Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Mandrake

Mandrake

Mandrake is a sophisticated Android espionage platform that has been active in the wild since at least 2016.Mandrake is very actively maintained, with sophisticated features and attacks that are executed with surgical precision.

Mandrake has gone undetected for several years by providing legitimate, ad-free applications with social media and real reviews to back the apps. The malware is only activated when the operators issue a specific command.[1]

ID: S0485
Associated Software: oxide, briar, ricinus, darkmatter
Type: MALWARE
Platforms: Android
Version: 1.0
Created: 15 July 2020
Last Modified: 25 April 2025

Associated Software Descriptions

NameDescription
oxide

[1]

briar

[1]

ricinus

[1]

darkmatter

[1]

Mobile Layer
downloadview

Techniques Used

DomainIDNameUse
MobileT1517Access Notifications

Mandrake can capture all device notifications and hide notifications from the user.[1]

MobileT1407Download New Code at Runtime

Mandrake can download its second (Loader) and third (Core) stages after the dropper is installed.[1]

MobileT1637.001Dynamic Resolution:Domain Generation Algorithms

Mandrake has used domain generation algorithms.[1]

MobileT1541Foreground Persistence

Mandrake uses foreground persistence to keep a service running. It shows the user a transparent notification to evade detection.[1]

MobileT1628.001Hide Artifacts:Suppress Application Icon

Mandrake can hide its icon on older Android versions.[1]

MobileT1629.001Impair Defenses:Prevent Application Removal

Mandrake can abuse device administrator permissions to ensure that it cannot be uninstalled until its permissions are revoked.[1]

.003Impair Defenses:Disable or Modify Tools

Mandrake can disable Play Protect.[1]

MobileT1630.002Indicator Removal on Host:File Deletion

Mandrake can delete all data from an infected device.[1]

MobileT1544Ingress Tool Transfer

Mandrake can install attacker-specified components or applications.[1]

MobileT1417.002Input Capture:GUI Input Capture

Mandrake can manipulate visual components to trick the user into granting dangerous permissions, and can use phishing overlays and JavaScript injection to capture credentials.[1]

MobileT1516Input Injection

Mandrake abuses the accessibility service to prevent removing administrator permissions, accessibility permissions, and to set itself as the default SMS handler.[1]

MobileT1430Location Tracking

Mandrake can collect the device’s location.[1]

MobileT1655.001Masquerading:Match Legitimate Name or Location

Mandrake can mimic an app called "Storage Settings" if it cannot hide its icon.[1]

MobileT1509Non-Standard Port

Mandrake has communicated with the C2 server over TCP port 7777.[1]

MobileT1406Obfuscated Files or Information

Mandrake obfuscates its hardcoded C2 URLs.[1]

MobileT1636.003Protected User Data:Contact List

Mandrake can access the device’s contact list.[1]

.004Protected User Data:SMS Messages

Mandrake can access SMS messages.[1]

MobileT1513Screen Capture

Mandrake can record the screen.[1]

MobileT1582SMS Control

Mandrake can block, forward, hide, and send SMS messages.[1]

MobileT1418Software Discovery

Mandrake can obtain a list of installed applications.[1]

MobileT1409Stored Application Data

Mandrake can collect all accounts stored on the device.[1]

MobileT1632.001Subvert Trust Controls:Code Signing Policy Modification

Mandrake can enable app installation from unknown sources.[1]

MobileT1426System Information Discovery

Mandrake can access device configuration information and status, including Android version, battery level, device model, country, and SIM operator.[1]

MobileT1633.001Virtualization/Sandbox Evasion:System Checks

Mandrake can evade automated analysis environments by requiring a CAPTCHA on launch that will prevent the application from running if not passed. It also checks for indications that it is running in an emulator.[1]

MobileT1481.002Web Service:Bidirectional Communication

Mandrake has used Firebase for C2.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp