This project provides an analysis of Android malware using static features. We leverage Google Colab Notebook to perform static analysis on Android APK files, extracting relevant features and providing insights into potential malicious behavior. This README serves as a guide to set up and use the analysis notebook.
Before getting started, make sure you have the following prerequisites:
- Python 3.x
- Google Colab Notebook
- Required Python packages (you can install them using
pip
):- pandas
- scikit-learn
- matplotlib
- seaborn
- APKTool (for APK decompilation)
-
Clone this repository to your local machine:
git clone https://github.com/srijansingh08/Android_Malware_Analysis.git 1.Navigate to the project directory: cd Android_Malware_Analysis 2.Create a virtual environment (optional but recommended): python -m venv venv 3.Activate the virtual environment: On Windows: venv\Scripts\activate On macOS and Linux: source venv/bin/activate 4.Install the required Python packages: pip install -r requirements.txt
1.Download Android APK files that you want to analyze and place them in the data/apk_samples directory.
2.Open Google Colab Notebook
3.Open the Android_Malware_Analysis.ipynb notebook in Google Colab.
4.Follow the instructions in the notebook to perform the analysis on your APK samples.
- Extracts static features from Android APK files.
- Provides visualizations and insights into the analysis results.
- Allows for customizable feature extraction and analysis.
- Supports both benign and malicious APKs.