Android Malware Detector (MobSF Companion)

Model description

This AI model classifies Android APKs as benign or malicious using features extracted during analysis with MobSF.
Its goal is to complement MobSF reports with a reproducible ML score/decision to support triage prioritization and CI/CD automation.

Intended use

Primary intended uses

  • Enrich the MobSF pipeline: consume analysis features (permissions) and produce a risk score.
  • Research/academia: benchmarking Android malware detection models.

Out-of-scope uses

  • It is not a real-time on-device antivirus.
  • It does not replace manual analysis, reversing, or signature verification.
  • It should not be used as the sole criterion for punitive actions (e.g., bans) without review.

How to use (with MobSF)

MobSF can be automated via its REST API to upload, scan, and retrieve reports, which makes it possible to integrate this model as a post-scan step.

Minimal pipeline (conceptual)

  1. Run analysis in MobSF (API).
  2. Retrieve report.json (or another artifact).
  3. Extract/transform features into the format expected by the model.
  4. Run inference with the model and attach the result back into the workflow (CI/CD, dashboard, etc.).

USAGE API MOBSF

https://github.com/H4ch1rou/NyerAndroidMalwarePOC

Downloads last month
33
Safetensors
Model size
0.1B params
Tensor type
F32
·
Inference Providers NEW
This model isn't deployed by any Inference Provider. 🙋 Ask for provider support

Model tree for Hachirou18/NyerAndroidMalware

Finetuned
(130)
this model