DocSwap is an Android malware first identified in 2025, and attributed to Kimsuky. DocSwap’s name is a combination of its Korean name "문서열람 인증 앱" (Document Viewing Authentication App) and a phishing page masquerading as CoinSwap at the C2 address. Based on DocSwap’s name and Korean-language strings, DocSwap potentially targets mobile device users in South Korea. Several variants of DocSwap exist; one of the latest samples indicates that the adversary added a native decryption function that decrypts an internal APK.[1][2]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Mobile | T1453 | Abuse Accessibility Features |
Once accessibility permissions are granted, DocSwap has abused the Accessibility Service to execute a keylogging capability.[1][2] |
|
| Mobile | T1437 | .001 | Application Layer Protocol: Web Protocols |
DocSwap has sent a POST request to downcat.php while recording the access time and APK URL path.[1] |
| Mobile | T1429 | Audio Capture |
DocSwap has the ability to start and stop audio recording.[1][2] |
|
| Mobile | T1616 | Call Control |
DocSwap has requested for the |
|
| Mobile | T1533 | Data from Local System |
DocSwap has checked for the |
|
| Mobile | T1624 | .001 | Event Triggered Execution: Broadcast Receivers |
DocSwap has registered the following intents to automatically execute MainService on device reboot: |
| Mobile | T1627 | Execution Guardrails |
DocSwap has checked if the victim has accessed the malicious URL from a PC. If so, DocSwap redirected the victim to scan the malicious QR code using a mobile device.[1] |
|
| Mobile | T1646 | Exfiltration Over C2 Channel |
DocSwap has used a hardcoded IP address and port for C2 and exfiltration over socket communication.[2] |
|
| Mobile | T1420 | File and Directory Discovery |
DocSwap has checked for the |
|
| Mobile | T1541 | Foreground Persistence |
DocSwap has checked for the |
|
| Mobile | T1630 | .002 | Indicator Removal on Host: File Deletion |
DocSwap has the ability to delete files and directories.[1][2] |
| Mobile | T1544 | Ingress Tool Transfer |
DocSwap has the ability to upload and download files via socket communication.[1][2] |
|
| Mobile | T1417 | .001 | Input Capture: Keylogging |
When an accessibility event occurs, DocSwap has used a keylogger to record the target application’s icon, package name, event text, and timestamp.[1][2] |
| Mobile | T1430 | Location Tracking |
DocSwap has the ability to collect location information and to start/stop location information from being sent to the C2 server.[1][2] |
|
| Mobile | T1655 | .001 | Masquerading: Match Legitimate Name or Location |
DocSwap has masqueraded as a VPN application, using the same package name ( |
| Mobile | T1575 | Native API |
DocSwap has decrypted the encrypted APK file security.dat using the |
|
| Mobile | T1406 | Obfuscated Files or Information |
DocSwap has used an obfuscated APK file and Base64-encoded URLs and files.[1][2] |
|
| Mobile | T1660 | Phishing |
DocSwap has used phishing messages (smishing) and emails to gain initial access to devices.[1] |
|
| Mobile | T1636 | .002 | Protected User Data: Call Log |
DocSwap has requested for the |
| .003 | Protected User Data: Contact List |
DocSwap has requested for the |
||
| .004 | Protected User Data: SMS Messages |
DocSwap has checked for the |
||
| .005 | Protected User Data: Accounts |
DocSwap has the ability to send registered account information.[1][2] |
||
| Mobile | T1418 | Software Discovery |
DocSwap has the ability to send installed application information, including application name, package name, installation timestamp, icon, and properties.[2] |
|
| Mobile | T1426 | System Information Discovery |
DocSwap has checked for the |
|
| Mobile | T1422 | System Network Configuration Discovery |
DocSwap has checked for the |
|
| .002 | Wi-Fi Discovery |
DocSwap has checked for the |
||
| Mobile | T1512 | Video Capture |
DocSwap has the ability to start and stop camera recording.[1][2] |
|