Malware Analysis and Detection in Android 15 Devices through Reverse Engineering Techniques

Authors

  • Anthony Alexander Contreras Espinoza Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la información, Machala, El Oro, Ecuador. https://orcid.org/0009-0006-3028-0463
  • Joofre Antonio Honores Tapia Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la información, Machala, El Oro, Ecuador. https://orcid.org/0000-0001-8612-3025
  • Milton Rafael Valarezo Pardo Universidad Técnica de Machala, Facultad de Ingeniería Civil, Carrera de Tecnologías de la información, Machala, El Oro, Ecuador. https://orcid.org/0000-0003-1819-2074
  • Tania Yesminia Contreras Alonso Unidad Educativa Ismael Pérez Pazmiño, Machala, El Oro, Ecuador https://orcid.org/0009-0009-3951-765X

DOI:

https://doi.org/10.33936/isrtic.v10i1.8098

Keywords:

Android, malware, reverse engineering, static and dynamic análisis, MagisTV

Abstract

This article presents a case study on malware analysis and detection in Android devices, focusing on the IPTV application MagisTV running on Android 8 and Android 15. MagisTV was selected as the unit of analysis due to its widespread use, its request for sensitive permissions and its intensive, potentially abusive network traffic. A hybrid, reverse-engineering-guided approach is used, combining static analysis of the Manifest, components, native libraries and sensitive APIs with dynamic analysis of runtime behaviour under controlled usage scenarios: startup, login, menu navigation, video streaming, background use, forced close and restart, storage operations, persistence test and TLS interception attempts. The methodology relies on specialised tools (MobSF, Apktool, Androguard, JADX, ADB/logcat, monkey/UIAutomator, tcpdump, Wireshark and mitmproxy) and on the systematic capture of network traces and system events, preserving end to end traceability between code level findings and observable behaviour. The results show that MagisTV exhibits a broad permission surface and complex architecture, but that in the tested scenarios it behaves as an IPTV client, without effective use of camera or microphone and without auto start after reboot, while still maintaining continuous or intermittent communications depending on the Android version. The comparison between Android 8 and Android 15 highlights differences in observability linked to platform hardening, particularly in storage access and background execution. The study underscores the importance of integrating static and dynamic evidence and of explicitly considering the Android version as contextual information for explainable detection and for the design of educational labs in mobile malware analysis.

Downloads

Download data is not yet available.

References

Aamir, M., Iqbal, M. W., Nosheen, M., Ashraf, M. U., Shaf, A., Almarhabi, K. A., Alghamdi, A. M., & Bahaddad, A. A. (2024). AMDDLmodel: Android smartphones malware detection using deep learning model. PLOS ONE, 19(1), e0296722. https://doi.org/10.1371/journal.pone.0296722

Almomani, I., Ahmed, M., & El-Shafai, W. (2022). Android malware analysis in a nutshell. PLOS ONE, 17(7), e0270647. https://doi.org/10.1371/journal.pone.0270647

Chen, Y.-C., Chen, H.-Y., Takahashi, T., Sun, B., & Lin, T.-N. (2021). Impact of Code Deobfuscation and Feature Interaction in Android Malware Detection. IEEE Access, 9, 123208-123219. https://doi.org/10.1109/ACCESS.2021.3110408

Gao, H., Cheng, S., & Zhang, W. (2021). GDroid: Android malware detection and classification with graph convolutional network. Computers & Security, 106, 102264. https://doi.org/10.1016/j.cose.2021.102264

Gohari, M., Hashemi, S., & Abdi, L. (2021). Android Malware Detection and Classification Based on Network Traffic Using Deep Learning. 2021 7th International Conference on Web Research (ICWR), 71-77. https://doi.org/10.1109/ICWR51868.2021.9443025

Gu, J., Zhu, H., Han, Z., Li, X., & Zhao, J. (2024). GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding. Computers & Security, 140, 103807. https://doi.org/10.1016/j.cose.2024.103807

Manzil, H. H. R., & Manohar Naik, S. (2023). Android malware category detection using a novel feature vector-based machine learning model. Cybersecurity, 6(1), 6. https://doi.org/10.1186/s42400-023-00139-y

Muzaffar, A., Ragab Hassen, H., Lones, M. A., & Zantout, H. (2022). An in-depth review of machine learning based Android malware detection. Computers & Security, 121, 102833. https://doi.org/10.1016/j.cose.2022.102833

Palma, C., Ferreira, A., & Figueiredo, M. (2023). Explainable Machine Learning for Malware Detection on Android Applications. Information, 15(1). https://doi.org/10.3390/info15010025

Pathak, A., Kumar, Th. S., & Barman, U. (2024). Static analysis framework for permission-based dataset generation and android malware detection using machine learning. EURASIP Journal on Information Security, 2024(1), 33. https://doi.org/10.1186/s13635-024-00182-3

Sanna, S. L., Soi, D., Maiorca, D., Fumera, G., & Giacinto, G. (s. f.). A risk estimation study of native code vulnerabilities in Android applications. Recuperado 29 de octubre de 2025, de https://dx.doi.org/10.1093/cybsec/tyae015

Smmarwar, S. K., Gupta, G. P., & Kumar, S. (2024). Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review. Telematics and Informatics Reports, 14, 100130. https://doi.org/10.1016/j.teler.2024.100130

Xu, Q., Zhao, D., Yang, S., Xu, L., & Li, X. (2023). Android Malware Detection Based on Behavioral-Level Features with Graph Convolutional Networks. Electronics, 12(23). https://doi.org/10.3390/electronics12234817

Published

2026-01-30

How to Cite

[1]
Contreras Espinoza, A.A., Honores Tapia, J.A., Valarezo Pardo, M.R. and Contreras Alonso, T.Y. 2026. Malware Analysis and Detection in Android 15 Devices through Reverse Engineering Techniques . Informática y Sistemas. 10, 1 (Jan. 2026), 24-. DOI:https://doi.org/10.33936/isrtic.v10i1.8098.

Issue

Section

Regular Papers

Most read articles by the same author(s)