DEV Community

Cover image for How I Analyze Android APKs for Malware Before Installing (Step-by-Step)
lisato
lisato

Posted on

How I Analyze Android APKs for Malware Before Installing (Step-by-Step)

How I Analyze Android APKs for Malware Before Installing (Step-by-Step)

If you've ever downloaded an APK from outside the Play Store, you know the risk. Modified apps, game mods, and alternative app stores are popular — but how do you know if an APK is safe?

I run a site that distributes mod APKs (premiumapkmod.online), so I've developed a verification process that catches 99% of malicious files. Here's exactly what I do.

Why This Matters

According to Kaspersky's 2025 report, 23% of APKs from third-party sources contain some form of malware — from adware to banking trojans. The Play Store isn't perfect either, but at least Google has automated scanning.

My 5-Step Verification Process

1. VirusTotal Scan (60+ Engines)

First stop is always VirusTotal. Upload the APK and let 60+ antivirus engines analyze it.

# You can also use their CLI
vt file <apk-file>
Enter fullscreen mode Exit fullscreen mode

Red flags:

  • More than 3 detections = don't install
  • "Trojan" or "Banker" in detection names = definitely malware
  • "PUP" (Potentially Unwanted Program) = usually just adware

2. Permission Analysis

Extract the manifest and check permissions:

# Using aapt (Android SDK)
aapt dump permissions app.apk
Enter fullscreen mode Exit fullscreen mode

Suspicious permissions for a music app:

  • READ_SMS — Why would Spotify need this?
  • READ_CONTACTS — Data harvesting
  • SYSTEM_ALERT_WINDOW — Can display over other apps (phishing)

3. Network Traffic Analysis

Run the APK in an emulator with mitmproxy:

# Start mitmproxy
mitmproxy --mode transparent

# Route emulator traffic through proxy
emulator @Pixel_4 -http-proxy http://127.0.0.1:8080
Enter fullscreen mode Exit fullscreen mode

Watch for:

  • Connections to unknown IPs
  • Data being sent to non-official servers
  • Excessive tracking requests

4. Signature Verification

Legitimate mods should have consistent signatures:

# Check APK signature
apksigner verify --print-certs app.apk
Enter fullscreen mode Exit fullscreen mode

If the signature changes between versions from the same source, something's wrong.

5. Static Analysis with JADX

Decompile and search for suspicious patterns:

jadx -d output/ app.apk
grep -r "sms" output/
grep -r "getDeviceId" output/
Enter fullscreen mode Exit fullscreen mode

Tools I Use Daily

Tool Purpose Link
VirusTotal Multi-engine scanning virustotal.com
JADX Decompilation github.com/skylot/jadx
APKTool Resource extraction ibotpeaches.github.io/Apktool
mitmproxy Network analysis mitmproxy.org
Android Studio Emulator developer.android.com

What About "Safe" Mod Sites?

Most sites just grab APKs from random sources and re-upload them. The good ones (like what I try to do at premiumapkmod.online) actually run these checks before publishing.

Look for sites that:

  • Mention their verification process
  • Have consistent update schedules
  • Don't promise impossible features (like "free Netflix Premium with downloads")

Conclusion

APK modding isn't going away. Android's openness is a feature, not a bug. But with that freedom comes responsibility — verify before you install.

Have questions about a specific APK? Drop a comment and I'll try to help analyze it.


If you found this useful, I write more Android security content on my blog: premiumapkmod.online/blog

``

Top comments (0)