The Android IMO app, developed by PageBites Inc, is a free messaging application known for its user-friendly interface and strong focus on security. With features such as text messaging, voice and video calls, media sharing, and group chats, IMO offers comprehensive messaging experience. It employs end-to-end encryption for message privacy and allows users to set self-destruct timers for added security.
IMO as most of instant messaging application; holds significant value in digital forensics. With its widespread use and diverse features, analyzing the artifacts left behind by IMO can provide valuable insights for forensic investigations. As an integral mode of communication, IMO's messages, media files, and call records can offer crucial evidence in tracking and uncovering illicit activities.
Android IMO artifacts records are in database in the SQLite format which can be found at the following location:
\data\data\com.imo.android.imoim\
This section will discuss how to use ArtiFast to extract Android IMO artifact from Android device's files and what kind of digital forensics insights we can gain from the artifact.
After you have created your case and added evidence for the investigation, at the Artifact Selection phase, you can select Android IMO artifact:
Once ArtiFast parser plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of Android IMO artifact in ArtiFast.
Android IMO Account Information
Android IMO Friends Information
Android IMO File Transfer History
Android IMO Calls
Android IMO Messages
Android IMO User Channels
Android IMO Secret Messages
Android IMO Stories
For more information or suggestions please contact: ekrma.elnour@forensafe.com