Adversaries may match or approximate the name or location of legitimate files or resources when naming/placing them. This is done for the sake of evading defenses and observation. This may be done by giving artifacts the name and icon of a legitimate, trusted application (i.e., Settings), or using a package name that matches legitimate, trusted applications (i.e., com.google.android.gm).
Adversaries may also use the same icon of the file or application they are trying to mimic.
| ID | Name | Description |
|---|---|---|
| S0440 | Agent Smith |
Agent Smith can impersonate any popular application on an infected device, and the core malware disguises itself as a legitimate Google application. Agent Smith's dropper is a weaponized legitimate Feng Shui Bundle.[1] |
| S0525 | Android/AdDisplay.Ashas |
Android/AdDisplay.Ashas has mimicked Facebook and Google icons on the "Recent apps" screen to avoid discovery and uses the |
| S0524 | AndroidOS/MalLocker.B |
AndroidOS/MalLocker.B has masqueraded as popular apps, cracked games, and video players. [3] |
| S0292 | AndroRAT | |
| S0422 | Anubis |
Anubis has requested accessibility service privileges while masquerading as "Google Play Protect" and has disguised additional malicious application installs as legitimate system updates.[6][7] |
| G1028 | APT-C-23 |
APT-C-23 has masqueraded malware as legitimate applications.[8][9][10] |
| S0540 | Asacub |
Asacub has masqueraded as a client of popular free ads services.[11] |
| S1079 | BOULDSPY |
BOULDSPY has been installed using the package name |
| G0097 | Bouncing Golf |
Bouncing Golf distributed malware as repackaged legitimate applications, with the malicious code in the |
| S1094 | BRATA |
BRATA has masqueraded as legitimate WhatsApp updates and app security scanners.[14][15] |
| C0033 | C0033 |
During C0033, PROMETHIUM used StrongPity on a compromised website to distribute a malicious version of a legitimate application.[16] |
| S0529 | CarbonSteal |
CarbonSteal has impersonated several apps, including official Google apps, chat apps, VPN apps, and popular games.[17] |
| S0480 | Cerberus |
Cerberus has pretended to be an Adobe Flash Player installer.[18] |
| S1083 | Chameleon |
Chameleon has disguised itself as other applications, such as a cryptocurrency app called ‘CoinSpot’, and IKO bank in Poland. It has also used familiar icons, such as the Chrome and Bitcoin logos.[19] |
| S0555 | CHEMISTGAMES |
CHEMISTGAMES has masqueraded as popular South Korean applications.[20] |
| S0301 | Dendroid |
Dendroid can be bound to legitimate applications prior to installation on devices.[21] |
| S0550 | DoubleAgent |
DoubleAgent has been embedded into trojanized versions of applications such as Voxer, TalkBox, and Amaq News.[17] |
| S0320 | DroidJack |
DroidJack included code from the legitimate Pokemon GO app in order to appear identical to the user, but it also included additional malicious code.[22] |
| S0478 | EventBot | |
| S0522 | Exobot | |
| S1080 | Fakecalls |
Fakecalls has masqueraded as popular Korean banking apps.[25] |
| S0509 | FakeSpy |
FakeSpy masquerades as local postal service applications.[26] |
| S0577 | FrozenCell |
FrozenCell has masqueraded as fake updates to chat applications such as Facebook, WhatsApp, Messenger, LINE, and LoveChat, as well as apps targeting Middle Eastern demographics.[27] |
| S0423 | Ginp |
Ginp has masqueraded as "Adobe Flash Player" and "Google Play Verificator".[28] |
| S0551 | GoldenEagle |
GoldenEagle has inserted trojan functionality into legitimate apps, including popular apps within the Uyghur community, VPNs, instant messaging apps, social networking, games, adult media, and Google searching.[17] |
| S0536 | GPlayed |
GPlayed has used the Play Store icon as well as the name "Google Play Marketplace".[29] |
| S0544 | HenBox | |
| S1077 | Hornbill |
Hornbill has impersonated chat applications such as Fruit Chat, Cucu Chat, and Kako Chat.[31] |
| S0485 | Mandrake |
Mandrake can mimic an app called "Storage Settings" if it cannot hide its icon.[32] |
| G1019 | MoustachedBouncer |
MoustachedBouncer has used legitimate looking filenames for malicious executables including MicrosoftUpdate845255.exe.[33] |
| S1126 | Phenakite |
Phenakite can masquerade as the chat application "Magic Smile."[34] |
| S0539 | Red Alert 2.0 |
Red Alert 2.0 has masqueraded as legitimate media player, social media, and VPN applications.[35] |
| S0549 | SilkBean |
SilkBean has been incorporated into trojanized applications, including Uyghur/Arabic focused keyboards, alphabets, and plugins, as well as official-looking Google applications.[17] |
| S0419 | SimBad | |
| S0558 | Tiktok Pro |
Tiktok Pro has masqueraded as TikTok.[37] |
| S0418 | ViceLeaker |
ViceLeaker was embedded into legitimate applications using Smali injection.[38] |
| S0506 | ViperRAT |
ViperRAT’s second stage has masqueraded as "System Updates", "Viber Update", and "WhatsApp Update".[39] |
| S0489 | WolfRAT |
WolfRAT has masqueraded as "Google service", "GooglePlay", and "Flash update".[40] |
| S0314 | X-Agent for Android |
X-Agent for Android was placed in a repackaged version of an application used by Ukrainian artillery forces.[41] |
| S0318 | XLoader for Android |
XLoader for Android has masqueraded as an Android security application.[42] |
| ID | Mitigation | Description |
|---|---|---|
| M1011 | User Guidance |
Users should be encouraged to only install apps from authorized app stores, which are less likely to contain malicious repackaged apps. |
| ID | Data Source | Data Component | Detects |
|---|---|---|---|
| DS0041 | Application Vetting | API Calls |
Application vetting services may potentially determine if an application contains suspicious code and/or metadata. |
| DS0042 | User Interface | System Notifications |
Unexpected behavior from an application could be an indicator of masquerading. |