Android is the most popular operating system among mobile devices and the malware targeted explicitly for Android is rapidly growing and spreading across the mobile ecosystem. In this paper, we propose a hybrid analysis of Android malware to retrieve evidential data, generated from or accessed by such mobile malware, which can be adopted as critical evidence for civil and criminal cases. We target on Android malware from Joker Family where we collected and analyzed 62 recently discovered malicious apps, we found that: 11 apps access and store user’s location information, 17 apps track user’s SMS text messages and 58 apps send out user personal information to remote servers. Our proposed approach found that, evidence data including location, timestamp, IP address are still able to be identified from the local file system and logging system. Our main contribution in this research is to provide an effective forensic analysis report on Android malware that can extract critical evidence from the local file systems as well as system logs.
Forensic Analysis on Joker Family Android Malware

Conference/Workshop:
17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
17th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)
Published: 2021
Primary Author: Chen Shi
Secondary Authors: Chris Chao-Chun, Yong Guan
Type: Publication
Research Area: Digital
Related Resources
Likelihood ratios for categorical count data with applications in digital forensics
We consider the forensic context in which the goal is to assess whether two sets of observed data came from the same source or from different sources. In particular, we…
CSAFE Project Update & ASCLD FRC Collaboration
This presentation highlighted CSAFE’s collaboration with the ASCLD FRC Collaboration Hub.
Forensic Analysis on Android Social Networking Applications
This presentation is from the 75th Anniversary Conference of the American Academy of Forensic Sciences, Orlando, Florida, February 13-18, 2023. Posted with permission of CSAFE.
Source Camera Identification on Multi-Camera Phones
Camera identification addresses the scenario where an investigator has a questioned digital image from an unknown camera. The investigator wants to know whether the questioned image was taken by a…