Oxygen Forensic® Detective v.15.5 Introduces Support For Android Devices With UNISOC Chipsets

The latest update to our flagship solution is here, Oxygen Forensic® Detective v.15.5!

This version introduces support for Android devices based on the UNISOC T610/T618/T700 chipsets, analysis of drive partitions protected with BitLocker, parsing of Samsung Customization Service and many other features.

Support for the UNISOC T610/T618/T700 Chipsets

In Oxygen Forensic® Detective v.15.5 we’ve added the ability to extract hardware keys and decrypt physical dumps of Android devices based on the UNISOC T610/T618/T700 chipsets, running Android OS 10-13 and having File-Based Encryption (FBE). Please use the Spreadtrum method for these types of extractions. Supported devices include Blackview Tab 15, Digma Pro 1480E 4G, Infinix Hot 12 Play Unisoc T610, Lenovo Tab M10 (3rd Gen), Micromax In 2b, Realme C21Y, Teclast T40 plus, and more.

Support for the MT6761 Chipset

We’ve extended our MTK Android method. Oxygen Forensic® Detective v.15.5 enables extraction of hardware keys and decryption of Android devices based on the MT6761 chipset. Our support covers Xiaomi Poco C50, Xiaomi Redmi A1, Xiaomi Redmi A1+, Honor 8S 2020, Huawei Y5 2019, Huawei Y6 Prime 2019, Xiaomi Redmi 6A, and other models.

Extended Support for Samsung Exynos Devices

Oxygen Forensic® Detective v.15.5 adds support for Samsung Exynos devices having Full-Disk Encryption (FDE) and upgraded to Android OS 10-11. This method offers passcode brute force.


Get The Latest DFIR News

Join the Forensic Focus newsletter for the best DFIR articles in your inbox every month.


Unsubscribe any time. We respect your privacy - read our privacy policy.

Other Device Extractor Updates

Our updated Oxygen Forensic® Device Extractor introduces several other enhancements:

  • Updated extraction of Twitter, Viber, WhatsApp, and WhatsApp Business data via Android Agent.
  • Added keychain extraction via iOS Agent from Apple iOS devices with versions 15.0 – 15.5.
  • Added file system extraction via iOS Agent from Apple iOS devices with versions 15.0 – 15.7.1 and 16.0 – 16.1.2.
  • Added full file system and keychain extraction via checkm8 from Apple iOS devices with version 15.7.5.

App Support

We’ve added support for the following new apps:

  • Hide It Pro (Android)
  • Notepad Vault-AppHider (Android)
  • Notion (Android)
  • Tappsk (Apple iOS)

Moreover, we have added support for a valuable artifact – Samsung Customization Service (com.Samsung.Android.rubin.app). It collects and stores information about the user activity: application usage history, paces, location history, motion history, web history, search history, Wi-Fi connection history, settings, notifications, and events logs.

The total number of supported app versions now exceeds 38,500.

Import of Telegram Exported Data

We’ve added another source for acquiring Telegram data. Now investigators can import and parse Telegram Exported Data files that can be saved using the “Export Telegram Data” option in the Telegram app settings. To import them into our software, click the Downloaded Accounts Data option located on the software Home screen.

Telegram Exported Data files can contain the following information:

  • Account information
  • Contacts
  • Chats
    • Private chats
    • Chats with bots
    • Private channels and groups (only account messages)
    • Public channels and groups (only account messages)
  • Active sessions
  • Attachments
    • Photos
    • Videos
    • Voice messages
    • Video messages
    • Stickers
    • GIF

Cloud Extractor Updates

We’ve added several enhancements to our Cloud Extractor tool:

  • Extraction of Telegram artifacts: reactions, avatars, blocked users, group and channel requests, and Premium account information
  • Updated Facebook data extraction
  • Updated the ability to authorize in Tinder

Learn more about Oxygen Forensic® Cloud Extractor.

Analysis of Drive Partitions Protected with BitLocker

In Oxygen Forensic® Detective v.15.5 we’ve added the ability to analyze drive partitions protected with BitLocker. There are four methods of analysis:

  • If a drive partition is protected and locked, Oxygen Forensic® KeyScout can decrypt it with a known password or BitLocker recover key.
  • If a drive partition is protected and locked, Oxygen Forensic® KeyScout can also decrypt it with a FVEK (Full Volume Encryption Key) or a VMK (Volume Master Key) extracted from RAM memory.
  • If a drive partition is protected, but protectors are deleted or disabled, Oxygen Forensic® KeyScout detects this state and automatically decrypts the drive.
  • If a drive partition is protected but unlocked during the Oxygen Forensic® KeyScout work, investigators can use Oxygen Forensic® KeyScout to decrypt it or use the OS API to find data in a decrypted logical drive.

Analysis of Hibernation Files

Investigators can now analyze hibernation files that show the state of the machine before hibernation. These files might include recent processes, malware analysis, a list of open apps, information regarding open apps, internet history, media such as videos, photos, passwords, geolocation information, and timestamps.

New and Updated Artifacts

With the updated Oxygen Forensic® KeyScout, users can collect the following new artifacts:

  • Known network connections from Windows
  • Saved pop-up notifications from macOS
  • Briar data from Windows and Linux
  • Notepad++ from Windows and Linux
  • Information about the installed Debian Package/Advanced Packaging Tool packages from Linux

Updated artifact support includes:

  • User credentials from Windows Credential Manager
  • Telegram data from macOS

Learn more about Oxygen Forensic® KeyScout.

Interested in trying out Oxygen Forensic® Detective v.15.5? Request a free trial.

Leave a Comment

Latest Videos

Digital Forensics News Round-Up, February 21 2024 #digitalforensics #dfir

Forensic Focus 21st February 2024 6:19 pm

Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts. 

The discussion covers how MSAB partners with law enforcement to develop custom workflows for mobile device acquisitions that facilitate ISO compliance. Alan explains MSAB's managed service offering, where approved MSAB staff can remotely access a customer's XEC Director server to assist with software updates and troubleshooting. He emphasizes the strict data segregation policies enforced by customers to prevent MSAB from accessing any sensitive case data.

Looking ahead, Alan mentions MSAB's new CEO and hints at some exciting developments coming down the pipeline. He spotlights recent enhancements to XEC Director's speed and database functionality for managing large estates of networked Kiosks. Alan also plugs the new XEC Director training he created to help users fully leverage the platform's capabilities.

00:00 – Introduction to Alan Platt
07:00 – Training
12:00 – Workflows
17:20 – Ensuring a secure environment
19:45 – Customer training
20:35 – Helping customers comply with ISO accreditation
25:00 – Validation and verification
27:30 – ISO standards
30:00 – MSAB’s pipeline plans
32:40 – XEC Director 
43:45 – Privacy of user data

Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts.

The discussion covers how MSAB partners with law enforcement to develop custom workflows for mobile device acquisitions that facilitate ISO compliance. Alan explains MSAB's managed service offering, where approved MSAB staff can remotely access a customer's XEC Director server to assist with software updates and troubleshooting. He emphasizes the strict data segregation policies enforced by customers to prevent MSAB from accessing any sensitive case data.

Looking ahead, Alan mentions MSAB's new CEO and hints at some exciting developments coming down the pipeline. He spotlights recent enhancements to XEC Director's speed and database functionality for managing large estates of networked Kiosks. Alan also plugs the new XEC Director training he created to help users fully leverage the platform's capabilities.

00:00 – Introduction to Alan Platt
07:00 – Training
12:00 – Workflows
17:20 – Ensuring a secure environment
19:45 – Customer training
20:35 – Helping customers comply with ISO accreditation
25:00 – Validation and verification
27:30 – ISO standards
30:00 – MSAB’s pipeline plans
32:40 – XEC Director
43:45 – Privacy of user data

YouTube Video UCQajlJPesqmyWJDN52AZI4Q_ifoHVkjJtRc

How MSAB Is Managing The Digital Forensics Challenges Of Frontline Policing

Forensic Focus 21st February 2024 3:07 pm

Podcast Ep. 80 Recap: Empowering Law Enforcement With Nick Harvey From Cellebrite

Forensic Focus 20th February 2024 11:49 am

This error message is only visible to WordPress admins

Important: No API Key Entered.

Many features are not available without adding an API Key. Please go to the YouTube Feed settings page to add an API key after following these instructions.

Latest Articles