Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by giving artifacts the name and icon of a legitimate, trusted application (i.e., Settings), or using a package name that matches legitimate, trusted applications (i.e., com.google.android.gm
).
Adversaries may also use the same icon of the file or application they are trying to mimic.
ID | Name | Description |
---|---|---|
S0440 | Agent Smith |
Agent Smith can impersonate any popular application on an infected device, and the core malware disguises itself as a legitimate Google application. Agent Smith's dropper is a weaponized legitimate Feng Shui Bundle.[1] |
S0525 | Android/AdDisplay.Ashas |
Android/AdDisplay.Ashas has mimicked Facebook and Google icons on the "Recent apps" screen to avoid discovery and uses the |
S0524 | AndroidOS/MalLocker.B |
AndroidOS/MalLocker.B has masqueraded as popular apps, cracked games, and video players. [3] |
S0292 | AndroRAT | |
S0422 | Anubis |
Anubis has requested accessibility service privileges while masquerading as "Google Play Protect" and has disguised additional malicious application installs as legitimate system updates.[6][7] |
G1028 | APT-C-23 |
APT-C-23 has masqueraded malware as legitimate applications.[8][9][10] |
S0540 | Asacub |
Asacub has masqueraded as a client of popular free ads services.[11] |
S1079 | BOULDSPY |
BOULDSPY has been installed using the package name |
G0097 | Bouncing Golf |
Bouncing Golf distributed malware as repackaged legitimate applications, with the malicious code in the |
S1094 | BRATA |
BRATA has masqueraded as legitimate WhatsApp updates and app security scanners.[14][15] |
C0033 | C0033 |
During C0033, PROMETHIUM used StrongPity on a compromised website to distribute a malicious version of a legitimate application.[16] |
S0529 | CarbonSteal |
CarbonSteal has impersonated several apps, including official Google apps, chat apps, VPN apps, and popular games.[17] |
S0480 | Cerberus |
Cerberus has pretended to be an Adobe Flash Player installer.[18] |
S1083 | Chameleon |
Chameleon has disguised itself as other applications, such as a cryptocurrency app called ‘CoinSpot’, and IKO bank in Poland. It has also used familiar icons, such as the Chrome and Bitcoin logos.[19] |
S0555 | CHEMISTGAMES |
CHEMISTGAMES has masqueraded as popular South Korean applications.[20] |
S0301 | Dendroid |
Dendroid can be bound to legitimate applications prior to installation on devices.[21] |
S0550 | DoubleAgent |
DoubleAgent has been embedded into trojanized versions of applications such as Voxer, TalkBox, and Amaq News.[17] |
S0320 | DroidJack |
DroidJack included code from the legitimate Pokemon GO app in order to appear identical to the user, but it also included additional malicious code.[22] |
S0478 | EventBot | |
S0522 | Exobot | |
S1080 | Fakecalls |
Fakecalls has masqueraded as popular Korean banking apps.[25] |
S0509 | FakeSpy |
FakeSpy masquerades as local postal service applications.[26] |
S0577 | FrozenCell |
FrozenCell has masqueraded as fake updates to chat applications such as Facebook, WhatsApp, Messenger, LINE, and LoveChat, as well as apps targeting Middle Eastern demographics.[27] |
S0423 | Ginp |
Ginp has masqueraded as "Adobe Flash Player" and "Google Play Verificator".[28] |
S0551 | GoldenEagle |
GoldenEagle has inserted trojan functionality into legitimate apps, including popular apps within the Uyghur community, VPNs, instant messaging apps, social networking, games, adult media, and Google searching.[17] |
S0536 | GPlayed |
GPlayed has used the Play Store icon as well as the name "Google Play Marketplace".[29] |
S0544 | HenBox | |
S1077 | Hornbill |
Hornbill has impersonated chat applications such as Fruit Chat, Cucu Chat, and Kako Chat.[31] |
S0485 | Mandrake |
Mandrake can mimic an app called "Storage Settings" if it cannot hide its icon.[32] |
G1019 | MoustachedBouncer |
MoustachedBouncer has used legitimate looking filenames for malicious executables including MicrosoftUpdate845255.exe.[33] |
S1126 | Phenakite |
Phenakite can masquerade as the chat application "Magic Smile."[34] |
S0539 | Red Alert 2.0 |
Red Alert 2.0 has masqueraded as legitimate media player, social media, and VPN applications.[35] |
S0549 | SilkBean |
SilkBean has been incorporated into trojanized applications, including Uyghur/Arabic focused keyboards, alphabets, and plugins, as well as official-looking Google applications.[17] |
S0419 | SimBad | |
S0558 | Tiktok Pro |
Tiktok Pro has masqueraded as TikTok.[37] |
S0418 | ViceLeaker |
ViceLeaker was embedded into legitimate applications using Smali injection.[38] |
S0506 | ViperRAT |
ViperRAT’s second stage has masqueraded as "System Updates", "Viber Update", and "WhatsApp Update".[39] |
S0489 | WolfRAT |
WolfRAT has masqueraded as "Google service", "GooglePlay", and "Flash update".[40] |
S0314 | X-Agent for Android |
X-Agent for Android was placed in a repackaged version of an application used by Ukrainian artillery forces.[41] |
S0318 | XLoader for Android |
XLoader for Android has masqueraded as an Android security application.[42] |
ID | Mitigation | Description |
---|---|---|
M1011 | User Guidance |
Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps. |
ID | Data Source | Data Component | Detects |
---|---|---|---|
DS0041 | Application Vetting | API Calls |
Application vetting services may potentially determine if an application contains suspicious code and/or metadata. |
DS0042 | User Interface | System Notifications |
Unexpected behavior from an application could be an indicator of masquerading. |