ID | Name |
---|---|
T1628.001 | Suppress Application Icon |
T1628.002 | User Evasion |
T1628.003 | Conceal Multimedia Files |
A malicious application could suppress its icon from being displayed to the user in the application launcher. This hides the fact that it is installed, and can make it more difficult for the user to uninstall the application. Hiding the application's icon programmatically does not require any special permissions.
This behavior has been seen in the BankBot/Spy Banker family of malware.[1][2][3]
Beginning in Android 10, changes were introduced to inhibit malicious applications’ ability to hide their icon. If an app is a system app, requests no permissions, or does not have a launcher activity, the application’s icon will be fully hidden. Further, if the device is fully managed or the application is in a work profile, the icon will be fully hidden. Otherwise, a synthesized activity is shown, which is a launcher icon that represents the app’s details page in the system settings. If the user clicks the synthesized activity in the launcher, they are taken to the application’s details page in the system settings.[4][5]
ID | Name | Description |
---|---|---|
S0440 | Agent Smith |
Agent Smith can hide its icon from the application launcher.[6] |
S0525 | Android/AdDisplay.Ashas |
Android/AdDisplay.Ashas can hide its icon and create a shortcut based on the C2 server response.[7] |
S0655 | BusyGasper |
BusyGasper can hide its icon.[8] |
S0480 | Cerberus |
Cerberus hides its icon from the application drawer after being launched for the first time.[9] |
S0505 | Desert Scorpion |
Desert Scorpion can hide its icon.[10] |
S0550 | DoubleAgent |
DoubleAgent has hidden its app icon.[11] |
S1054 | Drinik | |
S0509 | FakeSpy |
FakeSpy can hide its icon if it detects that it is being run on an emulator.[13] |
S0408 | FlexiSpy |
FlexiSpy is capable of hiding SuperSU's icon if it is installed and visible.[14] FlexiSpy can also hide its own icon to make detection and the uninstallation process more difficult.[15] |
S1103 | FlixOnline |
FlixOnline can hide its application icon.[16] |
S0423 | Ginp | |
S0406 | Gustuff | |
S0485 | Mandrake | |
S0411 | Rotexy | |
S1062 | S.O.V.A. | |
S0419 | SimBad | |
S0558 | Tiktok Pro |
Tiktok Pro can hide its icon after launch.[23] |
S0302 | Twitoor | |
S0418 | ViceLeaker |
ViceLeaker includes code to hide its icon, but the function does not appear to be called in an analyzed version of the software.[25] |
S0311 | YiSpecter |
ID | Mitigation | Description |
---|---|---|
M1006 | Use Recent OS Version |
Android 10 introduced changes to prevent malicious applications from fully suppressing their icon in the launcher.[4][5] |
M1011 | User Guidance |
Users should be shown what a synthetic activity looks like so they can scrutinize them in the future. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | API Calls |
Application vetting services could potentially detect the usage of APIs intended for suppressing the application’s icon. |
DS0042 | User Interface | System Settings |
The user can examine the list of all installed applications, including those with a suppressed icon, in the device settings. If the user is redirected to the device settings when tapping an application’s icon, they should inspect the application to ensure it is genuine. |