ID | Name | Description |
---|---|---|
S0440 | Agent Smith |
Agent Smith’s core malware is disguised as a JPG file, and encrypted with an XOR cipher.[5] |
S0525 | Android/AdDisplay.Ashas |
Android/AdDisplay.Ashas has hidden the C2 server address using base-64 encoding. [6] |
S0524 | AndroidOS/MalLocker.B |
AndroidOS/MalLocker.B has employed both name mangling and meaningless variable names in source. AndroidOS/MalLocker.B has stored encrypted payload code in the Assets directory, coupled with a custom decryption routine that assembles a .dex file by passing data through Android Intent objects. [7] |
S0540 | Asacub | |
S0293 | BrainTest |
BrainTest stores a secondary Android app package (APK) in its assets directory in encrypted form, and decrypts the payload at runtime.[9] |
S0432 | Bread |
Bread uses various tricks to obfuscate its strings including standard and custom encryption, programmatically building strings at runtime, and splitting unencrypted strings with repeated delimiters to break up keywords. Bread has also abused Java and JavaScript features to obfuscate code. Bread payloads have used several commercially available packers as well as hiding code in native libraries and encrypted JAR files in the data section of an ELF file. Bread has stored DEX payloads as base64-encoded strings in the Android manifest and internal Java classes.[10][11] |
S0529 | CarbonSteal |
CarbonSteal has used incorrect file extensions and encryption to hide most of its assets, including secondary APKs, configuration files, and JAR or DEX files.[12] |
S0480 | Cerberus |
Cerberus uses standard payload and string obfuscation techniques.[13] |
S0323 | Charger |
Charger encodes strings into binary arrays to make it difficult to inspect them. It also loads code from encrypted resources dynamically and includes meaningless commands that mask the actual commands passing through.[14] |
S0555 | CHEMISTGAMES |
CHEMISTGAMES has encrypted its DEX payload.[15] |
S0550 | DoubleAgent |
DoubleAgent has used an AES encrypted file in the assets folder with an unsuspecting name (e.g. ‘GoogleMusic.png’) for holding configuration and C2 information.[12] |
S0420 | Dvmap |
Dvmap decrypts executables from archive files stored in the |
S0478 | EventBot |
EventBot dynamically loads its malicious functionality at runtime from an RC4-encrypted TTF file. EventBot also utilizes ProGuard to obfuscate the generated APK file.[17] |
S0509 | FakeSpy |
FakeSpy stores its malicious code in encrypted asset files that are decrypted at runtime. Newer versions of FakeSpy encrypt the C2 address.[18] |
S0408 | FlexiSpy | |
S0423 | Ginp | |
S0421 | GolfSpy |
GolfSpy encodes its configurations using a customized algorithm.[21] |
S0536 | GPlayed |
GPlayed has base64-encoded the exfiltrated data, replacing some of the base64 characters to further obfuscate the data.[22] |
S0406 | Gustuff |
Gustuff code is both obfuscated and packed with an FTT packer. Command information is obfuscated using a custom base85-based encoding.[23] |
S0544 | HenBox |
HenBox has obfuscated components using XOR, ZIP with a single-byte key or ZIP/Zlib compression wrapped with RC4 encryption.[24] |
S0463 | INSOMNIA |
INSOMNIA obfuscates various pieces of information within the application.[25] |
S0485 | Mandrake | |
S0407 | Monokle | |
S0286 | OBAD |
OBAD contains encrypted code along with an obfuscated decryption routine to make it difficult to analyze.[3] |
S0399 | Pallas |
Pallas stores domain information and URL paths as hardcoded AES-encrypted, base64-encoded strings.[28] |
S0539 | Red Alert 2.0 |
Red Alert 2.0 has stored data embedded in the strings.xml resource file.[29] |
S0411 | Rotexy |
Starting in 2017, the Rotexy DEX file was packed with garbage strings and/or operations.[30] |
S0549 | SilkBean |
SilkBean has hidden malicious functionality in a second stage file and has encrypted C2 server information.[12] |
S0545 | TERRACOTTA |
TERRACOTTA has stored encoded strings.[31] |
S0427 | TrickMo |
TrickMo contains obfuscated function, class, and variable names, and encrypts its shared preferences using Java’s |
G0112 | Windshift |
Windshift has encrypted application strings using AES in ECB mode and Blowfish, and stored strings encoded in hex during Operation BULL. Further, in Operation BULL, encryption keys were stored within the application’s launcher icon file.[33] |
S0312 | WireLurker |
WireLurker obfuscates its payload through complex code structure, multiple component versions, file hiding, code obfuscation and customized encryption to thwart anti-reversing.[34] |
S0489 | WolfRAT | |
S0318 | XLoader for Android |
XLoader for Android loads an encrypted DEX code payload.[36] |
S0494 | Zen |
ID | Mitigation | Description |
---|---|---|
M1005 | Application Vetting |
Application vetting techniques may be able to alert to the presence of obfuscated or encrypted code in applications, and such applications could have extra scrutiny applied. Unfortunately, this mitigation is likely impractical, as many legitimate applications apply code obfuscation or encryption to resist adversary techniques such as Repackaged Application. Dynamic analysis when used in application vetting may in some cases be able to identify malicious code in obfuscated or encrypted form by detecting the code at execution time (after it is deobfuscated or decrypted). Some application vetting techniques apply reputation analysis of the application developer and can alert to potentially suspicious applications without actual examination of application code. |
Malicious obfuscation of files or information can be difficult to detect, and therefore enterprises may be better served focusing on detection at other stages of adversary behavior.