| Why O | |
| Did O | |
| Chinese O | |
| Spyware O | |
| Linger O | |
| in O | |
| U.S O | |
| . O | |
| Phones O | |
| ? O | |
| November O | |
| 16 O | |
| , O | |
| 2016 O | |
| In O | |
| what O | |
| 's O | |
| being O | |
| chalked O | |
| up O | |
| as O | |
| an O | |
| apparent O | |
| mistake O | |
| , O | |
| more O | |
| than O | |
| 120,000 O | |
| Android B-System | |
| phones O | |
| sold O | |
| in O | |
| the O | |
| U.S. O | |
| were O | |
| shipped O | |
| with O | |
| spying O | |
| code O | |
| that O | |
| sent O | |
| text O | |
| messages O | |
| , O | |
| call O | |
| logs O | |
| and O | |
| other O | |
| sensitive O | |
| data O | |
| to O | |
| a O | |
| server O | |
| in O | |
| Shanghai O | |
| . O | |
| The O | |
| New B-Organization | |
| York I-Organization | |
| Times I-Organization | |
| reported O | |
| on O | |
| Nov. O | |
| 15 O | |
| that O | |
| Kryptowire B-Organization | |
| , O | |
| a O | |
| mobile O | |
| enterprise O | |
| security O | |
| company O | |
| , O | |
| discovered O | |
| the O | |
| code O | |
| on O | |
| a O | |
| lower-end O | |
| smartphone O | |
| made O | |
| by O | |
| BLU B-Organization | |
| Products O | |
| of O | |
| Doral O | |
| , O | |
| Fla O | |
| . O | |
| The O | |
| phones O | |
| are O | |
| sold O | |
| at O | |
| Best B-Organization | |
| Buy I-Organization | |
| and O | |
| Amazon.com B-Organization | |
| , O | |
| among O | |
| other O | |
| retail O | |
| outlets O | |
| . O | |
| Kryptowire B-Organization | |
| says O | |
| the O | |
| code O | |
| , O | |
| which O | |
| it O | |
| found O | |
| on O | |
| a O | |
| BLU B-Organization | |
| R1 O | |
| HD O | |
| devices O | |
| , O | |
| transmitted O | |
| fine-grained O | |
| location O | |
| information O | |
| and O | |
| allowed O | |
| for O | |
| the O | |
| remote O | |
| installation O | |
| of O | |
| other O | |
| apps O | |
| . O | |
| Text O | |
| message O | |
| and O | |
| call O | |
| logs O | |
| were O | |
| transmitted O | |
| every O | |
| 72 O | |
| hours O | |
| to O | |
| the O | |
| Shanghai O | |
| server O | |
| , O | |
| and O | |
| once O | |
| a O | |
| day O | |
| for O | |
| other O | |
| personally O | |
| identifiable O | |
| data O | |
| , O | |
| the O | |
| company O | |
| says O | |
| . O | |
| It O | |
| turns O | |
| out O | |
| , O | |
| however O | |
| , O | |
| that O | |
| other O | |
| security O | |
| researchers O | |
| noticed O | |
| suspicious O | |
| and O | |
| faulty O | |
| code O | |
| on O | |
| BLU B-Organization | |
| devices O | |
| as O | |
| early O | |
| as O | |
| March O | |
| 2015 O | |
| , O | |
| and O | |
| it O | |
| has O | |
| taken O | |
| nearly O | |
| that O | |
| long O | |
| to O | |
| remove O | |
| it O | |
| from O | |
| the O | |
| company O | |
| 's O | |
| devices O | |
| . O | |
| The O | |
| finding O | |
| , O | |
| in O | |
| part O | |
| , O | |
| shows O | |
| the O | |
| risk O | |
| that O | |
| can O | |
| come O | |
| in O | |
| opting O | |
| for O | |
| less O | |
| expensive O | |
| smartphones O | |
| , O | |
| whose O | |
| manufacturers O | |
| may O | |
| not O | |
| diligently O | |
| fix O | |
| security B-Vulnerability | |
| vulnerabilities I-Vulnerability | |
| . O | |
| It O | |
| 's O | |
| also O | |
| raising O | |
| eyebrows O | |
| because O | |
| of O | |
| the O | |
| connection O | |
| with O | |
| China O | |
| , O | |
| which O | |
| has O | |
| frequently O | |
| sparred O | |
| with O | |
| the O | |
| U.S. O | |
| over O | |
| cyber O | |
| espionage O | |
| . O | |
| BLU B-Organization | |
| Products O | |
| has O | |
| now O | |
| updated O | |
| its O | |
| phones O | |
| to O | |
| remove O | |
| the O | |
| spying O | |
| code O | |
| , O | |
| which O | |
| most O | |
| likely O | |
| would O | |
| have O | |
| never O | |
| been O | |
| detected O | |
| by O | |
| regular O | |
| users O | |
| . O | |
| The O | |
| code O | |
| never O | |
| informed O | |
| phone O | |
| users O | |
| that O | |
| it O | |
| was O | |
| collecting O | |
| that O | |
| data O | |
| , O | |
| a O | |
| behavior O | |
| uniformly O | |
| viewed O | |
| by O | |
| many O | |
| as O | |
| a O | |
| serious O | |
| security O | |
| concern O | |
| . O | |
| The O | |
| developer O | |
| of O | |
| the O | |
| code O | |
| , O | |
| Shanghai B-Organization | |
| Adups I-Organization | |
| Technology I-Organization | |
| Co. I-Organization | |
| , O | |
| has O | |
| apologized O | |
| , O | |
| contending O | |
| that O | |
| the O | |
| code O | |
| was O | |
| intended O | |
| for O | |
| another O | |
| one O | |
| of O | |
| its O | |
| clients O | |
| who O | |
| requested O | |
| better O | |
| blocking O | |
| of O | |
| junk O | |
| text O | |
| messages O | |
| and O | |
| marketing O | |
| calls O | |
| . O | |
| Vulnerabilities O | |
| Reported O | |
| BLU O | |
| Products O | |
| , O | |
| founded O | |
| in O | |
| 2009 O | |
| , O | |
| makes O | |
| lower-end O | |
| Android-powered B-System | |
| smartphones O | |
| that O | |
| sell O | |
| for O | |
| as O | |
| little O | |
| as O | |
| $ O | |
| 50 O | |
| on O | |
| Amazon B-Organization | |
| . O | |
| Like O | |
| many O | |
| original O | |
| equipment O | |
| manufacturers O | |
| , O | |
| it O | |
| uses O | |
| software O | |
| components O | |
| from O | |
| other O | |
| developers O | |
| . O | |
| The O | |
| company O | |
| uses O | |
| a O | |
| type O | |
| of O | |
| software O | |
| from O | |
| Adups B-Organization | |
| that O | |
| 's O | |
| nicknamed O | |
| FOTA B-System | |
| , O | |
| short O | |
| for O | |
| firmware O | |
| over-the-air O | |
| . O | |
| The O | |
| software O | |
| manages O | |
| the O | |
| delivery O | |
| of O | |
| firmware O | |
| updates O | |
| over-the-air O | |
| , O | |
| the O | |
| term O | |
| used O | |
| for O | |
| transmission O | |
| via O | |
| a O | |
| mobile O | |
| network O | |
| . O | |
| Firmware O | |
| is O | |
| low-level O | |
| code O | |
| deep O | |
| in O | |
| an O | |
| operating O | |
| system O | |
| that O | |
| often O | |
| has O | |
| high O | |
| access O | |
| privileges O | |
| , O | |
| so O | |
| it O | |
| 's O | |
| critical O | |
| that O | |
| it O | |
| 's O | |
| verified O | |
| and O | |
| contains O | |
| no O | |
| software O | |
| vulnerabilities O | |
| . O | |
| Long O | |
| before O | |
| Kryptowire B-Organization | |
| 's O | |
| announcement O | |
| , O | |
| Tim O | |
| Strazzere O | |
| , O | |
| a O | |
| mobile O | |
| security O | |
| researcher O | |
| with O | |
| RedNaga B-Organization | |
| Security I-Organization | |
| , O | |
| contacted O | |
| BLU O | |
| Products O | |
| in O | |
| March O | |
| 2015 O | |
| after O | |
| he O | |
| found O | |
| two O | |
| vulnerabilities O | |
| that O | |
| could O | |
| be O | |
| traced O | |
| to O | |
| Adup B-Organization | |
| 's O | |
| code O | |
| . O | |
| Those O | |
| vulnerabilities O | |
| could O | |
| have O | |
| enabled O | |
| someone O | |
| to O | |
| gain O | |
| broad O | |
| access O | |
| to O | |
| an O | |
| Android B-System | |
| device O | |
| . O | |
| Strazzere O | |
| 's O | |
| colleague O | |
| , O | |
| Jon O | |
| Sawyer O | |
| , O | |
| suggested O | |
| on O | |
| Twitter B-Organization | |
| that O | |
| the O | |
| vulnerabilities O | |
| might O | |
| have O | |
| not O | |
| been O | |
| there O | |
| by O | |
| mistake O | |
| , O | |
| but O | |
| rather O | |
| included O | |
| as O | |
| intentionally O | |
| coded O | |
| backdoors O | |
| . O | |
| He O | |
| posted O | |
| a O | |
| tweet O | |
| to O | |
| The O | |
| New B-Organization | |
| York I-Organization | |
| Times I-Organization | |
| report O | |
| , O | |
| sarcastically O | |
| writing O | |
| , O | |
| " O | |
| If O | |
| only O | |
| two O | |
| people O | |
| had O | |
| called O | |
| this O | |
| company O | |
| out O | |
| for O | |
| their O | |
| backdoors O | |
| several O | |
| times O | |
| over O | |
| the O | |
| last O | |
| few O | |
| years O | |
| . O | |
| '' O | |
| Strazzere O | |
| 's O | |
| experience O | |
| in O | |
| trying O | |
| to O | |
| contact O | |
| both O | |
| vendors O | |
| last O | |
| year O | |
| is O | |
| typical O | |
| of O | |
| the O | |
| frustrations O | |
| frequently O | |
| faced O | |
| by O | |
| security O | |
| researchers O | |
| . O | |
| " O | |
| I O | |
| tried O | |
| reaching O | |
| out O | |
| to O | |
| Adups B-Organization | |
| and O | |
| never O | |
| heard O | |
| back O | |
| , O | |
| '' O | |
| Strazzere O | |
| tells O | |
| Information B-Organization | |
| Security I-Organization | |
| Media I-Organization | |
| Group I-Organization | |
| . O | |
| " O | |
| BLU B-Organization | |
| said O | |
| they O | |
| had O | |
| no O | |
| security O | |
| department O | |
| when O | |
| I O | |
| emailed O | |
| them O | |
| . O | |
| '' O | |
| Strazzere O | |
| says O | |
| he O | |
| also O | |
| failed O | |
| to O | |
| reach O | |
| MediaTek B-Organization | |
| , O | |
| a O | |
| Taiwanese O | |
| fabless O | |
| semiconductor O | |
| manufacturer O | |
| whose O | |
| chipsets O | |
| that O | |
| powered O | |
| BLU B-Organization | |
| phones O | |
| also O | |
| contained O | |
| Adups B-Organization | |
| software O | |
| . O | |
| To O | |
| their O | |
| credit O | |
| , O | |
| both O | |
| Google B-Organization | |
| and O | |
| Amazon B-Organization | |
| appear O | |
| to O | |
| have O | |
| put O | |
| pressure O | |
| on O | |
| device O | |
| manufacturers O | |
| to O | |
| fix O | |
| their O | |
| devices O | |
| when O | |
| flaws O | |
| are O | |
| found O | |
| , O | |
| Strazzere O | |
| says O | |
| . O | |
| For O | |
| Google B-Organization | |
| , O | |
| Android O | |
| security O | |
| issues O | |
| - O | |
| even O | |
| if O | |
| not O | |
| in O | |
| the O | |
| core O | |
| operating O | |
| code O | |
| - O | |
| are O | |
| a O | |
| reputation O | |
| threat O | |
| , O | |
| and O | |
| for O | |
| Amazon B-Organization | |
| , O | |
| a O | |
| product O | |
| quality O | |
| issue O | |
| . O | |
| But O | |
| devices O | |
| sold O | |
| outside O | |
| of O | |
| Amazon B-Organization | |
| " O | |
| might O | |
| not O | |
| have O | |
| ever O | |
| seen O | |
| fixes O | |
| , O | |
| '' O | |
| he O | |
| says O | |
| . O | |
| Officials O | |
| at O | |
| BLU B-Organization | |
| could O | |
| n't O | |
| be O | |
| immediately O | |
| reached O | |
| for O | |
| comment O | |
| . O | |
| Attitude O | |
| Change O | |
| The O | |
| disinterest O | |
| in O | |
| the O | |
| issues O | |
| appears O | |
| to O | |
| have O | |
| changed O | |
| with O | |
| The O | |
| New B-Organization | |
| York I-Organization | |
| Times I-Organization | |
| report O | |
| , O | |
| which O | |
| lit O | |
| a O | |
| fire O | |
| underneath O | |
| Adups B-Organization | |
| and O | |
| BLU B-Organization | |
| . O | |
| Adups B-Organization | |
| addressed O | |
| the O | |
| issue O | |
| in O | |
| a O | |
| Nov. O | |
| 16 O | |
| news O | |
| release O | |
| , O | |
| writing O | |
| that O | |
| some O | |
| products O | |
| made O | |
| by O | |
| BLU B-Organization | |
| were O | |
| updated O | |
| in O | |
| June O | |
| with O | |
| a O | |
| version O | |
| of O | |
| its O | |
| FOTA B-System | |
| that O | |
| had O | |
| actually O | |
| been O | |
| intended O | |
| for O | |
| other O | |
| clients O | |
| who O | |
| had O | |
| requested O | |
| an O | |
| ability O | |
| to O | |
| stop O | |
| text O | |
| spam O | |
| . O | |
| That O | |
| version O | |
| flags O | |
| messages O | |
| " O | |
| containing O | |
| certain O | |
| language O | |
| associated O | |
| with O | |
| junk O | |
| texts O | |
| and O | |
| flags O | |
| numbers O | |
| associated O | |
| with O | |
| junk O | |
| calls O | |
| and O | |
| not O | |
| in O | |
| a O | |
| user O | |
| 's O | |
| contacts O | |
| , O | |
| '' O | |
| the O | |
| company O | |
| says O | |
| . O | |
| Manufacturers O | |
| should O | |
| be O | |
| keeping O | |
| close O | |
| tabs O | |
| on O | |
| what O | |
| software O | |
| ends O | |
| up O | |
| on O | |
| their O | |
| devices O | |
| . O | |
| But O | |
| it O | |
| would O | |
| appear O | |
| that O | |
| BLU B-Organization | |
| only O | |
| took O | |
| action O | |
| after O | |
| Kryptowire B-Organization | |
| notified O | |
| it O | |
| along O | |
| with O | |
| Google B-Organization | |
| , O | |
| Adups B-Organization | |
| and O | |
| Amazon B-Organization | |
| . O | |
| " O | |
| When O | |
| BLU B-Organization | |
| raised O | |
| objections O | |
| , O | |
| Adups B-Organization | |
| took O | |
| immediate O | |
| measures O | |
| to O | |
| disable O | |
| that O | |
| functionality O | |
| on O | |
| BLU B-Organization | |
| phones O | |
| , O | |
| '' O | |
| Adups I-Organization | |
| says O | |
| . O | |
| The O | |
| greater O | |
| worry O | |
| is O | |
| that O | |
| these O | |
| situations O | |
| may O | |
| sometimes O | |
| not O | |
| be O | |
| simple O | |
| mistakes O | |
| . O | |
| Security O | |
| experts O | |
| have O | |
| long O | |
| warned O | |
| of O | |
| the O | |
| ability O | |
| of O | |
| advanced O | |
| adversaries O | |
| to O | |
| subvert O | |
| hardware O | |
| and O | |
| software O | |
| supply O | |
| chains O | |
| . O | |
| Also O | |
| , O | |
| the O | |
| software B-Vulnerability | |
| vulnerabilities I-Vulnerability | |
| pointed O | |
| out O | |
| in O | |
| the O | |
| FOTA B-System | |
| software O | |
| by O | |
| Strazzere O | |
| in O | |
| 2015 O | |
| could O | |
| have O | |
| been O | |
| taken O | |
| advantage O | |
| of O | |
| by O | |
| cybercriminals O | |
| looking O | |
| to O | |
| steal O | |
| bank O | |
| account O | |
| details O | |
| or O | |
| execute O | |
| other O | |
| frauds O | |
| . O | |
| Strazzere O | |
| advises O | |
| that O | |
| consumers O | |
| should O | |
| look O | |
| at O | |
| the O | |
| pedigree O | |
| of O | |
| mobile O | |
| manufacturers O | |
| and O | |
| take O | |
| a O | |
| close O | |
| look O | |
| at O | |
| their O | |
| security O | |
| track O | |
| record O | |
| before O | |
| making O | |
| a O | |
| decision O | |
| on O | |
| what O | |
| device O | |
| to O | |
| buy O | |
| . O | |
| " O | |
| In O | |
| the O | |
| end O | |
| , O | |
| the O | |
| consumer O | |
| needs O | |
| to O | |
| vote O | |
| with O | |
| their O | |
| wallet O | |
| , O | |
| '' O | |
| he O | |
| says O | |
| . O | |
| Skygofree B-Malware | |
| : O | |
| Following O | |
| in O | |
| the O | |
| footsteps O | |
| of O | |
| HackingTeam B-Organization | |
| 16 O | |
| JAN O | |
| 2018 O | |
| At O | |
| the O | |
| beginning O | |
| of O | |
| October O | |
| 2017 O | |
| , O | |
| we O | |
| discovered O | |
| new O | |
| Android B-System | |
| spyware O | |
| with O | |
| several O | |
| features O | |
| previously O | |
| unseen O | |
| in O | |
| the O | |
| wild O | |
| . O | |
| In O | |
| the O | |
| course O | |
| of O | |
| further O | |
| research O | |
| , O | |
| we O | |
| found O | |
| a O | |
| number O | |
| of O | |
| related O | |
| samples O | |
| that O | |
| point O | |
| to O | |
| a O | |
| long-term O | |
| development O | |
| process O | |
| . O | |
| We O | |
| believe O | |
| the O | |
| initial O | |
| versions O | |
| of O | |
| this O | |
| malware O | |
| were O | |
| created O | |
| at O | |
| least O | |
| three O | |
| years O | |
| ago O | |
| – O | |
| at O | |
| the O | |
| end O | |
| of O | |
| 2014 O | |
| . O | |
| Since O | |
| then O | |
| , O | |
| the O | |
| implant O | |
| ’ O | |
| s O | |
| functionality O | |
| has O | |
| been O | |
| improving O | |
| and O | |
| remarkable O | |
| new O | |
| features O | |
| implemented O | |
| , O | |
| such O | |
| as O | |
| the O | |
| ability O | |
| to O | |
| record O | |
| audio O | |
| surroundings O | |
| via O | |
| the O | |
| microphone O | |
| when O | |
| an O | |
| infected O | |
| device O | |
| is O | |
| in O | |
| a O | |
| specified O | |
| location O | |
| ; O | |
| the O | |
| stealing O | |
| of O | |
| WhatsApp B-System | |
| messages O | |
| via O | |
| Accessibility O | |
| Services O | |
| ; O | |
| and O | |
| the O | |
| ability O | |
| to O | |
| connect O | |
| an O | |
| infected O | |
| device O | |
| to O | |
| Wi-Fi O | |
| networks O | |
| controlled O | |
| by O | |
| cybercriminals O | |
| . O | |
| We O | |
| observed O | |
| many O | |
| web O | |
| landing O | |
| pages O | |
| that O | |
| mimic O | |
| the O | |
| sites O | |
| of O | |
| mobile O | |
| operators O | |
| and O | |
| which O | |
| are O | |
| used O | |
| to O | |
| spread O | |
| the O | |
| Android B-System | |
| implants O | |
| . O | |
| These O | |
| domains O | |
| have O | |
| been O | |
| registered O | |
| by O | |
| the O | |
| attackers O | |
| since O | |
| 2015 O | |
| . O | |
| According O | |
| to O | |
| our O | |
| telemetry O | |
| , O | |
| that O | |
| was O | |
| the O | |
| year O | |
| the O | |
| distribution O | |
| campaign O | |
| was O | |
| at O | |
| its O | |
| most O | |
| active O | |
| . O | |
| The O | |
| activities O | |
| continue O | |
| : O | |
| the O | |
| most O | |
| recently O | |
| observed O | |
| domain O | |
| was O | |
| registered O | |
| on O | |
| October O | |
| 31 O | |
| , O | |
| 2017 O | |
| . O | |
| Based O | |
| on O | |
| our O | |
| KSN O | |
| statistics O | |
| , O | |
| there O | |
| are O | |
| several O | |
| infected O | |
| individuals O | |
| , O | |
| exclusively O | |
| in O | |
| Italy O | |
| . O | |
| Moreover O | |
| , O | |
| as O | |
| we O | |
| dived O | |
| deeper O | |
| into O | |
| the O | |
| investigation O | |
| , O | |
| we O | |
| discovered O | |
| several O | |
| spyware O | |
| tools O | |
| for O | |
| Windows B-System | |
| that O | |
| form O | |
| an O | |
| implant O | |
| for O | |
| exfiltrating O | |
| sensitive O | |
| data O | |
| on O | |
| a O | |
| targeted O | |
| machine O | |
| . O | |
| The O | |
| version O | |
| we O | |
| found O | |
| was O | |
| built O | |
| at O | |
| the O | |
| beginning O | |
| of O | |
| 2017 O | |
| , O | |
| and O | |
| at O | |
| the O | |
| moment O | |
| we O | |
| are O | |
| not O | |
| sure O | |
| whether O | |
| this O | |
| implant O | |
| has O | |
| been O | |
| used O | |
| in O | |
| the O | |
| wild O | |
| . O | |
| We O | |
| named O | |
| the O | |
| malware O | |
| Skygofree B-Malware | |
| , O | |
| because O | |
| we O | |
| found O | |
| the O | |
| word O | |
| in O | |
| one O | |
| of O | |
| the O | |
| domains O | |
| * O | |
| . O | |
| Malware O | |
| Features O | |
| Android B-System | |
| According O | |
| to O | |
| the O | |
| observed O | |
| samples O | |
| and O | |
| their O | |
| signatures O | |
| , O | |
| early O | |
| versions O | |
| of O | |
| this O | |
| Android B-System | |
| malware O | |
| were O | |
| developed O | |
| by O | |
| the O | |
| end O | |
| of O | |
| 2014 O | |
| and O | |
| the O | |
| campaign O | |
| has O | |
| remained O | |
| active O | |
| ever O | |
| since O | |
| . O | |
| The O | |
| code O | |
| and O | |
| functionality O | |
| have O | |
| changed O | |
| numerous O | |
| times O | |
| ; O | |
| from O | |
| simple O | |
| unobfuscated O | |
| malware O | |
| at O | |
| the O | |
| beginning O | |
| to O | |
| sophisticated O | |
| multi-stage O | |
| spyware O | |
| that O | |
| gives O | |
| attackers O | |
| full O | |
| remote O | |
| control O | |
| of O | |
| the O | |
| infected O | |
| device O | |
| . O | |
| We O | |
| have O | |
| examined O | |
| all O | |
| the O | |
| detected O | |
| versions O | |
| , O | |
| including O | |
| the O | |
| latest O | |
| one O | |
| that O | |
| is O | |
| signed O | |
| by O | |
| a O | |
| certificate O | |
| valid O | |
| from O | |
| September O | |
| 14 O | |
| , O | |
| 2017 O | |
| . O | |
| The O | |
| implant O | |
| provides O | |
| the O | |
| ability O | |
| to O | |
| grab O | |
| a O | |
| lot O | |
| of O | |
| exfiltrated O | |
| data O | |
| , O | |
| like O | |
| call O | |
| records O | |
| , O | |
| text O | |
| messages O | |
| , O | |
| geolocation O | |
| , O | |
| surrounding O | |
| audio O | |
| , O | |
| calendar O | |
| events O | |
| , O | |
| and O | |
| other O | |
| memory O | |
| information O | |
| stored O | |
| on O | |
| the O | |
| device O | |
| . O | |
| After O | |
| manual O | |
| launch O | |
| , O | |
| it O | |
| shows O | |
| a O | |
| fake O | |
| welcome O | |
| notification O | |
| to O | |
| the O | |
| user O | |
| : O | |
| Dear O | |
| Customer O | |
| , O | |
| we O | |
| ’ O | |
| re O | |
| updating O | |
| your O | |
| configuration O | |
| and O | |
| it O | |
| will O | |
| be O | |
| ready O | |
| as O | |
| soon O | |
| as O | |
| possible O | |
| . O | |
| At O | |
| the O | |
| same O | |
| time O | |
| , O | |
| it O | |
| hides O | |
| an O | |
| icon O | |
| and O | |
| starts O | |
| background O | |
| services O | |
| to O | |
| hide O | |
| further O | |
| actions O | |
| from O | |
| the O | |
| user O | |
| . O | |
| Service O | |
| Name O | |
| Purpose O | |
| AndroidAlarmManager O | |
| Uploading O | |
| last O | |
| recorded O | |
| .amr O | |
| audio O | |
| AndroidSystemService O | |
| Audio O | |
| recording O | |
| AndroidSystemQueues O | |
| Location O | |
| tracking O | |
| with O | |
| movement O | |
| detection O | |
| ClearSystems O | |
| GSM B-System | |
| tracking O | |
| ( O | |
| CID O | |
| , O | |
| LAC O | |
| , O | |
| PSC O | |
| ) O | |
| ClipService O | |
| Clipboard O | |
| stealing O | |
| AndroidFileManager O | |
| Uploading O | |
| all O | |
| exfiltrated O | |
| data O | |
| AndroidPush O | |
| XMPP O | |
| С O | |
| & O | |
| C O | |
| protocol O | |
| ( O | |
| url.plus:5223 B-Indicator | |
| ) O | |
| RegistrationService O | |
| Registration O | |
| on O | |
| C O | |
| & O | |
| C O | |
| via O | |
| HTTP O | |
| ( O | |
| url.plus/app/pro/ B-Indicator | |
| ) O | |
| Interestingly O | |
| , O | |
| a O | |
| self-protection O | |
| feature O | |
| was O | |
| implemented O | |
| in O | |
| almost O | |
| every O | |
| service O | |
| . O | |
| Since O | |
| in O | |
| Android B-System | |
| 8.0 I-System | |
| ( O | |
| SDK O | |
| API O | |
| 26 O | |
| ) O | |
| the O | |
| system O | |
| is O | |
| able O | |
| to O | |
| kill O | |
| idle O | |
| services O | |
| , O | |
| this O | |
| code O | |
| raises O | |
| a O | |
| fake O | |
| update O | |
| notification O | |
| to O | |
| prevent O | |
| it O | |
| : O | |
| Cybercriminals O | |
| have O | |
| the O | |
| ability O | |
| to O | |
| control O | |
| the O | |
| implant O | |
| via O | |
| HTTP O | |
| , O | |
| XMPP O | |
| , O | |
| binary O | |
| SMS O | |
| and O | |
| FirebaseCloudMessaging O | |
| ( O | |
| or O | |
| GoogleCloudMessaging O | |
| in O | |
| older O | |
| versions O | |
| ) O | |
| protocols O | |
| . O | |
| Such O | |
| a O | |
| diversity O | |
| of O | |
| protocols O | |
| gives O | |
| the O | |
| attackers O | |
| more O | |
| flexible O | |
| control O | |
| . O | |
| In O | |
| the O | |
| latest O | |
| implant O | |
| versions O | |
| there O | |
| are O | |
| 48 O | |
| different O | |
| commands O | |
| . O | |
| You O | |
| can O | |
| find O | |
| a O | |
| full O | |
| list O | |
| with O | |
| short O | |
| descriptions O | |
| in O | |
| the O | |
| Appendix O | |
| . O | |
| Here O | |
| are O | |
| some O | |
| of O | |
| the O | |
| most O | |
| notable O | |
| : O | |
| ‘ O | |
| geofence O | |
| ’ O | |
| – O | |
| this O | |
| command O | |
| adds O | |
| a O | |
| specified O | |
| location O | |
| to O | |
| the O | |
| implant O | |
| ’ O | |
| s O | |
| internal O | |
| database O | |
| and O | |
| when O | |
| it O | |
| matches O | |
| a O | |
| device O | |
| ’ O | |
| s O | |
| current O | |
| location O | |
| the O | |
| malware O | |
| triggers O | |
| and O | |
| begins O | |
| to O | |
| record O | |
| surrounding O | |
| audio O | |
| . O | |
| ” O | |
| social O | |
| ” O | |
| – O | |
| this O | |
| command O | |
| that O | |
| starts O | |
| the O | |
| ‘ O | |
| AndroidMDMSupport O | |
| ’ O | |
| service O | |
| – O | |
| this O | |
| allows O | |
| the O | |
| files O | |
| of O | |
| any O | |
| other O | |
| installed O | |
| application O | |
| to O | |
| be O | |
| grabbed O | |
| . O | |
| The O | |
| service O | |
| name O | |
| makes O | |
| it O | |
| clear O | |
| that O | |
| by O | |
| applications O | |
| the O | |
| attackers O | |
| mean O | |
| MDM O | |
| solutions O | |
| that O | |
| are O | |
| business-specific O | |
| tools O | |
| . O | |
| The O | |
| operator O | |
| can O | |
| specify O | |
| a O | |
| path O | |
| with O | |
| the O | |
| database O | |
| of O | |
| any O | |
| targeted O | |
| application O | |
| and O | |
| server-side O | |
| PHP O | |
| script O | |
| name O | |
| for O | |
| uploading O | |
| . O | |
| Several O | |
| hardcoded O | |
| applications O | |
| targeted O | |
| by O | |
| the O | |
| MDM-grabbing O | |
| command O | |
| ‘ O | |
| wifi O | |
| ’ O | |
| – O | |
| this O | |
| command O | |
| creates O | |
| a O | |
| new O | |
| Wi-Fi O | |
| connection O | |
| with O | |
| specified O | |
| configurations O | |
| from O | |
| the O | |
| command O | |
| and O | |
| enable O | |
| Wi-Fi O | |
| if O | |
| it O | |
| is O | |
| disabled O | |
| . O | |
| So O | |
| , O | |
| when O | |
| a O | |
| device O | |
| connects O | |
| to O | |
| the O | |
| established O | |
| network O | |
| , O | |
| this O | |
| process O | |
| will O | |
| be O | |
| in O | |
| silent O | |
| and O | |
| automatic O | |
| mode O | |
| . O | |
| This O | |
| command O | |
| is O | |
| used O | |
| to O | |
| connect O | |
| the O | |
| victim O | |
| to O | |
| a O | |
| Wi-Fi O | |
| network O | |
| controlled O | |
| by O | |
| the O | |
| cybercriminals O | |
| to O | |
| perform O | |
| traffic O | |
| sniffing O | |
| and O | |
| man-in-the-middle O | |
| ( O | |
| MitM O | |
| ) O | |
| attacks O | |
| . O | |
| addWifiConfig O | |
| method O | |
| code O | |
| fragments O | |
| ‘ O | |
| camera O | |
| ’ O | |
| – O | |
| this O | |
| command O | |
| records O | |
| a O | |
| video/capture O | |
| a O | |
| photo O | |
| using O | |
| the O | |
| front-facing O | |
| camera O | |
| when O | |
| someone O | |
| next O | |
| unlocks O | |
| the O | |
| device O | |
| . O | |
| Some O | |
| versions O | |
| of O | |
| the O | |
| Skygofree B-Malware | |
| feature O | |
| the O | |
| self-protection O | |
| ability O | |
| exclusively O | |
| for O | |
| Huawei B-Organization | |
| devices O | |
| . O | |
| There O | |
| is O | |
| a O | |
| ‘ O | |
| protected O | |
| apps O | |
| ’ O | |
| list O | |
| in O | |
| this O | |
| brand O | |
| ’ O | |
| s O | |
| smartphones O | |
| , O | |
| related O | |
| to O | |
| a O | |
| battery-saving O | |
| concept O | |
| . O | |
| Apps O | |
| not O | |
| selected O | |
| as O | |
| protected O | |
| apps O | |
| stop O | |
| working O | |
| once O | |
| the O | |
| screen O | |
| is O | |
| off O | |
| and O | |
| await O | |
| re-activation O | |
| , O | |
| so O | |
| the O | |
| implant O | |
| is O | |
| able O | |
| to O | |
| determine O | |
| that O | |
| it O | |
| is O | |
| running O | |
| on O | |
| a O | |
| Huawei B-Organization | |
| device O | |
| and O | |
| add O | |
| itself O | |
| to O | |
| this O | |
| list O | |
| . O | |
| Due O | |
| to O | |
| this O | |
| feature O | |
| , O | |
| it O | |
| is O | |
| clear O | |
| that O | |
| the O | |
| developers O | |
| paid O | |
| special O | |
| attention O | |
| to O | |
| the O | |
| work O | |
| of O | |
| the O | |
| implant O | |
| on O | |
| Huawei B-Organization | |
| devices O | |
| . O | |
| Also O | |
| , O | |
| we O | |
| found O | |
| a O | |
| debug O | |
| version O | |
| of O | |
| the O | |
| implant O | |
| ( O | |
| 70a937b2504b3ad6c623581424c7e53d B-Indicator | |
| ) O | |
| that O | |
| contains O | |
| interesting O | |
| constants O | |
| , O | |
| including O | |
| the O | |
| version O | |
| of O | |
| the O | |
| spyware O | |
| . O | |
| Debug O | |
| BuildConfig O | |
| with O | |
| the O | |
| version O | |
| After O | |
| a O | |
| deep O | |
| analysis O | |
| of O | |
| all O | |
| discovered O | |
| versions O | |
| of O | |
| Skygofree B-Malware | |
| , O | |
| we O | |
| made O | |
| an O | |
| approximate O | |
| timeline O | |
| of O | |
| the O | |
| implant O | |
| ’ O | |
| s O | |
| evolution O | |
| . O | |
| Mobile O | |
| implant O | |
| evolution O | |
| timeline O | |
| However O | |
| , O | |
| some O | |
| facts O | |
| indicate O | |
| that O | |
| the O | |
| APK O | |
| samples O | |
| from O | |
| stage O | |
| two O | |
| can O | |
| also O | |
| be O | |
| used O | |
| separately O | |
| as O | |
| the O | |
| first O | |
| step O | |
| of O | |
| the O | |
| infection O | |
| . O | |
| Below O | |
| is O | |
| a O | |
| list O | |
| of O | |
| the O | |
| payloads O | |
| used O | |
| by O | |
| the O | |
| Skygofree B-Malware | |
| implant O | |
| in O | |
| the O | |
| second O | |
| and O | |
| third O | |
| stages O | |
| . O | |
| Reverse O | |
| shell O | |
| payload O | |
| The O | |
| reverse O | |
| shell O | |
| module O | |
| is O | |
| an O | |
| external O | |
| ELF O | |
| file O | |
| compiled O | |
| by O | |
| the O | |
| attackers O | |
| to O | |
| run O | |
| on O | |
| Android B-System | |
| . O | |
| The O | |
| choice O | |
| of O | |
| a O | |
| particular O | |
| payload O | |
| is O | |
| determined O | |
| by O | |
| the O | |
| implant O | |
| ’ O | |
| s O | |
| version O | |
| , O | |
| and O | |
| it O | |
| can O | |
| be O | |
| downloaded O | |
| from O | |
| the O | |
| command O | |
| and O | |
| control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| server O | |
| soon O | |
| after O | |
| the O | |
| implant O | |
| starts O | |
| , O | |
| or O | |
| after O | |
| a O | |
| specific O | |
| command O | |
| . O | |
| In O | |
| the O | |
| most O | |
| recent O | |
| case O | |
| , O | |
| the O | |
| choice O | |
| of O | |
| the O | |
| payload O | |
| zip O | |
| file O | |
| depends O | |
| on O | |
| the O | |
| device O | |
| process O | |
| architecture O | |
| . O | |
| For O | |
| now O | |
| , O | |
| we O | |
| observe O | |
| only O | |
| one O | |
| payload O | |
| version O | |
| for O | |
| following O | |
| the O | |
| ARM B-System | |
| CPUs O | |
| : O | |
| arm64-v8a B-System | |
| , O | |
| armeabi B-System | |
| , O | |
| armeabi-v7a B-System | |
| . O | |
| Note O | |
| that O | |
| in O | |
| almost O | |
| all O | |
| cases O | |
| , O | |
| this O | |
| payload O | |
| file O | |
| , O | |
| contained O | |
| in O | |
| zip O | |
| archives O | |
| , O | |
| is O | |
| named O | |
| ‘ O | |
| setting B-Indicator | |
| ’ O | |
| or O | |
| ‘ O | |
| setting.o B-Indicator | |
| ’ O | |
| . O | |
| The O | |
| main O | |
| purpose O | |
| of O | |
| this O | |
| module O | |
| is O | |
| providing O | |
| reverse O | |
| shell O | |
| features O | |
| on O | |
| the O | |
| device O | |
| by O | |
| connecting O | |
| with O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| ’ O | |
| s O | |
| socket O | |
| . O | |
| Reverse O | |
| shell O | |
| payload O | |
| The O | |
| payload O | |
| is O | |
| started O | |
| by O | |
| the O | |
| main O | |
| module O | |
| with O | |
| a O | |
| specified O | |
| host O | |
| and O | |
| port O | |
| as O | |
| a O | |
| parameter O | |
| that O | |
| is O | |
| hardcoded O | |
| to O | |
| ‘ O | |
| 54.67.109.199 B-Indicator | |
| ’ O | |
| and O | |
| ‘ O | |
| 30010 B-Indicator | |
| ’ O | |
| in O | |
| some O | |
| versions O | |
| : O | |
| Alternatively O | |
| , O | |
| they O | |
| could O | |
| be O | |
| hardcoded O | |
| directly O | |
| into O | |
| the O | |
| payload O | |
| code O | |
| : O | |
| We O | |
| also O | |
| observed O | |
| variants O | |
| that O | |
| were O | |
| equipped O | |
| with O | |
| similar O | |
| reverse O | |
| shell O | |
| payloads O | |
| directly O | |
| in O | |
| the O | |
| main O | |
| APK O | |
| /lib/ O | |
| path O | |
| . O | |
| Equipped O | |
| reverse O | |
| shell O | |
| payload O | |
| with O | |
| specific O | |
| string O | |
| After O | |
| an O | |
| in-depth O | |
| look O | |
| , O | |
| we O | |
| found O | |
| that O | |
| some O | |
| versions O | |
| of O | |
| the O | |
| reverse O | |
| shell O | |
| payload O | |
| code O | |
| share O | |
| similarities O | |
| with O | |
| PRISM B-Malware | |
| – O | |
| a O | |
| stealth O | |
| reverse O | |
| shell O | |
| backdoor O | |
| that O | |
| is O | |
| available O | |
| on O | |
| Github B-Organization | |
| . O | |
| Reverse O | |
| shell O | |
| payload O | |
| from O | |
| update_dev.zip B-Indicator | |
| Exploit O | |
| payload O | |
| At O | |
| the O | |
| same O | |
| time O | |
| , O | |
| we O | |
| found O | |
| an O | |
| important O | |
| payload O | |
| binary O | |
| that O | |
| is O | |
| trying O | |
| to O | |
| exploit O | |
| several O | |
| known O | |
| vulnerabilities O | |
| and O | |
| escalate O | |
| privileges O | |
| . O | |
| According O | |
| to O | |
| several O | |
| timestamps O | |
| , O | |
| this O | |
| payload O | |
| is O | |
| used O | |
| by O | |
| implant O | |
| versions O | |
| created O | |
| since O | |
| 2016 O | |
| . O | |
| It O | |
| can O | |
| also O | |
| be O | |
| downloaded O | |
| by O | |
| a O | |
| specific O | |
| command O | |
| . O | |
| The O | |
| exploit O | |
| payload O | |
| contains O | |
| following O | |
| file O | |
| components O | |
| : O | |
| Component O | |
| name O | |
| Description O | |
| run_root_shell/arrs_put_user.o/arrs_put_user/poc B-Indicator | |
| Exploit O | |
| ELF O | |
| db O | |
| Sqlite3 O | |
| tool O | |
| ELF O | |
| device.db B-Indicator | |
| Sqlite3 O | |
| database O | |
| with O | |
| supported O | |
| devices O | |
| and O | |
| their O | |
| constants O | |
| needed O | |
| for O | |
| privilege O | |
| escalation O | |
| ‘ O | |
| device.db B-Indicator | |
| ’ O | |
| is O | |
| a O | |
| database O | |
| used O | |
| by O | |
| the O | |
| exploit O | |
| . O | |
| It O | |
| contains O | |
| two O | |
| tables O | |
| – O | |
| ‘ O | |
| supported_devices O | |
| ’ O | |
| and O | |
| ‘ O | |
| device_address O | |
| ’ O | |
| . O | |
| The O | |
| first O | |
| table O | |
| contains O | |
| 205 O | |
| devices O | |
| with O | |
| some O | |
| Linux B-System | |
| properties O | |
| ; O | |
| the O | |
| second O | |
| contains O | |
| the O | |
| specific O | |
| memory O | |
| addresses O | |
| associated O | |
| with O | |
| them O | |
| that O | |
| are O | |
| needed O | |
| for O | |
| successful O | |
| exploitation O | |
| . O | |
| You O | |
| can O | |
| find O | |
| a O | |
| full O | |
| list O | |
| of O | |
| targeted O | |
| models O | |
| in O | |
| the O | |
| Appendix O | |
| . O | |
| Fragment O | |
| of O | |
| the O | |
| database O | |
| with O | |
| targeted O | |
| devices O | |
| and O | |
| specific O | |
| memory O | |
| addresses O | |
| If O | |
| the O | |
| infected O | |
| device O | |
| is O | |
| not O | |
| listed O | |
| in O | |
| this O | |
| database O | |
| , O | |
| the O | |
| exploit O | |
| tries O | |
| to O | |
| discover O | |
| these O | |
| addresses O | |
| programmatically O | |
| . O | |
| After O | |
| downloading O | |
| and O | |
| unpacking O | |
| , O | |
| the O | |
| main O | |
| module O | |
| executes O | |
| the O | |
| exploit O | |
| binary O | |
| file O | |
| . O | |
| Once O | |
| executed O | |
| , O | |
| the O | |
| module O | |
| attempts O | |
| to O | |
| get O | |
| root O | |
| privileges O | |
| on O | |
| the O | |
| device O | |
| by O | |
| exploiting O | |
| the O | |
| following O | |
| vulnerabilities O | |
| : O | |
| CVE-2013-2094 B-Vulnerability | |
| CVE-2013-2595 B-Vulnerability | |
| CVE-2013-6282 B-Vulnerability | |
| CVE-2014-3153 B-Vulnerability | |
| ( O | |
| futex B-Vulnerability | |
| aka O | |
| TowelRoot B-Vulnerability | |
| ) O | |
| CVE-2015-3636 B-Vulnerability | |
| Exploitation O | |
| process O | |
| After O | |
| an O | |
| in-depth O | |
| look O | |
| , O | |
| we O | |
| found O | |
| that O | |
| the O | |
| exploit O | |
| payload O | |
| code O | |
| shares O | |
| several O | |
| similarities O | |
| with O | |
| the O | |
| public O | |
| project O | |
| android-rooting-tools O | |
| . O | |
| Decompiled O | |
| exploit O | |
| function O | |
| code O | |
| fragment O | |
| run_with_mmap O | |
| function O | |
| from O | |
| the O | |
| android-rooting-tools B-System | |
| project O | |
| As O | |
| can O | |
| be O | |
| seen O | |
| from O | |
| the O | |
| comparison O | |
| , O | |
| there O | |
| are O | |
| similar O | |
| strings O | |
| and O | |
| also O | |
| a O | |
| unique O | |
| comment O | |
| in O | |
| Italian O | |
| , O | |
| so O | |
| it O | |
| looks O | |
| like O | |
| the O | |
| attackers O | |
| created O | |
| this O | |
| exploit O | |
| payload O | |
| based O | |
| on O | |
| android-rooting-tools B-System | |
| project O | |
| source O | |
| code O | |
| . O | |
| Busybox O | |
| payload O | |
| Busybox O | |
| is O | |
| public O | |
| software O | |
| that O | |
| provides O | |
| several O | |
| Linux O | |
| tools O | |
| in O | |
| a O | |
| single O | |
| ELF O | |
| file O | |
| . O | |
| In O | |
| earlier O | |
| versions O | |
| , O | |
| it O | |
| operated O | |
| with O | |
| shell O | |
| commands O | |
| like O | |
| this O | |
| : O | |
| Stealing O | |
| WhatsApp O | |
| encryption O | |
| key O | |
| with O | |
| Busybox B-Malware | |
| Social I-Malware | |
| payload I-Malware | |
| Actually O | |
| , O | |
| this O | |
| is O | |
| not O | |
| a O | |
| standalone O | |
| payload O | |
| file O | |
| – O | |
| in O | |
| all O | |
| the O | |
| observed O | |
| versions O | |
| its O | |
| code O | |
| was O | |
| compiled O | |
| with O | |
| exploit O | |
| payload O | |
| in O | |
| one O | |
| file O | |
| ( O | |
| ‘ O | |
| poc_perm O | |
| ’ O | |
| , O | |
| ‘ O | |
| arrs_put_user O | |
| ’ O | |
| , O | |
| ‘ O | |
| arrs_put_user.o O | |
| ’ O | |
| ) O | |
| . O | |
| This O | |
| is O | |
| due O | |
| to O | |
| the O | |
| fact O | |
| that O | |
| the O | |
| implant O | |
| needs O | |
| to O | |
| escalate O | |
| privileges O | |
| before O | |
| performing O | |
| social O | |
| payload O | |
| actions O | |
| . O | |
| This O | |
| payload O | |
| is O | |
| also O | |
| used O | |
| by O | |
| the O | |
| earlier O | |
| versions O | |
| of O | |
| the O | |
| implant O | |
| . O | |
| It O | |
| has O | |
| similar O | |
| functionality O | |
| to O | |
| the O | |
| ‘ O | |
| AndroidMDMSupport O | |
| ’ O | |
| command O | |
| from O | |
| the O | |
| current O | |
| versions O | |
| – O | |
| stealing O | |
| data O | |
| belonging O | |
| to O | |
| other O | |
| installed O | |
| applications O | |
| . O | |
| The O | |
| payload O | |
| will O | |
| execute O | |
| shell O | |
| code O | |
| to O | |
| steal O | |
| data O | |
| from O | |
| various O | |
| applications O | |
| . O | |
| The O | |
| example O | |
| below O | |
| steals O | |
| Facebook B-System | |
| data O | |
| : O | |
| All O | |
| the O | |
| other O | |
| hardcoded O | |
| applications O | |
| targeted O | |
| by O | |
| the O | |
| payload O | |
| : O | |
| Package O | |
| name O | |
| Name O | |
| jp.naver.line.android B-Indicator | |
| LINE B-System | |
| : I-System | |
| Free I-System | |
| Calls I-System | |
| & I-System | |
| Messages I-System | |
| com.facebook.orca B-Indicator | |
| Facebook B-System | |
| messenger I-System | |
| com.facebook.katana B-Indicator | |
| Facebook B-System | |
| com.whatsapp B-Indicator | |
| WhatsApp B-System | |
| com.viber.voip B-Indicator | |
| Viber B-System | |
| Parser O | |
| payload O | |
| Upon O | |
| receiving O | |
| a O | |
| specific O | |
| command O | |
| , O | |
| the O | |
| implant O | |
| can O | |
| download O | |
| a O | |
| special O | |
| payload O | |
| to O | |
| grab O | |
| sensitive O | |
| information O | |
| from O | |
| external O | |
| applications O | |
| . O | |
| The O | |
| case O | |
| where O | |
| we O | |
| observed O | |
| this O | |
| involved O | |
| WhatsApp B-System | |
| . O | |
| In O | |
| the O | |
| examined O | |
| version O | |
| , O | |
| it O | |
| was O | |
| downloaded O | |
| from O | |
| : O | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //url I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| plus/Updates/tt/parser.apk I-Indicator | |
| The O | |
| payload O | |
| can O | |
| be O | |
| a O | |
| .dex O | |
| or O | |
| .apk O | |
| file O | |
| which O | |
| is O | |
| a O | |
| Java-compiled O | |
| Android B-System | |
| executable O | |
| . O | |
| After O | |
| downloading O | |
| , O | |
| it O | |
| will O | |
| be O | |
| loaded O | |
| by O | |
| the O | |
| main O | |
| module O | |
| via O | |
| DexClassLoader O | |
| api O | |
| : O | |
| As O | |
| mentioned O | |
| , O | |
| we O | |
| observed O | |
| a O | |
| payload O | |
| that O | |
| exclusively O | |
| targets O | |
| the O | |
| WhatsApp B-System | |
| messenger I-System | |
| and O | |
| it O | |
| does O | |
| so O | |
| in O | |
| an O | |
| original O | |
| way O | |
| . O | |
| The O | |
| payload O | |
| uses O | |
| the O | |
| Android B-System | |
| Accessibility O | |
| Service O | |
| to O | |
| get O | |
| information O | |
| directly O | |
| from O | |
| the O | |
| displayed O | |
| elements O | |
| on O | |
| the O | |
| screen O | |
| , O | |
| so O | |
| it O | |
| waits O | |
| for O | |
| the O | |
| targeted O | |
| application O | |
| to O | |
| be O | |
| launched O | |
| and O | |
| then O | |
| parses O | |
| all O | |
| nodes O | |
| to O | |
| find O | |
| text O | |
| messages O | |
| : O | |
| Note O | |
| that O | |
| the O | |
| implant O | |
| needs O | |
| special O | |
| permission O | |
| to O | |
| use O | |
| the O | |
| Accessibility O | |
| Service O | |
| API O | |
| , O | |
| but O | |
| there O | |
| is O | |
| a O | |
| command O | |
| that O | |
| performs O | |
| a O | |
| request O | |
| with O | |
| a O | |
| phishing O | |
| text O | |
| displayed O | |
| to O | |
| the O | |
| user O | |
| to O | |
| obtain O | |
| such O | |
| permission O | |
| . O | |
| Windows B-System | |
| We O | |
| have O | |
| found O | |
| multiple O | |
| components O | |
| that O | |
| form O | |
| an O | |
| entire O | |
| spyware O | |
| system O | |
| for O | |
| the O | |
| Windows B-System | |
| platform O | |
| . O | |
| Name O | |
| MD5 O | |
| Purpose O | |
| msconf.exe B-Indicator | |
| 55fb01048b6287eadcbd9a0f86d21adf B-Indicator | |
| Main O | |
| module O | |
| , O | |
| reverse O | |
| shell O | |
| network.exe B-Indicator | |
| f673bb1d519138ced7659484c0b66c5b B-Indicator | |
| Sending O | |
| exfiltrated O | |
| data O | |
| system.exe B-Indicator | |
| d3baa45ed342fbc5a56d974d36d5f73f B-Indicator | |
| Surrounding O | |
| sound O | |
| recording O | |
| by O | |
| mic O | |
| update.exe B-Indicator | |
| 395f9f87df728134b5e3c1ca4d48e9fa B-Indicator | |
| Keylogging O | |
| wow.exe B-Indicator | |
| 16311b16fd48c1c87c6476a455093e7a B-Indicator | |
| Screenshot O | |
| capturing O | |
| skype_sync2.exe B-Indicator | |
| 6bcc3559d7405f25ea403317353d905f B-Indicator | |
| Skype B-System | |
| call O | |
| recording O | |
| to O | |
| MP3 O | |
| All O | |
| modules O | |
| , O | |
| except O | |
| skype_sync2.exe B-Indicator | |
| , O | |
| are O | |
| written O | |
| in O | |
| Python B-System | |
| and O | |
| packed O | |
| to O | |
| binary O | |
| files O | |
| via O | |
| the O | |
| Py2exe B-System | |
| tool O | |
| . O | |
| This O | |
| sort O | |
| of O | |
| conversion O | |
| allows O | |
| Python B-System | |
| code O | |
| to O | |
| be O | |
| run O | |
| in O | |
| a O | |
| Windows B-System | |
| environment O | |
| without O | |
| pre-installed O | |
| Python B-System | |
| binaries O | |
| . O | |
| msconf.exe B-Indicator | |
| is O | |
| the O | |
| main O | |
| module O | |
| that O | |
| provides O | |
| control O | |
| of O | |
| the O | |
| implant O | |
| and O | |
| reverse O | |
| shell O | |
| feature O | |
| . O | |
| It O | |
| opens O | |
| a O | |
| socket O | |
| on O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| machine O | |
| and O | |
| connects O | |
| with O | |
| a O | |
| server-side O | |
| component O | |
| of O | |
| the O | |
| implant O | |
| located O | |
| at O | |
| 54.67.109.199:6500 B-Indicator | |
| . O | |
| Before O | |
| connecting O | |
| with O | |
| the O | |
| socket O | |
| , O | |
| it O | |
| creates O | |
| a O | |
| malware O | |
| environment O | |
| in O | |
| ‘ O | |
| APPDATA/myupd B-Indicator | |
| ’ O | |
| and O | |
| creates O | |
| a O | |
| sqlite3 O | |
| database O | |
| there O | |
| – O | |
| ‘ O | |
| myupd_tmp\\mng.db B-Indicator | |
| ’ O | |
| : O | |
| CREATE O | |
| TABLE O | |
| MANAGE O | |
| ( O | |
| ID O | |
| INT O | |
| PRIMARY O | |
| KEY O | |
| NOT O | |
| NULL O | |
| , O | |
| Send O | |
| INT O | |
| NOT O | |
| NULL O | |
| , O | |
| Keylogg O | |
| INT O | |
| NOT O | |
| NULL O | |
| , O | |
| Screenshot O | |
| INT O | |
| NOT O | |
| NULL O | |
| , O | |
| Audio O | |
| INT O | |
| NOT O | |
| NULL O | |
| ) O | |
| ; O | |
| INSERT O | |
| INTO O | |
| MANAGE O | |
| ( O | |
| ID O | |
| , O | |
| Send O | |
| , O | |
| Keylogg O | |
| , O | |
| Screenshot O | |
| , O | |
| Audio O | |
| ) O | |
| VALUES O | |
| ( O | |
| 1 O | |
| , O | |
| 1 O | |
| , O | |
| 1 O | |
| , O | |
| 1 O | |
| , O | |
| 0 O | |
| ) O | |
| Finally O | |
| , O | |
| the O | |
| malware O | |
| modifies O | |
| the O | |
| ‘ O | |
| Software\Microsoft\Windows\CurrentVersion\Run B-Indicator | |
| ’ O | |
| registry O | |
| key O | |
| to O | |
| enable O | |
| autostart O | |
| of O | |
| the O | |
| main O | |
| module O | |
| . O | |
| The O | |
| code O | |
| contains O | |
| multiple O | |
| comments O | |
| in O | |
| Italian O | |
| , O | |
| here O | |
| is O | |
| the O | |
| most O | |
| noteworthy O | |
| example O | |
| : O | |
| “ O | |
| Receive O | |
| commands O | |
| from O | |
| the O | |
| remote O | |
| server O | |
| , O | |
| here O | |
| you O | |
| can O | |
| set O | |
| the O | |
| key O | |
| commands O | |
| to O | |
| command O | |
| the O | |
| virus O | |
| ” O | |
| Here O | |
| are O | |
| the O | |
| available O | |
| commands O | |
| : O | |
| Name O | |
| Description O | |
| cd O | |
| Change O | |
| current O | |
| directory O | |
| to O | |
| specified O | |
| quit O | |
| Close O | |
| the O | |
| socket O | |
| nggexe O | |
| Execute O | |
| received O | |
| command O | |
| via O | |
| Python B-System | |
| ’ O | |
| s O | |
| subprocess.Popen O | |
| ( O | |
| ) O | |
| without O | |
| outputs O | |
| ngguploads O | |
| Upload O | |
| specified O | |
| file O | |
| to O | |
| the O | |
| specified O | |
| URL O | |
| nggdownloads O | |
| Download O | |
| content O | |
| from O | |
| the O | |
| specified O | |
| URLs O | |
| and O | |
| save O | |
| to O | |
| specified O | |
| file O | |
| nggfilesystem O | |
| Dump O | |
| file O | |
| structure O | |
| of O | |
| the O | |
| C O | |
| : O | |
| path O | |
| , O | |
| save O | |
| it O | |
| to O | |
| the O | |
| file O | |
| in O | |
| json O | |
| format O | |
| and O | |
| zip O | |
| it O | |
| nggstart_screen O | |
| nggstop_screen O | |
| Enable/disable O | |
| screenshot O | |
| module O | |
| . O | |
| When O | |
| enabled O | |
| , O | |
| it O | |
| makes O | |
| a O | |
| screenshot O | |
| every O | |
| 25 O | |
| seconds O | |
| nggstart_key O | |
| nggstop_key O | |
| Enable/disable O | |
| keylogging O | |
| module O | |
| nggstart_rec O | |
| nggstop_rec O | |
| Enable/disable O | |
| surrounding O | |
| sounds O | |
| recording O | |
| module O | |
| ngg_status O | |
| Send O | |
| components O | |
| status O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| socket O | |
| * O | |
| any O | |
| other O | |
| * O | |
| Execute O | |
| received O | |
| command O | |
| via O | |
| Python B-System | |
| ’ O | |
| s O | |
| subprocess.Popen O | |
| ( O | |
| ) O | |
| , O | |
| output O | |
| result O | |
| will O | |
| be O | |
| sent O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| socket O | |
| . O | |
| All O | |
| modules O | |
| set O | |
| hidden O | |
| attributes O | |
| to O | |
| their O | |
| files O | |
| : O | |
| Module O | |
| Paths O | |
| Exfiltrated O | |
| data O | |
| format O | |
| msconf.exe B-Indicator | |
| % B-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd/gen/ I-Indicator | |
| % I-Indicator | |
| Y I-Indicator | |
| % I-Indicator | |
| m I-Indicator | |
| % I-Indicator | |
| d- I-Indicator | |
| % I-Indicator | |
| H I-Indicator | |
| % I-Indicator | |
| M I-Indicator | |
| % I-Indicator | |
| S_filesystem.zip I-Indicator | |
| ( I-Indicator | |
| file I-Indicator | |
| structure I-Indicator | |
| dump I-Indicator | |
| ) I-Indicator | |
| system.exe I-Indicator | |
| % I-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd/aud/ I-Indicator | |
| % I-Indicator | |
| d I-Indicator | |
| % I-Indicator | |
| m I-Indicator | |
| % I-Indicator | |
| Y I-Indicator | |
| % I-Indicator | |
| H I-Indicator | |
| % I-Indicator | |
| M I-Indicator | |
| % I-Indicator | |
| S.wav I-Indicator | |
| ( I-Indicator | |
| surrounding I-Indicator | |
| sounds I-Indicator | |
| ) I-Indicator | |
| update.exe I-Indicator | |
| % I-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd_tmp/txt/ I-Indicator | |
| % I-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd/txt/ I-Indicator | |
| % I-Indicator | |
| Y I-Indicator | |
| % I-Indicator | |
| m I-Indicator | |
| % I-Indicator | |
| d- I-Indicator | |
| % I-Indicator | |
| H I-Indicator | |
| % I-Indicator | |
| M I-Indicator | |
| % I-Indicator | |
| S.txt I-Indicator | |
| ( I-Indicator | |
| keylogging I-Indicator | |
| ) I-Indicator | |
| wow.exe I-Indicator | |
| % I-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd/scr/ I-Indicator | |
| % I-Indicator | |
| Y I-Indicator | |
| % I-Indicator | |
| m I-Indicator | |
| % I-Indicator | |
| d- I-Indicator | |
| % I-Indicator | |
| H I-Indicator | |
| % I-Indicator | |
| M I-Indicator | |
| % I-Indicator | |
| S.jpg I-Indicator | |
| ( I-Indicator | |
| screenshots I-Indicator | |
| ) I-Indicator | |
| skype_sync2.exe I-Indicator | |
| % I-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd_tmp/skype/ I-Indicator | |
| % I-Indicator | |
| APPDATA I-Indicator | |
| % I-Indicator | |
| /myupd/skype/ I-Indicator | |
| yyyyMMddHHmmss_in.mp3 I-Indicator | |
| yyyyMMddHHmmss_out.mp3 B-Indicator | |
| ( O | |
| skype O | |
| calls O | |
| records O | |
| ) O | |
| Moreover O | |
| , O | |
| we O | |
| found O | |
| one O | |
| module O | |
| written O | |
| in O | |
| .Net B-System | |
| – O | |
| skype_sync2.exe B-Indicator | |
| . O | |
| The O | |
| main O | |
| purpose O | |
| of O | |
| this O | |
| module O | |
| is O | |
| to O | |
| exfiltrate O | |
| Skype B-System | |
| call O | |
| recordings O | |
| . O | |
| Just O | |
| like O | |
| the O | |
| previous O | |
| modules O | |
| , O | |
| it O | |
| contains O | |
| multiple O | |
| strings O | |
| in O | |
| Italian O | |
| . O | |
| After O | |
| launch O | |
| , O | |
| it O | |
| downloads O | |
| a O | |
| codec O | |
| for O | |
| MP3 O | |
| encoding O | |
| directly O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| : O | |
| http B-Indicator | |
| : I-Indicator | |
| //54.67.109.199/skype_resource/libmp3lame.dll I-Indicator | |
| The O | |
| skype_sync2.exe B-Indicator | |
| module O | |
| has O | |
| a O | |
| compilation O | |
| timestamp O | |
| – O | |
| Feb O | |
| 06 O | |
| 2017 O | |
| and O | |
| the O | |
| following O | |
| PDB O | |
| string O | |
| : O | |
| \\vmware-host\Shared B-Indicator | |
| Folders\dati\Backup\Projects\REcodin_2\REcodin_2\obj\x86\Release\REcodin_2.pdb B-Indicator | |
| network.exe B-Indicator | |
| is O | |
| a O | |
| module O | |
| for O | |
| submitting O | |
| all O | |
| exfiltrated O | |
| data O | |
| to O | |
| the O | |
| server O | |
| . O | |
| In O | |
| the O | |
| observed O | |
| version O | |
| of O | |
| the O | |
| implant O | |
| it O | |
| doesn O | |
| ’ O | |
| t O | |
| have O | |
| an O | |
| interface O | |
| to O | |
| work O | |
| with O | |
| the O | |
| skype_sync2.exe B-Indicator | |
| module O | |
| . O | |
| network.exe B-Indicator | |
| submitting O | |
| to O | |
| the O | |
| server O | |
| code O | |
| snippet O | |
| Code O | |
| similarities O | |
| We O | |
| found O | |
| some O | |
| code O | |
| similarities O | |
| between O | |
| the O | |
| implant O | |
| for O | |
| Windows B-System | |
| and O | |
| other O | |
| public O | |
| accessible O | |
| projects O | |
| . O | |
| https B-Indicator | |
| : I-Indicator | |
| //github.com/El3ct71k/Keylogger/ I-Indicator | |
| It O | |
| appears O | |
| the O | |
| developers O | |
| have O | |
| copied O | |
| the O | |
| functional O | |
| part O | |
| of O | |
| the O | |
| keylogger O | |
| module O | |
| from O | |
| this O | |
| project O | |
| . O | |
| update.exe B-Indicator | |
| module O | |
| and O | |
| Keylogger O | |
| by O | |
| ‘ O | |
| El3ct71k O | |
| ’ O | |
| code O | |
| comparison O | |
| Xenotix B-System | |
| Python I-System | |
| Keylogger I-System | |
| including O | |
| specified O | |
| mutex O | |
| ‘ O | |
| mutex_var_xboz O | |
| ’ O | |
| . O | |
| update.exe B-Indicator | |
| module O | |
| and O | |
| Xenotix B-System | |
| Python I-System | |
| Keylogger I-System | |
| code O | |
| comparison O | |
| ‘ O | |
| addStartup O | |
| ’ O | |
| method O | |
| from O | |
| msconf.exe B-Indicator | |
| module O | |
| ‘ O | |
| addStartup O | |
| ’ O | |
| method O | |
| from O | |
| Xenotix B-System | |
| Python I-System | |
| Keylogger I-System | |
| Distribution O | |
| We O | |
| found O | |
| several O | |
| landing O | |
| pages O | |
| that O | |
| spread O | |
| the O | |
| Android B-System | |
| implants O | |
| . O | |
| Malicious O | |
| URL O | |
| Referrer O | |
| Dates O | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/tre/internet/Configuratore_3.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/tre/internet/ I-Indicator | |
| 2015-02-04 O | |
| to O | |
| present O | |
| time O | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/appPro_AC.apk I-Indicator | |
| – O | |
| 2015-07-01 O | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator | |
| % I-Indicator | |
| 20Configuratore I-Indicator | |
| % I-Indicator | |
| 20v5_4_2.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator | |
| 2015-01-20 O | |
| to O | |
| present O | |
| time O | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/190/configurazione/vodafone/smartphone/Vodafone I-Indicator | |
| % I-Indicator | |
| 20Configuratore.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator | |
| currently O | |
| active O | |
| http B-Indicator | |
| : I-Indicator | |
| //vodafoneinfinity.sytes.net/tim/internet/Configuratore_TIM.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //vodafoneinfinity.sytes.net/tim/internet/ I-Indicator | |
| 2015-03-04 O | |
| http B-Indicator | |
| : I-Indicator | |
| //vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator | |
| % I-Indicator | |
| 20Configuratore I-Indicator | |
| % I-Indicator | |
| 20v5_4_2.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/ I-Indicator | |
| 2015-01-14 O | |
| http B-Indicator | |
| : I-Indicator | |
| //windupdate.serveftp.com/wind/LTE/WIND I-Indicator | |
| % I-Indicator | |
| 20Configuratore I-Indicator | |
| % I-Indicator | |
| 20v5_4_2.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //windupdate.serveftp.com/wind/LTE/ I-Indicator | |
| 2015-03-31 O | |
| http B-Indicator | |
| : I-Indicator | |
| //119.network/lte/Internet-TIM-4G-LTE.apk I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //119.network/lte/download.html I-Indicator | |
| 2015-02-04 O | |
| 2015-07-20 O | |
| http B-Indicator | |
| : I-Indicator | |
| //119.network/lte/Configuratore_TIM.apk I-Indicator | |
| 2015-07-08 O | |
| Many O | |
| of O | |
| these O | |
| domains O | |
| are O | |
| outdated O | |
| , O | |
| but O | |
| almost O | |
| all O | |
| ( O | |
| except O | |
| one O | |
| – O | |
| appPro_AC.apk B-Indicator | |
| ) O | |
| samples O | |
| located O | |
| on O | |
| the O | |
| 217.194.13.133 B-Indicator | |
| server O | |
| are O | |
| still O | |
| accessible O | |
| . O | |
| All O | |
| the O | |
| observed O | |
| landing O | |
| pages O | |
| mimic O | |
| the O | |
| mobile O | |
| operators O | |
| ’ O | |
| web O | |
| pages O | |
| through O | |
| their O | |
| domain O | |
| name O | |
| and O | |
| web O | |
| page O | |
| content O | |
| as O | |
| well O | |
| . O | |
| Further O | |
| research O | |
| of O | |
| the O | |
| attacker O | |
| ’ O | |
| s O | |
| infrastructure O | |
| revealed O | |
| more O | |
| related O | |
| mimicking O | |
| domains O | |
| . O | |
| Unfortunately O | |
| , O | |
| for O | |
| now O | |
| we O | |
| can O | |
| ’ O | |
| t O | |
| say O | |
| in O | |
| what O | |
| environment O | |
| these O | |
| landing O | |
| pages O | |
| were O | |
| used O | |
| in O | |
| the O | |
| wild O | |
| , O | |
| but O | |
| according O | |
| to O | |
| all O | |
| the O | |
| information O | |
| at O | |
| our O | |
| dsiposal O | |
| , O | |
| we O | |
| can O | |
| assume O | |
| that O | |
| they O | |
| are O | |
| perfect O | |
| for O | |
| exploitation O | |
| using O | |
| malicious O | |
| redirects O | |
| or O | |
| man-in-the-middle O | |
| attacks O | |
| . O | |
| For O | |
| example O | |
| , O | |
| this O | |
| could O | |
| be O | |
| when O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| device O | |
| connects O | |
| to O | |
| a O | |
| Wi-Fi O | |
| access O | |
| point O | |
| that O | |
| is O | |
| infected O | |
| or O | |
| controlled O | |
| by O | |
| the O | |
| attackers O | |
| . O | |
| Artifacts O | |
| During O | |
| the O | |
| research O | |
| , O | |
| we O | |
| found O | |
| plenty O | |
| of O | |
| traces O | |
| of O | |
| the O | |
| developers O | |
| and O | |
| those O | |
| doing O | |
| the O | |
| maintaining O | |
| . O | |
| As O | |
| already O | |
| stated O | |
| in O | |
| the O | |
| ‘ O | |
| malware O | |
| features O | |
| ’ O | |
| part O | |
| , O | |
| there O | |
| are O | |
| multiple O | |
| giveaways O | |
| in O | |
| the O | |
| code O | |
| . O | |
| Here O | |
| are O | |
| just O | |
| some O | |
| of O | |
| them O | |
| : O | |
| ngglobal O | |
| – O | |
| FirebaseCloudMessaging O | |
| topic O | |
| name O | |
| Issuer O | |
| : O | |
| CN O | |
| = O | |
| negg O | |
| – O | |
| from O | |
| several O | |
| certificates O | |
| negg.ddns B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| , O | |
| negg1.ddns B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| , O | |
| negg2.ddns B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| – O | |
| C O | |
| & O | |
| C O | |
| servers O | |
| NG O | |
| SuperShell O | |
| – O | |
| string O | |
| from O | |
| the O | |
| reverse O | |
| shell O | |
| payload O | |
| ngg O | |
| – O | |
| prefix O | |
| in O | |
| commands O | |
| names O | |
| of O | |
| the O | |
| implant O | |
| for O | |
| Windows B-System | |
| Signature O | |
| with O | |
| specific O | |
| issuer O | |
| Whois O | |
| records O | |
| and O | |
| IP O | |
| relationships O | |
| provide O | |
| many O | |
| interesting O | |
| insights O | |
| as O | |
| well O | |
| . O | |
| There O | |
| are O | |
| a O | |
| lot O | |
| of O | |
| other O | |
| ‘ O | |
| Negg O | |
| ’ O | |
| mentions O | |
| in O | |
| Whois O | |
| records O | |
| and O | |
| references O | |
| to O | |
| it O | |
| . O | |
| For O | |
| example O | |
| : O | |
| Conclusions O | |
| The O | |
| Skygofree B-Malware | |
| Android B-System | |
| implant O | |
| is O | |
| one O | |
| of O | |
| the O | |
| most O | |
| powerful O | |
| spyware O | |
| tools O | |
| that O | |
| we O | |
| have O | |
| ever O | |
| seen O | |
| for O | |
| this O | |
| platform O | |
| . O | |
| As O | |
| a O | |
| result O | |
| of O | |
| the O | |
| long-term O | |
| development O | |
| process O | |
| , O | |
| there O | |
| are O | |
| multiple O | |
| , O | |
| exceptional O | |
| capabilities O | |
| : O | |
| usage O | |
| of O | |
| multiple O | |
| exploits O | |
| for O | |
| gaining O | |
| root O | |
| privileges O | |
| , O | |
| a O | |
| complex O | |
| payload O | |
| structure O | |
| , O | |
| never-before-seen O | |
| surveillance O | |
| features O | |
| such O | |
| as O | |
| recording O | |
| surrounding O | |
| audio O | |
| in O | |
| specified O | |
| locations O | |
| . O | |
| Given O | |
| the O | |
| many O | |
| artifacts O | |
| we O | |
| discovered O | |
| in O | |
| the O | |
| malware O | |
| code O | |
| , O | |
| as O | |
| well O | |
| as O | |
| infrastructure O | |
| analysis O | |
| , O | |
| we O | |
| are O | |
| pretty O | |
| confident O | |
| that O | |
| the O | |
| developer O | |
| of O | |
| the O | |
| Skygofree B-Malware | |
| implants O | |
| is O | |
| an O | |
| Italian O | |
| IT O | |
| company O | |
| that O | |
| works O | |
| on O | |
| surveillance O | |
| solutions O | |
| , O | |
| just O | |
| like O | |
| HackingTeam B-Organization | |
| . O | |
| HenBox B-Malware | |
| : O | |
| The O | |
| Chickens O | |
| Come O | |
| Home O | |
| to O | |
| Roost O | |
| March O | |
| 13 O | |
| , O | |
| 2018 O | |
| at O | |
| 5:00 O | |
| AM O | |
| Unit O | |
| 42 O | |
| recently O | |
| discovered O | |
| a O | |
| new O | |
| Android B-System | |
| malware O | |
| family O | |
| we O | |
| named O | |
| “ O | |
| HenBox B-Malware | |
| ” O | |
| masquerading O | |
| as O | |
| a O | |
| variety O | |
| of O | |
| legitimate O | |
| Android B-System | |
| apps O | |
| . O | |
| We O | |
| chose O | |
| the O | |
| name O | |
| “ O | |
| HenBox B-Malware | |
| ” O | |
| based O | |
| on O | |
| metadata O | |
| found O | |
| in O | |
| most O | |
| of O | |
| the O | |
| malicious O | |
| apps O | |
| such O | |
| as O | |
| package O | |
| names O | |
| and O | |
| signer O | |
| detail O | |
| . O | |
| HenBox B-Malware | |
| masquerades O | |
| as O | |
| apps O | |
| such O | |
| as O | |
| VPN O | |
| and O | |
| Android B-System | |
| system O | |
| apps O | |
| and O | |
| often O | |
| installs O | |
| legitimate O | |
| versions O | |
| of O | |
| these O | |
| apps O | |
| along O | |
| with O | |
| HenBox B-Malware | |
| to O | |
| trick O | |
| users O | |
| into O | |
| thinking O | |
| they O | |
| downloaded O | |
| the O | |
| legitimate O | |
| app O | |
| . O | |
| While O | |
| some O | |
| of O | |
| the O | |
| legitimate O | |
| apps O | |
| HenBox B-Malware | |
| use O | |
| as O | |
| decoys O | |
| can O | |
| be O | |
| found O | |
| on O | |
| Google B-System | |
| Play I-System | |
| , O | |
| HenBox B-Malware | |
| apps O | |
| themselves O | |
| have O | |
| only O | |
| been O | |
| found O | |
| on O | |
| third-party O | |
| ( O | |
| non-Google O | |
| Play B-System | |
| ) O | |
| app O | |
| stores O | |
| . O | |
| HenBox B-Malware | |
| appears O | |
| to O | |
| primarily O | |
| target O | |
| the O | |
| Uyghurs O | |
| – O | |
| a O | |
| minority O | |
| Turkic O | |
| ethnic O | |
| group O | |
| that O | |
| is O | |
| primarily O | |
| Muslim O | |
| and O | |
| lives O | |
| mainly O | |
| in O | |
| the O | |
| Xinjiang O | |
| Uyghur O | |
| Autonomous O | |
| Region O | |
| in O | |
| North O | |
| West O | |
| China O | |
| . O | |
| It O | |
| also O | |
| targets O | |
| devices O | |
| made O | |
| by O | |
| Chinese O | |
| manufacturer O | |
| Xiaomi B-Organization | |
| and O | |
| those O | |
| running O | |
| MIUI B-System | |
| , O | |
| an O | |
| operating O | |
| system O | |
| based O | |
| on O | |
| Google B-System | |
| Android I-System | |
| made O | |
| by O | |
| Xiaomi B-Organization | |
| . O | |
| Smartphones O | |
| are O | |
| the O | |
| dominant O | |
| form O | |
| of O | |
| internet O | |
| access O | |
| in O | |
| the O | |
| region O | |
| and O | |
| Xinjiang O | |
| was O | |
| recently O | |
| above O | |
| the O | |
| national O | |
| average O | |
| of O | |
| internet O | |
| users O | |
| in O | |
| China O | |
| . O | |
| The O | |
| result O | |
| is O | |
| a O | |
| large O | |
| online O | |
| population O | |
| who O | |
| have O | |
| been O | |
| the O | |
| subject O | |
| of O | |
| numerous O | |
| cyber-attacks O | |
| in O | |
| the O | |
| past O | |
| . O | |
| Once O | |
| installed O | |
| , O | |
| HenBox B-Malware | |
| steals O | |
| information O | |
| from O | |
| the O | |
| devices O | |
| from O | |
| a O | |
| myriad O | |
| of O | |
| sources O | |
| , O | |
| including O | |
| many O | |
| mainstream O | |
| chat O | |
| , O | |
| communication O | |
| , O | |
| and O | |
| social O | |
| media O | |
| apps O | |
| . O | |
| The O | |
| stolen O | |
| information O | |
| includes O | |
| personal O | |
| and O | |
| device O | |
| information O | |
| . O | |
| Of O | |
| note O | |
| , O | |
| in O | |
| addition O | |
| to O | |
| tracking O | |
| the O | |
| compromised O | |
| device O | |
| ’ O | |
| s O | |
| location O | |
| , O | |
| HenBox B-Malware | |
| also O | |
| harvests O | |
| all O | |
| outgoing O | |
| phone O | |
| numbers O | |
| with O | |
| an O | |
| “ O | |
| 86 O | |
| ” O | |
| prefix O | |
| , O | |
| which O | |
| is O | |
| the O | |
| country O | |
| code O | |
| for O | |
| the O | |
| People O | |
| ’ O | |
| s O | |
| Republic O | |
| of O | |
| China O | |
| ( O | |
| PRC O | |
| ) O | |
| . O | |
| It O | |
| can O | |
| also O | |
| access O | |
| the O | |
| phone O | |
| ’ O | |
| s O | |
| cameras O | |
| and O | |
| microphone O | |
| . O | |
| HenBox B-Malware | |
| has O | |
| ties O | |
| to O | |
| infrastructure O | |
| used O | |
| in O | |
| targeted O | |
| attacks O | |
| with O | |
| a O | |
| focus O | |
| on O | |
| politics O | |
| in O | |
| South O | |
| East O | |
| Asia O | |
| . O | |
| These O | |
| attackers O | |
| have O | |
| used O | |
| additional O | |
| malware O | |
| families O | |
| in O | |
| previous O | |
| activity O | |
| dating O | |
| to O | |
| at O | |
| least O | |
| 2015 O | |
| that O | |
| include O | |
| PlugX B-Malware | |
| , O | |
| Zupdax B-Malware | |
| , O | |
| 9002 B-Malware | |
| , O | |
| and O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| . O | |
| This O | |
| also O | |
| aligns O | |
| with O | |
| HenBox B-Malware | |
| ’ O | |
| s O | |
| timeline O | |
| , O | |
| as O | |
| in O | |
| total O | |
| we O | |
| have O | |
| identified O | |
| almost O | |
| 200 O | |
| HenBox B-Malware | |
| samples O | |
| , O | |
| with O | |
| the O | |
| oldest O | |
| dating O | |
| to O | |
| 2015 O | |
| . O | |
| Most O | |
| of O | |
| the O | |
| samples O | |
| we O | |
| found O | |
| date O | |
| from O | |
| the O | |
| last O | |
| half O | |
| of O | |
| 2017 O | |
| , O | |
| fewer O | |
| samples O | |
| date O | |
| from O | |
| 2016 O | |
| , O | |
| and O | |
| a O | |
| handful O | |
| date O | |
| back O | |
| to O | |
| 2015 O | |
| . O | |
| In O | |
| 2018 O | |
| , O | |
| we O | |
| have O | |
| already O | |
| observed O | |
| a O | |
| small O | |
| but O | |
| consistent O | |
| number O | |
| of O | |
| samples O | |
| . O | |
| We O | |
| believe O | |
| this O | |
| indicates O | |
| a O | |
| fairly O | |
| sustained O | |
| campaign O | |
| that O | |
| has O | |
| gained O | |
| momentum O | |
| over O | |
| recent O | |
| months O | |
| . O | |
| HenBox B-Malware | |
| Enters O | |
| the O | |
| Uyghur B-System | |
| App I-System | |
| Store I-System | |
| In O | |
| May O | |
| 2016 O | |
| , O | |
| a O | |
| HenBox B-Malware | |
| app O | |
| was O | |
| downloaded O | |
| from O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| . O | |
| Specifically O | |
| , O | |
| the O | |
| app O | |
| was O | |
| an O | |
| Android B-System | |
| Package I-System | |
| ( O | |
| APK O | |
| ) O | |
| file O | |
| that O | |
| will O | |
| be O | |
| discussed O | |
| in O | |
| more O | |
| detail O | |
| shortly O | |
| . O | |
| The O | |
| domain O | |
| name O | |
| , O | |
| language O | |
| of O | |
| the O | |
| site O | |
| and O | |
| app O | |
| content O | |
| hosted O | |
| suggest O | |
| this O | |
| site O | |
| is O | |
| a O | |
| third-party O | |
| app O | |
| store O | |
| for O | |
| whom O | |
| the O | |
| intended O | |
| users O | |
| are O | |
| the O | |
| Uyghurs O | |
| . O | |
| Such O | |
| app O | |
| stores O | |
| are O | |
| so-called O | |
| because O | |
| they O | |
| are O | |
| not O | |
| officially O | |
| supported O | |
| by O | |
| Android B-System | |
| , O | |
| nor O | |
| are O | |
| they O | |
| provided O | |
| by O | |
| Google B-Organization | |
| , O | |
| unlike O | |
| the O | |
| Play B-System | |
| Store I-System | |
| . O | |
| Third-party O | |
| app O | |
| stores O | |
| are O | |
| ubiquitous O | |
| in O | |
| China O | |
| for O | |
| a O | |
| number O | |
| of O | |
| reasons O | |
| including O | |
| : O | |
| evermore O | |
| powerful O | |
| Chinese B-Organization | |
| Original I-Organization | |
| Equipment I-Organization | |
| Manufacturers I-Organization | |
| ( I-Organization | |
| OEM I-Organization | |
| ) I-Organization | |
| , O | |
| a O | |
| lack O | |
| of O | |
| an O | |
| official O | |
| Chinese O | |
| Google B-System | |
| Play I-System | |
| app O | |
| store O | |
| , O | |
| and O | |
| a O | |
| growing O | |
| smartphone O | |
| market O | |
| . O | |
| The O | |
| HenBox B-Malware | |
| app O | |
| downloaded O | |
| in O | |
| May O | |
| 2016 O | |
| was O | |
| masquerading O | |
| as O | |
| the O | |
| DroidVPN B-Indicator | |
| app O | |
| . O | |
| At O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| , O | |
| the O | |
| content O | |
| served O | |
| at O | |
| the O | |
| given O | |
| URL O | |
| on O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| , O | |
| is O | |
| now O | |
| a O | |
| legitimate O | |
| version O | |
| of O | |
| the O | |
| DroidVPN B-Indicator | |
| app O | |
| , O | |
| and O | |
| looks O | |
| as O | |
| shown O | |
| in O | |
| Figure O | |
| 1 O | |
| below O | |
| . O | |
| henbox_2 O | |
| Figure O | |
| 1 O | |
| Uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| app O | |
| store O | |
| showing O | |
| the O | |
| current O | |
| DroidVPN B-Indicator | |
| app O | |
| Virtual O | |
| Private O | |
| Network O | |
| ( O | |
| VPN O | |
| ) O | |
| tools O | |
| allow O | |
| connections O | |
| to O | |
| remote O | |
| private O | |
| networks O | |
| , O | |
| increasing O | |
| the O | |
| security O | |
| and O | |
| privacy O | |
| of O | |
| the O | |
| user O | |
| ’ O | |
| s O | |
| communications O | |
| . O | |
| According O | |
| to O | |
| the O | |
| DroidVPN B-Indicator | |
| app O | |
| description O | |
| , O | |
| it O | |
| “ O | |
| helps O | |
| bypass O | |
| regional O | |
| internet O | |
| restrictions O | |
| , O | |
| web O | |
| filtering O | |
| and O | |
| firewalls O | |
| by O | |
| tunneling O | |
| traffic O | |
| over O | |
| ICMP. O | |
| ” O | |
| Some O | |
| features O | |
| may O | |
| require O | |
| devices O | |
| to O | |
| be O | |
| rooted O | |
| to O | |
| function O | |
| and O | |
| according O | |
| to O | |
| some O | |
| 3rd O | |
| party O | |
| app O | |
| stores O | |
| , O | |
| unconditional O | |
| rooting O | |
| is O | |
| required O | |
| , O | |
| which O | |
| has O | |
| additional O | |
| security O | |
| implications O | |
| for O | |
| the O | |
| device O | |
| . O | |
| We O | |
| have O | |
| not O | |
| been O | |
| able O | |
| to O | |
| ascertain O | |
| how O | |
| the O | |
| DroidVPN B-Indicator | |
| app O | |
| on O | |
| the O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| app O | |
| store O | |
| was O | |
| replaced O | |
| with O | |
| the O | |
| malicious O | |
| HenBox B-Malware | |
| app O | |
| ; O | |
| however O | |
| , O | |
| some O | |
| indicators O | |
| point O | |
| to O | |
| the O | |
| server O | |
| running O | |
| an O | |
| outdated O | |
| version O | |
| of O | |
| Apache O | |
| Web O | |
| Server O | |
| on O | |
| a O | |
| Windows B-System | |
| 32-Bit O | |
| operating O | |
| system O | |
| . O | |
| In O | |
| light O | |
| of O | |
| this O | |
| , O | |
| we O | |
| believe O | |
| an O | |
| attack O | |
| against O | |
| unpatched B-Vulnerability | |
| vulnerabilities I-Vulnerability | |
| is O | |
| a O | |
| reasonable O | |
| conjecture O | |
| for O | |
| how O | |
| the O | |
| server O | |
| was O | |
| compromised O | |
| . O | |
| The O | |
| HenBox O | |
| app O | |
| downloaded O | |
| in O | |
| May O | |
| 2016 O | |
| , O | |
| as O | |
| described O | |
| in O | |
| Table O | |
| 1 O | |
| below O | |
| , O | |
| masquerades O | |
| as O | |
| a O | |
| legitimate O | |
| version O | |
| of O | |
| the O | |
| DroidVPN B-Indicator | |
| app O | |
| by O | |
| using O | |
| the O | |
| same O | |
| app O | |
| name O | |
| “ O | |
| DroidVPN B-System | |
| ” O | |
| and O | |
| the O | |
| same O | |
| iconography O | |
| used O | |
| when O | |
| displaying O | |
| the O | |
| app O | |
| in O | |
| Android B-System | |
| ’ O | |
| s O | |
| launcher O | |
| view O | |
| , O | |
| as O | |
| highlighted O | |
| in O | |
| Figure O | |
| 2 O | |
| below O | |
| Table O | |
| 1 O | |
| . O | |
| APK O | |
| SHA256 O | |
| Size O | |
| ( O | |
| bytes O | |
| ) O | |
| First O | |
| Seen O | |
| App O | |
| Package O | |
| name O | |
| App O | |
| name O | |
| 0589bed1e3b3d6234c30061be3be1cc6685d786ab3a892a8d4dae8e2d7ed92f7 B-Indicator | |
| 2,740,860 O | |
| May O | |
| 2016 O | |
| com.android.henbox B-Indicator | |
| DroidVPN B-System | |
| Table O | |
| 1 O | |
| Details O | |
| of O | |
| the O | |
| HenBox B-Malware | |
| DroidVPN B-System | |
| app O | |
| on O | |
| the O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| app O | |
| store O | |
| henbox_3 O | |
| Figure O | |
| 2 O | |
| HenBox B-Malware | |
| app O | |
| installed O | |
| , O | |
| purporting O | |
| to O | |
| be O | |
| DroidVPN B-Indicator | |
| Depending O | |
| on O | |
| the O | |
| language O | |
| setting O | |
| on O | |
| the O | |
| device O | |
| , O | |
| and O | |
| for O | |
| this O | |
| particular O | |
| variant O | |
| of O | |
| HenBox B-Malware | |
| , O | |
| the O | |
| installed O | |
| HenBox B-Malware | |
| app O | |
| may O | |
| have O | |
| the O | |
| name O | |
| “ O | |
| Backup O | |
| ” O | |
| but O | |
| uses O | |
| the O | |
| same O | |
| DroidVPN B-Indicator | |
| logo O | |
| . O | |
| Other O | |
| variants O | |
| use O | |
| other O | |
| names O | |
| and O | |
| logos O | |
| , O | |
| as O | |
| described O | |
| later O | |
| . O | |
| Given O | |
| the O | |
| DroidVPN B-Indicator | |
| look O | |
| and O | |
| feel O | |
| being O | |
| used O | |
| by O | |
| this O | |
| variant O | |
| of O | |
| HenBox B-Malware | |
| , O | |
| it O | |
| ’ O | |
| s O | |
| highly O | |
| likely O | |
| the O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| page O | |
| for O | |
| DroidVPN B-Indicator | |
| remained O | |
| identical O | |
| when O | |
| serving O | |
| either O | |
| HenBox B-Malware | |
| or O | |
| DroidVPN B-Indicator | |
| apps O | |
| , O | |
| just O | |
| that O | |
| the O | |
| legitimate O | |
| APK O | |
| file O | |
| had O | |
| been O | |
| replaced O | |
| with O | |
| HenBox O | |
| for O | |
| an O | |
| unknown O | |
| period O | |
| of O | |
| time O | |
| . O | |
| In O | |
| addition O | |
| to O | |
| the O | |
| look O | |
| and O | |
| feel O | |
| of O | |
| DroidVPN B-Indicator | |
| , O | |
| this O | |
| HenBox B-Malware | |
| variant O | |
| also O | |
| contained O | |
| a O | |
| legitimate O | |
| DroidVPN B-Indicator | |
| app O | |
| within O | |
| its O | |
| APK O | |
| package O | |
| as O | |
| an O | |
| asset O | |
| , O | |
| which O | |
| could O | |
| be O | |
| compared O | |
| to O | |
| a O | |
| resource O | |
| item O | |
| within O | |
| a O | |
| Windows B-System | |
| Portable I-System | |
| Executable I-System | |
| ( O | |
| PE O | |
| ) O | |
| file O | |
| . O | |
| Once O | |
| the O | |
| HenBox B-Malware | |
| app O | |
| is O | |
| installed O | |
| and O | |
| launched O | |
| , O | |
| it O | |
| launches O | |
| an O | |
| install O | |
| process O | |
| for O | |
| the O | |
| embedded O | |
| app O | |
| as O | |
| a O | |
| decoy O | |
| to O | |
| other O | |
| malicious O | |
| behaviors O | |
| occurring O | |
| in O | |
| the O | |
| background O | |
| , O | |
| and O | |
| to O | |
| satisfy O | |
| the O | |
| victim O | |
| with O | |
| the O | |
| app O | |
| they O | |
| were O | |
| requesting O | |
| , O | |
| assuming O | |
| they O | |
| requested O | |
| to O | |
| download O | |
| a O | |
| particular O | |
| app O | |
| , O | |
| such O | |
| as O | |
| DroidVPN B-System | |
| . O | |
| The O | |
| version O | |
| of O | |
| the O | |
| legitimate O | |
| DroidVPN B-Indicator | |
| embedded O | |
| inside O | |
| this O | |
| HenBox B-Malware | |
| variant O | |
| is O | |
| the O | |
| same O | |
| version O | |
| of O | |
| DroidVPN B-Indicator | |
| available O | |
| for O | |
| download O | |
| from O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| , O | |
| at O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| . O | |
| It O | |
| ’ O | |
| s O | |
| worth O | |
| noting O | |
| , O | |
| newer O | |
| versions O | |
| of O | |
| the O | |
| DroidVPN B-System | |
| app O | |
| are O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| , O | |
| as O | |
| well O | |
| as O | |
| in O | |
| some O | |
| other O | |
| third-party O | |
| app O | |
| stores O | |
| , O | |
| which O | |
| could O | |
| indicate O | |
| uyghurapps B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| is O | |
| not O | |
| awfully O | |
| well O | |
| maintained O | |
| or O | |
| updated O | |
| to O | |
| the O | |
| latest O | |
| apps O | |
| available O | |
| . O | |
| At O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| , O | |
| to O | |
| our O | |
| knowledge O | |
| no O | |
| other O | |
| third-party O | |
| app O | |
| stores O | |
| , O | |
| nor O | |
| the O | |
| official O | |
| Google B-System | |
| Play I-System | |
| store O | |
| , O | |
| were O | |
| or O | |
| are O | |
| hosting O | |
| this O | |
| malicious O | |
| HenBox B-Malware | |
| variant O | |
| masquerading O | |
| as O | |
| DroidVPN B-Indicator | |
| . O | |
| The O | |
| Right O | |
| App O | |
| at O | |
| the O | |
| Right O | |
| Time O | |
| The O | |
| malicious O | |
| HenBox B-Malware | |
| and O | |
| embedded O | |
| DroidVPN B-Indicator | |
| app O | |
| combination O | |
| is O | |
| one O | |
| instance O | |
| of O | |
| the O | |
| type O | |
| of O | |
| legitimate O | |
| apps O | |
| the O | |
| attackers O | |
| choose O | |
| to O | |
| mimic O | |
| to O | |
| compromise O | |
| their O | |
| victims O | |
| . O | |
| These O | |
| threat O | |
| actors O | |
| frequently O | |
| offer O | |
| malicious O | |
| apps O | |
| purporting O | |
| to O | |
| be O | |
| legitimate O | |
| apps O | |
| that O | |
| are O | |
| broadly O | |
| used O | |
| or O | |
| important O | |
| to O | |
| a O | |
| targeted O | |
| population O | |
| . O | |
| It O | |
| ’ O | |
| s O | |
| worth O | |
| noting O | |
| however O | |
| , O | |
| about O | |
| one-third O | |
| of O | |
| the O | |
| HenBox B-Malware | |
| apps O | |
| contained O | |
| embedded O | |
| APK O | |
| objects O | |
| that O | |
| did O | |
| not O | |
| refer O | |
| to O | |
| legitimate O | |
| apps O | |
| . O | |
| Some O | |
| were O | |
| only O | |
| 3 O | |
| bytes O | |
| long O | |
| , O | |
| containing O | |
| strings O | |
| such O | |
| as O | |
| “ O | |
| ddd O | |
| ” O | |
| and O | |
| “ O | |
| 333 O | |
| ” O | |
| , O | |
| or O | |
| were O | |
| otherwise O | |
| corrupted O | |
| . O | |
| Beyond O | |
| the O | |
| previously O | |
| mentioned O | |
| DroidVPN B-Indicator | |
| example O | |
| , O | |
| other O | |
| viable O | |
| embedded O | |
| apps O | |
| we O | |
| found O | |
| include O | |
| apps O | |
| currently O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| , O | |
| as O | |
| well O | |
| as O | |
| many O | |
| third-party O | |
| app O | |
| stores O | |
| . O | |
| Table O | |
| 2 O | |
| below O | |
| lists O | |
| some O | |
| of O | |
| these O | |
| apps O | |
| with O | |
| their O | |
| respective O | |
| metadata O | |
| . O | |
| Sample O | |
| 1 O | |
| marks O | |
| the O | |
| first O | |
| HenBox B-Malware | |
| sample O | |
| we O | |
| saw O | |
| embedding O | |
| a O | |
| legitimate O | |
| app O | |
| within O | |
| its O | |
| assets O | |
| to O | |
| be O | |
| dropped O | |
| and O | |
| installed O | |
| on O | |
| the O | |
| victim O | |
| device O | |
| as O | |
| a O | |
| decoy O | |
| . O | |
| The O | |
| legitimate O | |
| app O | |
| in O | |
| question O | |
| was O | |
| a O | |
| Uyghur O | |
| language O | |
| keyboard O | |
| app O | |
| targeted O | |
| at O | |
| native O | |
| speakers O | |
| of O | |
| the O | |
| Uyghur O | |
| language O | |
| and O | |
| their O | |
| smartphones O | |
| . O | |
| Sample O | |
| 2 O | |
| , O | |
| has O | |
| the O | |
| package O | |
| name O | |
| cn.android.setting B-Indicator | |
| masquerading O | |
| as O | |
| Android O | |
| ’ O | |
| s O | |
| Settings B-System | |
| app I-System | |
| , O | |
| which O | |
| has O | |
| a O | |
| similar O | |
| package O | |
| name O | |
| ( O | |
| com.android.settings B-Indicator | |
| ) O | |
| . O | |
| This O | |
| variant O | |
| of O | |
| HenBox B-Malware | |
| also O | |
| used O | |
| the O | |
| common O | |
| green O | |
| Android B-System | |
| figure O | |
| as O | |
| the O | |
| app O | |
| logo O | |
| and O | |
| was O | |
| named O | |
| 设置 O | |
| ( O | |
| “ O | |
| Backup O | |
| ” O | |
| in O | |
| English O | |
| ) O | |
| . O | |
| This O | |
| variant O | |
| ’ O | |
| s O | |
| app O | |
| name O | |
| , O | |
| along O | |
| with O | |
| many O | |
| others O | |
| , O | |
| is O | |
| written O | |
| in O | |
| Chinese O | |
| and O | |
| describes O | |
| the O | |
| app O | |
| as O | |
| a O | |
| backup O | |
| tool O | |
| . O | |
| Please O | |
| see O | |
| the O | |
| IOCs O | |
| section O | |
| for O | |
| all O | |
| app O | |
| and O | |
| package O | |
| name O | |
| combinations O | |
| . O | |
| Interestingly O | |
| , O | |
| the O | |
| embedded O | |
| app O | |
| in O | |
| sample O | |
| 2 O | |
| is O | |
| not O | |
| a O | |
| version O | |
| of O | |
| the O | |
| Android B-System | |
| Settings I-System | |
| app O | |
| but O | |
| instead O | |
| the O | |
| “ O | |
| Amaq B-System | |
| Agency I-System | |
| ” O | |
| app O | |
| , O | |
| which O | |
| reports O | |
| on O | |
| ISIS O | |
| related O | |
| news O | |
| . O | |
| Reports O | |
| indicate O | |
| fake O | |
| versions O | |
| of O | |
| the O | |
| Amaq B-System | |
| app O | |
| exist O | |
| , O | |
| likely O | |
| in O | |
| order O | |
| to O | |
| spy O | |
| on O | |
| those O | |
| that O | |
| use O | |
| it O | |
| . O | |
| A O | |
| month O | |
| after O | |
| observing O | |
| sample O | |
| 2 O | |
| , O | |
| we O | |
| obtained O | |
| another O | |
| which O | |
| used O | |
| the O | |
| same O | |
| package O | |
| name O | |
| as O | |
| sample O | |
| 2 O | |
| ( O | |
| cn.android.setting B-Indicator | |
| ) O | |
| . O | |
| However O | |
| , O | |
| this O | |
| time O | |
| the O | |
| app O | |
| name O | |
| for O | |
| both O | |
| HenBox B-Malware | |
| and O | |
| the O | |
| embedded O | |
| app O | |
| were O | |
| identical O | |
| : O | |
| Islamawazi B-System | |
| . O | |
| Islamawazi B-System | |
| is O | |
| also O | |
| known O | |
| as O | |
| the O | |
| Turkistan B-Organization | |
| Islamic I-Organization | |
| Party I-Organization | |
| or O | |
| “ O | |
| TIP O | |
| ” O | |
| . O | |
| This O | |
| organization O | |
| was O | |
| formerly O | |
| known O | |
| as O | |
| the O | |
| East B-Organization | |
| Turkestan I-Organization | |
| Islamic I-Organization | |
| Party I-Organization | |
| and O | |
| is O | |
| purported O | |
| to O | |
| be O | |
| an O | |
| Islamic O | |
| extremist O | |
| separatist O | |
| organization O | |
| founded O | |
| by O | |
| Uyghur O | |
| jihadists O | |
| . O | |
| The O | |
| embedded O | |
| app O | |
| appears O | |
| to O | |
| be O | |
| a O | |
| media O | |
| player O | |
| . O | |
| These O | |
| examples O | |
| , O | |
| together O | |
| with O | |
| the O | |
| HenBox B-Malware | |
| app O | |
| placed O | |
| on O | |
| a O | |
| very O | |
| specific O | |
| third-party O | |
| app O | |
| store O | |
| , O | |
| point O | |
| clearly O | |
| to O | |
| at O | |
| least O | |
| some O | |
| of O | |
| the O | |
| intended O | |
| targets O | |
| of O | |
| these O | |
| malicious O | |
| apps O | |
| being O | |
| Uyghurs O | |
| , O | |
| specifically O | |
| those O | |
| with O | |
| interest O | |
| in O | |
| or O | |
| association O | |
| with O | |
| terrorist O | |
| groups O | |
| . O | |
| These O | |
| threat O | |
| actors O | |
| appear O | |
| to O | |
| be O | |
| choosing O | |
| the O | |
| right O | |
| apps O | |
| – O | |
| those O | |
| that O | |
| could O | |
| be O | |
| popular O | |
| with O | |
| locals O | |
| in O | |
| the O | |
| region O | |
| , O | |
| at O | |
| the O | |
| right O | |
| time O | |
| – O | |
| while O | |
| tensions O | |
| grow O | |
| in O | |
| this O | |
| region O | |
| of O | |
| China O | |
| , O | |
| to O | |
| ensure O | |
| a O | |
| good O | |
| victim O | |
| install-base O | |
| . O | |
| HenBox B-Malware | |
| Roosts O | |
| HenBox B-Malware | |
| has O | |
| evolved O | |
| over O | |
| the O | |
| past O | |
| three O | |
| years O | |
| , O | |
| and O | |
| of O | |
| the O | |
| almost O | |
| two O | |
| hundred O | |
| HenBox B-Malware | |
| apps O | |
| in O | |
| AutoFocus O | |
| , O | |
| the O | |
| vast O | |
| majority O | |
| contain O | |
| several O | |
| native O | |
| libraries O | |
| as O | |
| well O | |
| as O | |
| other O | |
| components O | |
| in O | |
| order O | |
| to O | |
| achieve O | |
| their O | |
| objective O | |
| . O | |
| Most O | |
| components O | |
| are O | |
| obfuscated O | |
| in O | |
| some O | |
| way O | |
| , O | |
| whether O | |
| it O | |
| be O | |
| simple O | |
| XOR O | |
| with O | |
| a O | |
| single-byte O | |
| key O | |
| , O | |
| or O | |
| through O | |
| the O | |
| use O | |
| of O | |
| ZIP B-System | |
| or O | |
| Zlib B-System | |
| compression O | |
| wrapped O | |
| with O | |
| RC4 O | |
| encryption O | |
| . O | |
| These O | |
| components O | |
| are O | |
| responsible O | |
| for O | |
| a O | |
| myriad O | |
| of O | |
| functions O | |
| including O | |
| handling O | |
| decryption O | |
| , O | |
| network O | |
| communications O | |
| , O | |
| gaining O | |
| super-user O | |
| privileges O | |
| , O | |
| monitoring O | |
| system O | |
| logs O | |
| , O | |
| loading O | |
| additional O | |
| Dalvik O | |
| code O | |
| files O | |
| , O | |
| tracking O | |
| the O | |
| device O | |
| location O | |
| and O | |
| more O | |
| . O | |
| The O | |
| remainder O | |
| of O | |
| this O | |
| section O | |
| describes O | |
| at O | |
| a O | |
| high-level O | |
| what O | |
| HenBox O | |
| is O | |
| capable O | |
| of O | |
| , O | |
| and O | |
| how O | |
| it O | |
| operates O | |
| . O | |
| The O | |
| description O | |
| is O | |
| based O | |
| on O | |
| analysis O | |
| of O | |
| the O | |
| sample O | |
| described O | |
| in O | |
| Table O | |
| 3 O | |
| below O | |
| , O | |
| which O | |
| was O | |
| of O | |
| interest O | |
| given O | |
| its O | |
| C2 O | |
| domain B-Indicator | |
| mefound I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| overlaps O | |
| with O | |
| PlugX B-Malware | |
| , O | |
| Zupdax B-Malware | |
| , O | |
| and O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| malware O | |
| families O | |
| discussed O | |
| in O | |
| more O | |
| detail O | |
| later O | |
| . O | |
| SHA256 O | |
| Package O | |
| Name O | |
| App O | |
| Name O | |
| a6c7351b09a733a1b3ff8a0901c5bde B-Indicator | |
| fdc3b566bfcedcdf5a338c3a97c9f249b O | |
| com.android.henbox B-Indicator | |
| 备份 O | |
| ( O | |
| Backup O | |
| ) O | |
| Table O | |
| 3 O | |
| HenBox B-Malware | |
| variant O | |
| used O | |
| in O | |
| description O | |
| Once O | |
| this O | |
| variant O | |
| of O | |
| HenBox B-Malware | |
| is O | |
| installed O | |
| on O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| device O | |
| , O | |
| the O | |
| app O | |
| can O | |
| be O | |
| executed O | |
| in O | |
| two O | |
| different O | |
| ways O | |
| : O | |
| One O | |
| method O | |
| for O | |
| executing O | |
| HenBox B-Malware | |
| is O | |
| for O | |
| the O | |
| victim O | |
| to O | |
| launch O | |
| the O | |
| malicious O | |
| app O | |
| ( O | |
| named O | |
| “ O | |
| Backup O | |
| ” O | |
| , O | |
| in O | |
| this O | |
| instance O | |
| ) O | |
| from O | |
| the O | |
| launcher O | |
| view O | |
| on O | |
| their O | |
| device O | |
| , O | |
| as O | |
| shown O | |
| in O | |
| Figure O | |
| 3 O | |
| below O | |
| . O | |
| This O | |
| runs O | |
| code O | |
| in O | |
| the O | |
| onCreate O | |
| ( O | |
| ) O | |
| method O | |
| of O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| MainActivity O | |
| class O | |
| , O | |
| which O | |
| in O | |
| effect O | |
| is O | |
| the O | |
| program O | |
| ’ O | |
| s O | |
| entry O | |
| point O | |
| . O | |
| This O | |
| process O | |
| is O | |
| defined O | |
| in O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| AndroidManifest.xml O | |
| config O | |
| file O | |
| , O | |
| as O | |
| shown O | |
| in O | |
| the O | |
| following O | |
| snippet O | |
| . O | |
| Doing O | |
| so O | |
| executes O | |
| code O | |
| checking O | |
| if O | |
| the O | |
| device O | |
| is O | |
| manufactured O | |
| by O | |
| Xiaomi B-Organization | |
| , O | |
| or O | |
| if O | |
| Xiaomi B-Organization | |
| ’ I-Organization | |
| s I-Organization | |
| fork O | |
| of O | |
| Android B-System | |
| is O | |
| running O | |
| on O | |
| the O | |
| device O | |
| . O | |
| Under O | |
| these O | |
| conditions O | |
| , O | |
| the O | |
| app O | |
| continues O | |
| executing O | |
| and O | |
| the O | |
| intent O | |
| of O | |
| targeting O | |
| Xiaomi B-Organization | |
| devices O | |
| and O | |
| users O | |
| could O | |
| be O | |
| inferred O | |
| , O | |
| however O | |
| poorly O | |
| written O | |
| code O | |
| results O | |
| in O | |
| execution O | |
| in O | |
| more O | |
| environments O | |
| than O | |
| perhaps O | |
| intended O | |
| ; O | |
| further O | |
| checks O | |
| are O | |
| made O | |
| to O | |
| ascertain O | |
| whether O | |
| the O | |
| app O | |
| is O | |
| running O | |
| on O | |
| an O | |
| emulator O | |
| , O | |
| perhaps O | |
| to O | |
| evade O | |
| researcher O | |
| analysis O | |
| environments O | |
| . O | |
| Assuming O | |
| these O | |
| checks O | |
| pass O | |
| , O | |
| one O | |
| of O | |
| the O | |
| main O | |
| ELF O | |
| libraries O | |
| is O | |
| loaded O | |
| that O | |
| orchestrates O | |
| other O | |
| components O | |
| and O | |
| provides O | |
| functionality O | |
| to O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| Dalvik O | |
| code O | |
| through O | |
| the O | |
| Java O | |
| Native O | |
| Interface O | |
| ( O | |
| JNI O | |
| ) O | |
| . O | |
| HenBox B-Malware | |
| checks O | |
| whether O | |
| this O | |
| execution O | |
| is O | |
| its O | |
| first O | |
| by O | |
| using O | |
| Android B-System | |
| ’ O | |
| s O | |
| shared O | |
| preferences O | |
| feature O | |
| to O | |
| persist O | |
| XML O | |
| key-value O | |
| pair O | |
| data O | |
| . O | |
| If O | |
| it O | |
| is O | |
| the O | |
| first O | |
| execution O | |
| , O | |
| and O | |
| if O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| path O | |
| does O | |
| not O | |
| contain O | |
| “ O | |
| /system/app B-Indicator | |
| ” O | |
| ( O | |
| i.e O | |
| . O | |
| HenBox B-Malware | |
| is O | |
| not O | |
| running O | |
| as O | |
| a O | |
| system O | |
| app O | |
| ) O | |
| , O | |
| another O | |
| ELF O | |
| library O | |
| is O | |
| loaded O | |
| to O | |
| aid O | |
| with O | |
| executing O | |
| super-user O | |
| commands O | |
| . O | |
| The O | |
| second O | |
| method O | |
| uses O | |
| intents O | |
| , O | |
| broadcasts O | |
| , O | |
| and O | |
| receivers O | |
| to O | |
| execute O | |
| HenBox O | |
| code O | |
| . O | |
| Providing O | |
| the O | |
| app O | |
| has O | |
| registered O | |
| an O | |
| intent O | |
| to O | |
| process O | |
| particular O | |
| events O | |
| from O | |
| the O | |
| system O | |
| , O | |
| and O | |
| one O | |
| of O | |
| said O | |
| events O | |
| occurs O | |
| , O | |
| HenBox O | |
| is O | |
| effectively O | |
| brought O | |
| to O | |
| life O | |
| through O | |
| external O | |
| stimulus O | |
| from O | |
| another O | |
| app O | |
| on O | |
| the O | |
| system O | |
| broadcasting O | |
| a O | |
| request O | |
| , O | |
| or O | |
| the O | |
| system O | |
| itself O | |
| broadcasting O | |
| a O | |
| particular O | |
| event O | |
| has O | |
| occurred O | |
| . O | |
| These O | |
| intents O | |
| are O | |
| typically O | |
| defined O | |
| statically O | |
| in O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| AndroidManifest.xml O | |
| config O | |
| file O | |
| ; O | |
| some O | |
| HenBox B-Malware | |
| variants O | |
| register O | |
| further O | |
| intents O | |
| from O | |
| their O | |
| code O | |
| at O | |
| run-time O | |
| . O | |
| Once O | |
| a O | |
| matching O | |
| intent O | |
| is O | |
| triggered O | |
| , O | |
| the O | |
| respective O | |
| Receiver O | |
| code O | |
| will O | |
| be O | |
| executed O | |
| , O | |
| leading O | |
| to O | |
| other O | |
| HenBox O | |
| behaviors O | |
| being O | |
| launched O | |
| , O | |
| which O | |
| are O | |
| described O | |
| later O | |
| . O | |
| Table O | |
| 4 O | |
| below O | |
| lists O | |
| the O | |
| intents O | |
| that O | |
| are O | |
| statically O | |
| registered O | |
| in O | |
| this O | |
| HenBox B-Malware | |
| variant O | |
| ’ O | |
| s O | |
| AndroidManifest.xml O | |
| config O | |
| file O | |
| , O | |
| together O | |
| with O | |
| a O | |
| description O | |
| of O | |
| what O | |
| that O | |
| intent O | |
| does O | |
| , O | |
| and O | |
| when O | |
| it O | |
| would O | |
| be O | |
| used O | |
| . O | |
| Depending O | |
| on O | |
| the O | |
| intent O | |
| triggered O | |
| , O | |
| one O | |
| of O | |
| two O | |
| Receivers O | |
| would O | |
| be O | |
| called O | |
| , O | |
| in O | |
| this O | |
| instance O | |
| they O | |
| are O | |
| called O | |
| Boot O | |
| or O | |
| Time O | |
| but O | |
| the O | |
| name O | |
| is O | |
| somewhat O | |
| immaterial O | |
| . O | |
| Receiver O | |
| Intent O | |
| Name O | |
| Description O | |
| BootReceiver O | |
| android.intent.action.BOOT_COMPLETED B-Indicator | |
| System O | |
| notification O | |
| that O | |
| the O | |
| device O | |
| has O | |
| finished O | |
| booting O | |
| . O | |
| android.intent.action.restart B-Indicator | |
| A O | |
| legacy O | |
| intent O | |
| used O | |
| to O | |
| indicate O | |
| a O | |
| system O | |
| restart O | |
| . O | |
| android.intent.action.SIM_STATE_CHANGED B-Indicator | |
| System O | |
| notification O | |
| that O | |
| the O | |
| SIM O | |
| card O | |
| has O | |
| changed O | |
| or O | |
| been O | |
| removed O | |
| . O | |
| android.intent.action.PACKAGE_INSTALL B-Indicator | |
| System O | |
| notification O | |
| that O | |
| the O | |
| download O | |
| and O | |
| eventual O | |
| installation O | |
| of O | |
| an O | |
| app O | |
| package O | |
| is O | |
| happening O | |
| ( O | |
| this O | |
| is O | |
| deprecated O | |
| ) O | |
| android.intent.action.PACKAGE_ADDED B-Indicator | |
| System O | |
| notification O | |
| that O | |
| a O | |
| new O | |
| app O | |
| package O | |
| has O | |
| been O | |
| installed O | |
| on O | |
| the O | |
| device O | |
| , O | |
| including O | |
| the O | |
| name O | |
| of O | |
| said O | |
| package O | |
| . O | |
| com.xiaomi.smarthome.receive_alarm B-Indicator | |
| Received O | |
| notifications O | |
| from O | |
| Xiaomi B-Organization | |
| ’ O | |
| s O | |
| smart O | |
| home O | |
| IoT O | |
| devices O | |
| . O | |
| TimeReceiver O | |
| android.intent.action.ACTION_TIME_CHANGED B-Indicator | |
| System O | |
| notification O | |
| that O | |
| the O | |
| time O | |
| was O | |
| set O | |
| . O | |
| android.intent.action.CONNECTIVITY_CHANGE B-Indicator | |
| System O | |
| notification O | |
| that O | |
| a O | |
| change O | |
| in O | |
| network O | |
| connectivity O | |
| has O | |
| occurred O | |
| , O | |
| either O | |
| lost O | |
| or O | |
| established O | |
| . O | |
| Since O | |
| Android B-System | |
| version O | |
| 7 O | |
| ( O | |
| Nougat B-System | |
| ) O | |
| this O | |
| information O | |
| is O | |
| gathered O | |
| using O | |
| other O | |
| means O | |
| , O | |
| perhaps O | |
| inferring O | |
| the O | |
| devices O | |
| used O | |
| by O | |
| potential O | |
| victim O | |
| run O | |
| older O | |
| versions O | |
| of O | |
| Android B-System | |
| . O | |
| Table O | |
| 4 O | |
| HenBox B-Malware | |
| variant O | |
| 's O | |
| Intents O | |
| and O | |
| Receivers O | |
| Most O | |
| of O | |
| the O | |
| intents O | |
| registered O | |
| in O | |
| the O | |
| AndroidManifest.xml O | |
| file O | |
| , O | |
| or O | |
| loaded O | |
| during O | |
| run-time O | |
| , O | |
| are O | |
| commonly O | |
| found O | |
| in O | |
| malicious O | |
| Android B-System | |
| apps O | |
| . O | |
| What O | |
| ’ O | |
| s O | |
| more O | |
| interesting O | |
| , O | |
| and O | |
| much O | |
| less O | |
| common O | |
| , O | |
| is O | |
| the O | |
| inclusion O | |
| of O | |
| the O | |
| com.xiaomi.smarthome.receive_alarm B-Indicator | |
| intent O | |
| filter O | |
| . O | |
| Xiaomi B-Organization | |
| , O | |
| a O | |
| privately O | |
| owned O | |
| Chinese O | |
| electronics O | |
| and O | |
| software O | |
| company O | |
| , O | |
| is O | |
| the O | |
| 5th O | |
| largest O | |
| smart O | |
| phone O | |
| manufacturer O | |
| in O | |
| the O | |
| world O | |
| and O | |
| also O | |
| manufactures O | |
| IoT O | |
| devices O | |
| for O | |
| the O | |
| home O | |
| . O | |
| Most O | |
| devices O | |
| can O | |
| be O | |
| controlled O | |
| by O | |
| Xiaomi B-Organization | |
| ’ O | |
| s O | |
| “ O | |
| MiHome B-System | |
| ” O | |
| Android B-System | |
| app O | |
| , O | |
| which O | |
| is O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| with O | |
| between O | |
| 1,000,000 O | |
| and O | |
| 5,000,000 O | |
| downloads O | |
| . O | |
| Given O | |
| the O | |
| nature O | |
| of O | |
| connected O | |
| devices O | |
| in O | |
| smart O | |
| homes O | |
| , O | |
| it O | |
| ’ O | |
| s O | |
| highly O | |
| likely O | |
| many O | |
| of O | |
| these O | |
| devices O | |
| , O | |
| and O | |
| indeed O | |
| the O | |
| controller O | |
| app O | |
| itself O | |
| , O | |
| communicate O | |
| with O | |
| one O | |
| another O | |
| sending O | |
| status O | |
| notifications O | |
| , O | |
| alerts O | |
| and O | |
| so O | |
| on O | |
| . O | |
| Such O | |
| notifications O | |
| would O | |
| be O | |
| received O | |
| by O | |
| the O | |
| MiHome B-System | |
| app O | |
| or O | |
| any O | |
| other O | |
| , O | |
| such O | |
| as O | |
| HenBox B-Malware | |
| , O | |
| so O | |
| long O | |
| as O | |
| they O | |
| register O | |
| their O | |
| intent O | |
| to O | |
| do O | |
| so O | |
| . O | |
| This O | |
| could O | |
| essentially O | |
| allow O | |
| for O | |
| external O | |
| devices O | |
| to O | |
| act O | |
| as O | |
| a O | |
| trigger O | |
| to O | |
| execute O | |
| the O | |
| malicious O | |
| HenBox B-Malware | |
| code O | |
| , O | |
| or O | |
| perhaps O | |
| afford O | |
| additional O | |
| data O | |
| HenBox B-Malware | |
| can O | |
| collect O | |
| and O | |
| exfiltrate O | |
| . O | |
| Either O | |
| method O | |
| to O | |
| load O | |
| HenBox B-Malware | |
| ultimately O | |
| results O | |
| in O | |
| an O | |
| instance O | |
| of O | |
| a O | |
| service O | |
| being O | |
| launched O | |
| . O | |
| This O | |
| service O | |
| hides O | |
| the O | |
| app O | |
| from O | |
| plain O | |
| sight O | |
| and O | |
| loads O | |
| another O | |
| ELF O | |
| library O | |
| to O | |
| gather O | |
| environmental O | |
| information O | |
| about O | |
| the O | |
| device O | |
| , O | |
| such O | |
| as O | |
| running O | |
| processes O | |
| and O | |
| apps O | |
| , O | |
| and O | |
| details O | |
| about O | |
| device O | |
| hardware O | |
| , O | |
| primarily O | |
| through O | |
| parsing O | |
| system O | |
| logs O | |
| and O | |
| querying O | |
| running O | |
| processes O | |
| . O | |
| The O | |
| service O | |
| continues O | |
| by O | |
| loading O | |
| an O | |
| ELF O | |
| , O | |
| created O | |
| by O | |
| Baidu B-Organization | |
| , O | |
| which O | |
| is O | |
| capable O | |
| of O | |
| tracking O | |
| the O | |
| device O | |
| location O | |
| before O | |
| setting O | |
| up O | |
| a O | |
| monitor O | |
| to O | |
| harvest O | |
| phone O | |
| numbers O | |
| associated O | |
| with O | |
| outgoing O | |
| calls O | |
| for O | |
| those O | |
| numbers O | |
| with O | |
| a O | |
| country O | |
| code O | |
| “ O | |
| +86 O | |
| ” O | |
| prefix O | |
| , O | |
| which O | |
| relates O | |
| to O | |
| the O | |
| People O | |
| ’ O | |
| s O | |
| Republic O | |
| of O | |
| China O | |
| . O | |
| Further O | |
| assets O | |
| are O | |
| decrypted O | |
| and O | |
| deployed O | |
| , O | |
| including O | |
| another O | |
| Dalvik O | |
| DEX O | |
| code O | |
| file O | |
| , O | |
| which O | |
| has O | |
| various O | |
| capabilities O | |
| including O | |
| registering O | |
| itself O | |
| as O | |
| the O | |
| incoming O | |
| SMS O | |
| handler O | |
| for O | |
| the O | |
| device O | |
| to O | |
| intercept O | |
| SMS O | |
| messages O | |
| , O | |
| loading O | |
| another O | |
| ELF O | |
| library O | |
| that O | |
| includes O | |
| a O | |
| version O | |
| of O | |
| BusyBox B-System | |
| - O | |
| a O | |
| package O | |
| containing O | |
| various O | |
| stripped-down O | |
| Unix O | |
| tools O | |
| useful O | |
| for O | |
| administering O | |
| such O | |
| systems O | |
| – O | |
| and O | |
| , O | |
| interestingly O | |
| , O | |
| is O | |
| capable O | |
| of O | |
| turning O | |
| off O | |
| the O | |
| sound O | |
| played O | |
| when O | |
| the O | |
| device O | |
| ’ O | |
| s O | |
| cameras O | |
| take O | |
| pictures O | |
| . O | |
| The O | |
| Android B-System | |
| permissions O | |
| requested O | |
| by O | |
| HenBox B-Malware | |
| , O | |
| as O | |
| defined O | |
| in O | |
| the O | |
| apps O | |
| ’ O | |
| AndroidManifest.xml O | |
| files O | |
| , O | |
| range O | |
| from O | |
| accessing O | |
| location O | |
| and O | |
| network O | |
| settings O | |
| to O | |
| messages O | |
| , O | |
| call O | |
| , O | |
| and O | |
| contact O | |
| data O | |
| . O | |
| HenBox B-Malware | |
| can O | |
| also O | |
| access O | |
| sensors O | |
| such O | |
| as O | |
| the O | |
| device O | |
| camera O | |
| ( O | |
| s O | |
| ) O | |
| and O | |
| the O | |
| microphone O | |
| . O | |
| Beyond O | |
| the O | |
| Android B-System | |
| app O | |
| itself O | |
| , O | |
| other O | |
| components O | |
| such O | |
| as O | |
| the O | |
| aforementioned O | |
| ELF O | |
| libraries O | |
| have O | |
| additional O | |
| data-stealing O | |
| capabilities O | |
| . O | |
| One O | |
| ELF O | |
| library O | |
| , O | |
| libloc4d.so B-Indicator | |
| , O | |
| handles O | |
| amongst O | |
| other O | |
| things O | |
| the O | |
| loading O | |
| of O | |
| the O | |
| app-decoded O | |
| ELF O | |
| library O | |
| file O | |
| “ O | |
| sux O | |
| ” O | |
| , O | |
| as O | |
| well O | |
| as O | |
| handling O | |
| connectivity O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| The O | |
| sux O | |
| library O | |
| appears O | |
| to O | |
| be O | |
| a O | |
| customized O | |
| super O | |
| user O | |
| ( O | |
| su O | |
| ) O | |
| tool O | |
| that O | |
| includes O | |
| code O | |
| from O | |
| the O | |
| com.koushikdutta.superuser B-Indicator | |
| app O | |
| and O | |
| carries O | |
| the O | |
| equivalent O | |
| of O | |
| a O | |
| super O | |
| user O | |
| ( O | |
| su O | |
| ) O | |
| binary O | |
| in O | |
| order O | |
| to O | |
| run O | |
| privileged O | |
| commands O | |
| on O | |
| the O | |
| system O | |
| . O | |
| The O | |
| primary O | |
| goal O | |
| of O | |
| sux O | |
| appears O | |
| to O | |
| be O | |
| steal O | |
| messages O | |
| and O | |
| other O | |
| data O | |
| from O | |
| popular O | |
| messaging O | |
| and O | |
| social O | |
| media O | |
| apps O | |
| specified O | |
| within O | |
| the O | |
| HenBox B-Malware | |
| sample O | |
| . O | |
| A O | |
| similar O | |
| tool O | |
| , O | |
| with O | |
| the O | |
| same O | |
| filename O | |
| , O | |
| has O | |
| been O | |
| discussed O | |
| in O | |
| previous O | |
| research O | |
| but O | |
| the O | |
| SpyDealer B-Malware | |
| malware O | |
| appears O | |
| unrelated O | |
| to O | |
| HenBox B-Malware | |
| . O | |
| More O | |
| likely O | |
| , O | |
| this O | |
| is O | |
| a O | |
| case O | |
| of O | |
| common O | |
| attack O | |
| tools O | |
| being O | |
| re-used O | |
| between O | |
| different O | |
| threat O | |
| actor O | |
| groups O | |
| . O | |
| This O | |
| particular O | |
| HenBox B-Malware | |
| variant O | |
| , O | |
| as O | |
| listed O | |
| in O | |
| Table O | |
| 3 O | |
| above O | |
| , O | |
| harvests O | |
| data O | |
| from O | |
| two O | |
| popular O | |
| messaging O | |
| and O | |
| social O | |
| media O | |
| apps O | |
| : O | |
| Voxer B-System | |
| Walkie B-System | |
| Talkie I-System | |
| Messenger B-System | |
| ( O | |
| com.rebelvox.voxer B-Indicator | |
| ) O | |
| and O | |
| Tencent B-Organization | |
| ’ O | |
| s O | |
| WeChat B-System | |
| ( O | |
| com.tencent.mm B-Indicator | |
| ) O | |
| . O | |
| These O | |
| types O | |
| of O | |
| apps O | |
| tend O | |
| to O | |
| store O | |
| their O | |
| data O | |
| in O | |
| databases O | |
| and O | |
| , O | |
| as O | |
| an O | |
| example O | |
| , O | |
| HenBox B-Malware | |
| accesses O | |
| Voxer O | |
| ’ O | |
| s O | |
| database O | |
| from O | |
| the O | |
| file O | |
| “ O | |
| /data/data/com.rebelvox.voxer/databases/rv.db B-Indicator | |
| ” O | |
| . O | |
| Once O | |
| opened O | |
| , O | |
| HenBox B-Malware | |
| runs O | |
| the O | |
| following O | |
| query O | |
| to O | |
| gather O | |
| message O | |
| information O | |
| . O | |
| Not O | |
| long O | |
| after O | |
| this O | |
| variant O | |
| was O | |
| public O | |
| , O | |
| newer O | |
| variants O | |
| of O | |
| HenBox B-Malware | |
| were O | |
| seen O | |
| , O | |
| and O | |
| some O | |
| had O | |
| significant O | |
| increases O | |
| in O | |
| the O | |
| number O | |
| of O | |
| targeted O | |
| apps O | |
| . O | |
| Table O | |
| 5 O | |
| describes O | |
| the O | |
| latest O | |
| variant O | |
| seen O | |
| in O | |
| AutoFocus O | |
| . O | |
| SHA256 O | |
| Package O | |
| Name O | |
| App O | |
| Name O | |
| First O | |
| Seen O | |
| 07994c9f2eeeede199dd6b4e760fce3 B-Indicator | |
| 71f03f3cc4307e6551c18d2fbd024a24f B-Indicator | |
| com.android.henbox B-Indicator | |
| 备份 O | |
| ( O | |
| Backup O | |
| ) O | |
| January O | |
| 3rd O | |
| 2018 O | |
| Table O | |
| 6 O | |
| contains O | |
| an O | |
| updated O | |
| list O | |
| of O | |
| targeted O | |
| apps O | |
| from O | |
| which O | |
| this O | |
| newer O | |
| variant O | |
| of O | |
| HenBox B-Malware | |
| is O | |
| capable O | |
| of O | |
| harvesting O | |
| data O | |
| . O | |
| Interestingly O | |
| , O | |
| the O | |
| two O | |
| communication O | |
| apps O | |
| described O | |
| above O | |
| as O | |
| being O | |
| targeted O | |
| by O | |
| the O | |
| HenBox O | |
| variant O | |
| listed O | |
| in O | |
| Table O | |
| 3 O | |
| do O | |
| not O | |
| appear O | |
| in O | |
| this O | |
| updated O | |
| list O | |
| . O | |
| Package O | |
| Name O | |
| App O | |
| Name O | |
| com.whatsapp B-Indicator | |
| WhatsApp B-System | |
| Messenger B-System | |
| com.pugna.magiccall B-Indicator | |
| n/a O | |
| org.telegram.messenger B-Indicator | |
| Telegram B-System | |
| com.facebook.katana B-Indicator | |
| Facebook B-System | |
| com.twitter.android B-Indicator | |
| Twitter B-System | |
| jp.naver.line.android B-Indicator | |
| LINE B-System | |
| : O | |
| Free O | |
| Calls O | |
| & O | |
| Messages O | |
| com.instanza.cocovoice B-Indicator | |
| Coco O | |
| com.beetalk B-Indicator | |
| BeeTalk B-System | |
| com.gtomato.talkbox B-Indicator | |
| TalkBox B-System | |
| Voice O | |
| Messenger B-System | |
| - O | |
| PTT O | |
| com.viber.voip B-Indicator | |
| Viber B-System | |
| Messenger B-System | |
| com.immomo.momo B-Indicator | |
| MOMO陌陌 B-System | |
| com.facebook.orca B-Indicator | |
| Messenger B-System | |
| – O | |
| Text O | |
| and O | |
| Video O | |
| Chat O | |
| for O | |
| Free O | |
| com.skype.rover B-Indicator | |
| Skype B-System | |
| ; O | |
| 3rd O | |
| party O | |
| stores O | |
| only O | |
| Most O | |
| of O | |
| these O | |
| apps O | |
| are O | |
| well O | |
| established O | |
| and O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| , O | |
| however O | |
| , O | |
| com.skype.rover B-Indicator | |
| appears O | |
| to O | |
| be O | |
| available O | |
| only O | |
| on O | |
| third-party O | |
| app O | |
| stores O | |
| . O | |
| The O | |
| same O | |
| is O | |
| likely O | |
| to O | |
| be O | |
| the O | |
| case O | |
| for O | |
| com.pugna.magiccall B-Indicator | |
| but O | |
| this O | |
| is O | |
| unknown O | |
| currently O | |
| . O | |
| It O | |
| ’ O | |
| s O | |
| clear O | |
| to O | |
| see O | |
| that O | |
| the O | |
| capabilities O | |
| of O | |
| HenBox B-Malware | |
| are O | |
| very O | |
| comprehensive O | |
| , O | |
| both O | |
| in O | |
| terms O | |
| of O | |
| an O | |
| Android B-System | |
| app O | |
| with O | |
| its O | |
| native O | |
| libraries O | |
| and O | |
| given O | |
| the O | |
| amount O | |
| of O | |
| data O | |
| it O | |
| can O | |
| glean O | |
| from O | |
| a O | |
| victim O | |
| . O | |
| Such O | |
| data O | |
| includes O | |
| contact O | |
| and O | |
| location O | |
| information O | |
| , O | |
| phone O | |
| and O | |
| message O | |
| activity O | |
| , O | |
| the O | |
| ability O | |
| to O | |
| record O | |
| from O | |
| the O | |
| microphone O | |
| , O | |
| camera O | |
| , O | |
| and O | |
| other O | |
| sensors O | |
| as O | |
| well O | |
| as O | |
| the O | |
| capability O | |
| to O | |
| access O | |
| data O | |
| from O | |
| many O | |
| popular O | |
| messaging O | |
| and O | |
| social O | |
| media O | |
| apps O | |
| . O | |
| Infrastructure O | |
| While O | |
| investigating O | |
| HenBox B-Malware | |
| we O | |
| discovered O | |
| infrastructure O | |
| ties O | |
| to O | |
| other O | |
| malware O | |
| families O | |
| associated O | |
| with O | |
| targeted O | |
| attacks O | |
| against O | |
| Windows B-System | |
| users O | |
| – O | |
| notable O | |
| overlaps O | |
| included O | |
| PlugX B-Malware | |
| , O | |
| Zupdax B-Malware | |
| , O | |
| 9002 B-Malware | |
| , O | |
| and O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| . O | |
| The O | |
| overall O | |
| image O | |
| of O | |
| these O | |
| ties O | |
| is O | |
| below O | |
| in O | |
| Figure O | |
| 5 O | |
| and O | |
| paints O | |
| a O | |
| picture O | |
| of O | |
| an O | |
| adversary O | |
| with O | |
| at O | |
| least O | |
| 5 O | |
| malware O | |
| families O | |
| in O | |
| their O | |
| toolbox O | |
| dating O | |
| back O | |
| to O | |
| at O | |
| least O | |
| 2015 O | |
| . O | |
| The O | |
| overlap O | |
| between O | |
| the O | |
| HenBox B-Malware | |
| and O | |
| 9002 B-Malware | |
| malware O | |
| families O | |
| Unit O | |
| 42 O | |
| has O | |
| seen O | |
| involves O | |
| three O | |
| shared O | |
| C2s O | |
| between O | |
| several O | |
| samples O | |
| ; O | |
| the O | |
| first O | |
| IP O | |
| below O | |
| is O | |
| used O | |
| for O | |
| more O | |
| than O | |
| half O | |
| of O | |
| the O | |
| HenBox B-Malware | |
| samples O | |
| we O | |
| have O | |
| seen O | |
| to O | |
| date O | |
| : O | |
| 47.90.81 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 23 I-Indicator | |
| 222.139.212 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 16 I-Indicator | |
| lala513.gicp B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| The O | |
| overlaps O | |
| between O | |
| the O | |
| Henbox B-Malware | |
| , O | |
| PlugX B-Malware | |
| , O | |
| Zupdax B-Malware | |
| , O | |
| and O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| malware O | |
| families O | |
| involves O | |
| a O | |
| web O | |
| of O | |
| shared O | |
| C2s O | |
| and O | |
| IP O | |
| resolutions O | |
| centered O | |
| around O | |
| the O | |
| below O | |
| : O | |
| 59.188.196 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 172 I-Indicator | |
| cdncool B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| ( O | |
| and O | |
| third-levels O | |
| of O | |
| this O | |
| domain O | |
| ) O | |
| www3.mefound B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| www5.zyns B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| w3.changeip B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| org I-Indicator | |
| Ties O | |
| to O | |
| previous O | |
| activity O | |
| The O | |
| registrant O | |
| of O | |
| cdncool B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| also O | |
| registered O | |
| six O | |
| other O | |
| domains O | |
| . O | |
| To O | |
| date O | |
| , O | |
| Unit O | |
| 42 O | |
| has O | |
| seen O | |
| four O | |
| of O | |
| the O | |
| seven O | |
| ( O | |
| the O | |
| first O | |
| three O | |
| in O | |
| the O | |
| list O | |
| below O | |
| , O | |
| along O | |
| with O | |
| cdncool B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| ) O | |
| used O | |
| in O | |
| malicious O | |
| activity O | |
| and O | |
| it O | |
| is O | |
| reasonable O | |
| to O | |
| assume O | |
| the O | |
| remaining O | |
| three O | |
| are O | |
| or O | |
| were O | |
| intended O | |
| to O | |
| serve O | |
| the O | |
| same O | |
| purpose B-Indicator | |
| . I-Indicator | |
| tcpdo I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| adminsysteminfo B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| md5c B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| linkdatax B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| csip6 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| biz I-Indicator | |
| adminloader B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| Unit O | |
| 42 O | |
| published O | |
| a O | |
| blog O | |
| in O | |
| July O | |
| 2016 O | |
| about O | |
| 9002 B-Malware | |
| malware O | |
| being O | |
| delivered O | |
| using O | |
| a O | |
| combination O | |
| of O | |
| shortened O | |
| links O | |
| and O | |
| a O | |
| file O | |
| hosted O | |
| on O | |
| Google O | |
| Drive O | |
| . O | |
| The O | |
| spear O | |
| phishing O | |
| emails O | |
| had O | |
| Myanmar O | |
| political-themed O | |
| lures O | |
| and O | |
| , O | |
| if O | |
| the O | |
| 9002 B-Malware | |
| C2 O | |
| server O | |
| responded O | |
| , O | |
| the O | |
| Trojan O | |
| sent O | |
| system O | |
| specific O | |
| information O | |
| along O | |
| with O | |
| the O | |
| string O | |
| “ O | |
| jackhex O | |
| ” O | |
| . O | |
| “ O | |
| jackhex O | |
| ” O | |
| has O | |
| also O | |
| been O | |
| part O | |
| of O | |
| a O | |
| C2 O | |
| for O | |
| what O | |
| is O | |
| likely O | |
| related O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| activity O | |
| detailed O | |
| below O | |
| , O | |
| along O | |
| with O | |
| additional O | |
| infrastructure O | |
| ties O | |
| . O | |
| The O | |
| C2 O | |
| for O | |
| the O | |
| aforementioned O | |
| 9002 B-Malware | |
| sample O | |
| was O | |
| logitechwkgame B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| , O | |
| which O | |
| resolved O | |
| to O | |
| the O | |
| IP O | |
| address O | |
| 222.239.91 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 30 I-Indicator | |
| . O | |
| At O | |
| the O | |
| same O | |
| time O | |
| , O | |
| the O | |
| domain B-Indicator | |
| admin.nslookupdns I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| also O | |
| resolved O | |
| to O | |
| the O | |
| same O | |
| IP O | |
| address O | |
| , O | |
| suggesting O | |
| that O | |
| these O | |
| two O | |
| domains O | |
| are O | |
| associated O | |
| with O | |
| the O | |
| same O | |
| threat O | |
| actors O | |
| . O | |
| In O | |
| addition O | |
| , O | |
| admin.nslookupdns B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| was O | |
| a O | |
| C2 O | |
| for O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| samples O | |
| associated O | |
| with O | |
| attacks O | |
| on O | |
| Myanmar O | |
| and O | |
| other O | |
| Asian O | |
| countries O | |
| discussed O | |
| in O | |
| a O | |
| blog O | |
| published O | |
| by O | |
| Arbor B-Organization | |
| Networks I-Organization | |
| in O | |
| April O | |
| 2016 O | |
| . O | |
| Another O | |
| tie O | |
| between O | |
| the O | |
| activity O | |
| is O | |
| the O | |
| C2 O | |
| jackhex.md5c B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| , O | |
| which O | |
| was O | |
| also O | |
| used O | |
| as O | |
| a O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| C2 O | |
| in O | |
| the O | |
| Arbor B-Organization | |
| Networks I-Organization | |
| blog O | |
| . O | |
| “ O | |
| jackhex O | |
| ” O | |
| is O | |
| not O | |
| a O | |
| common O | |
| word O | |
| or O | |
| phrase O | |
| and O | |
| , O | |
| as O | |
| noted O | |
| above O | |
| , O | |
| was O | |
| also O | |
| seen O | |
| in O | |
| the O | |
| beacon O | |
| activity O | |
| with O | |
| the O | |
| previously O | |
| discussed O | |
| 9002 B-Malware | |
| sample O | |
| . O | |
| Finally O | |
| , O | |
| since O | |
| publishing O | |
| the O | |
| 9002 B-Malware | |
| blog O | |
| , O | |
| Unit O | |
| 42 O | |
| has O | |
| also O | |
| seen O | |
| the O | |
| aforementioned O | |
| 9002 B-Malware | |
| C2 O | |
| used O | |
| as O | |
| a O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| C2 O | |
| with O | |
| a O | |
| Myanmar O | |
| political-themed O | |
| lure O | |
| . O | |
| In O | |
| our O | |
| 9002 B-Malware | |
| blog O | |
| we O | |
| noted O | |
| some O | |
| additional O | |
| infrastructure O | |
| used O | |
| either O | |
| as O | |
| C2s O | |
| for O | |
| related O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| samples O | |
| , O | |
| or O | |
| domain O | |
| registrant O | |
| overlap O | |
| with O | |
| those O | |
| C2 O | |
| domains O | |
| . O | |
| When O | |
| we O | |
| published O | |
| that O | |
| blog O | |
| Unit O | |
| 42 O | |
| hadn O | |
| ’ O | |
| t O | |
| seen O | |
| any O | |
| of O | |
| the O | |
| three O | |
| registrants O | |
| overlap O | |
| domains O | |
| used O | |
| in O | |
| malicious O | |
| activity O | |
| . O | |
| Since O | |
| then O | |
| , O | |
| we O | |
| have O | |
| seen O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| samples O | |
| using O | |
| third-levels O | |
| of O | |
| querlyurl B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| , O | |
| lending O | |
| further O | |
| credence O | |
| the O | |
| remaining O | |
| two O | |
| domains O | |
| , O | |
| gooledriveservice B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| and O | |
| appupdatemoremagic B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| are O | |
| or O | |
| were O | |
| intended O | |
| for O | |
| malicious O | |
| use O | |
| . O | |
| While O | |
| we O | |
| do O | |
| not O | |
| have O | |
| complete O | |
| targeting O | |
| , O | |
| information O | |
| associated O | |
| with O | |
| these O | |
| Poison B-Malware | |
| Ivy I-Malware | |
| samples O | |
| , O | |
| several O | |
| of O | |
| the O | |
| decoy O | |
| files O | |
| were O | |
| in O | |
| Chinese O | |
| and O | |
| appear O | |
| to O | |
| be O | |
| part O | |
| of O | |
| a O | |
| 2016 O | |
| campaign O | |
| targeting O | |
| organizations O | |
| in O | |
| Taiwan O | |
| with O | |
| political-themed O | |
| lures O | |
| . O | |
| Conclusion O | |
| Typically O | |
| masquerading O | |
| as O | |
| legitimate O | |
| Android B-Malware | |
| system O | |
| apps O | |
| , O | |
| and O | |
| sometimes O | |
| embedding O | |
| legitimate O | |
| apps O | |
| within O | |
| them O | |
| , O | |
| the O | |
| primary O | |
| goal O | |
| of O | |
| the O | |
| malicious O | |
| HenBox B-Malware | |
| appears O | |
| to O | |
| be O | |
| to O | |
| spy O | |
| on O | |
| those O | |
| who O | |
| install O | |
| them O | |
| . O | |
| Using O | |
| similar O | |
| traits O | |
| , O | |
| such O | |
| as O | |
| copycat O | |
| iconography O | |
| and O | |
| app O | |
| or O | |
| package O | |
| names O | |
| , O | |
| victims O | |
| are O | |
| likely O | |
| socially O | |
| engineered O | |
| into O | |
| installing O | |
| the O | |
| malicious O | |
| apps O | |
| , O | |
| especially O | |
| when O | |
| available O | |
| on O | |
| so-called O | |
| third-party O | |
| ( O | |
| i.e O | |
| . O | |
| non-Google O | |
| Play B-System | |
| ) O | |
| app O | |
| stores O | |
| which O | |
| often O | |
| have O | |
| fewer O | |
| security O | |
| and O | |
| vetting O | |
| procedures O | |
| for O | |
| the O | |
| apps O | |
| they O | |
| host O | |
| . O | |
| It O | |
| ’ O | |
| s O | |
| possible O | |
| , O | |
| as O | |
| with O | |
| other O | |
| Android B-System | |
| malware O | |
| , O | |
| that O | |
| some O | |
| apps O | |
| may O | |
| also O | |
| be O | |
| available O | |
| on O | |
| forums O | |
| , O | |
| file-sharing O | |
| sites O | |
| or O | |
| even O | |
| sent O | |
| to O | |
| victims O | |
| as O | |
| email O | |
| attachments O | |
| , O | |
| and O | |
| we O | |
| were O | |
| only O | |
| able O | |
| to O | |
| determine O | |
| the O | |
| delivery O | |
| mechanism O | |
| for O | |
| a O | |
| handful O | |
| of O | |
| the O | |
| apps O | |
| we O | |
| have O | |
| been O | |
| able O | |
| to O | |
| find O | |
| . O | |
| The O | |
| hosting O | |
| locations O | |
| seen O | |
| for O | |
| some O | |
| HenBox B-Malware | |
| samples O | |
| , O | |
| together O | |
| with O | |
| the O | |
| nature O | |
| of O | |
| some O | |
| embedded O | |
| apps O | |
| including O | |
| : O | |
| those O | |
| targeted O | |
| at O | |
| extremist O | |
| groups O | |
| , O | |
| those O | |
| who O | |
| use O | |
| VPN O | |
| or O | |
| other O | |
| privacy-enabling O | |
| apps O | |
| , O | |
| and O | |
| those O | |
| who O | |
| speak O | |
| the O | |
| Uyghur O | |
| language O | |
| , O | |
| highlights O | |
| the O | |
| victim O | |
| profile O | |
| the O | |
| threat O | |
| actors O | |
| were O | |
| seeking O | |
| to O | |
| attack O | |
| . O | |
| The O | |
| targets O | |
| and O | |
| capabilities O | |
| of O | |
| HenBox B-Malware | |
| , O | |
| in O | |
| addition O | |
| to O | |
| the O | |
| ties O | |
| to O | |
| previous O | |
| activity O | |
| using O | |
| four O | |
| different O | |
| Windows O | |
| malware O | |
| families O | |
| with O | |
| political-themed O | |
| lures O | |
| against O | |
| several O | |
| different O | |
| South O | |
| East O | |
| Asian O | |
| countries O | |
| , O | |
| indicates O | |
| this O | |
| activity O | |
| likely O | |
| represents O | |
| an O | |
| at O | |
| least O | |
| three-year-old O | |
| espionage O | |
| campaign O | |
| . O | |
| THURSDAY O | |
| , O | |
| OCTOBER O | |
| 11 O | |
| , O | |
| 2018 O | |
| GPlayed B-Malware | |
| Trojan O | |
| - O | |
| .Net O | |
| playing O | |
| with O | |
| Google B-Organization | |
| Market O | |
| Introduction O | |
| In O | |
| a O | |
| world O | |
| where O | |
| everything O | |
| is O | |
| always O | |
| connected O | |
| , O | |
| and O | |
| mobile O | |
| devices O | |
| are O | |
| involved O | |
| in O | |
| individuals O | |
| ' O | |
| day-to-day O | |
| lives O | |
| more O | |
| and O | |
| more O | |
| often O | |
| , O | |
| malicious O | |
| actors O | |
| are O | |
| seeing O | |
| increased O | |
| opportunities O | |
| to O | |
| attack O | |
| these O | |
| devices O | |
| . O | |
| Cisco B-Organization | |
| Talos I-Organization | |
| has O | |
| identified O | |
| the O | |
| latest O | |
| attempt O | |
| to O | |
| penetrate O | |
| mobile O | |
| devices O | |
| — O | |
| a O | |
| new O | |
| Android B-System | |
| trojan O | |
| that O | |
| we O | |
| have O | |
| dubbed O | |
| " O | |
| GPlayed B-Malware | |
| . O | |
| '' O | |
| This O | |
| is O | |
| a O | |
| trojan O | |
| with O | |
| many O | |
| built-in O | |
| capabilities O | |
| . O | |
| At O | |
| the O | |
| same O | |
| time O | |
| , O | |
| it O | |
| 's O | |
| extremely O | |
| flexible O | |
| , O | |
| making O | |
| it O | |
| a O | |
| very O | |
| effective O | |
| tool O | |
| for O | |
| malicious O | |
| actors O | |
| . O | |
| The O | |
| sample O | |
| we O | |
| analyzed O | |
| uses O | |
| an O | |
| icon O | |
| very O | |
| similar O | |
| to O | |
| Google B-System | |
| Apps I-System | |
| , O | |
| with O | |
| the O | |
| label O | |
| " O | |
| Google B-System | |
| Play I-System | |
| Marketplace I-System | |
| '' O | |
| to O | |
| disguise O | |
| itself O | |
| . O | |
| The O | |
| malicious O | |
| application O | |
| is O | |
| on O | |
| the O | |
| left-hand O | |
| side O | |
| . O | |
| What O | |
| makes O | |
| this O | |
| malware O | |
| extremely O | |
| powerful O | |
| is O | |
| the O | |
| capability O | |
| to O | |
| adapt O | |
| after O | |
| it O | |
| 's O | |
| deployed O | |
| . O | |
| In O | |
| order O | |
| to O | |
| achieve O | |
| this O | |
| adaptability O | |
| , O | |
| the O | |
| operator O | |
| has O | |
| the O | |
| capability O | |
| to O | |
| remotely O | |
| load O | |
| plugins O | |
| , O | |
| inject O | |
| scripts O | |
| and O | |
| even O | |
| compile O | |
| new O | |
| .NET B-System | |
| code O | |
| that O | |
| can O | |
| be O | |
| executed O | |
| . O | |
| Our O | |
| analysis O | |
| indicates O | |
| that O | |
| this O | |
| trojan O | |
| is O | |
| in O | |
| its O | |
| testing O | |
| stage O | |
| but O | |
| given O | |
| its O | |
| potential O | |
| , O | |
| every O | |
| mobile O | |
| user O | |
| should O | |
| be O | |
| aware O | |
| of O | |
| GPlayed B-Malware | |
| . O | |
| Mobile O | |
| developers O | |
| have O | |
| recently O | |
| begun O | |
| eschewing O | |
| traditional O | |
| app O | |
| stores O | |
| and O | |
| instead O | |
| want O | |
| to O | |
| deliver O | |
| their O | |
| software O | |
| directly O | |
| through O | |
| their O | |
| own O | |
| means O | |
| . O | |
| But O | |
| GPlayed B-Malware | |
| is O | |
| an O | |
| example O | |
| of O | |
| where O | |
| this O | |
| can O | |
| go O | |
| wrong O | |
| , O | |
| especially O | |
| if O | |
| a O | |
| mobile O | |
| user O | |
| is O | |
| not O | |
| aware O | |
| of O | |
| how O | |
| to O | |
| distinguish O | |
| a O | |
| fake O | |
| app O | |
| versus O | |
| a O | |
| real O | |
| one O | |
| . O | |
| Trojan O | |
| architecture O | |
| and O | |
| capabilities O | |
| This O | |
| malware O | |
| is O | |
| written O | |
| in O | |
| .NET B-System | |
| using O | |
| the O | |
| Xamarin B-System | |
| environment O | |
| for O | |
| mobile O | |
| applications O | |
| . O | |
| The O | |
| main O | |
| DLL O | |
| is O | |
| called O | |
| " O | |
| Reznov.DLL B-Indicator | |
| . O | |
| '' O | |
| This O | |
| DLL O | |
| contains O | |
| one O | |
| root O | |
| class O | |
| called O | |
| " O | |
| eClient O | |
| , O | |
| '' O | |
| which O | |
| is O | |
| the O | |
| core O | |
| of O | |
| the O | |
| trojan O | |
| . O | |
| The O | |
| imports O | |
| reveal O | |
| the O | |
| use O | |
| of O | |
| a O | |
| second O | |
| DLL O | |
| called O | |
| " O | |
| eCommon.dll B-Indicator | |
| . O | |
| '' O | |
| We O | |
| determined O | |
| that O | |
| the O | |
| " O | |
| eCommon O | |
| '' O | |
| file O | |
| contains O | |
| support O | |
| code O | |
| and O | |
| structures O | |
| that O | |
| are O | |
| platform O | |
| independent O | |
| . O | |
| The O | |
| main O | |
| DLL O | |
| also O | |
| contains O | |
| eClient O | |
| subclasses O | |
| that O | |
| implement O | |
| some O | |
| of O | |
| the O | |
| native O | |
| capabilities O | |
| . O | |
| The O | |
| package O | |
| certificate O | |
| is O | |
| issued O | |
| under O | |
| the O | |
| package O | |
| name O | |
| , O | |
| which O | |
| also O | |
| resembles O | |
| the O | |
| name O | |
| of O | |
| the O | |
| main O | |
| DLL O | |
| name O | |
| . O | |
| Certificate O | |
| information O | |
| The O | |
| Android B-System | |
| package O | |
| is O | |
| named O | |
| " O | |
| verReznov.Coampany B-Indicator | |
| . O | |
| '' O | |
| The O | |
| application O | |
| uses O | |
| the O | |
| label O | |
| " O | |
| Installer B-Indicator | |
| '' O | |
| and O | |
| its O | |
| name O | |
| is O | |
| " O | |
| android.app.Application B-Indicator | |
| . O | |
| '' O | |
| Package O | |
| permissions O | |
| The O | |
| trojan O | |
| declares O | |
| numerous O | |
| permissions O | |
| in O | |
| the O | |
| manifest O | |
| , O | |
| from O | |
| which O | |
| we O | |
| should O | |
| highlight O | |
| the O | |
| BIND_DEVICE_ADMIN O | |
| , O | |
| which O | |
| provides O | |
| nearly O | |
| full O | |
| control O | |
| of O | |
| the O | |
| device O | |
| to O | |
| the O | |
| trojan O | |
| . O | |
| This O | |
| trojan O | |
| is O | |
| highly O | |
| evolved O | |
| in O | |
| its O | |
| design O | |
| . O | |
| It O | |
| has O | |
| modular O | |
| architecture O | |
| implemented O | |
| in O | |
| the O | |
| form O | |
| of O | |
| plugins O | |
| , O | |
| or O | |
| it O | |
| can O | |
| receive O | |
| new O | |
| .NET B-System | |
| source O | |
| code O | |
| , O | |
| which O | |
| will O | |
| be O | |
| compiled O | |
| on O | |
| the O | |
| device O | |
| in O | |
| runtime O | |
| . O | |
| Initialization O | |
| of O | |
| the O | |
| compiler O | |
| object O | |
| The O | |
| plugins O | |
| can O | |
| be O | |
| added O | |
| in O | |
| runtime O | |
| , O | |
| or O | |
| they O | |
| can O | |
| be O | |
| added O | |
| as O | |
| a O | |
| package O | |
| resource O | |
| at O | |
| packaging O | |
| time O | |
| . O | |
| This O | |
| means O | |
| that O | |
| the O | |
| authors O | |
| or O | |
| the O | |
| operators O | |
| can O | |
| add O | |
| capabilities O | |
| without O | |
| the O | |
| need O | |
| to O | |
| recompile O | |
| and O | |
| upgrade O | |
| the O | |
| trojan O | |
| package O | |
| on O | |
| the O | |
| device O | |
| . O | |
| Trojan O | |
| native O | |
| capabilities O | |
| This O | |
| is O | |
| a O | |
| full-fledged O | |
| trojan O | |
| with O | |
| capabilities O | |
| ranging O | |
| from O | |
| those O | |
| of O | |
| a O | |
| banking O | |
| trojan O | |
| to O | |
| a O | |
| full O | |
| spying O | |
| trojan O | |
| . O | |
| This O | |
| means O | |
| that O | |
| the O | |
| malware O | |
| can O | |
| do O | |
| anything O | |
| from O | |
| harvest O | |
| the O | |
| user O | |
| 's O | |
| banking O | |
| credentials O | |
| , O | |
| to O | |
| monitoring O | |
| the O | |
| device O | |
| 's O | |
| location O | |
| . O | |
| There O | |
| are O | |
| several O | |
| indicators O | |
| ( O | |
| see O | |
| section O | |
| " O | |
| trojan O | |
| activity O | |
| '' O | |
| below O | |
| ) O | |
| that O | |
| it O | |
| is O | |
| in O | |
| its O | |
| last O | |
| stages O | |
| of O | |
| development O | |
| , O | |
| but O | |
| it O | |
| has O | |
| the O | |
| potential O | |
| to O | |
| be O | |
| a O | |
| serious O | |
| threat O | |
| . O | |
| Trojan O | |
| details O | |
| Upon O | |
| boot O | |
| , O | |
| the O | |
| trojan O | |
| will O | |
| start O | |
| by O | |
| populating O | |
| a O | |
| shared O | |
| preferences O | |
| file O | |
| with O | |
| the O | |
| configuration O | |
| it O | |
| has O | |
| on O | |
| its O | |
| internal O | |
| structures O | |
| . O | |
| Afterward O | |
| , O | |
| it O | |
| will O | |
| start O | |
| several O | |
| timers O | |
| to O | |
| execute O | |
| different O | |
| tasks O | |
| . O | |
| The O | |
| first O | |
| timer O | |
| will O | |
| be O | |
| fired O | |
| on O | |
| the O | |
| configured O | |
| interval O | |
| ( O | |
| 20 O | |
| seconds O | |
| in O | |
| this O | |
| case O | |
| ) O | |
| , O | |
| pinging O | |
| the O | |
| command O | |
| and O | |
| control O | |
| ( O | |
| C2 O | |
| ) O | |
| server O | |
| . O | |
| The O | |
| response O | |
| can O | |
| either O | |
| be O | |
| a O | |
| simple O | |
| " O | |
| OK O | |
| , O | |
| '' O | |
| or O | |
| can O | |
| be O | |
| a O | |
| request O | |
| to O | |
| perform O | |
| some O | |
| action O | |
| on O | |
| the O | |
| device O | |
| . O | |
| The O | |
| second O | |
| timer O | |
| will O | |
| run O | |
| every O | |
| five O | |
| seconds O | |
| and O | |
| it O | |
| will O | |
| try O | |
| to O | |
| enable O | |
| the O | |
| WiFi O | |
| if O | |
| it O | |
| 's O | |
| disabled O | |
| . O | |
| The O | |
| third O | |
| timer O | |
| will O | |
| fire O | |
| every O | |
| 10 O | |
| seconds O | |
| and O | |
| will O | |
| attempt O | |
| to O | |
| register O | |
| the O | |
| device O | |
| into O | |
| the O | |
| C2 O | |
| and O | |
| register O | |
| wake-up O | |
| locks O | |
| on O | |
| the O | |
| system O | |
| to O | |
| control O | |
| the O | |
| device O | |
| 's O | |
| status O | |
| . O | |
| During O | |
| the O | |
| trojan O | |
| registration O | |
| stage O | |
| , O | |
| the O | |
| trojan O | |
| exfiltrates O | |
| private O | |
| information O | |
| such O | |
| as O | |
| the O | |
| phone O | |
| 's O | |
| model O | |
| , O | |
| IMEI O | |
| , O | |
| phone O | |
| number O | |
| and O | |
| country O | |
| . O | |
| It O | |
| will O | |
| also O | |
| report O | |
| the O | |
| version O | |
| of O | |
| Android B-System | |
| that O | |
| the O | |
| phone O | |
| is O | |
| running O | |
| and O | |
| any O | |
| additional O | |
| capabilities O | |
| . O | |
| Device O | |
| registration O | |
| This O | |
| is O | |
| the O | |
| last O | |
| of O | |
| the O | |
| three O | |
| main O | |
| timers O | |
| that O | |
| are O | |
| created O | |
| . O | |
| The O | |
| trojan O | |
| will O | |
| register O | |
| the O | |
| SMS O | |
| handler O | |
| , O | |
| which O | |
| will O | |
| forward O | |
| the O | |
| contents O | |
| and O | |
| the O | |
| sender O | |
| of O | |
| all O | |
| of O | |
| the O | |
| SMS O | |
| messages O | |
| on O | |
| the O | |
| phone O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| The O | |
| final O | |
| step O | |
| in O | |
| the O | |
| trojan O | |
| 's O | |
| initialization O | |
| is O | |
| the O | |
| escalation O | |
| and O | |
| maintenance O | |
| of O | |
| privileges O | |
| in O | |
| the O | |
| device O | |
| . O | |
| This O | |
| is O | |
| done O | |
| both O | |
| by O | |
| requesting O | |
| admin O | |
| privileges O | |
| on O | |
| the O | |
| device O | |
| and O | |
| asking O | |
| the O | |
| user O | |
| to O | |
| allow O | |
| the O | |
| application O | |
| to O | |
| access O | |
| the O | |
| device O | |
| 's O | |
| settings O | |
| . O | |
| Privilege O | |
| escalation O | |
| requests O | |
| The O | |
| screens O | |
| asking O | |
| for O | |
| the O | |
| user O | |
| 's O | |
| approval O | |
| wo O | |
| n't O | |
| close O | |
| unless O | |
| the O | |
| user O | |
| approves O | |
| the O | |
| privilege O | |
| escalation O | |
| . O | |
| If O | |
| the O | |
| user O | |
| closes O | |
| the O | |
| windows O | |
| , O | |
| they O | |
| will O | |
| appear O | |
| again O | |
| due O | |
| to O | |
| the O | |
| timer O | |
| configuration O | |
| . O | |
| After O | |
| the O | |
| installation O | |
| of O | |
| the O | |
| trojan O | |
| , O | |
| it O | |
| will O | |
| wait O | |
| randomly O | |
| between O | |
| three O | |
| and O | |
| five O | |
| minutes O | |
| to O | |
| activate O | |
| one O | |
| of O | |
| the O | |
| native O | |
| capabilities O | |
| — O | |
| these O | |
| are O | |
| implemented O | |
| on O | |
| the O | |
| eClient O | |
| subclass O | |
| called O | |
| " O | |
| GoogleCC O | |
| . O | |
| '' O | |
| This O | |
| class O | |
| will O | |
| open O | |
| a O | |
| WebView O | |
| with O | |
| a O | |
| Google-themed B-Organization | |
| page O | |
| asking O | |
| for O | |
| payment O | |
| in O | |
| order O | |
| to O | |
| use O | |
| the O | |
| Google B-Organization | |
| services O | |
| . O | |
| This O | |
| will O | |
| take O | |
| the O | |
| user O | |
| through O | |
| several O | |
| steps O | |
| until O | |
| it O | |
| collects O | |
| all O | |
| the O | |
| necessary O | |
| credit O | |
| card O | |
| information O | |
| , O | |
| which O | |
| will O | |
| be O | |
| checked O | |
| online O | |
| and O | |
| exfiltrated O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| During O | |
| this O | |
| process O | |
| , O | |
| an O | |
| amount O | |
| of O | |
| money O | |
| , O | |
| configured O | |
| by O | |
| the O | |
| malicious O | |
| operator O | |
| , O | |
| is O | |
| requested O | |
| to O | |
| the O | |
| user O | |
| . O | |
| Steps O | |
| to O | |
| request O | |
| the O | |
| user O | |
| 's O | |
| credit O | |
| card O | |
| information O | |
| In O | |
| our O | |
| sample O | |
| configuration O | |
| , O | |
| the O | |
| request O | |
| for O | |
| the O | |
| views O | |
| above O | |
| can O | |
| not O | |
| be O | |
| canceled O | |
| or O | |
| removed O | |
| from O | |
| the O | |
| screen O | |
| — O | |
| behaving O | |
| just O | |
| like O | |
| a O | |
| screen O | |
| lock O | |
| that O | |
| wo O | |
| n't O | |
| be O | |
| disabled O | |
| without O | |
| providing O | |
| credit O | |
| card O | |
| information O | |
| . O | |
| All O | |
| communication O | |
| with O | |
| the O | |
| C2 O | |
| is O | |
| done O | |
| over O | |
| HTTP O | |
| . O | |
| It O | |
| will O | |
| use O | |
| either O | |
| a O | |
| standard O | |
| web O | |
| request O | |
| or O | |
| it O | |
| will O | |
| write O | |
| data O | |
| into O | |
| a O | |
| web O | |
| socket O | |
| if O | |
| the O | |
| first O | |
| method O | |
| fails O | |
| . O | |
| The O | |
| C2 O | |
| can O | |
| also O | |
| use O | |
| WebSocket O | |
| as O | |
| a O | |
| backup O | |
| communication O | |
| channel O | |
| . O | |
| Before O | |
| sending O | |
| any O | |
| data O | |
| to O | |
| the O | |
| C2 O | |
| using O | |
| the O | |
| trojan O | |
| attempts O | |
| to O | |
| disguise O | |
| its O | |
| data O | |
| , O | |
| the O | |
| data O | |
| is O | |
| serialized O | |
| using O | |
| JSON O | |
| , O | |
| which O | |
| is O | |
| then O | |
| encoded O | |
| in O | |
| Base64 O | |
| . O | |
| However O | |
| , O | |
| the O | |
| trojan O | |
| replaces O | |
| the O | |
| '= O | |
| ' O | |
| by O | |
| 'AAAZZZXXX O | |
| ' O | |
| , O | |
| the O | |
| '+ O | |
| ' O | |
| by O | |
| '| O | |
| ' O | |
| and O | |
| the O | |
| '/ O | |
| ' O | |
| by O | |
| ' O | |
| . O | |
| ' O | |
| to O | |
| disguise O | |
| the O | |
| Base64 O | |
| . O | |
| Request O | |
| encoding O | |
| process O | |
| The O | |
| HTTP O | |
| requests O | |
| follow O | |
| the O | |
| format O | |
| below O | |
| , O | |
| while O | |
| on O | |
| the O | |
| WebSocket O | |
| only O | |
| the O | |
| query O | |
| data O | |
| is O | |
| written O | |
| . O | |
| ? O | |
| q= O | |
| - O | |
| : O | |
| As O | |
| is O | |
| common O | |
| with O | |
| trojans O | |
| , O | |
| the O | |
| communication O | |
| is O | |
| always O | |
| initiated O | |
| by O | |
| the O | |
| trojan O | |
| on O | |
| the O | |
| device O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| The O | |
| request O | |
| codes O | |
| are O | |
| actually O | |
| replies O | |
| to O | |
| the O | |
| C2 O | |
| action O | |
| requests O | |
| , O | |
| which O | |
| are O | |
| actually O | |
| called O | |
| " O | |
| responses O | |
| . O | |
| '' O | |
| There O | |
| are O | |
| 27 O | |
| response O | |
| codes O | |
| that O | |
| the O | |
| C2 O | |
| can O | |
| use O | |
| to O | |
| make O | |
| requests O | |
| to O | |
| the O | |
| trojan O | |
| , O | |
| which O | |
| pretty O | |
| much O | |
| match O | |
| what O | |
| 's O | |
| listed O | |
| in O | |
| the O | |
| capabilities O | |
| section O | |
| . O | |
| Error O | |
| Registration O | |
| Ok O | |
| Empty O | |
| SendSMS O | |
| RequestGoogleCC O | |
| Wipe O | |
| OpenBrowser O | |
| SendUSSD O | |
| RequestSMSList O | |
| RequestAppList O | |
| RequestLocation O | |
| ShowNotification O | |
| SetLockPassword O | |
| LockNow O | |
| MuteSound O | |
| LoadScript O | |
| LoadPlugin O | |
| ServerChange O | |
| StartApp O | |
| CallPhone O | |
| SetPingTimer O | |
| SMSBroadcast O | |
| RequestContacts O | |
| AddInject O | |
| RemoveInject O | |
| Evaluate O | |
| Another O | |
| feature O | |
| of O | |
| this O | |
| trojan O | |
| is O | |
| the O | |
| ability O | |
| to O | |
| register O | |
| injects O | |
| , O | |
| which O | |
| are O | |
| JavaScript O | |
| snippets O | |
| of O | |
| code O | |
| . O | |
| These O | |
| will O | |
| be O | |
| executed O | |
| in O | |
| a O | |
| WebView O | |
| object O | |
| created O | |
| by O | |
| the O | |
| trojan O | |
| . O | |
| This O | |
| gives O | |
| the O | |
| operators O | |
| the O | |
| capability O | |
| to O | |
| trick O | |
| the O | |
| user O | |
| into O | |
| accessing O | |
| any O | |
| site O | |
| while O | |
| stealing O | |
| the O | |
| user O | |
| 's O | |
| cookies O | |
| or O | |
| forging O | |
| form O | |
| fields O | |
| , O | |
| like O | |
| account O | |
| numbers O | |
| or O | |
| phone O | |
| numbers O | |
| . O | |
| Trojan O | |
| activity O | |
| At O | |
| the O | |
| time O | |
| of O | |
| the O | |
| writing O | |
| of O | |
| this O | |
| post O | |
| , O | |
| all O | |
| URLs O | |
| ( O | |
| see O | |
| IOC O | |
| section O | |
| ) O | |
| found O | |
| on O | |
| the O | |
| sample O | |
| were O | |
| inactive O | |
| , O | |
| and O | |
| it O | |
| does O | |
| not O | |
| seem O | |
| to O | |
| be O | |
| widespread O | |
| . O | |
| There O | |
| are O | |
| some O | |
| indicators O | |
| that O | |
| this O | |
| sample O | |
| is O | |
| just O | |
| a O | |
| test O | |
| sample O | |
| on O | |
| its O | |
| final O | |
| stages O | |
| of O | |
| development O | |
| . O | |
| There O | |
| are O | |
| several O | |
| strings O | |
| and O | |
| labels O | |
| still O | |
| mentioning O | |
| 'test O | |
| ' O | |
| or O | |
| 'testcc O | |
| ' O | |
| — O | |
| even O | |
| the O | |
| URL O | |
| used O | |
| for O | |
| the O | |
| credit O | |
| card O | |
| data O | |
| exfiltration O | |
| is O | |
| named O | |
| " O | |
| testcc.php B-Indicator | |
| . O | |
| '' O | |
| Debug O | |
| information O | |
| on O | |
| logcat O | |
| Another O | |
| indicator O | |
| is O | |
| the O | |
| amount O | |
| of O | |
| debugging O | |
| information O | |
| the O | |
| trojan O | |
| is O | |
| still O | |
| generating O | |
| — O | |
| a O | |
| production-level O | |
| trojan O | |
| would O | |
| keep O | |
| its O | |
| logging O | |
| to O | |
| a O | |
| minimum O | |
| . O | |
| The O | |
| only O | |
| sample O | |
| was O | |
| found O | |
| on O | |
| public O | |
| repositories O | |
| and O | |
| almost O | |
| seemed O | |
| to O | |
| indicate O | |
| a O | |
| test O | |
| run O | |
| to O | |
| determine O | |
| the O | |
| detection O | |
| ratio O | |
| of O | |
| the O | |
| sample O | |
| . O | |
| We O | |
| have O | |
| observed O | |
| this O | |
| trojan O | |
| being O | |
| submitted O | |
| to O | |
| public O | |
| antivirus O | |
| testing O | |
| platforms O | |
| , O | |
| once O | |
| as O | |
| a O | |
| package O | |
| and O | |
| once O | |
| for O | |
| each O | |
| DLL O | |
| to O | |
| determine O | |
| the O | |
| detection O | |
| ratio O | |
| . O | |
| The O | |
| sample O | |
| analyzed O | |
| was O | |
| targeted O | |
| at O | |
| Russian-speaking O | |
| users O | |
| , O | |
| as O | |
| most O | |
| of O | |
| the O | |
| user O | |
| interaction O | |
| pages O | |
| are O | |
| written O | |
| in O | |
| Russian O | |
| . O | |
| However O | |
| , O | |
| given O | |
| the O | |
| way O | |
| the O | |
| trojan O | |
| is O | |
| built O | |
| , O | |
| it O | |
| is O | |
| highly O | |
| customizable O | |
| , O | |
| meaning O | |
| that O | |
| adapting O | |
| it O | |
| to O | |
| a O | |
| different O | |
| language O | |
| would O | |
| be O | |
| extremely O | |
| easy O | |
| . O | |
| The O | |
| wide O | |
| range O | |
| of O | |
| capabilities O | |
| does O | |
| n't O | |
| limit O | |
| this O | |
| trojan O | |
| to O | |
| a O | |
| specific O | |
| malicious O | |
| activity O | |
| like O | |
| a O | |
| banking O | |
| trojan O | |
| or O | |
| a O | |
| ransomware O | |
| . O | |
| This O | |
| makes O | |
| it O | |
| impossible O | |
| to O | |
| create O | |
| a O | |
| target O | |
| profile O | |
| . O | |
| Conclusion O | |
| This O | |
| trojan O | |
| shows O | |
| a O | |
| new O | |
| path O | |
| for O | |
| threats O | |
| to O | |
| evolve O | |
| . O | |
| Having O | |
| the O | |
| ability O | |
| to O | |
| move O | |
| code O | |
| from O | |
| desktops O | |
| to O | |
| mobile O | |
| platforms O | |
| with O | |
| no O | |
| effort O | |
| , O | |
| like O | |
| the O | |
| eCommon.DLL B-Indicator | |
| demonstrates O | |
| that O | |
| malicious O | |
| actors O | |
| can O | |
| create O | |
| hybrid O | |
| threats O | |
| faster O | |
| and O | |
| with O | |
| fewer O | |
| resources O | |
| involved O | |
| than O | |
| ever O | |
| before O | |
| . O | |
| This O | |
| trojan O | |
| 's O | |
| design O | |
| and O | |
| implementation O | |
| is O | |
| of O | |
| an O | |
| uncommonly O | |
| high O | |
| level O | |
| , O | |
| making O | |
| it O | |
| a O | |
| dangerous O | |
| threat O | |
| . O | |
| These O | |
| kinds O | |
| of O | |
| threats O | |
| will O | |
| become O | |
| more O | |
| common O | |
| , O | |
| as O | |
| more O | |
| and O | |
| more O | |
| companies O | |
| decide O | |
| to O | |
| publish O | |
| their O | |
| software O | |
| directly O | |
| to O | |
| consumers O | |
| . O | |
| There O | |
| have O | |
| been O | |
| several O | |
| recent O | |
| examples O | |
| of O | |
| companies O | |
| choosing O | |
| to O | |
| release O | |
| their O | |
| software O | |
| directly O | |
| to O | |
| consumers O | |
| , O | |
| bypassing O | |
| traditional O | |
| storefronts O | |
| . O | |
| The O | |
| average O | |
| user O | |
| might O | |
| not O | |
| have O | |
| the O | |
| necessary O | |
| skills O | |
| to O | |
| distinguish O | |
| legitimate O | |
| sites O | |
| from O | |
| malicious O | |
| ones O | |
| . O | |
| We O | |
| 've O | |
| seen O | |
| that O | |
| this O | |
| has O | |
| been O | |
| the O | |
| case O | |
| for O | |
| many O | |
| years O | |
| with O | |
| spear-phishing O | |
| campaigns O | |
| on O | |
| desktop O | |
| and O | |
| mobile O | |
| platforms O | |
| , O | |
| so O | |
| , O | |
| unfortunately O | |
| , O | |
| it O | |
| does O | |
| n't O | |
| seem O | |
| that O | |
| this O | |
| will O | |
| change O | |
| any O | |
| time O | |
| soon O | |
| . O | |
| And O | |
| this O | |
| just O | |
| means O | |
| attackers O | |
| will O | |
| continue O | |
| to O | |
| be O | |
| successful O | |
| . O | |
| Coverage O | |
| Additional O | |
| ways O | |
| our O | |
| customers O | |
| can O | |
| detect O | |
| and O | |
| block O | |
| this O | |
| threat O | |
| are O | |
| listed O | |
| below O | |
| . O | |
| Advanced B-System | |
| Malware I-System | |
| Protection I-System | |
| ( I-System | |
| AMP I-System | |
| ) I-System | |
| is O | |
| ideally O | |
| suited O | |
| to O | |
| prevent O | |
| the O | |
| execution O | |
| of O | |
| the O | |
| malware O | |
| used O | |
| by O | |
| these O | |
| threat O | |
| actors O | |
| . O | |
| Cisco B-System | |
| Cloud I-System | |
| Web I-System | |
| Security I-System | |
| ( I-System | |
| CWS I-System | |
| ) I-System | |
| or O | |
| Web B-System | |
| Security I-System | |
| Appliance I-System | |
| ( I-System | |
| WSA I-System | |
| ) I-System | |
| web O | |
| scanning O | |
| prevents O | |
| access O | |
| to O | |
| malicious O | |
| websites O | |
| and O | |
| detects O | |
| malware O | |
| used O | |
| in O | |
| these O | |
| attacks O | |
| . O | |
| Email O | |
| Security O | |
| can O | |
| block O | |
| malicious O | |
| emails O | |
| sent O | |
| by O | |
| threat O | |
| actors O | |
| as O | |
| part O | |
| of O | |
| their O | |
| campaign O | |
| . O | |
| Network O | |
| Security O | |
| appliances O | |
| such O | |
| as O | |
| Next-Generation B-System | |
| Firewall I-System | |
| ( I-System | |
| NGFW I-System | |
| ) I-System | |
| , O | |
| Next-Generation B-System | |
| Intrusion I-System | |
| Prevention I-System | |
| System I-System | |
| ( I-System | |
| NGIPS I-System | |
| ) I-System | |
| , O | |
| and O | |
| Meraki B-System | |
| MX I-System | |
| can O | |
| detect O | |
| malicious O | |
| activity O | |
| associated O | |
| with O | |
| this O | |
| threat O | |
| . O | |
| AMP O | |
| Threat O | |
| Grid O | |
| helps O | |
| identify O | |
| malicious O | |
| binaries O | |
| and O | |
| build O | |
| protection O | |
| into O | |
| all O | |
| Cisco B-Organization | |
| Security O | |
| products O | |
| . O | |
| Umbrella B-System | |
| , O | |
| our O | |
| secure O | |
| internet O | |
| gateway O | |
| ( O | |
| SIG O | |
| ) O | |
| , O | |
| blocks O | |
| users O | |
| from O | |
| connecting O | |
| to O | |
| malicious O | |
| domains O | |
| , O | |
| IPs O | |
| , O | |
| and O | |
| URLs O | |
| , O | |
| whether O | |
| users O | |
| are O | |
| on O | |
| or O | |
| off O | |
| the O | |
| corporate O | |
| network O | |
| . O | |
| Open O | |
| Source O | |
| Snort O | |
| Subscriber O | |
| Rule O | |
| Set O | |
| customers O | |
| can O | |
| stay O | |
| up O | |
| to O | |
| date O | |
| by O | |
| downloading O | |
| the O | |
| latest O | |
| rule O | |
| pack O | |
| available O | |
| for O | |
| purchase O | |
| on O | |
| Snort.org O | |
| . O | |
| Indicators O | |
| of O | |
| compromise O | |
| ( O | |
| IOC O | |
| ) O | |
| URLs O | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //5.9.33.226:5416 I-Indicator | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //172.110.10.171:85/testcc.php I-Indicator | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //sub1.tdsworker.ru:5555/3ds/ I-Indicator | |
| Hash O | |
| values O | |
| Package.apk B-Indicator | |
| - O | |
| A342a16082ea53d101f556b50532651cd3e3fdc7d9e0be3aa136680ad9c6a69f B-Indicator | |
| eCommon.dl B-Indicator | |
| - O | |
| 604deb75eedf439766896f05799752de268baf437bf89a7185540627ab4a4bd1 B-Indicator | |
| Reznov.dll B-Indicator | |
| - O | |
| 17b8665cdbbb94482ca970a754d11d6e29c46af6390a2d8e8193d8d6a527dec3 B-Indicator | |
| Custom O | |
| activity O | |
| prefix O | |
| com.cact.CAct B-Indicator | |
| Cerberus B-Malware | |
| - O | |
| A O | |
| new O | |
| banking O | |
| Trojan O | |
| from O | |
| the O | |
| underworld O | |
| August O | |
| 2019 O | |
| In O | |
| June O | |
| 2019 O | |
| , O | |
| ThreatFabric B-Organization | |
| analysts O | |
| found O | |
| a O | |
| new O | |
| Android B-System | |
| malware O | |
| , O | |
| dubbed O | |
| “ O | |
| Cerberus B-Malware | |
| ” O | |
| , O | |
| being O | |
| rented O | |
| out O | |
| on O | |
| underground O | |
| forums O | |
| . O | |
| Its O | |
| authors O | |
| claim O | |
| that O | |
| it O | |
| was O | |
| used O | |
| for O | |
| private O | |
| operations O | |
| for O | |
| two O | |
| years O | |
| preceding O | |
| the O | |
| start O | |
| of O | |
| the O | |
| rental O | |
| . O | |
| They O | |
| also O | |
| state O | |
| that O | |
| the O | |
| code O | |
| is O | |
| written O | |
| from O | |
| scratch O | |
| and O | |
| is O | |
| not O | |
| using O | |
| parts O | |
| of O | |
| other O | |
| existing O | |
| banking O | |
| Trojans O | |
| unlike O | |
| many O | |
| other O | |
| Trojans O | |
| that O | |
| are O | |
| either O | |
| based O | |
| completely O | |
| on O | |
| the O | |
| source O | |
| of O | |
| another O | |
| Trojan O | |
| ( O | |
| such O | |
| as O | |
| the O | |
| leaked O | |
| Anubis B-Malware | |
| source O | |
| code O | |
| that O | |
| is O | |
| now O | |
| being O | |
| resold O | |
| ) O | |
| or O | |
| at O | |
| least O | |
| borrow O | |
| parts O | |
| of O | |
| other O | |
| Trojans O | |
| . O | |
| After O | |
| thorough O | |
| analysis O | |
| we O | |
| can O | |
| confirm O | |
| that O | |
| Cerberus B-Malware | |
| was O | |
| indeed O | |
| not O | |
| based O | |
| on O | |
| the O | |
| Anubis B-Malware | |
| source O | |
| code O | |
| . O | |
| One O | |
| peculiar O | |
| thing O | |
| about O | |
| the O | |
| actor O | |
| group O | |
| behind O | |
| this O | |
| banking O | |
| malware O | |
| is O | |
| that O | |
| they O | |
| have O | |
| an O | |
| “ O | |
| official O | |
| ” O | |
| twitter B-Organization | |
| account O | |
| that O | |
| they O | |
| use O | |
| to O | |
| post O | |
| promotional O | |
| content O | |
| ( O | |
| even O | |
| videos O | |
| ) O | |
| about O | |
| the O | |
| malware O | |
| . O | |
| Oddly O | |
| enough O | |
| they O | |
| also O | |
| use O | |
| it O | |
| to O | |
| make O | |
| fun O | |
| of O | |
| the O | |
| AV O | |
| community O | |
| , O | |
| sharing O | |
| detection O | |
| screenshots O | |
| from O | |
| VirusTotal B-Organization | |
| ( O | |
| thus O | |
| leaking O | |
| IoC O | |
| ) O | |
| and O | |
| even O | |
| engaging O | |
| in O | |
| discussions O | |
| with O | |
| malware O | |
| researchers O | |
| directly O | |
| The O | |
| following O | |
| screenshot O | |
| shows O | |
| tweets O | |
| from O | |
| their O | |
| advertisement O | |
| campaign O | |
| : O | |
| That O | |
| unusual O | |
| behavior O | |
| could O | |
| be O | |
| explained O | |
| by O | |
| the O | |
| combination O | |
| of O | |
| the O | |
| need O | |
| for O | |
| attention O | |
| and O | |
| a O | |
| probable O | |
| lack O | |
| of O | |
| experience O | |
| . O | |
| What O | |
| is O | |
| sure O | |
| is O | |
| that O | |
| the O | |
| gap O | |
| in O | |
| the O | |
| Android B-System | |
| banking O | |
| malware O | |
| rental O | |
| business O | |
| left O | |
| open O | |
| after O | |
| the O | |
| rental O | |
| of O | |
| the O | |
| Anubis B-Malware | |
| 2 I-Malware | |
| and O | |
| RedAlert B-Malware | |
| 2 I-Malware | |
| Trojans O | |
| ended O | |
| provides O | |
| a O | |
| good O | |
| opportunity O | |
| for O | |
| the O | |
| actors O | |
| behind O | |
| Cerberus B-Malware | |
| to O | |
| grow O | |
| their O | |
| business O | |
| quickly O | |
| . O | |
| The O | |
| Android B-System | |
| banking O | |
| Trojan O | |
| rental O | |
| business O | |
| Rental O | |
| of O | |
| banking O | |
| Trojans O | |
| is O | |
| not O | |
| new O | |
| . O | |
| It O | |
| was O | |
| an O | |
| existing O | |
| business O | |
| model O | |
| when O | |
| computer-based O | |
| banking O | |
| malware O | |
| was O | |
| the O | |
| only O | |
| form O | |
| of O | |
| banking O | |
| malware O | |
| and O | |
| has O | |
| shifted O | |
| to O | |
| the O | |
| Android B-System | |
| equivalent O | |
| a O | |
| few O | |
| years O | |
| later O | |
| . O | |
| The O | |
| life O | |
| span O | |
| of O | |
| Android B-System | |
| banking O | |
| malware O | |
| is O | |
| limited O | |
| to O | |
| either O | |
| the O | |
| will O | |
| of O | |
| its O | |
| author O | |
| ( O | |
| s O | |
| ) O | |
| to O | |
| support O | |
| it O | |
| or O | |
| the O | |
| arrest O | |
| of O | |
| those O | |
| actors O | |
| . O | |
| This O | |
| malware-life-cycle O | |
| has O | |
| been O | |
| observed O | |
| to O | |
| reoccur O | |
| every O | |
| few O | |
| years O | |
| , O | |
| bringing O | |
| new O | |
| malware O | |
| families O | |
| into O | |
| light O | |
| . O | |
| Each O | |
| time O | |
| a O | |
| rented O | |
| malware O | |
| reaches O | |
| the O | |
| end O | |
| of O | |
| its O | |
| life O | |
| it O | |
| provides O | |
| the O | |
| opportunity O | |
| for O | |
| other O | |
| actors O | |
| a O | |
| to O | |
| take O | |
| over O | |
| the O | |
| malware O | |
| rental O | |
| market-share O | |
| . O | |
| As O | |
| visible O | |
| on O | |
| following O | |
| chart O | |
| , O | |
| the O | |
| lifespan O | |
| of O | |
| many O | |
| well-known O | |
| rented O | |
| Android B-System | |
| bankers O | |
| is O | |
| usually O | |
| no O | |
| more O | |
| than O | |
| one O | |
| or O | |
| two O | |
| years O | |
| . O | |
| When O | |
| the O | |
| family O | |
| ceases O | |
| to O | |
| exist O | |
| a O | |
| new O | |
| one O | |
| is O | |
| already O | |
| available O | |
| to O | |
| fill O | |
| the O | |
| void O | |
| , O | |
| proving O | |
| that O | |
| the O | |
| demand O | |
| for O | |
| such O | |
| malware O | |
| is O | |
| always O | |
| present O | |
| and O | |
| that O | |
| therefore O | |
| Cerberus B-Malware | |
| has O | |
| a O | |
| good O | |
| chance O | |
| to O | |
| survive O | |
| . O | |
| After O | |
| the O | |
| actor O | |
| behind O | |
| RedAlert B-Malware | |
| 2 I-Malware | |
| decided O | |
| to O | |
| quit O | |
| the O | |
| rental O | |
| business O | |
| , O | |
| we O | |
| observed O | |
| a O | |
| surge O | |
| in O | |
| Anubis B-Malware | |
| samples O | |
| in O | |
| the O | |
| wild O | |
| . O | |
| After O | |
| the O | |
| Anubis B-Malware | |
| actor O | |
| was O | |
| allegedly O | |
| arrested O | |
| and O | |
| the O | |
| source O | |
| code O | |
| was O | |
| leaked O | |
| there O | |
| was O | |
| also O | |
| huge O | |
| increase O | |
| in O | |
| the O | |
| number O | |
| of O | |
| Anubis B-Malware | |
| samples O | |
| found O | |
| in O | |
| the O | |
| wild O | |
| , O | |
| but O | |
| the O | |
| new O | |
| actors O | |
| using O | |
| Anubis B-Malware | |
| have O | |
| no O | |
| support O | |
| or O | |
| updates O | |
| . O | |
| Due O | |
| to O | |
| this O | |
| Cerberus B-Malware | |
| will O | |
| come O | |
| in O | |
| handy O | |
| for O | |
| actors O | |
| that O | |
| want O | |
| to O | |
| focus O | |
| on O | |
| performing O | |
| fraud O | |
| without O | |
| having O | |
| to O | |
| develop O | |
| and O | |
| maintain O | |
| a O | |
| botnet O | |
| and O | |
| C2 O | |
| infrastructure O | |
| . O | |
| Analysis O | |
| of O | |
| evasion O | |
| techniques O | |
| Along O | |
| with O | |
| the O | |
| standard O | |
| payload O | |
| and O | |
| string O | |
| obfuscation O | |
| , O | |
| Cerberus B-Malware | |
| uses O | |
| a O | |
| rather O | |
| interesting O | |
| technique O | |
| to O | |
| prevent O | |
| analysis O | |
| of O | |
| the O | |
| Trojan O | |
| . O | |
| Using O | |
| the O | |
| device O | |
| accelerometer O | |
| sensor O | |
| it O | |
| implements O | |
| a O | |
| simple O | |
| pedometer O | |
| that O | |
| is O | |
| used O | |
| to O | |
| measure O | |
| movements O | |
| of O | |
| the O | |
| victim O | |
| . O | |
| The O | |
| idea O | |
| is O | |
| simple O | |
| - O | |
| if O | |
| the O | |
| infected O | |
| device O | |
| belongs O | |
| to O | |
| a O | |
| real O | |
| person O | |
| , O | |
| sooner O | |
| or O | |
| later O | |
| this O | |
| person O | |
| will O | |
| move O | |
| around O | |
| , O | |
| increasing O | |
| the O | |
| step O | |
| counter O | |
| . O | |
| The O | |
| Trojan O | |
| uses O | |
| this O | |
| counter O | |
| to O | |
| activate O | |
| the O | |
| bot O | |
| - O | |
| if O | |
| aforementioned O | |
| step O | |
| counter O | |
| hits O | |
| the O | |
| pre-configured O | |
| threshold O | |
| it O | |
| considers O | |
| running O | |
| on O | |
| the O | |
| device O | |
| to O | |
| be O | |
| safe O | |
| . O | |
| This O | |
| simple O | |
| measure O | |
| prevents O | |
| the O | |
| Trojan O | |
| from O | |
| running O | |
| and O | |
| being O | |
| analyzed O | |
| in O | |
| dynamic O | |
| analysis O | |
| environments O | |
| ( O | |
| sandboxes O | |
| ) O | |
| and O | |
| on O | |
| the O | |
| test O | |
| devices O | |
| of O | |
| malware O | |
| analysts O | |
| . O | |
| The O | |
| code O | |
| responsible O | |
| for O | |
| this O | |
| verification O | |
| is O | |
| shown O | |
| in O | |
| the O | |
| following O | |
| snippet O | |
| : O | |
| How O | |
| it O | |
| works O | |
| When O | |
| the O | |
| malware O | |
| is O | |
| first O | |
| started O | |
| on O | |
| the O | |
| device O | |
| it O | |
| will O | |
| begin O | |
| by O | |
| hiding O | |
| its O | |
| icon O | |
| from O | |
| the O | |
| application O | |
| drawer O | |
| . O | |
| Then O | |
| it O | |
| will O | |
| ask O | |
| for O | |
| the O | |
| accessibility O | |
| service O | |
| privilege O | |
| as O | |
| visible O | |
| in O | |
| the O | |
| following O | |
| screenshot O | |
| : O | |
| After O | |
| the O | |
| user O | |
| grants O | |
| the O | |
| requested O | |
| privilege O | |
| , O | |
| Cerberus B-Malware | |
| starts O | |
| to O | |
| abuse O | |
| it O | |
| by O | |
| granting O | |
| itself O | |
| additional O | |
| permissions O | |
| , O | |
| such O | |
| as O | |
| permissions O | |
| needed O | |
| to O | |
| send O | |
| messages O | |
| and O | |
| make O | |
| calls O | |
| , O | |
| without O | |
| requiring O | |
| any O | |
| user O | |
| interaction O | |
| . O | |
| It O | |
| also O | |
| disables O | |
| Play B-System | |
| Protect I-System | |
| ( O | |
| Google B-Organization | |
| ’ O | |
| s O | |
| preinstalled O | |
| antivirus O | |
| solution O | |
| ) O | |
| to O | |
| prevent O | |
| its O | |
| discovery O | |
| and O | |
| deletion O | |
| in O | |
| the O | |
| future O | |
| . O | |
| After O | |
| conveniently O | |
| granting O | |
| itself O | |
| additional O | |
| privileges O | |
| and O | |
| securing O | |
| its O | |
| persistence O | |
| on O | |
| the O | |
| device O | |
| , O | |
| Cerberus B-Malware | |
| registers O | |
| the O | |
| infected O | |
| device O | |
| in O | |
| the O | |
| botnet O | |
| and O | |
| waits O | |
| for O | |
| commands O | |
| from O | |
| the O | |
| C2 O | |
| server O | |
| while O | |
| also O | |
| being O | |
| ready O | |
| to O | |
| perform O | |
| overlay O | |
| attacks O | |
| . O | |
| The O | |
| commands O | |
| supported O | |
| by O | |
| the O | |
| analyzed O | |
| version O | |
| of O | |
| the O | |
| Cerberus B-Malware | |
| bot O | |
| are O | |
| listed O | |
| below O | |
| . O | |
| As O | |
| can O | |
| be O | |
| seen O | |
| , O | |
| the O | |
| possibilities O | |
| offered O | |
| by O | |
| the O | |
| bot O | |
| are O | |
| pretty O | |
| common O | |
| . O | |
| Command O | |
| Description O | |
| push O | |
| Shows O | |
| a O | |
| push O | |
| notification O | |
| . O | |
| Clicking O | |
| on O | |
| thenotification O | |
| will O | |
| result O | |
| in O | |
| launching O | |
| a O | |
| specified O | |
| app O | |
| startApp O | |
| Starts O | |
| the O | |
| specified O | |
| application O | |
| getInstallApps O | |
| Gets O | |
| the O | |
| list O | |
| of O | |
| installedapplications O | |
| on O | |
| the O | |
| infected O | |
| device O | |
| getContacts O | |
| Gets O | |
| the O | |
| contact O | |
| names O | |
| and O | |
| phone O | |
| numbers O | |
| from O | |
| the O | |
| addressbook O | |
| on O | |
| the O | |
| infected O | |
| device O | |
| deleteApplication O | |
| Triggers O | |
| the O | |
| deletion O | |
| of O | |
| the O | |
| specified O | |
| application O | |
| forwardCall O | |
| Enables O | |
| call O | |
| forwarding O | |
| to O | |
| the O | |
| specified O | |
| number O | |
| sendSms O | |
| Sends O | |
| a O | |
| text O | |
| message O | |
| with O | |
| specified O | |
| text O | |
| from O | |
| the O | |
| infecteddevice O | |
| to O | |
| the O | |
| specified O | |
| phone O | |
| number O | |
| startInject O | |
| Triggers O | |
| the O | |
| overlay O | |
| attack O | |
| against O | |
| the O | |
| specified O | |
| application O | |
| startUssd O | |
| Calls O | |
| the O | |
| specified O | |
| USSD O | |
| code O | |
| openUrl O | |
| Opens O | |
| the O | |
| specified O | |
| URL O | |
| in O | |
| the O | |
| WebView O | |
| getSMS O | |
| Gets O | |
| all O | |
| text O | |
| messages O | |
| from O | |
| the O | |
| infected O | |
| device O | |
| killMe O | |
| Triggers O | |
| the O | |
| kill O | |
| switch O | |
| for O | |
| the O | |
| bot O | |
| updateModule O | |
| Updates O | |
| the O | |
| payload O | |
| module O | |
| Cerberus B-Malware | |
| features O | |
| Cerberus B-Malware | |
| malware O | |
| has O | |
| the O | |
| same O | |
| capabilities O | |
| as O | |
| most O | |
| other O | |
| Android B-System | |
| banking O | |
| Trojans O | |
| such O | |
| as O | |
| the O | |
| use O | |
| of O | |
| overlay O | |
| attacks O | |
| , O | |
| SMS O | |
| control O | |
| and O | |
| contact O | |
| list O | |
| harvesting O | |
| . O | |
| The O | |
| Trojan O | |
| can O | |
| also O | |
| leverage O | |
| keylogging O | |
| to O | |
| broaden O | |
| the O | |
| attack O | |
| scope O | |
| . O | |
| Overall O | |
| , O | |
| Cerberus B-Malware | |
| has O | |
| a O | |
| pretty O | |
| common O | |
| feature O | |
| list O | |
| and O | |
| although O | |
| the O | |
| malware O | |
| seems O | |
| to O | |
| have O | |
| been O | |
| written O | |
| from O | |
| scratch O | |
| there O | |
| does O | |
| not O | |
| seem O | |
| to O | |
| be O | |
| any O | |
| innovative O | |
| functionality O | |
| at O | |
| this O | |
| time O | |
| . O | |
| For O | |
| example O | |
| , O | |
| some O | |
| of O | |
| the O | |
| more O | |
| advanced O | |
| banking O | |
| Trojans O | |
| now O | |
| offer O | |
| features O | |
| such O | |
| as O | |
| a O | |
| back-connect O | |
| proxy O | |
| , O | |
| screen-streaming O | |
| and O | |
| even O | |
| remote O | |
| control O | |
| . O | |
| Cerberus B-Malware | |
| embeds O | |
| the O | |
| following O | |
| set O | |
| of O | |
| features O | |
| that O | |
| allows O | |
| itself O | |
| to O | |
| remain O | |
| under O | |
| the O | |
| radar O | |
| and O | |
| successfully O | |
| perform O | |
| attacks O | |
| : O | |
| Overlaying O | |
| : O | |
| Dynamic O | |
| ( O | |
| Local O | |
| injects O | |
| obtained O | |
| from O | |
| C2 O | |
| ) O | |
| Keylogging O | |
| SMS O | |
| harvesting O | |
| : O | |
| SMS O | |
| listing O | |
| SMS O | |
| harvesting O | |
| : O | |
| SMS O | |
| forwarding O | |
| Device O | |
| info O | |
| collection O | |
| Contact O | |
| list O | |
| collection O | |
| Application O | |
| listing O | |
| Location O | |
| collection O | |
| Overlaying O | |
| : O | |
| Targets O | |
| list O | |
| update O | |
| SMS O | |
| : O | |
| Sending O | |
| Calls O | |
| : O | |
| USSD O | |
| request O | |
| making O | |
| Calls O | |
| : O | |
| Call O | |
| forwarding O | |
| Remote O | |
| actions O | |
| : O | |
| App O | |
| installing O | |
| Remote O | |
| actions O | |
| : O | |
| App O | |
| starting O | |
| Remote O | |
| actions O | |
| : O | |
| App O | |
| removal O | |
| Remote O | |
| actions O | |
| : O | |
| Showing O | |
| arbitrary O | |
| web O | |
| pages O | |
| Remote O | |
| actions O | |
| : O | |
| Screen-locking O | |
| Notifications O | |
| : O | |
| Push O | |
| notifications O | |
| C2 O | |
| Resilience O | |
| : O | |
| Auxiliary O | |
| C2 O | |
| list O | |
| Self-protection O | |
| : O | |
| Hiding O | |
| the O | |
| App O | |
| icon O | |
| Self-protection O | |
| : O | |
| Preventing O | |
| removal O | |
| Self-protection O | |
| : O | |
| Emulation-detection O | |
| Architecture O | |
| : O | |
| Modular O | |
| Overlay O | |
| attack O | |
| Most O | |
| Android O | |
| banking O | |
| Trojans O | |
| use O | |
| overlay O | |
| attacks O | |
| to O | |
| trick O | |
| the O | |
| victim O | |
| into O | |
| providing O | |
| their O | |
| personal O | |
| information O | |
| ( O | |
| such O | |
| as O | |
| but O | |
| not O | |
| limited O | |
| to O | |
| : O | |
| credit O | |
| card O | |
| information O | |
| , O | |
| banking O | |
| credentials O | |
| , O | |
| mail O | |
| credentials O | |
| ) O | |
| and O | |
| Cerberus B-Malware | |
| is O | |
| no O | |
| exception O | |
| . O | |
| In O | |
| this O | |
| particular O | |
| case O | |
| , O | |
| the O | |
| bot O | |
| abuses O | |
| the O | |
| accessibility O | |
| service O | |
| privilege O | |
| to O | |
| obtain O | |
| the O | |
| package O | |
| name O | |
| of O | |
| the O | |
| foreground O | |
| application O | |
| and O | |
| determine O | |
| whether O | |
| or O | |
| not O | |
| to O | |
| show O | |
| a O | |
| phishing O | |
| overlay O | |
| window O | |
| , O | |
| as O | |
| shown O | |
| in O | |
| the O | |
| following O | |
| code O | |
| snippet O | |
| : O | |
| Targets O | |
| Some O | |
| examples O | |
| of O | |
| phishing O | |
| overlays O | |
| are O | |
| shown O | |
| below O | |
| . O | |
| They O | |
| exist O | |
| in O | |
| two O | |
| types O | |
| : O | |
| the O | |
| credentials O | |
| stealers O | |
| ( O | |
| first O | |
| 2 O | |
| screenshots O | |
| ) O | |
| and O | |
| the O | |
| credit O | |
| card O | |
| grabbers O | |
| ( O | |
| last O | |
| screenshot O | |
| ) O | |
| . O | |
| The O | |
| only O | |
| active O | |
| target O | |
| list O | |
| observed O | |
| in O | |
| the O | |
| wild O | |
| is O | |
| available O | |
| in O | |
| the O | |
| appendix O | |
| and O | |
| contains O | |
| a O | |
| total O | |
| of O | |
| 30 O | |
| unique O | |
| targets O | |
| . O | |
| It O | |
| is O | |
| interesting O | |
| to O | |
| observe O | |
| that O | |
| the O | |
| actual O | |
| target O | |
| list O | |
| contains O | |
| : O | |
| 7 O | |
| French O | |
| banking O | |
| apps O | |
| 7 O | |
| U.S. O | |
| banking O | |
| apps O | |
| 1 O | |
| Japanese O | |
| banking O | |
| app O | |
| 15 O | |
| non-banking O | |
| apps O | |
| This O | |
| uncommon O | |
| target O | |
| list O | |
| might O | |
| either O | |
| be O | |
| the O | |
| result O | |
| of O | |
| specific O | |
| customer O | |
| demand O | |
| , O | |
| or O | |
| due O | |
| to O | |
| some O | |
| actors O | |
| having O | |
| partially O | |
| reused O | |
| an O | |
| existing O | |
| target O | |
| list O | |
| . O | |
| Conclusion O | |
| Although O | |
| not O | |
| yet O | |
| mature O | |
| enough O | |
| to O | |
| provide O | |
| the O | |
| equivalent O | |
| of O | |
| a O | |
| full-blown O | |
| set O | |
| of O | |
| Android B-System | |
| banking O | |
| malware O | |
| features O | |
| ( O | |
| such O | |
| as O | |
| RAT O | |
| , O | |
| RAT O | |
| with O | |
| ATS O | |
| ( O | |
| Automated O | |
| Transaction O | |
| Script O | |
| ) O | |
| , O | |
| back-connect O | |
| proxy O | |
| , O | |
| media O | |
| streaming O | |
| ) O | |
| , O | |
| or O | |
| providing O | |
| an O | |
| exhaustive O | |
| target O | |
| list O | |
| , O | |
| Cerberus B-Malware | |
| should O | |
| not O | |
| be O | |
| taken O | |
| lightly O | |
| . O | |
| Due O | |
| to O | |
| the O | |
| current O | |
| absence O | |
| of O | |
| maintained O | |
| and O | |
| supported O | |
| Android B-Malware | |
| banking O | |
| Malware-as-a-Service O | |
| in O | |
| the O | |
| underground O | |
| community O | |
| , O | |
| there O | |
| is O | |
| a O | |
| certainly O | |
| demand O | |
| for O | |
| a O | |
| new O | |
| service O | |
| . O | |
| Cerberus B-Malware | |
| is O | |
| already O | |
| capable O | |
| to O | |
| fulfill O | |
| this O | |
| demand O | |
| . O | |
| In O | |
| addition O | |
| to O | |
| the O | |
| feature O | |
| base O | |
| it O | |
| already O | |
| possesses O | |
| and O | |
| the O | |
| money O | |
| that O | |
| can O | |
| be O | |
| made O | |
| from O | |
| the O | |
| rental O | |
| , O | |
| it O | |
| could O | |
| evolve O | |
| to O | |
| compete O | |
| with O | |
| the O | |
| mightiest O | |
| Android B-System | |
| banking O | |
| Trojans O | |
| . O | |
| Next O | |
| to O | |
| the O | |
| features O | |
| , O | |
| we O | |
| expect O | |
| the O | |
| target O | |
| list O | |
| to O | |
| be O | |
| expanded O | |
| to O | |
| contain O | |
| additional O | |
| ( O | |
| banking O | |
| ) O | |
| apps O | |
| in O | |
| the O | |
| near O | |
| future O | |
| . O | |
| Knowledge O | |
| of O | |
| the O | |
| threat O | |
| landscape O | |
| and O | |
| implementation O | |
| of O | |
| the O | |
| right O | |
| detection O | |
| tools O | |
| remains O | |
| crucial O | |
| to O | |
| be O | |
| able O | |
| to O | |
| protect O | |
| yourself O | |
| from O | |
| fraud O | |
| ; O | |
| Cerberus B-Malware | |
| is O | |
| yet O | |
| a O | |
| new O | |
| Trojan O | |
| active O | |
| in O | |
| the O | |
| wild O | |
| ! O | |
| Appendix O | |
| Samples O | |
| Some O | |
| of O | |
| the O | |
| latest O | |
| Cerberus B-Malware | |
| samples O | |
| found O | |
| in O | |
| the O | |
| wild O | |
| : O | |
| App O | |
| name O | |
| Package O | |
| name O | |
| SHA O | |
| 256 O | |
| hash O | |
| Flash B-System | |
| Player I-System | |
| com.uxlgtsvfdc.zipvwntdy B-Indicator | |
| 728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f B-Indicator | |
| Flash B-System | |
| Player I-System | |
| com.ognbsfhszj.hqpquokjdp B-Indicator | |
| fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329 B-Indicator | |
| Flash B-System | |
| Player I-System | |
| com.mwmnfwt.arhkrgajn B-Indicator | |
| ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c B-Indicator | |
| Flash B-System | |
| Player I-System | |
| com.wogdjywtwq.oiofvpzpxyo B-Indicator | |
| 6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4 B-Indicator | |
| Flash B-System | |
| Player I-System | |
| com.hvdnaiujzwo.fovzeukzywfr B-Indicator | |
| cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b B-Indicator | |
| Flash B-System | |
| Player I-System | |
| com.gzhlubw.pmevdiexmn B-Indicator | |
| 3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63 B-Indicator | |
| Target O | |
| list O | |
| The O | |
| actual O | |
| observed O | |
| list O | |
| of O | |
| mobile O | |
| apps O | |
| targeted O | |
| by O | |
| Cerberus B-Malware | |
| contains O | |
| a O | |
| total O | |
| of O | |
| 30 O | |
| unique O | |
| applications O | |
| . O | |
| This O | |
| list O | |
| is O | |
| expected O | |
| to O | |
| expand O | |
| : O | |
| Package O | |
| name O | |
| Application O | |
| name O | |
| com.android.vending B-Indicator | |
| Play B-System | |
| Market I-System | |
| com.boursorama.android.clients B-Indicator | |
| Boursorama I-Indicator | |
| Banque B-System | |
| com.caisseepargne.android.mobilebanking B-Indicator | |
| Banque B-System | |
| com.chase.sig.android B-Indicator | |
| Chase B-System | |
| Mobile I-System | |
| com.clairmail.fth B-Indicator | |
| Fifth B-System | |
| Third I-System | |
| Mobile I-System | |
| Banking I-System | |
| com.connectivityapps.hotmail B-Indicator | |
| Connect B-System | |
| for I-System | |
| Hotmail I-System | |
| com.google.android.gm B-Indicator | |
| Gmail B-System | |
| com.imo.android.imoim B-Indicator | |
| imo B-System | |
| free O | |
| video O | |
| calls O | |
| and O | |
| chat O | |
| com.infonow.bofa B-Indicator | |
| Bank B-System | |
| of I-System | |
| America I-System | |
| Mobile I-System | |
| Banking I-System | |
| com.IngDirectAndroid B-Indicator | |
| ING O | |
| com.instagram.android B-Indicator | |
| Instagram I-Indicator | |
| com.konylabs.capitalone B-Indicator | |
| Capital B-System | |
| One® I-System | |
| Mobile I-System | |
| com.mail.mobile.android.mail B-Indicator | |
| mail.com I-Indicator | |
| mail B-System | |
| com.microsoft.office.outlook B-Indicator | |
| Microsoft B-System | |
| Outlook I-System | |
| com.snapchat.android B-Indicator | |
| Snapchat B-System | |
| com.tencent.mm B-Indicator | |
| WeChat B-System | |
| com.twitter.android B-Indicator | |
| Twitter B-System | |
| com.ubercab B-Indicator | |
| Uber B-Organization | |
| com.usaa.mobile.android.usaa B-Indicator | |
| USAA B-System | |
| Mobile I-System | |
| com.usbank.mobilebanking B-Indicator | |
| U.S. I-Indicator | |
| Bank O | |
| - O | |
| Inspired O | |
| by O | |
| customers O | |
| com.viber.voip B-Indicator | |
| Viber B-System | |
| com.wf.wellsfargomobile B-Indicator | |
| Wells B-System | |
| Fargo I-System | |
| Mobile I-System | |
| com.whatsapp B-Indicator | |
| WhatsApp B-System | |
| com.yahoo.mobile.client.android.mail B-Indicator | |
| Yahoo B-System | |
| Mail I-System | |
| – O | |
| Organized O | |
| Email O | |
| fr.banquepopulaire.cyberplus B-Indicator | |
| Banque B-System | |
| Populaire O | |
| fr.creditagricole.androidapp B-Indicator | |
| Ma B-System | |
| Banque I-System | |
| jp.co.rakuten_bank.rakutenbank B-Indicator | |
| 楽天銀行 O | |
| -個人のお客様向けアプリ O | |
| mobi.societegenerale.mobile.lappli B-Indicator | |
| L O | |
| ’ O | |
| Appli O | |
| Société O | |
| Générale O | |
| net.bnpparibas.mescomptes B-Indicator | |
| Mes O | |
| Comptes O | |
| BNP O | |
| Paribas O | |
| org.telegram.messenger B-Indicator | |
| Telegram I-Indicator | |
| Triout B-Malware | |
| - O | |
| Spyware O | |
| Framework O | |
| for O | |
| Android B-System | |
| with O | |
| Extensive O | |
| Surveillance O | |
| Capabilities O | |
| August O | |
| 20 O | |
| , O | |
| 2018 O | |
| No O | |
| operating O | |
| system O | |
| is O | |
| safe O | |
| from O | |
| malware O | |
| , O | |
| as O | |
| cyber O | |
| criminals O | |
| will O | |
| always O | |
| want O | |
| to O | |
| steal O | |
| , O | |
| spy O | |
| or O | |
| tamper O | |
| with O | |
| your O | |
| data O | |
| . O | |
| The O | |
| proliferation O | |
| of O | |
| Android B-Malware | |
| devices O | |
| – O | |
| from O | |
| smartphones O | |
| to O | |
| tablets O | |
| and O | |
| smart O | |
| TVs O | |
| – O | |
| has O | |
| opened O | |
| up O | |
| new O | |
| possibilities O | |
| for O | |
| malware O | |
| developers O | |
| , O | |
| as O | |
| all O | |
| these O | |
| devices O | |
| pack O | |
| microphones O | |
| , O | |
| cameras O | |
| and O | |
| location-tracking O | |
| hardware O | |
| they O | |
| can O | |
| turn O | |
| into O | |
| the O | |
| perfect O | |
| spy O | |
| tools O | |
| . O | |
| Bitdefender B-Organization | |
| researchers O | |
| have O | |
| identified O | |
| a O | |
| new O | |
| Android B-System | |
| spyware O | |
| , O | |
| dubbed O | |
| Triout B-Malware | |
| , O | |
| which O | |
| appears O | |
| to O | |
| act O | |
| as O | |
| a O | |
| framework O | |
| for O | |
| building O | |
| extensive O | |
| surveillance O | |
| capabilities O | |
| into O | |
| seemingly O | |
| benign O | |
| applications O | |
| . O | |
| Found O | |
| bundled O | |
| with O | |
| a O | |
| repackaged O | |
| app O | |
| , O | |
| the O | |
| spyware O | |
| ’ O | |
| s O | |
| surveillance O | |
| capabilities O | |
| involve O | |
| hiding O | |
| its O | |
| presence O | |
| on O | |
| the O | |
| device O | |
| , O | |
| recording O | |
| phone O | |
| calls O | |
| , O | |
| logging O | |
| incoming O | |
| text O | |
| messages O | |
| , O | |
| recoding O | |
| videos O | |
| , O | |
| taking O | |
| pictures O | |
| and O | |
| collecting O | |
| GPS B-System | |
| coordinates O | |
| , O | |
| then O | |
| broadcasting O | |
| all O | |
| of O | |
| that O | |
| to O | |
| an O | |
| attacker-controlled O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| command O | |
| and O | |
| control O | |
| ) O | |
| server O | |
| . O | |
| It O | |
| ’ O | |
| s O | |
| interesting O | |
| that O | |
| Triout B-Malware | |
| , O | |
| which O | |
| is O | |
| detected O | |
| by O | |
| Bitdefender B-Organization | |
| ’ O | |
| s O | |
| machine O | |
| learning O | |
| algorithms O | |
| , O | |
| was O | |
| first O | |
| submitted O | |
| from O | |
| Russia O | |
| , O | |
| and O | |
| most O | |
| scans/reports O | |
| came O | |
| from O | |
| Israel O | |
| . O | |
| The O | |
| sample O | |
| ’ O | |
| s O | |
| first O | |
| appearance O | |
| seems O | |
| to O | |
| be O | |
| May O | |
| 15 O | |
| , O | |
| 2018 O | |
| , O | |
| when O | |
| it O | |
| was O | |
| uploaded O | |
| to O | |
| VirusTotal B-Organization | |
| , O | |
| but O | |
| it O | |
| ’ O | |
| s O | |
| unclear O | |
| how O | |
| the O | |
| tainted O | |
| sample O | |
| is O | |
| disseminated O | |
| . O | |
| Third-party O | |
| marketplaces O | |
| or O | |
| some O | |
| other O | |
| attacker-controlled O | |
| domains O | |
| are O | |
| likely O | |
| used O | |
| to O | |
| host O | |
| the O | |
| sample O | |
| . O | |
| A O | |
| subsequent O | |
| investigation O | |
| revealed O | |
| that O | |
| the O | |
| spyware O | |
| has O | |
| the O | |
| following O | |
| capabilities O | |
| : O | |
| Records O | |
| every O | |
| phone O | |
| call O | |
| ( O | |
| literally O | |
| the O | |
| conversation O | |
| as O | |
| a O | |
| media O | |
| file O | |
| ) O | |
| , O | |
| then O | |
| sends O | |
| it O | |
| together O | |
| with O | |
| the O | |
| caller O | |
| id O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| incall3.php B-Indicator | |
| and O | |
| outcall3.php B-Indicator | |
| ) O | |
| Logs O | |
| every O | |
| incoming O | |
| SMS O | |
| message O | |
| ( O | |
| SMS O | |
| body O | |
| and O | |
| SMS O | |
| sender O | |
| ) O | |
| to O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| script3.php B-Indicator | |
| ) O | |
| Has O | |
| capability O | |
| to O | |
| hide O | |
| self O | |
| Can O | |
| send O | |
| all O | |
| call O | |
| logs O | |
| ( O | |
| “ O | |
| content B-Indicator | |
| : I-Indicator | |
| //call_log/calls I-Indicator | |
| ” O | |
| , O | |
| info O | |
| : O | |
| callname O | |
| , O | |
| callnum O | |
| , O | |
| calldate O | |
| , O | |
| calltype O | |
| , O | |
| callduration O | |
| ) O | |
| to O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| calllog.php B-Indicator | |
| ) O | |
| Whenever O | |
| the O | |
| user O | |
| snaps O | |
| a O | |
| picture O | |
| , O | |
| either O | |
| with O | |
| the O | |
| front O | |
| or O | |
| rear O | |
| camera O | |
| , O | |
| it O | |
| gets O | |
| sent O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| uppc.php B-Indicator | |
| , O | |
| fi O | |
| npic.php B-Indicator | |
| orreqpic.php B-Indicator | |
| ) O | |
| Can O | |
| send O | |
| GPS B-System | |
| coordinates O | |
| to O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| gps3.php B-Indicator | |
| ) O | |
| The O | |
| C O | |
| & O | |
| C O | |
| server O | |
| to O | |
| which O | |
| the O | |
| application O | |
| seems O | |
| to O | |
| be O | |
| sending O | |
| collected O | |
| data O | |
| appears O | |
| to O | |
| be O | |
| operational O | |
| , O | |
| as O | |
| of O | |
| this O | |
| writing O | |
| , O | |
| and O | |
| running O | |
| since O | |
| May O | |
| 2018 O | |
| . O | |
| January O | |
| 23 O | |
| , O | |
| 2017 O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| posing O | |
| as O | |
| Netflix B-System | |
| app I-System | |
| As O | |
| users O | |
| have O | |
| become O | |
| more O | |
| attached O | |
| to O | |
| their O | |
| mobile O | |
| devices O | |
| , O | |
| they O | |
| want O | |
| everything O | |
| on O | |
| those O | |
| devices O | |
| . O | |
| There O | |
| ’ O | |
| s O | |
| an O | |
| app O | |
| for O | |
| just O | |
| about O | |
| any O | |
| facet O | |
| of O | |
| one O | |
| ’ O | |
| s O | |
| personal O | |
| and O | |
| professional O | |
| life O | |
| , O | |
| from O | |
| booking O | |
| travel O | |
| and O | |
| managing O | |
| projects O | |
| , O | |
| to O | |
| buying O | |
| groceries O | |
| and O | |
| binge-watching O | |
| the O | |
| latest O | |
| Netflix B-Organization | |
| series O | |
| . O | |
| The O | |
| iOS B-System | |
| and O | |
| Android B-System | |
| apps O | |
| for O | |
| Netflix B-Organization | |
| are O | |
| enormously O | |
| popular O | |
| , O | |
| effectively O | |
| turning O | |
| a O | |
| mobile O | |
| device O | |
| into O | |
| a O | |
| television O | |
| with O | |
| which O | |
| users O | |
| can O | |
| stream O | |
| full O | |
| movies O | |
| and O | |
| TV O | |
| programs O | |
| anytime O | |
| , O | |
| anywhere O | |
| . O | |
| But O | |
| the O | |
| apps O | |
| , O | |
| with O | |
| their O | |
| many O | |
| millions O | |
| of O | |
| users O | |
| , O | |
| have O | |
| captured O | |
| the O | |
| attention O | |
| of O | |
| the O | |
| bad O | |
| actors O | |
| , O | |
| too O | |
| , O | |
| who O | |
| are O | |
| exploiting O | |
| the O | |
| popularity O | |
| of O | |
| Netflix B-Organization | |
| to O | |
| spread O | |
| malware O | |
| . O | |
| Recently O | |
| , O | |
| the O | |
| ThreatLabZ B-Organization | |
| research O | |
| team O | |
| came O | |
| across O | |
| a O | |
| fake B-System | |
| Netflix I-System | |
| app I-System | |
| , O | |
| which O | |
| turned O | |
| out O | |
| to O | |
| be O | |
| a O | |
| new O | |
| variant O | |
| of O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| ( O | |
| Remote O | |
| Access O | |
| Trojan O | |
| ) O | |
| . O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| is O | |
| capable O | |
| of O | |
| performing O | |
| a O | |
| variety O | |
| of O | |
| alarming O | |
| functions O | |
| that O | |
| includes O | |
| : O | |
| Activating O | |
| the O | |
| device O | |
| ’ O | |
| s O | |
| microphone O | |
| and O | |
| listening O | |
| to O | |
| live O | |
| conversations O | |
| Executing O | |
| commands O | |
| on O | |
| the O | |
| device O | |
| Copying O | |
| files O | |
| from O | |
| the O | |
| device O | |
| to O | |
| a O | |
| Command O | |
| & O | |
| Control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| center O | |
| Recording O | |
| screen O | |
| captures O | |
| Viewing O | |
| contacts O | |
| Reading O | |
| SMS O | |
| messages O | |
| The O | |
| screenshot O | |
| below O | |
| shows O | |
| part O | |
| of O | |
| the O | |
| sandbox O | |
| ’ O | |
| s O | |
| report O | |
| on O | |
| the O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| ’ O | |
| s O | |
| signature O | |
| and O | |
| detected O | |
| functions O | |
| : O | |
| The O | |
| fake O | |
| Netflix B-Organization | |
| app O | |
| we O | |
| are O | |
| analyzing O | |
| in O | |
| this O | |
| blog O | |
| appears O | |
| to O | |
| be O | |
| built O | |
| using O | |
| an O | |
| updated O | |
| version O | |
| of O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| builder O | |
| , O | |
| which O | |
| was O | |
| leaked O | |
| last O | |
| year O | |
| . O | |
| Technical O | |
| details O | |
| Please O | |
| note O | |
| that O | |
| our O | |
| research O | |
| is O | |
| not O | |
| about O | |
| the O | |
| legitimate O | |
| Netflix B-System | |
| app I-System | |
| on O | |
| Google B-System | |
| Play I-System | |
| . O | |
| The O | |
| spyware O | |
| in O | |
| this O | |
| analysis O | |
| was O | |
| portraying O | |
| itself O | |
| as O | |
| the O | |
| Netflix B-System | |
| app I-System | |
| . O | |
| Once O | |
| installed O | |
| , O | |
| it O | |
| displayed O | |
| the O | |
| icon O | |
| found O | |
| in O | |
| the O | |
| actual O | |
| Netflix B-System | |
| app I-System | |
| on O | |
| Google B-System | |
| Play I-System | |
| . O | |
| As O | |
| soon O | |
| as O | |
| the O | |
| user O | |
| clicks O | |
| the O | |
| spyware O | |
| ’ O | |
| s O | |
| icon O | |
| for O | |
| the O | |
| first O | |
| time O | |
| , O | |
| nothing O | |
| seems O | |
| to O | |
| happen O | |
| and O | |
| the O | |
| icon O | |
| disappears O | |
| from O | |
| the O | |
| home O | |
| screen O | |
| . O | |
| This O | |
| is O | |
| a O | |
| common O | |
| trick O | |
| played O | |
| by O | |
| malware O | |
| developers O | |
| , O | |
| making O | |
| the O | |
| user O | |
| think O | |
| the O | |
| app O | |
| may O | |
| have O | |
| been O | |
| removed O | |
| . O | |
| But O | |
| , O | |
| behind O | |
| the O | |
| scenes O | |
| , O | |
| the O | |
| malware O | |
| has O | |
| not O | |
| been O | |
| removed O | |
| ; O | |
| instead O | |
| it O | |
| starts O | |
| preparing O | |
| its O | |
| onslaught O | |
| of O | |
| attacks O | |
| . O | |
| For O | |
| contacting O | |
| C O | |
| & O | |
| C O | |
| , O | |
| the O | |
| spyware O | |
| was O | |
| found O | |
| to O | |
| be O | |
| using O | |
| free O | |
| DNS B-Indicator | |
| services O | |
| , O | |
| as O | |
| shown O | |
| in O | |
| the O | |
| screenshot O | |
| below O | |
| : O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| uses O | |
| an O | |
| unusual O | |
| trick O | |
| to O | |
| make O | |
| sure O | |
| that O | |
| it O | |
| remains O | |
| up O | |
| and O | |
| running O | |
| and O | |
| that O | |
| the O | |
| spying O | |
| does O | |
| not O | |
| stop O | |
| . O | |
| It O | |
| does O | |
| so O | |
| using O | |
| the O | |
| Services O | |
| , O | |
| Broadcast O | |
| Receivers O | |
| , O | |
| and O | |
| Activities O | |
| components O | |
| of O | |
| the O | |
| Android B-System | |
| platform O | |
| . O | |
| Services O | |
| can O | |
| perform O | |
| long-running O | |
| operations O | |
| in O | |
| the O | |
| background O | |
| and O | |
| does O | |
| not O | |
| need O | |
| a O | |
| user O | |
| interface O | |
| . O | |
| Broadcast O | |
| Receivers O | |
| are O | |
| Android B-System | |
| components O | |
| that O | |
| can O | |
| register O | |
| themselves O | |
| for O | |
| particular O | |
| events O | |
| . O | |
| Activities O | |
| are O | |
| key O | |
| building O | |
| blocks O | |
| , O | |
| central O | |
| to O | |
| an O | |
| app O | |
| ’ O | |
| s O | |
| navigation O | |
| , O | |
| for O | |
| example O | |
| . O | |
| The O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| registers O | |
| a O | |
| service O | |
| called O | |
| AutoStartup O | |
| and O | |
| a O | |
| broadcast O | |
| receiver O | |
| named O | |
| BootComplete O | |
| . O | |
| MainActivity O | |
| registers O | |
| BootComplete O | |
| with O | |
| a O | |
| boot O | |
| event O | |
| , O | |
| so O | |
| that O | |
| whenever O | |
| the O | |
| device O | |
| is O | |
| booted O | |
| , O | |
| BootComplete O | |
| gets O | |
| triggered O | |
| . O | |
| BootComplete O | |
| starts O | |
| the O | |
| AutoStartup O | |
| service O | |
| and O | |
| the O | |
| AutoStartup O | |
| service O | |
| makes O | |
| sure O | |
| that O | |
| MainActivity O | |
| is O | |
| always O | |
| running O | |
| . O | |
| What O | |
| follows O | |
| are O | |
| some O | |
| of O | |
| the O | |
| features O | |
| exhibited O | |
| by O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| . O | |
| Command O | |
| execution O | |
| Command O | |
| execution O | |
| can O | |
| create O | |
| havoc O | |
| for O | |
| victim O | |
| if O | |
| the O | |
| malware O | |
| developer O | |
| decides O | |
| to O | |
| execute O | |
| commands O | |
| in O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| device O | |
| . O | |
| Leveraging O | |
| this O | |
| feature O | |
| , O | |
| the O | |
| malware O | |
| developer O | |
| can O | |
| root O | |
| the O | |
| device O | |
| using O | |
| a O | |
| range O | |
| of O | |
| vulnerabilities O | |
| , O | |
| well-known O | |
| or O | |
| zero-day O | |
| . O | |
| The O | |
| following O | |
| screenshot O | |
| shows O | |
| the O | |
| command O | |
| execution O | |
| functionality O | |
| in O | |
| action O | |
| : O | |
| The O | |
| paramString O | |
| parameter O | |
| shown O | |
| in O | |
| the O | |
| above O | |
| screenshot O | |
| can O | |
| be O | |
| any O | |
| command O | |
| received O | |
| from O | |
| C O | |
| & O | |
| C O | |
| . O | |
| Screen O | |
| capture O | |
| and O | |
| audio O | |
| recording O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| was O | |
| able O | |
| to O | |
| take O | |
| screen O | |
| captures O | |
| and O | |
| , O | |
| using O | |
| the O | |
| device O | |
| ’ O | |
| s O | |
| microphone O | |
| , O | |
| listen O | |
| to O | |
| audio O | |
| conversations O | |
| . O | |
| This O | |
| capability O | |
| was O | |
| confirmed O | |
| when O | |
| the O | |
| Android B-System | |
| permission O | |
| , O | |
| called O | |
| android.permission.RECORD_AUDIO B-Indicator | |
| , O | |
| was O | |
| being O | |
| requested O | |
| along O | |
| with O | |
| code O | |
| found O | |
| in O | |
| the O | |
| app O | |
| . O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| captured O | |
| the O | |
| device O | |
| ’ O | |
| s O | |
| screen O | |
| activities O | |
| along O | |
| with O | |
| audio O | |
| using O | |
| the O | |
| MediaProjectionCallback O | |
| functionality O | |
| ( O | |
| available O | |
| with O | |
| Lollipop B-System | |
| , O | |
| the O | |
| Android B-System | |
| 5.0 I-System | |
| release O | |
| , O | |
| and O | |
| later O | |
| ) O | |
| and O | |
| saved O | |
| the O | |
| output O | |
| in O | |
| a O | |
| file O | |
| named O | |
| " O | |
| video.mp4 B-Indicator | |
| '' O | |
| as O | |
| shown O | |
| in O | |
| the O | |
| following O | |
| screenshot O | |
| SMS O | |
| stealing O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| was O | |
| also O | |
| observed O | |
| stealing O | |
| SMS O | |
| messages O | |
| from O | |
| the O | |
| affected O | |
| devices O | |
| , O | |
| as O | |
| shown O | |
| in O | |
| screenshot O | |
| below O | |
| : O | |
| Stealing O | |
| contacts O | |
| The O | |
| ability O | |
| to O | |
| steal O | |
| contacts O | |
| is O | |
| a O | |
| favorite O | |
| feature O | |
| for O | |
| spyware O | |
| developers O | |
| , O | |
| as O | |
| the O | |
| stolen O | |
| contacts O | |
| can O | |
| be O | |
| used O | |
| to O | |
| further O | |
| spread O | |
| the O | |
| spyware O | |
| . O | |
| The O | |
| following O | |
| screenshot O | |
| shows O | |
| the O | |
| contacts O | |
| being O | |
| stolen O | |
| and O | |
| written O | |
| in O | |
| a O | |
| local O | |
| array O | |
| , O | |
| which O | |
| is O | |
| then O | |
| sent O | |
| to O | |
| C O | |
| & O | |
| C O | |
| : O | |
| Uninstalling O | |
| apps O | |
| Uninstalling O | |
| apps O | |
| is O | |
| another O | |
| function O | |
| favored O | |
| by O | |
| developers O | |
| of O | |
| Android B-System | |
| spyware O | |
| and O | |
| malware O | |
| . O | |
| They O | |
| tend O | |
| to O | |
| target O | |
| any O | |
| antivirus O | |
| protections O | |
| on O | |
| the O | |
| device O | |
| and O | |
| uninstall O | |
| them O | |
| , O | |
| which O | |
| increases O | |
| the O | |
| possibility O | |
| of O | |
| their O | |
| malware O | |
| persisting O | |
| on O | |
| the O | |
| device O | |
| . O | |
| Following O | |
| screenshot O | |
| shows O | |
| this O | |
| functionality O | |
| in O | |
| action O | |
| : O | |
| Other O | |
| functions O | |
| In O | |
| addition O | |
| to O | |
| the O | |
| functionalities O | |
| we O | |
| ’ O | |
| ve O | |
| described O | |
| , O | |
| the O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| was O | |
| exhibiting O | |
| many O | |
| other O | |
| behaviors O | |
| that O | |
| make O | |
| it O | |
| more O | |
| robust O | |
| than O | |
| most O | |
| off-the-shelf O | |
| malware O | |
| . O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| was O | |
| designed O | |
| to O | |
| function O | |
| only O | |
| over O | |
| Wi-Fi O | |
| , O | |
| which O | |
| is O | |
| the O | |
| preferable O | |
| mode O | |
| for O | |
| Android B-System | |
| malware O | |
| to O | |
| send O | |
| files O | |
| to O | |
| C O | |
| & O | |
| C O | |
| . O | |
| The O | |
| screenshot O | |
| below O | |
| shows O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| scanning O | |
| for O | |
| Wi-Fi O | |
| and O | |
| enabling O | |
| it O | |
| if O | |
| a O | |
| known O | |
| channel O | |
| is O | |
| found O | |
| : O | |
| Additional O | |
| features O | |
| - O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| could O | |
| click O | |
| photos O | |
| using O | |
| the O | |
| device O | |
| 's O | |
| camera O | |
| , O | |
| based O | |
| on O | |
| commands O | |
| from O | |
| C O | |
| & O | |
| C O | |
| . O | |
| - O | |
| There O | |
| were O | |
| two O | |
| interesting O | |
| sub-classes O | |
| found O | |
| inside O | |
| Main O | |
| Activity O | |
| : O | |
| Receiver O | |
| and O | |
| Sender O | |
| . O | |
| Receiver O | |
| was O | |
| involved O | |
| in O | |
| receiving O | |
| commands O | |
| from O | |
| the O | |
| Server O | |
| and O | |
| the O | |
| main O | |
| functionality O | |
| of O | |
| Sender O | |
| was O | |
| to O | |
| send O | |
| all O | |
| the O | |
| data O | |
| collected O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| over O | |
| Wi-Fi O | |
| . O | |
| - O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| was O | |
| also O | |
| collecting O | |
| the O | |
| device O | |
| ’ O | |
| s O | |
| location O | |
| to O | |
| identify O | |
| the O | |
| exact O | |
| location O | |
| of O | |
| the O | |
| victim O | |
| . O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| builder O | |
| The O | |
| SpyNote B-Malware | |
| Remote O | |
| Access O | |
| Trojan O | |
| ( O | |
| RAT O | |
| ) O | |
| builder O | |
| is O | |
| gaining O | |
| popularity O | |
| in O | |
| the O | |
| hacking O | |
| community O | |
| , O | |
| so O | |
| we O | |
| decided O | |
| to O | |
| study O | |
| its O | |
| pervasiveness O | |
| . O | |
| What O | |
| we O | |
| found O | |
| were O | |
| several O | |
| other O | |
| fake O | |
| apps O | |
| developed O | |
| using O | |
| the O | |
| SpyNote B-Malware | |
| builder O | |
| , O | |
| which O | |
| should O | |
| come O | |
| as O | |
| a O | |
| warning O | |
| to O | |
| Android B-System | |
| users O | |
| . O | |
| Some O | |
| of O | |
| the O | |
| targeted O | |
| apps O | |
| were O | |
| : O | |
| Whatsapp B-System | |
| YouTube B-System | |
| Video I-System | |
| Downloader I-System | |
| Google B-System | |
| Update I-System | |
| Instagram B-System | |
| Hack B-System | |
| Wifi I-System | |
| AirDroid B-System | |
| WifiHacker B-System | |
| Facebook B-System | |
| Photoshop B-System | |
| SkyTV B-System | |
| Hotstar B-System | |
| Trump B-System | |
| Dash I-System | |
| PokemonGo B-System | |
| With O | |
| many O | |
| more O | |
| to O | |
| come O | |
| . O | |
| Furthermore O | |
| , O | |
| we O | |
| found O | |
| that O | |
| in O | |
| just O | |
| the O | |
| first O | |
| two O | |
| weeks O | |
| of O | |
| 2017 O | |
| , O | |
| there O | |
| have O | |
| been O | |
| more O | |
| than O | |
| 120 O | |
| such O | |
| spyware O | |
| variants O | |
| already O | |
| built O | |
| using O | |
| the O | |
| same O | |
| SpyNote B-Malware | |
| Trojan O | |
| builder O | |
| as O | |
| SpyNote B-Malware | |
| RAT I-Malware | |
| and O | |
| roaming O | |
| in O | |
| the O | |
| wild O | |
| . O | |
| A O | |
| complete O | |
| list O | |
| of O | |
| sample O | |
| hashes O | |
| is O | |
| available O | |
| here O | |
| . O | |
| Conclusion O | |
| The O | |
| days O | |
| when O | |
| one O | |
| needed O | |
| in-depth O | |
| coding O | |
| knowledge O | |
| to O | |
| develop O | |
| malware O | |
| are O | |
| long O | |
| gone O | |
| . O | |
| Nowadays O | |
| , O | |
| script O | |
| kiddies O | |
| can O | |
| build O | |
| a O | |
| piece O | |
| of O | |
| malware O | |
| that O | |
| can O | |
| create O | |
| real O | |
| havoc O | |
| . O | |
| Moreover O | |
| , O | |
| there O | |
| are O | |
| many O | |
| toolkits O | |
| like O | |
| the O | |
| SpyNote B-Malware | |
| Trojan O | |
| builder O | |
| that O | |
| enable O | |
| users O | |
| to O | |
| build O | |
| malware O | |
| with O | |
| ease O | |
| and O | |
| few O | |
| clicks O | |
| . O | |
| In O | |
| particular O | |
| , O | |
| avoid O | |
| side-loading O | |
| apps O | |
| from O | |
| third-party O | |
| app O | |
| stores O | |
| and O | |
| avoid O | |
| the O | |
| temptation O | |
| to O | |
| play O | |
| games O | |
| that O | |
| are O | |
| not O | |
| yet O | |
| available O | |
| on O | |
| Android B-System | |
| . O | |
| Yes O | |
| , O | |
| we O | |
| are O | |
| talking O | |
| about O | |
| SuperMarioRun B-System | |
| , O | |
| which O | |
| was O | |
| recently O | |
| launched O | |
| by O | |
| Nintendo B-Organization | |
| only O | |
| for O | |
| iOS B-System | |
| users O | |
| . O | |
| Recent O | |
| blogs O | |
| by O | |
| the O | |
| Zscaler B-Organization | |
| research O | |
| team O | |
| explain O | |
| how O | |
| some O | |
| variants O | |
| of O | |
| Android B-Malware | |
| malware O | |
| are O | |
| exploiting O | |
| the O | |
| popularity O | |
| of O | |
| this O | |
| game O | |
| and O | |
| tricking O | |
| Android B-System | |
| users O | |
| into O | |
| downloading O | |
| a O | |
| fake O | |
| version O | |
| . O | |
| ( O | |
| Have O | |
| a O | |
| look O | |
| here O | |
| and O | |
| here O | |
| . O | |
| ) O | |
| You O | |
| should O | |
| also O | |
| avoid O | |
| the O | |
| temptation O | |
| to O | |
| play O | |
| games O | |
| from O | |
| sources O | |
| other O | |
| than O | |
| legitimate O | |
| app O | |
| stores O | |
| ; O | |
| such O | |
| games O | |
| are O | |
| not O | |
| safe O | |
| and O | |
| may O | |
| bring O | |
| harm O | |
| to O | |
| your O | |
| reputation O | |
| and O | |
| your O | |
| bank O | |
| account O | |
| . O | |
| FakeSpy B-Malware | |
| Masquerades O | |
| as O | |
| Postal O | |
| Service O | |
| Apps O | |
| Around O | |
| the O | |
| World O | |
| July O | |
| 1 O | |
| , O | |
| 2020 O | |
| KEY O | |
| FINDINGS O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| is O | |
| investigating O | |
| a O | |
| new O | |
| campaign O | |
| involving O | |
| FakeSpy B-Malware | |
| , O | |
| an O | |
| Android B-System | |
| mobile O | |
| malware O | |
| that O | |
| emerged O | |
| around O | |
| October O | |
| 2017 O | |
| . O | |
| FakeSpy B-Malware | |
| is O | |
| an O | |
| information O | |
| stealer O | |
| used O | |
| to O | |
| steal O | |
| SMS O | |
| messages O | |
| , O | |
| send O | |
| SMS O | |
| messages O | |
| , O | |
| steal O | |
| financial O | |
| data O | |
| , O | |
| read O | |
| account O | |
| information O | |
| and O | |
| contact O | |
| lists O | |
| , O | |
| steal O | |
| application O | |
| data O | |
| , O | |
| and O | |
| do O | |
| much O | |
| more O | |
| . O | |
| FakeSpy B-Malware | |
| first O | |
| targeted O | |
| South O | |
| Korean O | |
| and O | |
| Japanese O | |
| speakers O | |
| . O | |
| However O | |
| , O | |
| it O | |
| has O | |
| begun O | |
| to O | |
| target O | |
| users O | |
| all O | |
| around O | |
| the O | |
| world O | |
| , O | |
| especially O | |
| users O | |
| in O | |
| countries O | |
| like O | |
| China O | |
| , O | |
| Taiwan O | |
| , O | |
| France O | |
| , O | |
| Switzerland O | |
| , O | |
| Germany O | |
| , O | |
| United O | |
| Kingdom O | |
| , O | |
| United O | |
| States O | |
| , O | |
| and O | |
| others O | |
| . O | |
| FakeSpy B-Malware | |
| masquerades O | |
| as O | |
| legitimate O | |
| postal O | |
| service O | |
| apps O | |
| and O | |
| transportation O | |
| services O | |
| in O | |
| order O | |
| to O | |
| gain O | |
| the O | |
| users O | |
| ' O | |
| trust O | |
| . O | |
| Once O | |
| installed O | |
| , O | |
| the O | |
| application O | |
| requests O | |
| permissions O | |
| so O | |
| that O | |
| it O | |
| may O | |
| control O | |
| SMS O | |
| messages O | |
| and O | |
| steal O | |
| sensitive O | |
| data O | |
| on O | |
| the O | |
| device O | |
| , O | |
| as O | |
| well O | |
| as O | |
| proliferate O | |
| to O | |
| other O | |
| devices O | |
| in O | |
| the O | |
| target O | |
| device O | |
| ’ O | |
| s O | |
| contact O | |
| list O | |
| . O | |
| Cybereason B-Organization | |
| 's O | |
| investigation O | |
| shows O | |
| that O | |
| the O | |
| threat O | |
| actor O | |
| behind O | |
| the O | |
| FakeSpy B-Malware | |
| campaign O | |
| is O | |
| a O | |
| Chinese-speaking O | |
| group O | |
| dubbed O | |
| " O | |
| Roaming B-Organization | |
| Mantis I-Organization | |
| '' O | |
| , O | |
| a I-Organization | |
| group O | |
| that O | |
| has O | |
| led O | |
| similar O | |
| campaigns O | |
| . O | |
| FakeSpy B-Malware | |
| has O | |
| been O | |
| in O | |
| the O | |
| wild O | |
| since O | |
| 2017 O | |
| ; O | |
| this O | |
| latest O | |
| campaign O | |
| indicates O | |
| that O | |
| it O | |
| has O | |
| become O | |
| more O | |
| powerful O | |
| . O | |
| Code O | |
| improvements O | |
| , O | |
| new O | |
| capabilities O | |
| , O | |
| anti-emulation O | |
| techniques O | |
| , O | |
| and O | |
| new O | |
| , O | |
| global O | |
| targets O | |
| all O | |
| suggest O | |
| that O | |
| this O | |
| malware O | |
| is O | |
| well-maintained O | |
| by O | |
| its O | |
| authors O | |
| and O | |
| continues O | |
| to O | |
| evolve O | |
| . O | |
| TABLE O | |
| OF O | |
| CONTENTS O | |
| Key O | |
| Findings O | |
| Introduction O | |
| Threat O | |
| Analysis O | |
| Fakespy B-Malware | |
| Code O | |
| Analysis O | |
| Dynamic O | |
| Library O | |
| Loading O | |
| Stealing O | |
| Sensitive O | |
| Information O | |
| Anti-Emulator O | |
| Techniques O | |
| Under O | |
| Active O | |
| Development O | |
| Who O | |
| is O | |
| Behind O | |
| Fakespy B-Malware | |
| 's O | |
| Smishing O | |
| Campaigns O | |
| ? O | |
| Conclusions O | |
| Cybereason B-Organization | |
| Mobile I-Organization | |
| Detects O | |
| and O | |
| Stops O | |
| FakeSpy B-Malware | |
| Indicators O | |
| of O | |
| Compromise O | |
| INTRODUCTION O | |
| For O | |
| the O | |
| past O | |
| several O | |
| weeks O | |
| , O | |
| Cybereason B-Organization | |
| has O | |
| been O | |
| investigating O | |
| a O | |
| new O | |
| version O | |
| of O | |
| Android B-System | |
| malware O | |
| dubbed O | |
| FakeSpy B-Malware | |
| , O | |
| which O | |
| was O | |
| first O | |
| identified O | |
| in O | |
| October O | |
| 2017 O | |
| and O | |
| reported O | |
| again O | |
| in O | |
| October O | |
| 2018 O | |
| . O | |
| A O | |
| new O | |
| campaign O | |
| is O | |
| up O | |
| and O | |
| running O | |
| using O | |
| newly O | |
| improved O | |
| , O | |
| significantly O | |
| more O | |
| powerful O | |
| malware O | |
| as O | |
| compared O | |
| to O | |
| previous O | |
| versions O | |
| . O | |
| FakeSpy B-Malware | |
| is O | |
| under O | |
| active O | |
| development O | |
| and O | |
| is O | |
| evolving O | |
| rapidly O | |
| ; O | |
| new O | |
| versions O | |
| are O | |
| released O | |
| every O | |
| week O | |
| with O | |
| additional O | |
| evasion O | |
| techniques O | |
| and O | |
| capabilities O | |
| . O | |
| Our O | |
| analysis O | |
| shows O | |
| that O | |
| the O | |
| threat O | |
| actor O | |
| behind O | |
| the O | |
| FakeSpy B-Malware | |
| malware O | |
| is O | |
| a O | |
| Chinese-speaking O | |
| group O | |
| , O | |
| commonly O | |
| referred O | |
| to O | |
| as O | |
| " O | |
| Roaming B-Organization | |
| Mantis I-Organization | |
| '' O | |
| , O | |
| a I-Organization | |
| group O | |
| that O | |
| is O | |
| known O | |
| to O | |
| have O | |
| launched O | |
| similar O | |
| campaigns O | |
| in O | |
| the O | |
| past O | |
| . O | |
| FakeSpy B-Malware | |
| is O | |
| an O | |
| information O | |
| stealer O | |
| that O | |
| exfiltrates O | |
| and O | |
| sends O | |
| SMS O | |
| messages O | |
| , O | |
| steals O | |
| financial O | |
| and O | |
| application O | |
| data O | |
| , O | |
| reads O | |
| account O | |
| information O | |
| and O | |
| contact O | |
| lists O | |
| , O | |
| and O | |
| more O | |
| . O | |
| The O | |
| malware O | |
| uses O | |
| smishing O | |
| , O | |
| or O | |
| SMS O | |
| phishing O | |
| , O | |
| to O | |
| infiltrate O | |
| target O | |
| devices O | |
| , O | |
| which O | |
| is O | |
| a O | |
| technique O | |
| that O | |
| relies O | |
| on O | |
| social O | |
| engineering O | |
| . O | |
| The O | |
| attackers O | |
| send O | |
| fake O | |
| text O | |
| messages O | |
| to O | |
| lure O | |
| the O | |
| victims O | |
| to O | |
| click O | |
| on O | |
| a O | |
| malicious O | |
| link O | |
| . O | |
| The O | |
| link O | |
| directs O | |
| them O | |
| to O | |
| a O | |
| malicious O | |
| web O | |
| page O | |
| , O | |
| which O | |
| prompts O | |
| them O | |
| to O | |
| download O | |
| an O | |
| Android O | |
| application O | |
| package O | |
| ( O | |
| APK O | |
| ) O | |
| . O | |
| This O | |
| most O | |
| recent O | |
| FakeSpy B-Malware | |
| campaign O | |
| appears O | |
| to O | |
| target O | |
| users O | |
| of O | |
| postal O | |
| services O | |
| around O | |
| the O | |
| world O | |
| . O | |
| New O | |
| versions O | |
| of O | |
| FakeSpy B-Malware | |
| masquerade O | |
| as O | |
| government O | |
| post O | |
| office O | |
| apps O | |
| and O | |
| transportation O | |
| services O | |
| apps O | |
| . O | |
| Our O | |
| analysis O | |
| indicates O | |
| that O | |
| the O | |
| threat O | |
| actors O | |
| are O | |
| no O | |
| longer O | |
| limiting O | |
| their O | |
| campaigns O | |
| to O | |
| East O | |
| Asian O | |
| countries O | |
| , O | |
| but O | |
| are O | |
| targeting O | |
| additional O | |
| countries O | |
| around O | |
| the O | |
| world O | |
| . O | |
| THREAT O | |
| ANALYSIS O | |
| Infection O | |
| Vector O | |
| : O | |
| Smishing O | |
| Your O | |
| Device O | |
| Thus O | |
| far O | |
| , O | |
| FakeSpy B-Malware | |
| campaigns O | |
| are O | |
| characterized O | |
| by O | |
| SMS O | |
| phishing O | |
| ( O | |
| a.k.a O | |
| . O | |
| smishing O | |
| ) O | |
| . O | |
| These O | |
| SMS O | |
| messages O | |
| masquerade O | |
| as O | |
| a O | |
| message O | |
| from O | |
| the O | |
| local O | |
| post O | |
| office O | |
| and O | |
| link O | |
| to O | |
| the O | |
| FakeSpy B-Malware | |
| download O | |
| . O | |
| In O | |
| a O | |
| previous O | |
| campaign O | |
| reported O | |
| by O | |
| JPCERT B-Organization | |
| , O | |
| mobile O | |
| users O | |
| were O | |
| alerted O | |
| by O | |
| phishy O | |
| messages O | |
| containing O | |
| “ O | |
| delivery O | |
| updates O | |
| ” O | |
| purportedly O | |
| from O | |
| Sagawa B-Organization | |
| Express I-Organization | |
| . O | |
| Fake O | |
| SMS O | |
| message O | |
| luring O | |
| users O | |
| to O | |
| enter O | |
| a O | |
| fake O | |
| website O | |
| , O | |
| which O | |
| contains O | |
| the O | |
| malicious O | |
| APK O | |
| ( O | |
| JPCERT B-Organization | |
| report O | |
| ) O | |
| . O | |
| Clicking O | |
| the O | |
| SMS O | |
| link O | |
| brings O | |
| the O | |
| user O | |
| to O | |
| a O | |
| fake O | |
| website O | |
| that O | |
| prompts O | |
| them O | |
| to O | |
| download O | |
| and O | |
| install O | |
| the O | |
| FakeSpy B-Malware | |
| APK O | |
| , O | |
| which O | |
| is O | |
| masquerading O | |
| as O | |
| a O | |
| local O | |
| postal O | |
| service O | |
| app O | |
| . O | |
| Targeting O | |
| Postal O | |
| and O | |
| Transportation O | |
| Services O | |
| Companies O | |
| One O | |
| of O | |
| the O | |
| most O | |
| significant O | |
| findings O | |
| is O | |
| that O | |
| new O | |
| versions O | |
| of O | |
| FakeSpy B-Malware | |
| target O | |
| not O | |
| only O | |
| Korean O | |
| and O | |
| Japanese O | |
| speakers O | |
| , O | |
| but O | |
| also O | |
| almost O | |
| any O | |
| postal O | |
| service O | |
| company O | |
| around O | |
| the O | |
| world O | |
| . O | |
| Example O | |
| of O | |
| more O | |
| recent O | |
| FakeSpy B-Malware | |
| campaigns O | |
| targeting O | |
| France O | |
| . O | |
| New O | |
| FakeSpy B-Malware | |
| campaign O | |
| applications O | |
| leveraging O | |
| fake O | |
| postal O | |
| services O | |
| apps O | |
| . O | |
| All O | |
| recent O | |
| FakeSpy B-Malware | |
| versions O | |
| contain O | |
| the O | |
| same O | |
| code O | |
| with O | |
| minor O | |
| changes O | |
| . O | |
| The O | |
| FakeSpy B-Malware | |
| malware O | |
| has O | |
| been O | |
| found O | |
| to O | |
| masquerade O | |
| as O | |
| any O | |
| of O | |
| the O | |
| following O | |
| companies O | |
| : O | |
| United B-Organization | |
| States I-Organization | |
| Postal I-Organization | |
| Service I-Organization | |
| - O | |
| An O | |
| independent O | |
| agency O | |
| of O | |
| the O | |
| executive O | |
| branch O | |
| of O | |
| the O | |
| United O | |
| States O | |
| federal O | |
| government O | |
| . O | |
| USPS B-Organization | |
| is O | |
| the O | |
| most O | |
| well-known O | |
| branch O | |
| of O | |
| the O | |
| US O | |
| government O | |
| and O | |
| provides O | |
| a O | |
| publicly O | |
| funded O | |
| postal O | |
| service O | |
| . O | |
| Royal B-Organization | |
| Mail I-Organization | |
| - O | |
| British O | |
| postal O | |
| service O | |
| and O | |
| courier O | |
| company O | |
| . O | |
| For O | |
| most O | |
| of O | |
| its O | |
| history O | |
| it O | |
| operated O | |
| as O | |
| a O | |
| government O | |
| department O | |
| or O | |
| public O | |
| corporation O | |
| . O | |
| Deutsche B-Organization | |
| Post I-Organization | |
| - O | |
| Deutsche O | |
| Post O | |
| DHL B-Organization | |
| Group I-Organization | |
| , O | |
| a O | |
| German O | |
| multinational O | |
| package O | |
| delivery O | |
| and O | |
| supply O | |
| chain O | |
| management O | |
| company O | |
| headquartered O | |
| in O | |
| Bonn O | |
| . O | |
| La B-Organization | |
| Poste I-Organization | |
| - O | |
| La O | |
| Poste O | |
| is O | |
| a O | |
| public O | |
| limited O | |
| postal O | |
| service O | |
| company O | |
| in O | |
| France O | |
| . O | |
| Japan B-Organization | |
| Post I-Organization | |
| - O | |
| A O | |
| private O | |
| Japanese O | |
| post O | |
| , O | |
| logistics O | |
| and O | |
| courier O | |
| headquartered O | |
| in O | |
| Tokyo O | |
| . O | |
| Yamato B-Organization | |
| Transport I-Organization | |
| - O | |
| One O | |
| of O | |
| Japan O | |
| 's O | |
| largest O | |
| door-to-door O | |
| delivery O | |
| service O | |
| companies O | |
| , O | |
| also O | |
| in O | |
| Tokyo O | |
| . O | |
| Chunghwa B-Organization | |
| Post I-Organization | |
| - O | |
| The O | |
| government-owned O | |
| corporation O | |
| Chunghwa B-Organization | |
| is O | |
| the O | |
| official O | |
| postal O | |
| service O | |
| of O | |
| Taiwan O | |
| . O | |
| Swiss B-Organization | |
| Post I-Organization | |
| - O | |
| The O | |
| national O | |
| postal O | |
| service O | |
| of O | |
| Switzerland O | |
| , O | |
| a O | |
| fully O | |
| state-owned O | |
| limited O | |
| company O | |
| ( O | |
| AG O | |
| ) O | |
| regulated O | |
| by O | |
| public O | |
| law O | |
| . O | |
| The O | |
| fake O | |
| applications O | |
| are O | |
| built O | |
| using O | |
| WebView B-System | |
| , O | |
| a O | |
| popular O | |
| extension O | |
| of O | |
| Android B-System | |
| ’ O | |
| s O | |
| View O | |
| class O | |
| that O | |
| lets O | |
| the O | |
| developer O | |
| show O | |
| a O | |
| webpage O | |
| . O | |
| FakeSpy B-Malware | |
| uses O | |
| this O | |
| view O | |
| to O | |
| redirect O | |
| users O | |
| to O | |
| the O | |
| original O | |
| post O | |
| office O | |
| carrier O | |
| webpage O | |
| on O | |
| launch O | |
| of O | |
| the O | |
| application O | |
| , O | |
| continuing O | |
| the O | |
| deception O | |
| . O | |
| This O | |
| allows O | |
| the O | |
| application O | |
| to O | |
| appear O | |
| legitimate O | |
| , O | |
| especially O | |
| given O | |
| these O | |
| applications O | |
| icons O | |
| and O | |
| user O | |
| interface O | |
| . O | |
| New O | |
| FakeSpy B-Malware | |
| applications O | |
| masquerading O | |
| as O | |
| post O | |
| office O | |
| apps O | |
| . O | |
| FAKESPY B-Malware | |
| CODE O | |
| ANALYSIS O | |
| Once O | |
| the O | |
| user O | |
| clicks O | |
| on O | |
| the O | |
| malicious O | |
| link O | |
| from O | |
| the O | |
| SMS O | |
| message O | |
| , O | |
| the O | |
| app O | |
| asks O | |
| them O | |
| to O | |
| approve O | |
| installation O | |
| from O | |
| unknown O | |
| resources O | |
| . O | |
| This O | |
| configuration O | |
| can O | |
| be O | |
| toggled O | |
| on O | |
| by O | |
| going O | |
| to O | |
| ‘ O | |
| Settings O | |
| ’ O | |
| - O | |
| > O | |
| ‘ O | |
| Security O | |
| ’ O | |
| - O | |
| > O | |
| ‘ O | |
| Unknown O | |
| Resources O | |
| ’ O | |
| . O | |
| PackageInstaller O | |
| shows O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| permission O | |
| access O | |
| and O | |
| asks O | |
| for O | |
| the O | |
| user O | |
| 's O | |
| approval O | |
| , O | |
| which O | |
| then O | |
| installs O | |
| the O | |
| application O | |
| . O | |
| This O | |
| analysis O | |
| dissects O | |
| FakeSpy B-Malware | |
| ’ O | |
| s O | |
| Chunghwa O | |
| Post O | |
| app O | |
| version O | |
| , O | |
| which O | |
| emerged O | |
| in O | |
| April O | |
| 2020 O | |
| . O | |
| During O | |
| the O | |
| installation O | |
| , O | |
| the O | |
| malware O | |
| asks O | |
| for O | |
| the O | |
| following O | |
| permissions O | |
| : O | |
| READ_PHONE_STATE O | |
| - O | |
| Allows O | |
| read-only O | |
| access O | |
| to O | |
| the O | |
| phone O | |
| state O | |
| , O | |
| including O | |
| the O | |
| current O | |
| cellular O | |
| network O | |
| information O | |
| , O | |
| the O | |
| status O | |
| of O | |
| any O | |
| ongoing O | |
| calls O | |
| , O | |
| and O | |
| a O | |
| list O | |
| of O | |
| any O | |
| PhoneAccounts O | |
| registered O | |
| on O | |
| the O | |
| device O | |
| . O | |
| READ_SMS O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| read O | |
| text O | |
| messages O | |
| . O | |
| RECEIVE_SMS O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| receive O | |
| SMS O | |
| messages O | |
| . O | |
| WRITE_SMS O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| write O | |
| to O | |
| SMS O | |
| messages O | |
| stored O | |
| on O | |
| the O | |
| device O | |
| or O | |
| SIM O | |
| card O | |
| , O | |
| including O | |
| y O | |
| deleting O | |
| messages O | |
| . O | |
| SEND_SMS O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| send O | |
| SMS O | |
| messages O | |
| . O | |
| INTERNET O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| open O | |
| network O | |
| sockets O | |
| . O | |
| WRITE_EXTERNAL_STORAGE O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| write O | |
| to O | |
| external O | |
| storage O | |
| . O | |
| READ_EXTERNAL_STORAGE O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| read O | |
| from O | |
| external O | |
| storage O | |
| . O | |
| RECEIVE_BOOT_COMPLETED O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| receive O | |
| a O | |
| broadcast O | |
| after O | |
| the O | |
| system O | |
| finishes O | |
| booting O | |
| . O | |
| GET_TASKS O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| get O | |
| information O | |
| about O | |
| current O | |
| or O | |
| recently O | |
| run O | |
| tasks O | |
| . O | |
| ( O | |
| deprecated O | |
| in O | |
| API O | |
| level O | |
| 21 O | |
| ) O | |
| SYSTEM_ALERT_WINDOW O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| create O | |
| windows O | |
| shown O | |
| on O | |
| top O | |
| of O | |
| all O | |
| other O | |
| apps O | |
| . O | |
| WAKE_LOCK O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| use O | |
| PowerManager O | |
| WakeLocks O | |
| to O | |
| keep O | |
| the O | |
| processor O | |
| from O | |
| sleeping O | |
| or O | |
| the O | |
| screen O | |
| from O | |
| dimming O | |
| . O | |
| ACCESS_NETWORK_STATE O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| access O | |
| information O | |
| about O | |
| networks O | |
| . O | |
| REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O | |
| - O | |
| Whitelists O | |
| the O | |
| application O | |
| to O | |
| allow O | |
| it O | |
| to O | |
| ignore O | |
| battery O | |
| optimizations O | |
| . O | |
| READ_CONTACTS O | |
| - O | |
| Allows O | |
| the O | |
| application O | |
| to O | |
| read O | |
| the O | |
| user O | |
| 's O | |
| contacts O | |
| data O | |
| . O | |
| FakeSpy B-Malware | |
| package O | |
| permissions O | |
| . O | |
| On O | |
| opening O | |
| the O | |
| app O | |
| , O | |
| two O | |
| pop-up O | |
| messages O | |
| appear O | |
| on O | |
| screen O | |
| : O | |
| Change O | |
| SMS O | |
| App O | |
| : O | |
| This O | |
| sets O | |
| permissions O | |
| to O | |
| intercept O | |
| every O | |
| SMS O | |
| received O | |
| on O | |
| the O | |
| device O | |
| and O | |
| send O | |
| a O | |
| copy O | |
| of O | |
| these O | |
| messages O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| . O | |
| Ignore O | |
| Battery O | |
| Optimization O | |
| : O | |
| This O | |
| sets O | |
| permissions O | |
| to O | |
| continue O | |
| to O | |
| operate O | |
| at O | |
| full O | |
| capacity O | |
| while O | |
| the O | |
| phone O | |
| 's O | |
| screen O | |
| is O | |
| turned O | |
| off O | |
| and O | |
| the O | |
| phone O | |
| locked O | |
| . O | |
| These O | |
| requests O | |
| rely O | |
| on O | |
| the O | |
| end O | |
| user O | |
| accepting O | |
| the O | |
| permission O | |
| changes O | |
| and O | |
| points O | |
| to O | |
| the O | |
| importance O | |
| of O | |
| healthy O | |
| skepticism O | |
| when O | |
| giving O | |
| applications O | |
| permissions O | |
| . O | |
| FakeSpy B-Malware | |
| Chunghwa B-Organization | |
| Post I-Organization | |
| version O | |
| installation O | |
| process O | |
| and O | |
| application O | |
| UI O | |
| . O | |
| DYNAMIC O | |
| LIBRARY O | |
| LOADING O | |
| Once O | |
| the O | |
| application O | |
| has O | |
| finished O | |
| the O | |
| installation O | |
| process O | |
| , O | |
| the O | |
| malware O | |
| starts O | |
| its O | |
| real O | |
| malicious O | |
| activity O | |
| . O | |
| The O | |
| malicious O | |
| application O | |
| da.hao.pao.bin B-Indicator | |
| ( O | |
| Chunghwa B-Organization | |
| Post I-Organization | |
| ) O | |
| loads O | |
| a O | |
| library O | |
| file O | |
| libmsy.so B-Indicator | |
| used O | |
| to O | |
| execute O | |
| the O | |
| packed O | |
| mycode.jar B-Indicator | |
| file I-Indicator | |
| . O | |
| The O | |
| JAR O | |
| file O | |
| is O | |
| the O | |
| decrypted O | |
| version O | |
| of O | |
| the O | |
| file O | |
| tong.luo B-Indicator | |
| , O | |
| which O | |
| is O | |
| located O | |
| in O | |
| the O | |
| assets O | |
| folder O | |
| . O | |
| Decompiled O | |
| APK O | |
| resources O | |
| . O | |
| By O | |
| comparing O | |
| the O | |
| sizes O | |
| of O | |
| the O | |
| encrypted O | |
| asset O | |
| file O | |
| tong.luo B-Indicator | |
| vs O | |
| the O | |
| decrypted O | |
| JAR O | |
| file O | |
| mycode.jar B-Indicator | |
| , O | |
| it O | |
| is O | |
| interesting O | |
| to O | |
| note O | |
| that O | |
| it O | |
| is O | |
| the O | |
| same O | |
| file O | |
| ( O | |
| almost O | |
| the O | |
| same O | |
| size O | |
| ) O | |
| . O | |
| Comparing O | |
| encrypted O | |
| vs O | |
| decrypted O | |
| asset O | |
| file O | |
| . O | |
| After O | |
| libmsy.so B-Indicator | |
| decrypts O | |
| the O | |
| asset O | |
| file O | |
| tong.luo B-Indicator | |
| , O | |
| it O | |
| loads O | |
| mycode.jar B-Indicator | |
| dynamically O | |
| into O | |
| FakeSpy B-Malware | |
| ’ O | |
| s O | |
| process O | |
| , O | |
| as O | |
| is O | |
| shown O | |
| from O | |
| the O | |
| output O | |
| of O | |
| the O | |
| “ O | |
| adb O | |
| logcat O | |
| ” O | |
| command O | |
| . O | |
| Logcat O | |
| logs O | |
| show O | |
| FakeSpy B-Malware | |
| uses O | |
| libmsy.so B-Indicator | |
| to O | |
| execute O | |
| the O | |
| malicious O | |
| packed O | |
| mycode.jar B-Indicator | |
| file I-Indicator | |
| . O | |
| By O | |
| analyzing O | |
| running O | |
| processes O | |
| on O | |
| the O | |
| infected O | |
| device O | |
| , O | |
| it O | |
| shows O | |
| that O | |
| the O | |
| malware O | |
| creates O | |
| a O | |
| child O | |
| process O | |
| of O | |
| itself O | |
| to O | |
| perform O | |
| the O | |
| multi-process O | |
| ptrace O | |
| anti-debugging O | |
| technique O | |
| . O | |
| FakeSpy B-Malware | |
| uses O | |
| an O | |
| anti-debugging O | |
| technique O | |
| by O | |
| creating O | |
| another O | |
| child O | |
| process O | |
| of O | |
| itself O | |
| . O | |
| By O | |
| performing O | |
| a O | |
| deep O | |
| analysis O | |
| of O | |
| the O | |
| malware O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| extract O | |
| the O | |
| unpacked O | |
| JAR O | |
| file O | |
| mycode.jar B-Indicator | |
| and O | |
| reveal O | |
| some O | |
| very O | |
| interesting O | |
| code O | |
| . O | |
| STEALING O | |
| SENSITIVE O | |
| INFORMATION O | |
| FakeSpy B-Malware | |
| has O | |
| multiple O | |
| built O | |
| in O | |
| information O | |
| stealing O | |
| capabilities O | |
| . O | |
| The O | |
| first O | |
| function O | |
| is O | |
| used O | |
| for O | |
| contact O | |
| information O | |
| stealing O | |
| : O | |
| the O | |
| function O | |
| upCon O | |
| steals O | |
| all O | |
| contacts O | |
| in O | |
| the O | |
| contact O | |
| list O | |
| and O | |
| their O | |
| information O | |
| . O | |
| Then O | |
| , O | |
| it O | |
| sends O | |
| it O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| using O | |
| the O | |
| URL O | |
| that O | |
| ends O | |
| with O | |
| /servlet/ContactUpload B-Indicator | |
| . O | |
| The O | |
| stolen O | |
| data O | |
| fields O | |
| are O | |
| : O | |
| Mobile O | |
| - O | |
| The O | |
| infected O | |
| device O | |
| phone O | |
| number O | |
| and O | |
| contact O | |
| ’ O | |
| s O | |
| phone O | |
| number O | |
| Contacts O | |
| - O | |
| A O | |
| headline O | |
| used O | |
| for O | |
| the O | |
| attacker O | |
| to O | |
| distinguish O | |
| between O | |
| the O | |
| type O | |
| of O | |
| stolen O | |
| information O | |
| he O | |
| gets O | |
| Name O | |
| - O | |
| Contact O | |
| ’ O | |
| s O | |
| full O | |
| name O | |
| ( O | |
| Display O | |
| name O | |
| ) O | |
| upCon O | |
| ( O | |
| upload O | |
| contact O | |
| ) O | |
| function O | |
| used O | |
| for O | |
| stealing O | |
| contact O | |
| list O | |
| information O | |
| . O | |
| For O | |
| testing O | |
| purposes O | |
| we O | |
| inserted O | |
| a O | |
| fake O | |
| contacts O | |
| list O | |
| to O | |
| our O | |
| Android B-System | |
| Emulator O | |
| and O | |
| observed O | |
| resultant O | |
| behavior O | |
| . O | |
| Exfiltrated O | |
| contact O | |
| list O | |
| data O | |
| sent O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| . O | |
| The O | |
| second O | |
| stealing O | |
| function O | |
| is O | |
| the O | |
| onStartCommand O | |
| , O | |
| which O | |
| steals O | |
| infected O | |
| device O | |
| data O | |
| and O | |
| additional O | |
| information O | |
| . O | |
| The O | |
| stolen O | |
| data O | |
| is O | |
| sent O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| using O | |
| the O | |
| URL O | |
| ending O | |
| with O | |
| /servlet/xx B-Indicator | |
| . O | |
| The O | |
| stolen O | |
| data O | |
| fields O | |
| are O | |
| : O | |
| Mobile O | |
| - O | |
| The O | |
| infected O | |
| device O | |
| phone O | |
| number O | |
| Machine O | |
| - O | |
| The O | |
| device O | |
| model O | |
| ( O | |
| in O | |
| our O | |
| example O | |
| : O | |
| Google B-System | |
| Pixel I-System | |
| 2 I-System | |
| ) O | |
| Sversion O | |
| - O | |
| The O | |
| OS O | |
| version O | |
| Bank O | |
| - O | |
| Checks O | |
| if O | |
| there O | |
| are O | |
| any O | |
| banking-related O | |
| or O | |
| cryptocurrency O | |
| trading O | |
| apps O | |
| Provider O | |
| - O | |
| The O | |
| telecommunication O | |
| provider O | |
| ( O | |
| IMSI O | |
| value O | |
| in O | |
| device O | |
| settings O | |
| ) O | |
| npki O | |
| - O | |
| Checks O | |
| if O | |
| the O | |
| folder O | |
| named O | |
| NPKI O | |
| ( O | |
| National O | |
| Public O | |
| Key O | |
| Infrastructure O | |
| ) O | |
| might O | |
| contain O | |
| authentication O | |
| certificates O | |
| related O | |
| to O | |
| financial O | |
| transactions O | |
| onStartCommand O | |
| function O | |
| for O | |
| stealing O | |
| device O | |
| information O | |
| and O | |
| additional O | |
| sensitive O | |
| data O | |
| . O | |
| Exfiltrated O | |
| device O | |
| information O | |
| and O | |
| additional O | |
| sensitive O | |
| data O | |
| sent O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| . O | |
| FakeSpy B-Malware | |
| asks O | |
| to O | |
| be O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| because O | |
| it O | |
| uses O | |
| the O | |
| function O | |
| onReceive O | |
| to O | |
| intercept O | |
| incoming O | |
| SMS O | |
| messages O | |
| . O | |
| It O | |
| saves O | |
| the O | |
| messages O | |
| ’ O | |
| metadata O | |
| and O | |
| content O | |
| , O | |
| filters O | |
| the O | |
| information O | |
| by O | |
| fields O | |
| , O | |
| and O | |
| sends O | |
| them O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| using O | |
| the O | |
| URL O | |
| /servlet/SendMassage2 B-Indicator | |
| . O | |
| The O | |
| fields O | |
| it O | |
| collects O | |
| are O | |
| : O | |
| Mobile O | |
| - O | |
| The O | |
| phone O | |
| number O | |
| which O | |
| sent O | |
| the O | |
| SMS O | |
| Content O | |
| - O | |
| The O | |
| message O | |
| body O | |
| Sender O | |
| - O | |
| The O | |
| contact O | |
| name O | |
| who O | |
| sent O | |
| the O | |
| message O | |
| Time O | |
| - O | |
| The O | |
| time O | |
| the O | |
| message O | |
| was O | |
| received O | |
| onReceive O | |
| function O | |
| used O | |
| to O | |
| intercept O | |
| incoming O | |
| SMS O | |
| messages O | |
| . O | |
| The O | |
| malware O | |
| uses O | |
| the O | |
| function O | |
| sendAll O | |
| to O | |
| send O | |
| messages O | |
| that O | |
| spread O | |
| the O | |
| malware O | |
| to O | |
| other O | |
| devices O | |
| . O | |
| It O | |
| sends O | |
| a O | |
| smishing O | |
| message O | |
| to O | |
| the O | |
| entire O | |
| contact O | |
| list O | |
| of O | |
| the O | |
| infected O | |
| device O | |
| along O | |
| with O | |
| the O | |
| malicious O | |
| link O | |
| to O | |
| the O | |
| FakeSpy B-Malware | |
| installation O | |
| page O | |
| . O | |
| sendAll O | |
| function O | |
| used O | |
| to O | |
| spread O | |
| malicious O | |
| messages O | |
| to O | |
| the O | |
| contact O | |
| list O | |
| . O | |
| Another O | |
| interesting O | |
| feature O | |
| in O | |
| FakeSpy B-Malware | |
| ’ O | |
| s O | |
| code O | |
| is O | |
| the O | |
| collection O | |
| of O | |
| the O | |
| device O | |
| 's O | |
| IMEI O | |
| ( O | |
| International O | |
| Mobile O | |
| Station O | |
| Equipment O | |
| Identity O | |
| ) O | |
| number O | |
| and O | |
| all O | |
| installed O | |
| applications O | |
| using O | |
| the O | |
| function O | |
| upAppinfos O | |
| . O | |
| It O | |
| sends O | |
| all O | |
| of O | |
| this O | |
| data O | |
| to O | |
| the O | |
| C2 O | |
| server O | |
| using O | |
| the O | |
| URL O | |
| ending O | |
| with O | |
| /servlet/AppInfos B-Indicator | |
| . O | |
| upAppinfos O | |
| function O | |
| used O | |
| for O | |
| obtaining O | |
| the O | |
| device O | |
| IMEI O | |
| and O | |
| all O | |
| of O | |
| its O | |
| installed O | |
| applications O | |
| . O | |
| FakeSpy B-Malware | |
| is O | |
| able O | |
| to O | |
| check O | |
| the O | |
| network O | |
| connectivity O | |
| status O | |
| by O | |
| using O | |
| the O | |
| function O | |
| isNetworkAvailable O | |
| . O | |
| What O | |
| makes O | |
| this O | |
| function O | |
| more O | |
| suspicious O | |
| is O | |
| the O | |
| two O | |
| strings O | |
| written O | |
| in O | |
| Chinese O | |
| characters O | |
| : O | |
| ===状态=== O | |
| ( O | |
| ===Status=== O | |
| ) O | |
| - O | |
| Checks O | |
| whether O | |
| the O | |
| device O | |
| is O | |
| connected O | |
| to O | |
| a O | |
| network O | |
| ===类型=== O | |
| ( O | |
| ===Type=== O | |
| ) O | |
| - O | |
| Checks O | |
| whether O | |
| the O | |
| device O | |
| sees O | |
| available O | |
| nearby O | |
| Wifi O | |
| networks O | |
| isNetworkAvailable O | |
| function O | |
| used O | |
| for O | |
| monitoring O | |
| network O | |
| connectivity O | |
| status O | |
| . O | |
| ANTI-EMULATOR O | |
| TECHNIQUES O | |
| FakeSpy B-Malware | |
| appears O | |
| to O | |
| use O | |
| multiple O | |
| techniques O | |
| to O | |
| evade O | |
| detection O | |
| via O | |
| the O | |
| emulator O | |
| . O | |
| It O | |
| shows O | |
| that O | |
| the O | |
| malware O | |
| can O | |
| detect O | |
| whether O | |
| it O | |
| ’ O | |
| s O | |
| running O | |
| in O | |
| an O | |
| emulated O | |
| environment O | |
| or O | |
| a O | |
| real O | |
| mobile O | |
| device O | |
| , O | |
| and O | |
| can O | |
| change O | |
| its O | |
| code O | |
| pattern O | |
| accordingly O | |
| . O | |
| The O | |
| first O | |
| example O | |
| of O | |
| this O | |
| is O | |
| in O | |
| the O | |
| onStart O | |
| function O | |
| , O | |
| where O | |
| the O | |
| malware O | |
| looks O | |
| for O | |
| the O | |
| string O | |
| “ O | |
| Emulator O | |
| ” O | |
| and O | |
| a O | |
| x86 O | |
| processor O | |
| model O | |
| . O | |
| Anti-emulator O | |
| code O | |
| . O | |
| In O | |
| order O | |
| to O | |
| simulate O | |
| this O | |
| technique O | |
| , O | |
| we O | |
| took O | |
| two O | |
| videos O | |
| side O | |
| by O | |
| side O | |
| of O | |
| how O | |
| FakeSpy B-Malware | |
| ( O | |
| the O | |
| Royal B-Organization | |
| Mail I-Organization | |
| sample O | |
| ) O | |
| behaves O | |
| differently O | |
| on O | |
| a O | |
| physical O | |
| device O | |
| versus O | |
| an O | |
| emulator O | |
| . O | |
| FakeSpy B-Malware | |
| behavior O | |
| on O | |
| physical O | |
| device O | |
| vs O | |
| emulator O | |
| ( O | |
| anti-emulator O | |
| ) O | |
| . O | |
| This O | |
| simulation O | |
| shows O | |
| that O | |
| FakeSpy B-Malware | |
| behaves O | |
| differently O | |
| on O | |
| a O | |
| physical O | |
| device O | |
| versus O | |
| an O | |
| emulator O | |
| . O | |
| When O | |
| executed O | |
| the O | |
| second O | |
| time O | |
| by O | |
| clicking O | |
| on O | |
| the O | |
| app O | |
| on O | |
| the O | |
| physical O | |
| device O | |
| , O | |
| FakeSpy B-Malware | |
| redirects O | |
| to O | |
| the O | |
| app O | |
| settings O | |
| . O | |
| In O | |
| contrast O | |
| , O | |
| on O | |
| the O | |
| emulator O | |
| , O | |
| a O | |
| toast O | |
| message O | |
| is O | |
| displayed O | |
| that O | |
| shows O | |
| “ O | |
| Install O | |
| completed O | |
| ” O | |
| , O | |
| at O | |
| which O | |
| point O | |
| FakeSpy B-Malware | |
| removes O | |
| its O | |
| shortcut O | |
| from O | |
| the O | |
| device O | |
| 's O | |
| homescreen O | |
| . O | |
| Another O | |
| example O | |
| of O | |
| FakeSpy B-Malware | |
| ’ O | |
| s O | |
| anti-emulation O | |
| techniques O | |
| is O | |
| how O | |
| it O | |
| uses O | |
| the O | |
| getMachine O | |
| function O | |
| , O | |
| which O | |
| uses O | |
| the O | |
| TelephonyManager O | |
| class O | |
| to O | |
| check O | |
| for O | |
| the O | |
| deviceID O | |
| , O | |
| phone O | |
| number O | |
| , O | |
| IMEI O | |
| , O | |
| and O | |
| IMSI O | |
| . O | |
| Some O | |
| emulators O | |
| build O | |
| their O | |
| phone O | |
| number O | |
| out O | |
| of O | |
| the O | |
| default O | |
| number O | |
| created O | |
| in O | |
| the O | |
| emulator O | |
| software O | |
| and O | |
| the O | |
| port B-Indicator | |
| number I-Indicator | |
| : I-Indicator | |
| 5554. I-Indicator | |
| getMachine O | |
| function O | |
| using O | |
| anti-emulator O | |
| technique O | |
| . O | |
| UNDER O | |
| ACTIVE O | |
| DEVELOPMENT O | |
| An O | |
| analysis O | |
| of O | |
| new O | |
| FakeSpy B-Malware | |
| samples O | |
| to O | |
| old O | |
| ones O | |
| showed O | |
| code O | |
| discrepancies O | |
| and O | |
| new O | |
| features O | |
| . O | |
| These O | |
| artifacts O | |
| indicate O | |
| that O | |
| FakeSpy B-Malware | |
| 's O | |
| campaign O | |
| is O | |
| still O | |
| live O | |
| and O | |
| under O | |
| development O | |
| . O | |
| The O | |
| newer O | |
| version O | |
| of O | |
| FakeSpy B-Malware | |
| uses O | |
| new O | |
| URL O | |
| addresses O | |
| for O | |
| malicious O | |
| communication O | |
| with O | |
| FakeSpy B-Malware | |
| . O | |
| The O | |
| function O | |
| main O | |
| uses O | |
| a O | |
| DES O | |
| encryption O | |
| algorithm O | |
| to O | |
| encode O | |
| these O | |
| addresses O | |
| . O | |
| The O | |
| examples O | |
| below O | |
| show O | |
| the O | |
| plaintext O | |
| key O | |
| “ O | |
| TEST O | |
| ” O | |
| to O | |
| decrypt O | |
| encoded O | |
| hexadecimal O | |
| strings O | |
| ( O | |
| jUtils.decrypt O | |
| ( O | |
| ) O | |
| ) O | |
| . O | |
| These O | |
| encoded O | |
| strings O | |
| contain O | |
| the O | |
| new O | |
| URL O | |
| addresses O | |
| not O | |
| seen O | |
| in O | |
| older O | |
| versions O | |
| of O | |
| FakeSpy B-Malware | |
| . O | |
| Comparing O | |
| strings O | |
| from O | |
| an O | |
| old O | |
| FakeSpy B-Malware | |
| sample O | |
| to O | |
| a O | |
| new O | |
| one O | |
| . O | |
| WHO O | |
| IS O | |
| BEHIND O | |
| FAKESPY B-Malware | |
| ’ O | |
| S O | |
| SMISHING O | |
| CAMPAIGNS O | |
| ? O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| suspects O | |
| that O | |
| the O | |
| malware O | |
| operators O | |
| and O | |
| authors O | |
| are O | |
| Chinese O | |
| speakers O | |
| . O | |
| Our O | |
| findings O | |
| , O | |
| along O | |
| with O | |
| previous O | |
| research O | |
| , O | |
| indicates O | |
| that O | |
| the O | |
| threat O | |
| actor O | |
| behind O | |
| these O | |
| recent O | |
| campaigns O | |
| is O | |
| likely O | |
| a O | |
| Chinese O | |
| group O | |
| dubbed O | |
| “ O | |
| Roaming B-Organization | |
| Mantis I-Organization | |
| ” O | |
| . O | |
| Roaming B-Organization | |
| Mantis I-Organization | |
| is O | |
| believed O | |
| to O | |
| be O | |
| a O | |
| Chinese O | |
| threat O | |
| actor O | |
| group O | |
| first O | |
| discovered O | |
| in O | |
| April O | |
| 2018 O | |
| that O | |
| has O | |
| continuously O | |
| evolved O | |
| . O | |
| In O | |
| the O | |
| beginning O | |
| , O | |
| this O | |
| threat O | |
| group O | |
| mainly O | |
| targeted O | |
| Asian O | |
| countries O | |
| . O | |
| Now O | |
| , O | |
| they O | |
| are O | |
| expanding O | |
| their O | |
| activity O | |
| to O | |
| audiences O | |
| all O | |
| around O | |
| the O | |
| world O | |
| . O | |
| As O | |
| part O | |
| of O | |
| their O | |
| activities O | |
| , O | |
| they O | |
| are O | |
| known O | |
| for O | |
| hijacking O | |
| DNS O | |
| settings O | |
| on O | |
| Japanese O | |
| routers O | |
| that O | |
| redirect O | |
| users O | |
| to O | |
| malicious O | |
| IP O | |
| addresses O | |
| , O | |
| creating O | |
| disguised O | |
| malicious O | |
| Android B-System | |
| apps O | |
| that O | |
| appear O | |
| as O | |
| popular O | |
| apps O | |
| , O | |
| stealing O | |
| Apple B-Organization | |
| ID O | |
| credentials O | |
| by O | |
| creating O | |
| Apple B-Organization | |
| phishing O | |
| pages O | |
| , O | |
| as O | |
| well O | |
| as O | |
| performing O | |
| web O | |
| crypto O | |
| mining O | |
| on O | |
| browsers O | |
| . O | |
| CONNECTION O | |
| TO O | |
| CHINA O | |
| Chinese O | |
| server O | |
| infrastructure O | |
| : O | |
| FakeSpy B-Malware | |
| applications O | |
| send O | |
| stolen O | |
| information O | |
| to O | |
| C2 O | |
| domains O | |
| with O | |
| .club B-Indicator | |
| TLDs I-Indicator | |
| and O | |
| URLs O | |
| ending O | |
| with O | |
| /servlet/ B-Indicator | |
| [ I-Indicator | |
| C2 I-Indicator | |
| Command I-Indicator | |
| ] I-Indicator | |
| ( O | |
| mentioned O | |
| above O | |
| in O | |
| the O | |
| “ O | |
| Stealing O | |
| Sensitive O | |
| Information O | |
| ” O | |
| section O | |
| ) O | |
| . O | |
| All O | |
| of O | |
| these O | |
| domains O | |
| are O | |
| registered O | |
| to O | |
| ‘ O | |
| Li O | |
| Jun O | |
| Biao O | |
| ’ O | |
| on O | |
| Bizcn B-Organization | |
| , I-Organization | |
| Inc I-Organization | |
| , O | |
| a O | |
| Chinese O | |
| Internet O | |
| application O | |
| service O | |
| provider O | |
| . O | |
| Chinese O | |
| language O | |
| traces O | |
| in O | |
| the O | |
| code O | |
| : O | |
| During O | |
| the O | |
| investigation O | |
| , O | |
| the O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| discovered O | |
| code O | |
| artifacts O | |
| that O | |
| may O | |
| indicate O | |
| Chinese O | |
| threat O | |
| actors O | |
| . O | |
| For O | |
| example O | |
| , O | |
| we O | |
| found O | |
| several O | |
| suspicious O | |
| strings O | |
| written O | |
| in O | |
| the O | |
| Chinese O | |
| language O | |
| in O | |
| a O | |
| function O | |
| called O | |
| isNetworkAvailable O | |
| , O | |
| previously O | |
| discussed O | |
| in O | |
| this O | |
| blog O | |
| : O | |
| An O | |
| almost O | |
| identical O | |
| function O | |
| is O | |
| mentioned O | |
| in O | |
| an O | |
| earlier O | |
| research O | |
| , O | |
| that O | |
| ties O | |
| FakeSpy B-Malware | |
| and O | |
| other O | |
| malware O | |
| to O | |
| the O | |
| Roaming B-Organization | |
| Mantis I-Organization | |
| group O | |
| . O | |
| Chinese O | |
| APK O | |
| names O | |
| : O | |
| Some O | |
| of O | |
| FakeSpy B-Malware | |
| ’ O | |
| s O | |
| APK O | |
| package O | |
| names O | |
| contain O | |
| anglicized O | |
| Chinese O | |
| ( O | |
| Mandarin O | |
| ) O | |
| words O | |
| that O | |
| might O | |
| be O | |
| related O | |
| to O | |
| Chinese O | |
| songs O | |
| and O | |
| lyrics O | |
| , O | |
| food O | |
| , O | |
| provinces O | |
| , O | |
| etc O | |
| . O | |
| CONCLUSIONS O | |
| FakeSpy B-Malware | |
| was O | |
| first O | |
| seen O | |
| in O | |
| October O | |
| 2017 O | |
| and O | |
| until O | |
| recently O | |
| mainly O | |
| targeted O | |
| East O | |
| Asian O | |
| countries O | |
| . O | |
| Our O | |
| research O | |
| shows O | |
| fresh O | |
| developments O | |
| in O | |
| the O | |
| malware O | |
| ’ O | |
| s O | |
| code O | |
| and O | |
| sophistication O | |
| , O | |
| as O | |
| well O | |
| as O | |
| an O | |
| expansion O | |
| to O | |
| target O | |
| Europe O | |
| and O | |
| North O | |
| America O | |
| . O | |
| This O | |
| mobile O | |
| malware O | |
| masquerades O | |
| as O | |
| legitimate O | |
| , O | |
| trusted O | |
| postal O | |
| service O | |
| applications O | |
| so O | |
| that O | |
| it O | |
| can O | |
| gain O | |
| the O | |
| users O | |
| trust O | |
| . O | |
| Once O | |
| it O | |
| has O | |
| been O | |
| installed O | |
| , O | |
| it O | |
| requests O | |
| permissions O | |
| from O | |
| the O | |
| user O | |
| so O | |
| that O | |
| it O | |
| can O | |
| steal O | |
| sensitive O | |
| data O | |
| , O | |
| manipulate O | |
| SMS O | |
| messages O | |
| , O | |
| and O | |
| potentially O | |
| infect O | |
| contacts O | |
| of O | |
| the O | |
| user O | |
| . O | |
| The O | |
| malware O | |
| now O | |
| targets O | |
| more O | |
| countries O | |
| all O | |
| over O | |
| the O | |
| world O | |
| by O | |
| masquerading O | |
| as O | |
| official O | |
| post O | |
| office O | |
| and O | |
| transportation O | |
| services O | |
| apps O | |
| . O | |
| These O | |
| apps O | |
| appear O | |
| legitimate O | |
| due O | |
| to O | |
| their O | |
| app O | |
| logo O | |
| , O | |
| UI O | |
| appearance O | |
| , O | |
| and O | |
| redirects O | |
| to O | |
| the O | |
| carrier O | |
| webpage O | |
| -- O | |
| all O | |
| luring O | |
| end O | |
| users O | |
| to O | |
| believe O | |
| it O | |
| ’ O | |
| s O | |
| the O | |
| original O | |
| one O | |
| . O | |
| In O | |
| this O | |
| blog O | |
| , O | |
| we O | |
| showed O | |
| that O | |
| the O | |
| threat O | |
| actor O | |
| behind O | |
| the O | |
| recent O | |
| FakeSpy B-Malware | |
| campaign O | |
| is O | |
| a O | |
| Chinese-speaking O | |
| group O | |
| called O | |
| “ O | |
| Roaming B-Organization | |
| Mantis I-Organization | |
| ” O | |
| known O | |
| to O | |
| operate O | |
| mainly O | |
| in O | |
| Asia O | |
| . O | |
| It O | |
| is O | |
| interesting O | |
| to O | |
| see O | |
| that O | |
| the O | |
| group O | |
| has O | |
| expanded O | |
| their O | |
| operation O | |
| to O | |
| other O | |
| regions O | |
| , O | |
| such O | |
| as O | |
| the O | |
| United O | |
| States O | |
| and O | |
| Europe O | |
| . O | |
| The O | |
| malware O | |
| authors O | |
| seem O | |
| to O | |
| be O | |
| putting O | |
| a O | |
| lot O | |
| of O | |
| effort O | |
| into O | |
| improving O | |
| this O | |
| malware O | |
| , O | |
| bundling O | |
| it O | |
| with O | |
| numerous O | |
| new O | |
| upgrades O | |
| that O | |
| make O | |
| it O | |
| more O | |
| sophisticated O | |
| , O | |
| evasive O | |
| , O | |
| and O | |
| well-equipped O | |
| . O | |
| These O | |
| improvements O | |
| render O | |
| FakeSpy B-Malware | |
| one O | |
| of O | |
| the O | |
| most O | |
| powerful O | |
| information O | |
| stealers O | |
| on O | |
| the O | |
| market O | |
| . O | |
| We O | |
| anticipate O | |
| this O | |
| malware O | |
| to O | |
| continue O | |
| to O | |
| evolve O | |
| with O | |
| additional O | |
| new O | |
| features O | |
| ; O | |
| the O | |
| only O | |
| question O | |
| now O | |
| is O | |
| when O | |
| we O | |
| will O | |
| see O | |
| the O | |
| next O | |
| wave O | |
| . O | |
| First O | |
| Twitter‑controlled B-System | |
| Android B-System | |
| botnet O | |
| discovered O | |
| Detected O | |
| by O | |
| ESET B-Organization | |
| as O | |
| Android/Twitoor B-Malware | |
| , O | |
| this O | |
| malware O | |
| is O | |
| unique O | |
| because O | |
| of O | |
| its O | |
| resilience O | |
| mechanism O | |
| . O | |
| Instead O | |
| of O | |
| being O | |
| controlled O | |
| by O | |
| a O | |
| traditional O | |
| command-and-control O | |
| server O | |
| , O | |
| it O | |
| receives O | |
| instructions O | |
| via O | |
| tweets O | |
| . O | |
| 24 O | |
| Aug O | |
| 2016 O | |
| - O | |
| 02:05PM O | |
| Android/Twitoor B-Malware | |
| is O | |
| a O | |
| backdoor O | |
| capable O | |
| of O | |
| downloading O | |
| other O | |
| malware O | |
| onto O | |
| an O | |
| infected O | |
| device O | |
| . O | |
| It O | |
| has O | |
| been O | |
| active O | |
| for O | |
| around O | |
| one O | |
| month O | |
| . O | |
| This O | |
| malicious O | |
| app O | |
| , O | |
| detected O | |
| by O | |
| ESET B-Organization | |
| as O | |
| a O | |
| variant O | |
| of O | |
| Android/Twitoor.A B-Malware | |
| , O | |
| can O | |
| ’ O | |
| t O | |
| be O | |
| found O | |
| on O | |
| any O | |
| official O | |
| Android B-System | |
| app I-System | |
| store I-System | |
| – O | |
| it O | |
| probably O | |
| spreads O | |
| by O | |
| SMS O | |
| or O | |
| via O | |
| malicious O | |
| URLs O | |
| . O | |
| It O | |
| impersonates O | |
| a O | |
| porn O | |
| player O | |
| app O | |
| or O | |
| MMS O | |
| application O | |
| but O | |
| without O | |
| having O | |
| their O | |
| functionality O | |
| . O | |
| After O | |
| launching O | |
| , O | |
| it O | |
| hides O | |
| its O | |
| presence O | |
| on O | |
| the O | |
| system O | |
| and O | |
| checks O | |
| the O | |
| defined O | |
| Twitter B-System | |
| account O | |
| at O | |
| regular O | |
| intervals O | |
| for O | |
| commands O | |
| . O | |
| Based O | |
| on O | |
| received O | |
| commands O | |
| , O | |
| it O | |
| can O | |
| either O | |
| download O | |
| malicious O | |
| apps O | |
| or O | |
| switch O | |
| the O | |
| C O | |
| & O | |
| C O | |
| Twitter B-System | |
| account O | |
| to O | |
| another O | |
| one O | |
| . O | |
| “ O | |
| Using O | |
| Twitter B-System | |
| instead O | |
| of O | |
| command-and-control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| servers O | |
| is O | |
| pretty O | |
| innovative O | |
| for O | |
| an O | |
| Android B-System | |
| botnet. O | |
| ” O | |
| “ O | |
| Using O | |
| Twitter B-Organization | |
| instead O | |
| of O | |
| command-and-control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| servers O | |
| is O | |
| pretty O | |
| innovative O | |
| for O | |
| an O | |
| Android B-System | |
| botnet O | |
| , O | |
| ” O | |
| says O | |
| Lukáš O | |
| Štefanko O | |
| , O | |
| the O | |
| ESET B-Organization | |
| malware O | |
| researcher O | |
| who O | |
| discovered O | |
| the O | |
| malicious O | |
| app O | |
| . O | |
| Malware O | |
| that O | |
| enslaves O | |
| devices O | |
| to O | |
| form O | |
| botnets O | |
| needs O | |
| to O | |
| be O | |
| able O | |
| to O | |
| receive O | |
| updated O | |
| instructions O | |
| . O | |
| That O | |
| communication O | |
| is O | |
| an O | |
| Achilles O | |
| heel O | |
| for O | |
| any O | |
| botnet O | |
| – O | |
| it O | |
| may O | |
| raise O | |
| suspicion O | |
| and O | |
| , O | |
| cutting O | |
| the O | |
| bots O | |
| off O | |
| is O | |
| always O | |
| lethal O | |
| to O | |
| the O | |
| botnet O | |
| ’ O | |
| s O | |
| functioning O | |
| . O | |
| Additionally O | |
| , O | |
| should O | |
| the O | |
| command-and-control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| servers O | |
| get O | |
| seized O | |
| by O | |
| the O | |
| authorities O | |
| , O | |
| it O | |
| would O | |
| ultimately O | |
| lead O | |
| to O | |
| disclosing O | |
| information O | |
| about O | |
| the O | |
| entire O | |
| botnet O | |
| . O | |
| To O | |
| make O | |
| the O | |
| Twitoor B-Malware | |
| botnet O | |
| ’ O | |
| s O | |
| communication O | |
| more O | |
| resilient O | |
| , O | |
| botnet O | |
| designers O | |
| took O | |
| various O | |
| steps O | |
| like O | |
| encrypting O | |
| their O | |
| messages O | |
| , O | |
| using O | |
| complex O | |
| topologies O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| network O | |
| – O | |
| or O | |
| using O | |
| innovative O | |
| means O | |
| for O | |
| communication O | |
| , O | |
| among O | |
| them O | |
| the O | |
| use O | |
| of O | |
| social O | |
| networks O | |
| . O | |
| “ O | |
| These O | |
| communication O | |
| channels O | |
| are O | |
| hard O | |
| to O | |
| discover O | |
| and O | |
| even O | |
| harder O | |
| to O | |
| block O | |
| entirely O | |
| . O | |
| On O | |
| the O | |
| other O | |
| hand O | |
| , O | |
| it O | |
| ’ O | |
| s O | |
| extremely O | |
| easy O | |
| for O | |
| the O | |
| crooks O | |
| to O | |
| re-direct O | |
| communications O | |
| to O | |
| another O | |
| freshly O | |
| created O | |
| account O | |
| , O | |
| ” O | |
| explains O | |
| Štefanko O | |
| . O | |
| In O | |
| the O | |
| Windows B-System | |
| space O | |
| , O | |
| Twitter B-Organization | |
| , O | |
| founded O | |
| in O | |
| 2006 O | |
| , O | |
| was O | |
| first O | |
| used O | |
| to O | |
| control O | |
| botnets O | |
| as O | |
| early O | |
| as O | |
| in O | |
| 2009 O | |
| . O | |
| Android B-System | |
| bots O | |
| have O | |
| also O | |
| already O | |
| been O | |
| found O | |
| being O | |
| controlled O | |
| via O | |
| other O | |
| non-traditional O | |
| means O | |
| – O | |
| blogs O | |
| or O | |
| some O | |
| of O | |
| the O | |
| many O | |
| cloud O | |
| messaging O | |
| systems O | |
| like O | |
| Google B-Organization | |
| ’ O | |
| s O | |
| or O | |
| Baidu B-Organization | |
| ’ O | |
| s O | |
| – O | |
| but O | |
| Twitoor B-Malware | |
| is O | |
| the O | |
| first O | |
| Twitter-based B-System | |
| bot O | |
| malware O | |
| , O | |
| according O | |
| to O | |
| Štefanko O | |
| . O | |
| “ O | |
| In O | |
| the O | |
| future O | |
| , O | |
| we O | |
| can O | |
| expect O | |
| that O | |
| the O | |
| bad O | |
| guys O | |
| will O | |
| try O | |
| to O | |
| make O | |
| use O | |
| of O | |
| Facebook B-System | |
| statuses O | |
| or O | |
| deploy O | |
| LinkedIn B-System | |
| and O | |
| other O | |
| social O | |
| networks O | |
| ” O | |
| , O | |
| states O | |
| ESET B-Organization | |
| ’ O | |
| s O | |
| researcher O | |
| . O | |
| Currently O | |
| , O | |
| the O | |
| Twitoor B-Malware | |
| trojan O | |
| has O | |
| been O | |
| downloading O | |
| several O | |
| versions O | |
| of O | |
| mobile O | |
| banking O | |
| malware O | |
| . O | |
| However O | |
| , O | |
| the O | |
| botnet O | |
| operators O | |
| can O | |
| start O | |
| distributing O | |
| other O | |
| malware O | |
| , O | |
| including O | |
| ransomware O | |
| , O | |
| at O | |
| any O | |
| time O | |
| warns O | |
| Štefanko O | |
| . O | |
| “ O | |
| Twitoor B-Malware | |
| serves O | |
| as O | |
| another O | |
| example O | |
| of O | |
| how O | |
| cybercriminals O | |
| keep O | |
| on O | |
| innovating O | |
| their O | |
| business O | |
| , O | |
| ” O | |
| Stefanko O | |
| continues O | |
| . O | |
| “ O | |
| The O | |
| takeaway O | |
| ? O | |
| Internet O | |
| users O | |
| should O | |
| keep O | |
| on O | |
| securing O | |
| their O | |
| activities O | |
| with O | |
| good O | |
| security O | |
| solutions O | |
| for O | |
| both O | |
| computers O | |
| and O | |
| mobile O | |
| devices. O | |
| ” O | |
| Hashes O | |
| : O | |
| E5212D4416486AF42E7ED1F58A526AEF77BE89BE B-Indicator | |
| A9891222232145581FE8D0D483EDB4B18836BCFC B-Indicator | |
| AFF9F39A6CA5D68C599B30012D79DA29E2672C6E B-Indicator | |
| Insidious O | |
| Android B-System | |
| malware O | |
| gives O | |
| up O | |
| all O | |
| malicious O | |
| features O | |
| but O | |
| one O | |
| to O | |
| gain O | |
| stealth O | |
| ESET B-Organization | |
| researchers O | |
| detect O | |
| a O | |
| new O | |
| way O | |
| of O | |
| misusing O | |
| Accessibility O | |
| Service O | |
| , O | |
| the O | |
| Achilles O | |
| ’ O | |
| heel O | |
| of O | |
| Android B-System | |
| security O | |
| 22 O | |
| May O | |
| 2020 O | |
| - O | |
| 03:00PM O | |
| ESET B-Organization | |
| researchers O | |
| have O | |
| analyzed O | |
| an O | |
| extremely O | |
| dangerous O | |
| Android B-System | |
| app O | |
| that O | |
| can O | |
| perform O | |
| a O | |
| host O | |
| of O | |
| nefarious O | |
| actions O | |
| , O | |
| notably O | |
| wiping O | |
| out O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| bank O | |
| account O | |
| or O | |
| cryptocurrency O | |
| wallet O | |
| and O | |
| taking O | |
| over O | |
| their O | |
| email O | |
| or O | |
| social O | |
| media O | |
| accounts O | |
| . O | |
| Called O | |
| “ O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| ” O | |
| , O | |
| the O | |
| banking O | |
| trojan O | |
| was O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| at O | |
| the O | |
| time O | |
| of O | |
| the O | |
| analysis O | |
| . O | |
| The O | |
| app O | |
| is O | |
| fitted O | |
| with O | |
| standard O | |
| information-stealing O | |
| capabilities O | |
| ; O | |
| however O | |
| , O | |
| this O | |
| banker O | |
| is O | |
| exceptionally O | |
| insidious O | |
| in O | |
| that O | |
| after O | |
| installation O | |
| it O | |
| requires O | |
| a O | |
| single O | |
| action O | |
| from O | |
| the O | |
| victim O | |
| – O | |
| enable O | |
| Android B-System | |
| ’ O | |
| s O | |
| Accessibility O | |
| Service O | |
| – O | |
| to O | |
| fully O | |
| unleash O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| malicious O | |
| functionality O | |
| . O | |
| The O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| app O | |
| made O | |
| it O | |
| onto O | |
| the O | |
| heavily O | |
| guarded O | |
| Google B-System | |
| Play I-System | |
| store I-System | |
| thanks O | |
| to O | |
| its O | |
| extreme O | |
| stealth O | |
| . O | |
| Its O | |
| creators O | |
| reduced O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| malicious O | |
| surface O | |
| to O | |
| the O | |
| bare O | |
| minimum O | |
| by O | |
| removing O | |
| all O | |
| potentially O | |
| malicious O | |
| functionalities O | |
| but O | |
| one O | |
| : O | |
| abusing O | |
| Accessibility O | |
| Service O | |
| . O | |
| Accessibility O | |
| Service O | |
| is O | |
| long O | |
| known O | |
| to O | |
| be O | |
| the O | |
| Achilles O | |
| ’ O | |
| heel O | |
| of O | |
| the O | |
| Android B-System | |
| operating O | |
| system O | |
| . O | |
| Security O | |
| solutions O | |
| can O | |
| detect O | |
| it O | |
| in O | |
| countless O | |
| combinations O | |
| with O | |
| other O | |
| suspicious O | |
| permissions O | |
| and O | |
| functions O | |
| , O | |
| or O | |
| malicious O | |
| functionalities O | |
| – O | |
| but O | |
| when O | |
| faced O | |
| with O | |
| no O | |
| additional O | |
| functionality O | |
| nor O | |
| permission O | |
| , O | |
| all O | |
| failed O | |
| to O | |
| trigger O | |
| any O | |
| alarm O | |
| on O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| . O | |
| By O | |
| “ O | |
| all O | |
| ” O | |
| we O | |
| mean O | |
| all O | |
| security O | |
| mechanisms O | |
| guarding O | |
| the O | |
| official O | |
| Android B-System | |
| app I-System | |
| store I-System | |
| ( O | |
| including O | |
| the O | |
| detection O | |
| engines O | |
| of O | |
| the O | |
| members O | |
| of O | |
| the O | |
| App B-Organization | |
| Defense I-Organization | |
| Alliance I-Organization | |
| ) O | |
| and O | |
| all O | |
| security O | |
| vendors O | |
| participating O | |
| in O | |
| the O | |
| VirusTotal B-Organization | |
| program O | |
| ( O | |
| see O | |
| Figure O | |
| 1 O | |
| ) O | |
| . O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| was O | |
| released O | |
| on O | |
| Feb O | |
| 3 O | |
| , O | |
| 2020 O | |
| and O | |
| last O | |
| updated O | |
| to O | |
| v1.4 O | |
| on O | |
| May O | |
| 6 O | |
| , O | |
| 2020 O | |
| . O | |
| The O | |
| latest O | |
| version O | |
| is O | |
| analyzed O | |
| here O | |
| ; O | |
| we O | |
| weren O | |
| ’ O | |
| t O | |
| able O | |
| to O | |
| determine O | |
| if O | |
| the O | |
| earlier O | |
| versions O | |
| were O | |
| also O | |
| malicious O | |
| . O | |
| According O | |
| to O | |
| its O | |
| profile O | |
| at O | |
| Google B-System | |
| Play I-System | |
| ( O | |
| see O | |
| Figure O | |
| 2 O | |
| ) O | |
| the O | |
| app O | |
| reached O | |
| a O | |
| mere O | |
| 10+ O | |
| downloads O | |
| . O | |
| We O | |
| reported O | |
| it O | |
| to O | |
| Google B-Organization | |
| on O | |
| May O | |
| 16 O | |
| , O | |
| 2020 O | |
| and O | |
| since O | |
| May O | |
| 19 O | |
| , O | |
| 2020 O | |
| the O | |
| app O | |
| has O | |
| no O | |
| longer O | |
| been O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| . O | |
| The O | |
| developer O | |
| name O | |
| used O | |
| , O | |
| GAS O | |
| Brazil O | |
| , O | |
| suggests O | |
| the O | |
| criminals O | |
| behind O | |
| the O | |
| app O | |
| targeted O | |
| Brazilian O | |
| users O | |
| . O | |
| Apart O | |
| from O | |
| including O | |
| the O | |
| country O | |
| ’ O | |
| s O | |
| name O | |
| , O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| name O | |
| is O | |
| probably O | |
| intended O | |
| to O | |
| imply O | |
| a O | |
| relationship O | |
| with O | |
| the O | |
| antifraud O | |
| solution O | |
| named O | |
| GAS B-System | |
| Tecnologia I-System | |
| . O | |
| That O | |
| security O | |
| software O | |
| is O | |
| commonly O | |
| installed O | |
| on O | |
| computers O | |
| in O | |
| Brazil O | |
| as O | |
| several O | |
| banks O | |
| require O | |
| it O | |
| to O | |
| log O | |
| into O | |
| their O | |
| online O | |
| banking O | |
| . O | |
| However O | |
| , O | |
| there O | |
| is O | |
| also O | |
| an O | |
| English O | |
| version O | |
| of O | |
| the O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| app O | |
| ( O | |
| see O | |
| Figure O | |
| 3 O | |
| ) O | |
| besides O | |
| the O | |
| Portuguese O | |
| one O | |
| , O | |
| and O | |
| that O | |
| app O | |
| has O | |
| neither O | |
| geographical O | |
| nor O | |
| language O | |
| restrictions O | |
| . O | |
| Playing O | |
| further O | |
| off O | |
| the O | |
| suggested O | |
| GAS B-System | |
| Tecnologia I-System | |
| link O | |
| , O | |
| the O | |
| app O | |
| promises O | |
| better O | |
| security O | |
| for O | |
| its O | |
| users O | |
| . O | |
| The O | |
| description O | |
| in O | |
| Portuguese O | |
| promises O | |
| more O | |
| protection O | |
| for O | |
| the O | |
| user O | |
| ’ O | |
| s O | |
| applications O | |
| , O | |
| including O | |
| end-to-end O | |
| encryption O | |
| . O | |
| Deceptively O | |
| , O | |
| the O | |
| app O | |
| was O | |
| listed O | |
| in O | |
| the O | |
| Education O | |
| section O | |
| . O | |
| Functionality O | |
| After O | |
| starting O | |
| , O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| requests O | |
| the O | |
| following O | |
| permissions O | |
| : O | |
| allow O | |
| modify O | |
| system O | |
| settings O | |
| permit O | |
| drawing O | |
| over O | |
| other O | |
| apps O | |
| , O | |
| and O | |
| activate O | |
| accessibility O | |
| services O | |
| . O | |
| If O | |
| an O | |
| unsuspecting O | |
| user O | |
| grants O | |
| these O | |
| permissions O | |
| ( O | |
| see O | |
| Figure O | |
| 4 O | |
| ) O | |
| , O | |
| the O | |
| trojan O | |
| can O | |
| read O | |
| any O | |
| text O | |
| displayed O | |
| in O | |
| any O | |
| app O | |
| the O | |
| user O | |
| may O | |
| launch O | |
| – O | |
| and O | |
| send O | |
| it O | |
| to O | |
| the O | |
| attackers O | |
| . O | |
| This O | |
| means O | |
| the O | |
| attackers O | |
| can O | |
| steal O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| credentials O | |
| for O | |
| logging O | |
| into O | |
| apps O | |
| , O | |
| SMS O | |
| and O | |
| email O | |
| messages O | |
| , O | |
| displayed O | |
| cryptocurrency O | |
| private O | |
| keys O | |
| , O | |
| and O | |
| even O | |
| software-generated O | |
| 2FA O | |
| codes O | |
| . O | |
| The O | |
| fact O | |
| the O | |
| trojan O | |
| can O | |
| steal O | |
| both O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| credentials O | |
| and O | |
| also O | |
| can O | |
| control O | |
| their O | |
| SMS O | |
| messages O | |
| and O | |
| generated O | |
| 2FA O | |
| codes O | |
| means O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| ’ O | |
| s O | |
| operators O | |
| can O | |
| bypass O | |
| two-factor O | |
| authentication O | |
| . O | |
| This O | |
| opens O | |
| the O | |
| door O | |
| to O | |
| , O | |
| for O | |
| example O | |
| , O | |
| fully O | |
| controlling O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| bank O | |
| account O | |
| . O | |
| To O | |
| make O | |
| sure O | |
| the O | |
| trojan O | |
| survives O | |
| a O | |
| device O | |
| restart O | |
| , O | |
| it O | |
| abuses O | |
| already O | |
| activated O | |
| accessibility O | |
| services O | |
| that O | |
| will O | |
| launch O | |
| the O | |
| trojan O | |
| right O | |
| after O | |
| start O | |
| . O | |
| Our O | |
| analysis O | |
| shows O | |
| the O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| trojan O | |
| can O | |
| execute O | |
| 17 O | |
| commands O | |
| received O | |
| from O | |
| the O | |
| attacker-controlled O | |
| server O | |
| such O | |
| as O | |
| uninstalling O | |
| an O | |
| app O | |
| , O | |
| launching O | |
| an O | |
| app O | |
| and O | |
| then O | |
| performing O | |
| any O | |
| click/tap O | |
| action O | |
| controlled O | |
| remotely O | |
| by O | |
| the O | |
| attacker O | |
| ( O | |
| see O | |
| Figure O | |
| 5 O | |
| ) O | |
| . O | |
| In O | |
| 2018 O | |
| , O | |
| we O | |
| saw O | |
| similar O | |
| behavior O | |
| , O | |
| but O | |
| all O | |
| the O | |
| click O | |
| actions O | |
| were O | |
| hardcoded O | |
| and O | |
| suited O | |
| only O | |
| for O | |
| the O | |
| app O | |
| of O | |
| the O | |
| attacker O | |
| ’ O | |
| s O | |
| choice O | |
| . O | |
| In O | |
| this O | |
| case O | |
| , O | |
| the O | |
| attacker O | |
| can O | |
| get O | |
| the O | |
| list O | |
| of O | |
| all O | |
| installed O | |
| apps O | |
| and O | |
| then O | |
| remotely O | |
| launch O | |
| the O | |
| victim O | |
| ’ O | |
| s O | |
| app O | |
| of O | |
| their O | |
| choice O | |
| to O | |
| either O | |
| steal O | |
| credentials O | |
| or O | |
| perform O | |
| malicious O | |
| actions O | |
| ( O | |
| e.g O | |
| . O | |
| send O | |
| funds O | |
| via O | |
| a O | |
| wire O | |
| transfer O | |
| ) O | |
| . O | |
| We O | |
| believe O | |
| that O | |
| this O | |
| is O | |
| the O | |
| reason O | |
| the O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| trojan O | |
| requests O | |
| the O | |
| user O | |
| to O | |
| allow O | |
| “ O | |
| Modify O | |
| system O | |
| settings O | |
| ” O | |
| . O | |
| Subsequently O | |
| , O | |
| the O | |
| malware O | |
| will O | |
| change O | |
| the O | |
| screen O | |
| off O | |
| time-out O | |
| to O | |
| 10 O | |
| minutes O | |
| . O | |
| This O | |
| means O | |
| that O | |
| , O | |
| unless O | |
| victims O | |
| lock O | |
| their O | |
| devices O | |
| via O | |
| the O | |
| hardware O | |
| button O | |
| , O | |
| the O | |
| timer O | |
| provides O | |
| plenty O | |
| of O | |
| time O | |
| for O | |
| the O | |
| malware O | |
| to O | |
| remotely O | |
| perform O | |
| malicious O | |
| , O | |
| in-app O | |
| operations O | |
| . O | |
| If O | |
| the O | |
| device O | |
| gets O | |
| locked O | |
| , O | |
| the O | |
| malware O | |
| can O | |
| ’ O | |
| t O | |
| unlock O | |
| it O | |
| . O | |
| Malware O | |
| data O | |
| leak O | |
| When O | |
| we O | |
| analyzed O | |
| the O | |
| sample O | |
| , O | |
| we O | |
| realized O | |
| that O | |
| the O | |
| malware O | |
| operators O | |
| left O | |
| the O | |
| remote O | |
| database O | |
| with O | |
| some O | |
| of O | |
| the O | |
| victims O | |
| ’ O | |
| data O | |
| freely O | |
| accessible O | |
| , O | |
| without O | |
| any O | |
| authentication O | |
| . O | |
| The O | |
| database O | |
| contained O | |
| the O | |
| last O | |
| activity O | |
| performed O | |
| on O | |
| around O | |
| 60 O | |
| compromised O | |
| devices O | |
| . O | |
| We O | |
| found O | |
| no O | |
| other O | |
| information O | |
| stolen O | |
| from O | |
| the O | |
| victims O | |
| to O | |
| be O | |
| accessible O | |
| . O | |
| Thanks O | |
| to O | |
| this O | |
| data O | |
| leak O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| confirm O | |
| that O | |
| the O | |
| malware O | |
| really O | |
| worked O | |
| as O | |
| designed O | |
| : O | |
| the O | |
| attacker O | |
| had O | |
| access O | |
| to O | |
| the O | |
| victims O | |
| ’ O | |
| entered O | |
| credentials O | |
| , O | |
| displayed O | |
| or O | |
| written O | |
| emails O | |
| and O | |
| messages O | |
| , O | |
| etc O | |
| . O | |
| Once O | |
| we O | |
| reached O | |
| the O | |
| non-secured O | |
| database O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| directly O | |
| observe O | |
| the O | |
| app O | |
| ’ O | |
| s O | |
| malicious O | |
| behavior O | |
| . O | |
| To O | |
| illustrate O | |
| the O | |
| level O | |
| of O | |
| threat O | |
| the O | |
| DEFENSOR B-Malware | |
| ID I-Malware | |
| app O | |
| posed O | |
| , O | |
| we O | |
| performed O | |
| three O | |
| tests O | |
| . O | |
| First O | |
| , O | |
| we O | |
| launched O | |
| a O | |
| banking O | |
| app O | |
| and O | |
| entered O | |
| the O | |
| credentials O | |
| there O | |
| . O | |
| The O | |
| credentials O | |
| were O | |
| immediately O | |
| available O | |
| in O | |
| the O | |
| leaky O | |
| database O | |
| – O | |
| see O | |
| Figure O | |
| 6 O | |
| . O | |
| Figure O | |
| 6 O | |
| . O | |
| The O | |
| banking O | |
| app O | |
| test O | |
| : O | |
| the O | |
| credentials O | |
| as O | |
| entered O | |
| ( O | |
| left O | |
| ) O | |
| and O | |
| as O | |
| available O | |
| in O | |
| the O | |
| database O | |
| ( O | |
| right O | |
| ) O | |
| Second O | |
| , O | |
| we O | |
| wrote O | |
| a O | |
| test O | |
| message O | |
| in O | |
| an O | |
| email O | |
| client O | |
| . O | |
| We O | |
| saw O | |
| the O | |
| message O | |
| uploaded O | |
| to O | |
| the O | |
| attackers O | |
| ’ O | |
| server O | |
| within O | |
| a O | |
| second O | |
| – O | |
| see O | |
| Figure O | |
| 7 O | |
| . O | |
| Figure O | |
| 7 O | |
| . O | |
| The O | |
| email O | |
| message O | |
| test O | |
| : O | |
| the O | |
| message O | |
| as O | |
| written O | |
| ( O | |
| left O | |
| ) O | |
| and O | |
| as O | |
| available O | |
| in O | |
| the O | |
| database O | |
| ( O | |
| right O | |
| ) O | |
| Third O | |
| , O | |
| we O | |
| documented O | |
| the O | |
| trojan O | |
| retrieving O | |
| the O | |
| Google B-System | |
| Authenticator I-System | |
| 2FA O | |
| code O | |
| . O | |
| Figure O | |
| 8 O | |
| . O | |
| The O | |
| software O | |
| generated O | |
| 2FA O | |
| code O | |
| as O | |
| it O | |
| appeared O | |
| on O | |
| the O | |
| device O | |
| ’ O | |
| s O | |
| display O | |
| ( O | |
| left O | |
| ) O | |
| and O | |
| as O | |
| available O | |
| in O | |
| the O | |
| database O | |
| ( O | |
| right O | |
| ) O | |
| Along O | |
| with O | |
| the O | |
| malicious O | |
| DEFENSOR O | |
| ID O | |
| app O | |
| , O | |
| another O | |
| malicious O | |
| app O | |
| named O | |
| Defensor B-Malware | |
| Digital I-Malware | |
| was O | |
| discovered O | |
| . O | |
| Both O | |
| apps O | |
| shared O | |
| the O | |
| same O | |
| C O | |
| & O | |
| C O | |
| server O | |
| , O | |
| but O | |
| we O | |
| couldn O | |
| ’ O | |
| t O | |
| investigate O | |
| the O | |
| latter O | |
| as O | |
| it O | |
| had O | |
| already O | |
| been O | |
| removed O | |
| from O | |
| the O | |
| Google B-System | |
| Play I-System | |
| store I-System | |
| . O | |
| Indicators O | |
| of O | |
| Compromise O | |
| ( O | |
| IoCs O | |
| ) O | |
| Package O | |
| Name O | |
| Hash O | |
| ESET B-Organization | |
| detection O | |
| name O | |
| com.secure.protect.world B-Indicator | |
| F17AEBC741957AA21CFE7C7D7BAEC0900E863F61 B-Indicator | |
| Android/Spy.BanBra.A B-Indicator | |
| com.brazil.android.free B-Indicator | |
| EA069A5C96DC1DB0715923EB68192FD325F3D3CE B-Indicator | |
| Android/Spy.BanBra.A B-Indicator | |
| MITRE B-Organization | |
| ATT O | |
| & O | |
| CK O | |
| techniques O | |
| Tactic O | |
| ID O | |
| Name O | |
| Description O | |
| Initial O | |
| Access O | |
| T1475 O | |
| Deliver O | |
| Malicious O | |
| App O | |
| via O | |
| Authorized O | |
| App B-System | |
| Store I-System | |
| Impersonates O | |
| security O | |
| app O | |
| on O | |
| Google B-System | |
| Play I-System | |
| . O | |
| T1444 O | |
| Masquerade O | |
| as O | |
| Legitimate O | |
| Application O | |
| Impersonates O | |
| legitimate O | |
| GAS B-System | |
| Tecnologia I-System | |
| application O | |
| . O | |
| Discovery O | |
| T1418 O | |
| Application O | |
| Discovery O | |
| Sends O | |
| list O | |
| of O | |
| installed O | |
| apps O | |
| on O | |
| device O | |
| . O | |
| Impact O | |
| T1516 O | |
| Input O | |
| Injection O | |
| Can O | |
| enter O | |
| text O | |
| and O | |
| perform O | |
| clicks O | |
| on O | |
| behalf O | |
| of O | |
| user O | |
| . O | |
| Collection O | |
| T1417 O | |
| Input O | |
| Capture O | |
| Records O | |
| user O | |
| input O | |
| data O | |
| . O | |
| Command O | |
| and O | |
| Control O | |
| T1437 O | |
| Standard O | |
| Application O | |
| Layer O | |
| Protocol O | |
| Uses O | |
| Firebase O | |
| Cloud O | |
| Messaging O | |
| for O | |
| C O | |
| & O | |
| C O | |
| . O | |