Skip to content

S0420 Dvmap

Dvmap is rooting malware that injects malicious code into system runtime libraries. It is credited with being the first malware that performs this type of code injection.1

Item Value
ID S0420
Associated Names
Type MALWARE
Version 1.0
Created 10 December 2019
Last Modified 22 January 2020
Navigation Layer View In ATT&CK® Navigator

Techniques Used

Domain ID Name Use
mobile T1475 Deliver Malicious App via Authorized App Store Dvmap was delivered via the Google Play Store. It evaded Google Play Store checks by uploading a clean application, and replacing it with a malicious version for a short period of time. This occurred at least 5 times in a one month period.1
mobile T1407 Download New Code at Runtime Dvmap can download code and binaries from the C2 server to execute on the device as root.1
mobile T1404 Exploit OS Vulnerability Dvmap attempts to gain root access by using local exploits.1
mobile T1478 Install Insecure or Malicious Configuration Dvmap can enable installation of apps from unknown sources, turn off VerifyApps, and can grant Device Administrator permissions via commands only, rather than using the UI.1
mobile T1400 Modify System Partition Dvmap replaces /system/bin/ip with a malicious version. Dvmap can inject code by patching libdmv.so or libandroid_runtime.so, depending on the Android OS version. Both libraries are related to the Dalvik and ART runtime environments. The patched functions can only call /system/bin/ip, which was replaced with the malicious version.1
mobile T1406 Obfuscated Files or Information Dvmap decrypts executables from archive files stored in the assets directory of the installation binary.1
mobile T1426 System Information Discovery Dvmap checks the Android version to determine which system library to patch.1

References

Back to top