Threema is an open-source end-to-end encrypted instant messaging application and does not require a phone number or any other personally identifiable information. It anonymizes users to some extent. Users can make voice and video calls, and send multimedia, locations, voice messages, and files in addition to text messaging.
Messaging application in mobile phones is a rich source of information when it comes to digital forensics investigation. That’s because those applications hold data related to the user’s messaging history along with media attachments and call logs. Threema as an open-source end-to-end encrypted instant messaging application can be a valuable source of information. Threema encrypts all communications end-to-end, including group messages, photos, videos, files, and voice calls. Threema includes its app-specific encryption based on AES-256 to protect stored messages and media.
iOS Threema App artifact can be found at the following location:
/private/var/mobile/Containers/Data/Application/<App_GUID>/ThreemaData.sqlite
This section will discuss how to use ArtiFast to extract iOS Threema artifact from iOS device's files and what kind of digital forensics insights we can gain from the artifact.
After you have created your case and added evidence for the investigation, at the Artifact Selection phase, you can select iOS Threema artifact:
Once ArtiFast parser plugins complete processing the artifact for analysis, it can be reviewed via “Artifact View” or “Timeline View,” with indexing, filtering, and searching capabilities. Below is a detailed description of iOS Threema App artifact in ArtiFast.
iOS Threema Contacts
iOS Threema Messages
iOS Threema Conversations
For more information or suggestions please contact: ekrma.elnour@forensafe.com