Native API

Adversaries may use Android’s Native Development Kit (NDK) to write native functions that can achieve execution of binaries or functions. Like system calls on a traditional desktop operating system, native code achieves execution on a lower level than normal Android SDK calls.

The NDK allows developers to write native code in C or C++ that is compiled directly to machine code, avoiding all intermediate languages and steps in compilation that higher level languages, like Java, typically have. The Java Native Interface (JNI) is the component that allows Java functions in the Android app to call functions in a native library.[1]

Adversaries may also choose to use native functions to execute malicious code since native actions are typically much more difficult to analyze than standard, non-native behaviors.[2]

ID: T1575
Sub-techniques:  No sub-techniques
Tactic Type: Post-Adversary Device Access
Platforms: Android
Version: 2.0
Created: 28 April 2020
Last Modified: 24 October 2025

Procedure Examples

ID Name Description
S0540 Asacub

Asacub has implemented functions in native code.[3]

S0432 Bread

Bread has used native code in an attempt to disguise malicious functionality.[4]

S0529 CarbonSteal

CarbonSteal has seen native libraries used in some reported samples [5]

S1083 Chameleon

Chameleon has used the KeyguardManager API to evaluate the device’s locking mechanism and the AlarmManager API to schedule tasks.[6]

S0555 CHEMISTGAMES

CHEMISTGAMES has utilized native code to decrypt its malicious payload.[7]

S1231 GodFather

GodFather has hooked onto the getEnabledAccessibilityServiceList API to return an empty list of active services, which hides GodFather and other active services.[8]

S0544 HenBox

HenBox has contained native libraries.[9]

S1185 LightSpy

LightSpy's main executable and modules use native libraries to execute targeted functionality.[10][11][12][13]

C0054 Operation Triangulation

During Operation Triangulation, the threat actors use the Audio Queue API to record audio.[14][15]

S0545 TERRACOTTA

TERRACOTTA has included native modules.[16]

Mitigations

This type of attack technique cannot be easily mitigated with preventive controls since it is based on the abuse of system features.

Detection Strategy

ID Name Analytic ID Analytic Description
DET0717 Detection of Native API AN1847

This is abuse of standard OS-level APIs and are therefore typically undetectable to the end user.

References