407/gj.v6i2.17749

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free