← Course Dashboard
Module 4

📱 Module 4: Mobile App (APK) Analysis

Mobile devices are central to modern communication, making malicious Android apps (APKs) a primary target for cyber investigations.

Historically, analyzing an APK required complex command-line reverse engineering tools like apktool or jadx. Today, with tools like Google Gemini, you can do this entirely in your browser with no coding experience required!


1️⃣ The Unzip Trick: No Tools Required

Did you know that an Android APK is actually just a .zip archive in disguise? You don't need hacker software to open it.

Step-by-Step Extraction:

  1. Rename the File: Copy the suspicious file (payload.apk) to your desktop and rename the extension to .zip (so it becomes payload.zip).
  2. Extract: Double-click the ZIP file (or right click -> extract) to open it just like a normal folder.
  3. Explore the Contents: Inside, you will see folders like META-INF, res, and critical files like AndroidManifest.xml and classes.dex (the actual app code).

2️⃣ Uploading the Code to Gemini

Now that we have the raw files, we can use an AI with a massive "context window"—like Google Gemini—to read and analyze them instantly.

Analyzing the Android Manifest

The AndroidManifest.xml file functions as the "passport" for the app. It declares exactly what permissions the app is requesting from the phone.

Decoding Complex Scripts and Assets

If the app uses JavaScript, React Native, or stores malicious URLs in its assets/ folder, humans struggle to read the minified text. AI shines at it.


[!CAUTION] Operational Security (OpSec): Never upload a live malicious APK or highly sensitive police evidence to public free tiers of chatbots. Ensure you are using secure, enterprise environments (like Gemini Workspace) where your data is not used to train future public models!