Skip to content

Commit 6c9f76e

Browse files
authored
Add docs for PhantomCard (#843)
* Add docs for PhantomCard * Add docs for PhantomCard * Update description for phantomcard * Update description for phantomcard
1 parent 1305bee commit 6c9f76e

File tree

1 file changed

+101
-0
lines changed

1 file changed

+101
-0
lines changed

docs/source/quark_rules.rst

Lines changed: 101 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1008,3 +1008,104 @@ The table below lists the APKs we tested.
10081008
* - 11
10091009
- f3fcd84b4e92a52ae5b30df003b911f21b2ea4325f788d5a5decc08582d3fd40
10101010

1011+
1012+
New Quark Rules For PhantomCard
1013+
===============================
1014+
1015+
New Quark rules (#247 - #251) are now available. These rules target `PhantomCard <https://www.threatfabric.com/blogs/phantomcard-new-nfc-driven-android-malware-emerging-in-brazil>`_\ , a malware family that communicates with C2 servers, reads the payment data of NFC cards, and captures PINs of NFC cards through deceptive screens. Check `here <https://github.com/ev-flow/quark-rules>`_ for the rule details.
1016+
1017+
With these rules, Quark is now able to identify the PhantomCard malware family as high-risk. In our experiment, Quark achieved 100% accuracy and 100% precision. Please check :ref:`here <list-of-tested-apks-phantomcard>` for the APKs we tested.
1018+
1019+
Below is a summary report of a PhantomCard sample (\ ``5769ae3cc93943dda4d1743f2febf6cec1282a0a6289da68cb55bb4724ec9332``\ ). The report shows that Quark identified the sample as high-risk, with a list of behaviors as evidence.
1020+
1021+
1022+
.. image:: https://i.postimg.cc/MTm5xxn2/Screenshot-2025-12-19-00-52-13.png
1023+
:target: https://i.postimg.cc/MTm5xxn2/Screenshot-2025-12-19-00-52-13.png
1024+
:alt:
1025+
1026+
1027+
Identified Well-Known Threats
1028+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1029+
1030+
With Quark's `rule classification <https://quark-engine.readthedocs.io/en/latest/quark_reports.html#rule-classification>`_ feature, analysts can generate behavior maps and see how behaviors are related. This feature helps identify 3 well-known threats from PhantomCard, as shown below.
1031+
1032+
**1. Communicate with C2 servers**
1033+
1034+
1035+
.. image:: https://i.postimg.cc/6qqQcXDG/c2.png
1036+
:target: https://i.postimg.cc/6qqQcXDG/c2.png
1037+
:alt:
1038+
1039+
1040+
The behavior map reveals that the ``Ls1/j;doInBackground`` function establishes a connection to an IP address, which could be a malicious C2 server.
1041+
1042+
Behaviors detected by Quark:
1043+
1044+
1045+
* Establish a connection to an IP address (#00247)
1046+
1047+
**2. Read the payment data of NFC cards**
1048+
1049+
1050+
.. image:: https://i.postimg.cc/9QFmVVxY/nfc.png
1051+
:target: https://i.postimg.cc/9QFmVVxY/nfc.png
1052+
:alt:
1053+
1054+
1055+
The behavior map reveals that the ``Lt1/c;b`` function establishes a connection to an NFC card and reads the payment data stored in it.
1056+
1057+
Behaviors detected by Quark:
1058+
1059+
1060+
* Establish a connection to an NFC card (#00248)
1061+
* Read the payment data stored in an NFC card (#00249)
1062+
1063+
**3. Captures PINs of NFC cards through deceptive screens**
1064+
1065+
1066+
.. image:: https://i.postimg.cc/xT2QtP2Y/ui.png
1067+
:target: https://i.postimg.cc/xT2QtP2Y/ui.png
1068+
:alt:
1069+
1070+
1071+
The behavior map reveals that the ``Le/r;onReceive`` function creates a UI layout and listens for user clicks on a UI element. If the UI layout is deceptive, users could be deceived into entering their NFC card PINs. Subsequently, the app could harvest the PINs by listening for user clicks on UI elements such as keypad buttons.
1072+
1073+
Behaviors detected by Quark:
1074+
1075+
1076+
* Create a UI layout from XML (#00250)
1077+
* Listen for user clicks on a UI element (#00251)
1078+
1079+
.. _list-of-tested-apks-phantomcard:
1080+
1081+
List of Tested APKs
1082+
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
1083+
1084+
The table below lists the APKs we tested.
1085+
1086+
.. list-table::
1087+
:header-rows: 1
1088+
1089+
* - index
1090+
- sha256
1091+
* - 1
1092+
- 0d5fd1997ecb76a167df753d5cce7688dfd0d813c028c9644025da352af77b7d
1093+
* - 2
1094+
- 21c66fe505f2bcd7b29d413189920b3a85df48da0ecf4eb6962d6a504a7fdcd8
1095+
* - 3
1096+
- 2922fcf373e2caf3588266cfafeaafbc74304c81d024315d279f0ea537adc1b6
1097+
* - 4
1098+
- 360966ad8752d040e9aaae5cb4a5913e6f85edcf56ecfeb8246729b45d0e6c78
1099+
* - 5
1100+
- 5769ae3cc93943dda4d1743f2febf6cec1282a0a6289da68cb55bb4724ec9332
1101+
* - 6
1102+
- a78ab0c38fc97406727e48f0eb5a803b1edb9da4a39e613f013b3c5b4736262f
1103+
* - 7
1104+
- ab2906d88e4f64ec0784ef8fdf132bb7ca9a914c037c3b731803f3adfd7a8f66
1105+
* - 8
1106+
- cb10953f39723427d697d06550fae2a330d7fff8fc42e034821e4a4c55f5a667
1107+
* - 9
1108+
- d3f863757e946d117ee7c7b50e480264a2ff1a08e7925bd2de3e6c43182868ed
1109+
* - 10
1110+
- e27579b92fcad2f4fe96db7b5e7a7cdc41754a7cd126fcaf598d3f8d8c21c0f5
1111+

0 commit comments

Comments
 (0)