| Riltok B-Malware | |
| mobile O | |
| Trojan O | |
| : O | |
| A O | |
| banker O | |
| with O | |
| global O | |
| reach O | |
| 25 O | |
| JUN O | |
| 2019 O | |
| Riltok B-Malware | |
| is O | |
| one O | |
| of O | |
| numerous O | |
| families O | |
| of O | |
| mobile O | |
| banking O | |
| Trojans O | |
| with O | |
| standard O | |
| ( O | |
| for O | |
| such O | |
| malware O | |
| ) O | |
| functions O | |
| and O | |
| distribution O | |
| methods O | |
| . O | |
| Originally O | |
| intended O | |
| to O | |
| target O | |
| the O | |
| Russian O | |
| audience O | |
| , O | |
| the O | |
| banker O | |
| was O | |
| later O | |
| adapted O | |
| , O | |
| with O | |
| minimal O | |
| modifications O | |
| , O | |
| for O | |
| the O | |
| European O | |
| β O | |
| market. O | |
| β O | |
| The O | |
| bulk O | |
| of O | |
| its O | |
| victims O | |
| ( O | |
| more O | |
| than O | |
| 90 O | |
| % O | |
| ) O | |
| reside O | |
| in O | |
| Russia O | |
| , O | |
| with O | |
| France O | |
| in O | |
| second O | |
| place O | |
| ( O | |
| 4 O | |
| % O | |
| ) O | |
| . O | |
| Third O | |
| place O | |
| is O | |
| shared O | |
| by O | |
| Italy O | |
| , O | |
| Ukraine O | |
| , O | |
| and O | |
| the O | |
| United O | |
| Kingdom O | |
| . O | |
| We O | |
| first O | |
| detected O | |
| members O | |
| of O | |
| this O | |
| family O | |
| back O | |
| in O | |
| March O | |
| 2018 O | |
| . O | |
| Like O | |
| many O | |
| other O | |
| bankers O | |
| , O | |
| they O | |
| were O | |
| disguised O | |
| as O | |
| apps O | |
| for O | |
| popular O | |
| free O | |
| ad O | |
| services O | |
| in O | |
| Russia O | |
| . O | |
| The O | |
| malware O | |
| was O | |
| distributed O | |
| from O | |
| infected O | |
| devices O | |
| via O | |
| SMS O | |
| in O | |
| the O | |
| form O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| I O | |
| β O | |
| ll O | |
| buy O | |
| under O | |
| a O | |
| secure O | |
| transaction O | |
| . O | |
| youlabuy B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| ru/7 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 3 I-Indicator | |
| β O | |
| or O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| accept O | |
| 25,000 O | |
| on O | |
| Youla O | |
| youla-protect B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| ru/4 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 7 I-Indicator | |
| β O | |
| , O | |
| containing O | |
| a O | |
| link O | |
| to O | |
| download O | |
| the O | |
| Trojan O | |
| . O | |
| Other O | |
| samples O | |
| were O | |
| also O | |
| noticed O | |
| , O | |
| posing O | |
| as O | |
| a O | |
| client O | |
| of O | |
| a O | |
| ticket-finding O | |
| service O | |
| or O | |
| as O | |
| an O | |
| app O | |
| store O | |
| for O | |
| Android B-System | |
| . O | |
| It O | |
| was O | |
| late O | |
| 2018 O | |
| when O | |
| Riltok B-Malware | |
| climbed O | |
| onto O | |
| the O | |
| international O | |
| stage O | |
| . O | |
| The O | |
| cybercriminals O | |
| behind O | |
| it O | |
| kept O | |
| the O | |
| same O | |
| masking O | |
| and O | |
| distribution O | |
| methods O | |
| , O | |
| using O | |
| names O | |
| and O | |
| icons O | |
| imitating O | |
| those O | |
| of O | |
| popular O | |
| free O | |
| ad O | |
| services O | |
| . O | |
| In O | |
| November O | |
| 2018 O | |
| , O | |
| a O | |
| version O | |
| of O | |
| the O | |
| Trojan O | |
| for O | |
| the O | |
| English O | |
| market O | |
| appeared O | |
| in O | |
| the O | |
| shape O | |
| of O | |
| Gumtree.apk B-Indicator | |
| . O | |
| The O | |
| SMS O | |
| message O | |
| with O | |
| a O | |
| link O | |
| to O | |
| a O | |
| banker O | |
| looked O | |
| as O | |
| follows O | |
| : O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| i O | |
| send O | |
| you O | |
| prepayment O | |
| gumtree B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| cc/3 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 1 I-Indicator | |
| β O | |
| . O | |
| Italian O | |
| ( O | |
| Subito.apk B-Indicator | |
| ) O | |
| and O | |
| French O | |
| ( O | |
| Leboncoin.apk B-Indicator | |
| ) O | |
| versions O | |
| appeared O | |
| shortly O | |
| afterwards O | |
| in O | |
| January O | |
| 2019 O | |
| . O | |
| The O | |
| messages O | |
| looked O | |
| as O | |
| follows O | |
| : O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| ti O | |
| ho O | |
| inviato O | |
| il O | |
| soldi O | |
| sul O | |
| subito O | |
| subito-a B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| pw/6 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 5 I-Indicator | |
| β O | |
| ( O | |
| It O | |
| . O | |
| ) O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| ti O | |
| ho O | |
| inviato O | |
| il O | |
| pagamento O | |
| subitop B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| pw/4 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 7 I-Indicator | |
| β O | |
| ( O | |
| It O | |
| . O | |
| ) O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| je O | |
| vous O | |
| ai O | |
| envoyΓ© O | |
| un O | |
| prepaiement O | |
| m-leboncoin B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| top/7 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 3 I-Indicator | |
| β O | |
| ( O | |
| Fr O | |
| . O | |
| ) O | |
| β O | |
| % O | |
| USERNAME O | |
| % O | |
| , O | |
| j O | |
| β O | |
| ai O | |
| fait O | |
| l O | |
| β O | |
| avance O | |
| ( O | |
| suivi O | |
| d O | |
| β O | |
| un O | |
| lien O | |
| ) O | |
| : O | |
| leboncoin-le B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/8 I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| * I-Indicator | |
| 9 I-Indicator | |
| β O | |
| ( O | |
| Fr O | |
| . O | |
| ) O | |
| Let O | |
| β O | |
| s O | |
| take O | |
| a O | |
| more O | |
| detailed O | |
| look O | |
| at O | |
| how O | |
| this O | |
| banking O | |
| Trojan O | |
| works O | |
| . O | |
| Infection O | |
| The O | |
| user O | |
| receives O | |
| an O | |
| SMS O | |
| with O | |
| a O | |
| malicious O | |
| link O | |
| pointing O | |
| to O | |
| a O | |
| fake O | |
| website O | |
| simulating O | |
| a O | |
| popular O | |
| free O | |
| ad O | |
| service O | |
| . O | |
| There O | |
| , O | |
| they O | |
| are O | |
| prompted O | |
| to O | |
| download O | |
| a O | |
| new O | |
| version O | |
| of O | |
| the O | |
| mobile O | |
| app O | |
| , O | |
| under O | |
| which O | |
| guise O | |
| the O | |
| Trojan O | |
| is O | |
| hidden O | |
| . O | |
| To O | |
| be O | |
| installed O | |
| , O | |
| it O | |
| needs O | |
| the O | |
| victim O | |
| to O | |
| allow O | |
| installation O | |
| of O | |
| apps O | |
| from O | |
| unknown O | |
| sources O | |
| in O | |
| the O | |
| device O | |
| settings O | |
| . O | |
| During O | |
| installation O | |
| , O | |
| Riltok B-Malware | |
| asks O | |
| the O | |
| user O | |
| for O | |
| permission O | |
| to O | |
| use O | |
| special O | |
| features O | |
| in O | |
| AccessibilityService O | |
| by O | |
| displaying O | |
| a O | |
| fake O | |
| warning O | |
| : O | |
| If O | |
| the O | |
| user O | |
| ignores O | |
| or O | |
| declines O | |
| the O | |
| request O | |
| , O | |
| the O | |
| window O | |
| keeps O | |
| opening O | |
| ad O | |
| infinitum O | |
| . O | |
| After O | |
| obtaining O | |
| the O | |
| desired O | |
| rights O | |
| , O | |
| the O | |
| Trojan O | |
| sets O | |
| itself O | |
| as O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| ( O | |
| by O | |
| independently O | |
| clicking O | |
| Yes O | |
| in O | |
| AccessibilityService O | |
| ) O | |
| , O | |
| before O | |
| vanishing O | |
| from O | |
| the O | |
| device O | |
| screen O | |
| . O | |
| After O | |
| enabling O | |
| AccessibilityService O | |
| , O | |
| the O | |
| malware O | |
| sets O | |
| itself O | |
| as O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| Now O | |
| installed O | |
| and O | |
| having O | |
| obtained O | |
| the O | |
| necessary O | |
| permissions O | |
| from O | |
| the O | |
| user O | |
| , O | |
| Riltok B-Malware | |
| contacts O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| In O | |
| later O | |
| versions O | |
| , O | |
| when O | |
| it O | |
| starts O | |
| , O | |
| the O | |
| Trojan O | |
| additionally O | |
| opens O | |
| a O | |
| phishing O | |
| site O | |
| in O | |
| the O | |
| browser O | |
| that O | |
| simulates O | |
| a O | |
| free O | |
| ad O | |
| service O | |
| so O | |
| as O | |
| to O | |
| dupe O | |
| the O | |
| user O | |
| into O | |
| entering O | |
| their O | |
| login O | |
| credentials O | |
| and O | |
| bank O | |
| card O | |
| details O | |
| . O | |
| The O | |
| entered O | |
| data O | |
| is O | |
| forwarded O | |
| to O | |
| the O | |
| cybercriminals O | |
| . O | |
| Phishing O | |
| page O | |
| from O | |
| the O | |
| French O | |
| version O | |
| of O | |
| the O | |
| Trojan O | |
| Communication O | |
| with O | |
| C O | |
| & O | |
| C O | |
| Riltok B-Malware | |
| actively O | |
| communicates O | |
| with O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| First O | |
| off O | |
| , O | |
| it O | |
| registers O | |
| the O | |
| infected O | |
| device O | |
| in O | |
| the O | |
| administrative O | |
| panel O | |
| by O | |
| sending O | |
| a O | |
| GET O | |
| request O | |
| to O | |
| the O | |
| relative O | |
| address O | |
| gate.php B-Indicator | |
| ( O | |
| in O | |
| later O | |
| versions O | |
| gating.php B-Indicator | |
| ) O | |
| with O | |
| the O | |
| ID O | |
| ( O | |
| device O | |
| identifier O | |
| generated O | |
| by O | |
| the O | |
| setPsuedoID O | |
| function O | |
| in O | |
| a O | |
| pseudo-random O | |
| way O | |
| based O | |
| on O | |
| the O | |
| device O | |
| IMEI O | |
| ) O | |
| and O | |
| screen O | |
| ( O | |
| shows O | |
| if O | |
| the O | |
| device O | |
| is O | |
| active O | |
| , O | |
| possible O | |
| values O | |
| are O | |
| β O | |
| on O | |
| β O | |
| , O | |
| β O | |
| off O | |
| β O | |
| , O | |
| β O | |
| none O | |
| β O | |
| ) O | |
| parameters O | |
| . O | |
| Then O | |
| , O | |
| using O | |
| POST O | |
| requests O | |
| to O | |
| the O | |
| relative O | |
| address O | |
| report.php B-Indicator | |
| , O | |
| it O | |
| sends O | |
| data O | |
| about O | |
| the O | |
| device O | |
| ( O | |
| IMEI O | |
| , O | |
| phone O | |
| number O | |
| , O | |
| country O | |
| , O | |
| mobile O | |
| operator O | |
| , O | |
| phone O | |
| model O | |
| , O | |
| availability O | |
| of O | |
| root O | |
| rights O | |
| , O | |
| OS O | |
| version O | |
| ) O | |
| , O | |
| list O | |
| of O | |
| contacts O | |
| , O | |
| list O | |
| of O | |
| installed O | |
| apps O | |
| , O | |
| incoming O | |
| SMS O | |
| , O | |
| and O | |
| other O | |
| information O | |
| . O | |
| From O | |
| the O | |
| server O | |
| , O | |
| the O | |
| Trojan O | |
| receives O | |
| commands O | |
| ( O | |
| for O | |
| example O | |
| , O | |
| to O | |
| send O | |
| SMS O | |
| ) O | |
| and O | |
| changes O | |
| in O | |
| the O | |
| configuration O | |
| . O | |
| Trojan O | |
| anatomy O | |
| The O | |
| family O | |
| was O | |
| named O | |
| Riltok B-Malware | |
| after O | |
| the O | |
| librealtalk-jni.so B-Indicator | |
| library O | |
| contained O | |
| in O | |
| the O | |
| APK O | |
| file O | |
| of O | |
| the O | |
| Trojan O | |
| . O | |
| The O | |
| library O | |
| includes O | |
| such O | |
| operations O | |
| as O | |
| : O | |
| Get O | |
| address O | |
| of O | |
| cybercriminal O | |
| C O | |
| & O | |
| C O | |
| server O | |
| Get O | |
| configuration O | |
| file O | |
| with O | |
| web O | |
| injects O | |
| from O | |
| C O | |
| & O | |
| C O | |
| , O | |
| as O | |
| well O | |
| as O | |
| default O | |
| list O | |
| of O | |
| injects O | |
| Scan O | |
| for O | |
| app O | |
| package O | |
| names O | |
| that O | |
| generated O | |
| AccessibilityEvent O | |
| events O | |
| in O | |
| the O | |
| list O | |
| of O | |
| known O | |
| banking/antivirus/other O | |
| popular O | |
| apps O | |
| Set O | |
| malware O | |
| as O | |
| default O | |
| SMS O | |
| app O | |
| Get O | |
| address O | |
| of O | |
| the O | |
| phishing O | |
| page O | |
| that O | |
| opens O | |
| when O | |
| the O | |
| app O | |
| runs O | |
| , O | |
| and O | |
| others O | |
| getStartWebUrl O | |
| function O | |
| β O | |
| get O | |
| address O | |
| of O | |
| phishing O | |
| page O | |
| The O | |
| configuration O | |
| file O | |
| contains O | |
| a O | |
| list O | |
| of O | |
| injects O | |
| for O | |
| mobile O | |
| banking O | |
| apps O | |
| β O | |
| links O | |
| to O | |
| phishing O | |
| pages O | |
| matching O | |
| the O | |
| mobile O | |
| banking O | |
| app O | |
| used O | |
| by O | |
| the O | |
| user O | |
| . O | |
| In O | |
| most O | |
| so-called O | |
| Western O | |
| versions O | |
| of O | |
| the O | |
| Trojan O | |
| , O | |
| the O | |
| package O | |
| names O | |
| in O | |
| the O | |
| default O | |
| configuration O | |
| file O | |
| are O | |
| erased O | |
| . O | |
| Sample O | |
| configuration O | |
| file O | |
| of O | |
| the O | |
| Trojan O | |
| Through O | |
| AccessibilityService O | |
| , O | |
| the O | |
| malware O | |
| monitors O | |
| AccessibilityEvent O | |
| events O | |
| . O | |
| Depending O | |
| on O | |
| which O | |
| app O | |
| ( O | |
| package O | |
| name O | |
| ) O | |
| generated O | |
| the O | |
| event O | |
| , O | |
| Riltok B-Malware | |
| can O | |
| : O | |
| Open O | |
| a O | |
| fake O | |
| Google B-System | |
| Play I-System | |
| screen O | |
| requesting O | |
| bank O | |
| card O | |
| details O | |
| Open O | |
| a O | |
| fake O | |
| screen O | |
| or O | |
| phishing O | |
| page O | |
| in O | |
| a O | |
| browser O | |
| ( O | |
| inject O | |
| ) O | |
| mimicking O | |
| the O | |
| screen O | |
| of O | |
| the O | |
| relevant O | |
| mobile O | |
| banking O | |
| app O | |
| and O | |
| requesting O | |
| user/bank O | |
| card O | |
| details O | |
| Minimize O | |
| the O | |
| app O | |
| ( O | |
| for O | |
| example O | |
| , O | |
| antivirus O | |
| applications O | |
| or O | |
| device O | |
| security O | |
| settings O | |
| ) O | |
| Additionally O | |
| , O | |
| the O | |
| Trojan O | |
| can O | |
| hide O | |
| notifications O | |
| from O | |
| certain O | |
| banking O | |
| apps O | |
| . O | |
| List O | |
| of O | |
| package O | |
| names O | |
| of O | |
| apps O | |
| on O | |
| events O | |
| from O | |
| which O | |
| the O | |
| Trojan O | |
| opens O | |
| a O | |
| fake O | |
| Google B-System | |
| Play I-System | |
| window O | |
| ( O | |
| for O | |
| the O | |
| Russian O | |
| version O | |
| of O | |
| the O | |
| Trojan O | |
| ) O | |
| Example O | |
| of O | |
| Trojan O | |
| screen O | |
| overlapping O | |
| other O | |
| apps O | |
| When O | |
| bank O | |
| card O | |
| details O | |
| are O | |
| entered O | |
| in O | |
| the O | |
| fake O | |
| window O | |
| , O | |
| Riltok O | |
| performs O | |
| basic O | |
| validation O | |
| checks O | |
| : O | |
| card O | |
| validity O | |
| period O | |
| , O | |
| number O | |
| checksum O | |
| , O | |
| CVC O | |
| length O | |
| , O | |
| whether O | |
| the O | |
| number O | |
| is O | |
| in O | |
| the O | |
| denylist O | |
| sewn O | |
| into O | |
| the O | |
| Trojan O | |
| code O | |
| : O | |
| Examples O | |
| of O | |
| phishing O | |
| pages O | |
| imitating O | |
| mobile O | |
| banks O | |
| At O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| , O | |
| the O | |
| functionality O | |
| of O | |
| most O | |
| of O | |
| the O | |
| Western O | |
| versions O | |
| of O | |
| Riltok O | |
| was O | |
| somewhat O | |
| pared O | |
| down O | |
| compared O | |
| to O | |
| the O | |
| Russian O | |
| one O | |
| . O | |
| For O | |
| example O | |
| , O | |
| the O | |
| default O | |
| configuration O | |
| file O | |
| with O | |
| injects O | |
| is O | |
| non-operational O | |
| , O | |
| and O | |
| the O | |
| malware O | |
| contains O | |
| no O | |
| fake O | |
| built-in O | |
| windows O | |
| requesting O | |
| bank O | |
| card O | |
| details O | |
| . O | |
| Conclusion O | |
| Threats O | |
| are O | |
| better O | |
| prevented O | |
| than O | |
| cured O | |
| , O | |
| so O | |
| do O | |
| not O | |
| follow O | |
| suspicious O | |
| links O | |
| in O | |
| SMS O | |
| , O | |
| and O | |
| be O | |
| sure O | |
| to O | |
| install O | |
| apps O | |
| only O | |
| from O | |
| official O | |
| sources O | |
| and O | |
| check O | |
| what O | |
| permissions O | |
| you O | |
| are O | |
| granting O | |
| during O | |
| installation O | |
| . O | |
| As O | |
| Riltok B-Malware | |
| shows O | |
| , O | |
| cybercriminals O | |
| can O | |
| apply O | |
| the O | |
| same O | |
| methods O | |
| of O | |
| infection O | |
| to O | |
| victims O | |
| in O | |
| different O | |
| countries O | |
| with O | |
| more O | |
| or O | |
| less O | |
| the O | |
| same O | |
| success O | |
| . O | |
| Kaspersky B-Organization | |
| products O | |
| detect O | |
| the O | |
| above-described O | |
| threat O | |
| with O | |
| the O | |
| verdict O | |
| Trojan-Banker.AndroidOS.Riltok B-Indicator | |
| . O | |
| IoCs O | |
| C O | |
| & O | |
| C O | |
| 100.51.100.00 B-Indicator | |
| 108.62.118.131 B-Indicator | |
| 172.81.134.165 B-Indicator | |
| 172.86.120.207 B-Indicator | |
| 185.212.128.152 B-Indicator | |
| 185.212.128.192 B-Indicator | |
| 185.61.000.108 B-Indicator | |
| 185.61.138.108 B-Indicator | |
| 185.61.138.37 B-Indicator | |
| 188.209.52.101 B-Indicator | |
| 5.206.225.57 B-Indicator | |
| alr992.date B-Indicator | |
| avito-app.pw B-Indicator | |
| backfround2.pw B-Indicator | |
| background1.xyz B-Indicator | |
| blacksolider93.com B-Indicator | |
| blass9g087.com B-Indicator | |
| brekelter2.com B-Indicator | |
| broplar3hf.xyz B-Indicator | |
| buy-youla.ru B-Indicator | |
| cd78cg210xy0.com B-Indicator | |
| copsoiteess.com B-Indicator | |
| farmatefc93.org B-Indicator | |
| firstclinsop.com B-Indicator | |
| holebrhuhh3.com B-Indicator | |
| holebrhuhh45.com B-Indicator | |
| karambga3j.net B-Indicator | |
| le22999a.pw B-Indicator | |
| leboncoin-bk.top B-Indicator | |
| leboncoin-buy.pw B-Indicator | |
| leboncoin-cz.info B-Indicator | |
| leboncoin-f.pw B-Indicator | |
| leboncoin-jp.info B-Indicator | |
| leboncoin-kp.top B-Indicator | |
| leboncoin-ny.info B-Indicator | |
| leboncoin-ql.top B-Indicator | |
| leboncoin-tr.info B-Indicator | |
| myyoula.ru B-Indicator | |
| sell-avito.ru B-Indicator | |
| sell-youla.ru B-Indicator | |
| sentel8ju67.com B-Indicator | |
| subito-li.pw B-Indicator | |
| subitop.pw B-Indicator | |
| web-gumtree.com B-Indicator | |
| whitehousejosh.com B-Indicator | |
| whitekalgoy3.com B-Indicator | |
| youlaprotect.ru B-Indicator | |
| Examples O | |
| of O | |
| malware O | |
| 0497b6000a7a23e9e9b97472bc2d3799caf49cbbea1627ad4d87ae6e0b7e2a98 B-Indicator | |
| 417fc112cd0610cc8c402742b0baab0a086b5c4164230009e11d34fdeee7d3fa B-Indicator | |
| 54594edbe9055517da2836199600f682dee07e6b405c6fe4b476627e8d184bfe B-Indicator | |
| 6e995d68c724f121d43ec2ff59bc4e536192360afa3beaec5646f01094f0b745 B-Indicator | |
| bbc268ca63eeb27e424fec1b3976bab550da304de18e29faff94d9057b1fa25a B-Indicator | |
| dc3dd9d75120934333496d0a4100252b419ee8fcdab5d74cf343bcb0306c9811 B-Indicator | |
| e3f77ff093f322e139940b33994c5a57ae010b66668668dc4945142a81bcc049 B-Indicator | |
| ebd0a8043434edac261cb25b94f417188a5c0d62b5dd4033f156b890d150a4c5 B-Indicator | |
| f51a27163cb0ddd08caa29d865b9f238848118ba2589626af711330481b352df B-Indicator | |
| Tracking O | |
| down O | |
| the O | |
| developer O | |
| of O | |
| Android B-System | |
| adware O | |
| affecting O | |
| millions O | |
| of O | |
| users O | |
| 24 O | |
| Oct O | |
| 2019 O | |
| - O | |
| 11:30AM O | |
| We O | |
| detected O | |
| a O | |
| large O | |
| adware O | |
| campaign O | |
| running O | |
| for O | |
| about O | |
| a O | |
| year O | |
| , O | |
| with O | |
| the O | |
| involved O | |
| apps O | |
| installed O | |
| eight O | |
| million O | |
| times O | |
| from O | |
| Google B-System | |
| Play I-System | |
| alone O | |
| . O | |
| We O | |
| identified O | |
| 42 O | |
| apps O | |
| on O | |
| Google B-System | |
| Play I-System | |
| as O | |
| belonging O | |
| to O | |
| the O | |
| campaign O | |
| , O | |
| which O | |
| had O | |
| been O | |
| running O | |
| since O | |
| July O | |
| 2018 O | |
| . O | |
| Of O | |
| those O | |
| , O | |
| 21 O | |
| were O | |
| still O | |
| available O | |
| at O | |
| the O | |
| time O | |
| of O | |
| discovery O | |
| . O | |
| We O | |
| reported O | |
| the O | |
| apps O | |
| to O | |
| the O | |
| Google O | |
| security O | |
| team O | |
| and O | |
| they O | |
| were O | |
| swiftly O | |
| removed O | |
| . O | |
| However O | |
| , O | |
| the O | |
| apps O | |
| are O | |
| still O | |
| available O | |
| in O | |
| third-party O | |
| app O | |
| stores O | |
| . O | |
| ESET B-Organization | |
| detects O | |
| this O | |
| adware O | |
| , O | |
| collectively O | |
| , O | |
| as O | |
| Android/AdDisplay.Ashas B-Malware | |
| . O | |
| Figure O | |
| 1 O | |
| . O | |
| Apps O | |
| of O | |
| the O | |
| Android/AdDisplay.Ashas B-Malware | |
| family O | |
| reported O | |
| to O | |
| Google O | |
| by O | |
| ESET B-Organization | |
| Figure O | |
| 2 O | |
| . O | |
| The O | |
| most O | |
| popular O | |
| member O | |
| of O | |
| the O | |
| Android/AdDisplay.Ashas B-Malware | |
| family I-Malware | |
| on O | |
| Google B-System | |
| Play I-System | |
| was O | |
| β O | |
| Video O | |
| downloader O | |
| master O | |
| β O | |
| with O | |
| over O | |
| five O | |
| million O | |
| downloads O | |
| Ashas B-Malware | |
| functionality O | |
| All O | |
| the O | |
| apps O | |
| provide O | |
| the O | |
| functionality O | |
| they O | |
| promise O | |
| , O | |
| besides O | |
| working O | |
| as O | |
| adware O | |
| . O | |
| The O | |
| adware O | |
| functionality O | |
| is O | |
| the O | |
| same O | |
| in O | |
| all O | |
| the O | |
| apps O | |
| we O | |
| analyzed O | |
| . O | |
| [ O | |
| Note O | |
| : O | |
| The O | |
| analysis O | |
| of O | |
| the O | |
| functionality O | |
| below O | |
| describes O | |
| a O | |
| single O | |
| app O | |
| , O | |
| but O | |
| applies O | |
| to O | |
| all O | |
| apps O | |
| of O | |
| the O | |
| Android/AdDisplay.Ashas B-Malware | |
| family I-Malware | |
| . O | |
| ] O | |
| Once O | |
| launched O | |
| , O | |
| the O | |
| app O | |
| starts O | |
| to O | |
| communicate O | |
| with O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| ( O | |
| whose O | |
| IP O | |
| address O | |
| is O | |
| base64-encoded O | |
| in O | |
| the O | |
| app O | |
| ) O | |
| . O | |
| It O | |
| sends O | |
| β O | |
| home O | |
| β O | |
| key O | |
| data O | |
| about O | |
| the O | |
| affected O | |
| device O | |
| : O | |
| device O | |
| type O | |
| , O | |
| OS O | |
| version O | |
| , O | |
| language O | |
| , O | |
| number O | |
| of O | |
| installed O | |
| apps O | |
| , O | |
| free O | |
| storage O | |
| space O | |
| , O | |
| battery O | |
| status O | |
| , O | |
| whether O | |
| the O | |
| device O | |
| is O | |
| rooted O | |
| and O | |
| Developer O | |
| mode O | |
| enabled O | |
| , O | |
| and O | |
| whether O | |
| Facebook B-Organization | |
| and O | |
| FB O | |
| Messenger B-System | |
| are O | |
| installed O | |
| . O | |
| Figure O | |
| 3 O | |
| . O | |
| Sending O | |
| information O | |
| about O | |
| the O | |
| affected O | |
| device O | |
| The O | |
| app O | |
| receives O | |
| configuration O | |
| data O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| , O | |
| needed O | |
| for O | |
| displaying O | |
| ads O | |
| , O | |
| and O | |
| for O | |
| stealth O | |
| and O | |
| resilience O | |
| . O | |
| Figure O | |
| 4 O | |
| . O | |
| Configuration O | |
| file O | |
| received O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| As O | |
| for O | |
| stealth O | |
| and O | |
| resilience O | |
| , O | |
| the O | |
| attacker O | |
| uses O | |
| a O | |
| number O | |
| of O | |
| tricks O | |
| . O | |
| First O | |
| , O | |
| the O | |
| malicious O | |
| app O | |
| tries O | |
| to O | |
| determine O | |
| whether O | |
| it O | |
| is O | |
| being O | |
| tested O | |
| by O | |
| the O | |
| Google B-System | |
| Play I-System | |
| security O | |
| mechanism O | |
| . O | |
| For O | |
| this O | |
| purpose O | |
| , O | |
| the O | |
| app O | |
| receives O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| the O | |
| isGoogleIp O | |
| flag O | |
| , O | |
| which O | |
| indicates O | |
| whether O | |
| the O | |
| IP O | |
| address O | |
| of O | |
| the O | |
| affected O | |
| device O | |
| falls O | |
| within O | |
| the O | |
| range O | |
| of O | |
| known O | |
| IP O | |
| addresses O | |
| for O | |
| Google O | |
| servers O | |
| . O | |
| If O | |
| the O | |
| server O | |
| returns O | |
| this O | |
| flag O | |
| as O | |
| positive O | |
| , O | |
| the O | |
| app O | |
| will O | |
| not O | |
| trigger O | |
| the O | |
| adware O | |
| payload O | |
| . O | |
| Second O | |
| , O | |
| the O | |
| app O | |
| can O | |
| set O | |
| a O | |
| custom O | |
| delay O | |
| between O | |
| displaying O | |
| ads O | |
| . O | |
| The O | |
| samples O | |
| we O | |
| have O | |
| seen O | |
| had O | |
| their O | |
| configuration O | |
| set O | |
| to O | |
| delay O | |
| displaying O | |
| the O | |
| first O | |
| ad O | |
| by O | |
| 24 O | |
| minutes O | |
| after O | |
| the O | |
| device O | |
| unlocks O | |
| . O | |
| This O | |
| delay O | |
| means O | |
| that O | |
| a O | |
| typical O | |
| testing O | |
| procedure O | |
| , O | |
| which O | |
| takes O | |
| less O | |
| than O | |
| 10 O | |
| minutes O | |
| , O | |
| will O | |
| not O | |
| detect O | |
| any O | |
| unwanted O | |
| behavior O | |
| . O | |
| Also O | |
| , O | |
| the O | |
| longer O | |
| the O | |
| delay O | |
| , O | |
| the O | |
| lower O | |
| the O | |
| risk O | |
| of O | |
| the O | |
| user O | |
| associating O | |
| the O | |
| unwanted O | |
| ads O | |
| with O | |
| a O | |
| particular O | |
| app O | |
| . O | |
| Third O | |
| , O | |
| based O | |
| on O | |
| the O | |
| server O | |
| response O | |
| , O | |
| the O | |
| app O | |
| can O | |
| also O | |
| hide O | |
| its O | |
| icon O | |
| and O | |
| create O | |
| a O | |
| shortcut O | |
| instead O | |
| . O | |
| If O | |
| a O | |
| typical O | |
| user O | |
| tries O | |
| to O | |
| get O | |
| rid O | |
| of O | |
| the O | |
| malicious O | |
| app O | |
| , O | |
| chances O | |
| are O | |
| that O | |
| only O | |
| the O | |
| shortcut O | |
| ends O | |
| up O | |
| getting O | |
| removed O | |
| . O | |
| The O | |
| app O | |
| then O | |
| continues O | |
| to O | |
| run O | |
| in O | |
| the O | |
| background O | |
| without O | |
| the O | |
| user O | |
| β O | |
| s O | |
| knowledge O | |
| . O | |
| This O | |
| stealth O | |
| technique O | |
| has O | |
| been O | |
| gaining O | |
| popularity O | |
| among O | |
| adware-related O | |
| threats O | |
| distributed O | |
| via O | |
| Google B-System | |
| Play I-System | |
| . O | |
| Figure O | |
| 5 O | |
| . O | |
| Time O | |
| delay O | |
| to O | |
| postpone O | |
| displaying O | |
| ads O | |
| implemented O | |
| by O | |
| the O | |
| adware O | |
| Once O | |
| the O | |
| malicious O | |
| app O | |
| receives O | |
| its O | |
| configuration O | |
| data O | |
| , O | |
| the O | |
| affected O | |
| device O | |
| is O | |
| ready O | |
| to O | |
| display O | |
| ads O | |
| as O | |
| per O | |
| the O | |
| attacker O | |
| β O | |
| s O | |
| choice O | |
| ; O | |
| each O | |
| ad O | |
| is O | |
| displayed O | |
| as O | |
| a O | |
| full O | |
| screen O | |
| activity O | |
| . O | |
| If O | |
| the O | |
| user O | |
| wants O | |
| to O | |
| check O | |
| which O | |
| app O | |
| is O | |
| responsible O | |
| for O | |
| the O | |
| ad O | |
| being O | |
| displayed O | |
| , O | |
| by O | |
| hitting O | |
| the O | |
| β O | |
| Recent O | |
| apps O | |
| β O | |
| button O | |
| , O | |
| another O | |
| trick O | |
| is O | |
| used O | |
| : O | |
| the O | |
| app O | |
| displays O | |
| a O | |
| Facebook B-Organization | |
| or O | |
| Google B-Organization | |
| icon O | |
| , O | |
| as O | |
| seen O | |
| in O | |
| Figure O | |
| 6 O | |
| . O | |
| The O | |
| adware O | |
| mimics O | |
| these O | |
| two O | |
| apps O | |
| to O | |
| look O | |
| legitimate O | |
| and O | |
| avoid O | |
| suspicion O | |
| β O | |
| and O | |
| thus O | |
| stay O | |
| on O | |
| the O | |
| affected O | |
| device O | |
| for O | |
| as O | |
| long O | |
| as O | |
| possible O | |
| . O | |
| Figure O | |
| 6 O | |
| . O | |
| The O | |
| adware O | |
| activity O | |
| impersonates O | |
| Facebook B-Organization | |
| ( O | |
| left O | |
| ) O | |
| . O | |
| If O | |
| the O | |
| user O | |
| long-presses O | |
| the O | |
| icon O | |
| , O | |
| the O | |
| name O | |
| of O | |
| the O | |
| app O | |
| responsible O | |
| for O | |
| the O | |
| activity O | |
| is O | |
| revealed O | |
| ( O | |
| right O | |
| ) O | |
| . O | |
| Finally O | |
| , O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| family O | |
| has O | |
| its O | |
| code O | |
| hidden O | |
| under O | |
| the O | |
| com.google.xxx O | |
| package O | |
| name O | |
| . O | |
| This O | |
| trick O | |
| β O | |
| posing O | |
| as O | |
| a O | |
| part O | |
| of O | |
| a O | |
| legitimate O | |
| Google B-Organization | |
| service O | |
| β O | |
| may O | |
| help O | |
| avoid O | |
| scrutiny O | |
| . O | |
| Some O | |
| detection O | |
| mechanisms O | |
| and O | |
| sandboxes O | |
| may O | |
| whitelist O | |
| such O | |
| package O | |
| names O | |
| , O | |
| in O | |
| an O | |
| effort O | |
| to O | |
| prevent O | |
| wasting O | |
| resources O | |
| . O | |
| Figure O | |
| 7 O | |
| . O | |
| Malicious O | |
| code O | |
| hidden O | |
| in O | |
| a O | |
| package O | |
| named O | |
| β O | |
| com.google O | |
| β O | |
| Hunting O | |
| down O | |
| the O | |
| developer O | |
| Using O | |
| open-source O | |
| information O | |
| , O | |
| we O | |
| tracked O | |
| down O | |
| the O | |
| developer O | |
| of O | |
| the O | |
| adware O | |
| , O | |
| who O | |
| we O | |
| also O | |
| identified O | |
| as O | |
| the O | |
| campaign O | |
| β O | |
| s O | |
| operator O | |
| and O | |
| owner O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| In O | |
| the O | |
| following O | |
| paragraphs O | |
| , O | |
| we O | |
| outline O | |
| our O | |
| efforts O | |
| to O | |
| discover O | |
| other O | |
| applications O | |
| from O | |
| the O | |
| same O | |
| developer O | |
| and O | |
| protect O | |
| our O | |
| users O | |
| from O | |
| it O | |
| . O | |
| First O | |
| , O | |
| based O | |
| on O | |
| information O | |
| that O | |
| is O | |
| associated O | |
| with O | |
| the O | |
| registered O | |
| C O | |
| & O | |
| C O | |
| domain O | |
| , O | |
| we O | |
| identified O | |
| the O | |
| name O | |
| of O | |
| the O | |
| registrant O | |
| , O | |
| along O | |
| with O | |
| further O | |
| data O | |
| like O | |
| country O | |
| and O | |
| email O | |
| address O | |
| , O | |
| as O | |
| seen O | |
| in O | |
| Figure O | |
| 8 O | |
| . O | |
| Figure O | |
| 8 O | |
| . O | |
| Information O | |
| about O | |
| the O | |
| C O | |
| & O | |
| C O | |
| domain O | |
| used O | |
| by O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| Knowing O | |
| that O | |
| the O | |
| information O | |
| provided O | |
| to O | |
| a O | |
| domain O | |
| registrar O | |
| might O | |
| be O | |
| fake O | |
| , O | |
| we O | |
| continued O | |
| our O | |
| search O | |
| . O | |
| The O | |
| email O | |
| address O | |
| and O | |
| country O | |
| information O | |
| drove O | |
| us O | |
| to O | |
| a O | |
| list O | |
| of O | |
| students O | |
| attending O | |
| a O | |
| class O | |
| at O | |
| a O | |
| Vietnamese O | |
| university O | |
| β O | |
| corroborating O | |
| the O | |
| existence O | |
| of O | |
| the O | |
| person O | |
| under O | |
| whose O | |
| name O | |
| the O | |
| domain O | |
| was O | |
| registered O | |
| . O | |
| Figure O | |
| 9 O | |
| . O | |
| A O | |
| university O | |
| class O | |
| student O | |
| list O | |
| including O | |
| the O | |
| C O | |
| & O | |
| C O | |
| domain O | |
| registrant O | |
| Due O | |
| to O | |
| poor O | |
| privacy O | |
| practices O | |
| on O | |
| the O | |
| part O | |
| of O | |
| our O | |
| culprit O | |
| β O | |
| s O | |
| university O | |
| , O | |
| we O | |
| now O | |
| know O | |
| his O | |
| date O | |
| of O | |
| birth O | |
| ( O | |
| probably O | |
| : O | |
| he O | |
| seemingly O | |
| used O | |
| his O | |
| birth O | |
| year O | |
| as O | |
| part O | |
| of O | |
| his O | |
| Gmail B-System | |
| address O | |
| , O | |
| as O | |
| further O | |
| partial O | |
| confirmation O | |
| ) O | |
| , O | |
| we O | |
| know O | |
| that O | |
| he O | |
| was O | |
| a O | |
| student O | |
| and O | |
| what O | |
| university O | |
| he O | |
| attended O | |
| . O | |
| We O | |
| were O | |
| also O | |
| able O | |
| to O | |
| confirm O | |
| that O | |
| the O | |
| phone O | |
| number O | |
| he O | |
| provided O | |
| to O | |
| the O | |
| domain O | |
| registrar O | |
| was O | |
| genuine O | |
| . O | |
| Moreover O | |
| , O | |
| we O | |
| retrieved O | |
| his O | |
| University O | |
| ID O | |
| ; O | |
| a O | |
| quick O | |
| googling O | |
| showed O | |
| some O | |
| of O | |
| his O | |
| exam O | |
| grades O | |
| . O | |
| However O | |
| , O | |
| his O | |
| study O | |
| results O | |
| are O | |
| out O | |
| of O | |
| the O | |
| scope O | |
| of O | |
| our O | |
| research O | |
| . O | |
| Based O | |
| on O | |
| our O | |
| culprit O | |
| β O | |
| s O | |
| email O | |
| address O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| find O | |
| his O | |
| GitHub B-Organization | |
| repository O | |
| . O | |
| His O | |
| repository O | |
| proves O | |
| that O | |
| he O | |
| is O | |
| indeed O | |
| an O | |
| Android B-System | |
| developer O | |
| , O | |
| but O | |
| it O | |
| contained O | |
| no O | |
| publicly O | |
| available O | |
| code O | |
| of O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| at O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| of O | |
| this O | |
| blogpost O | |
| . O | |
| However O | |
| , O | |
| a O | |
| simple O | |
| Google B-Organization | |
| search O | |
| for O | |
| the O | |
| adware O | |
| package O | |
| name O | |
| returned O | |
| a O | |
| β O | |
| TestDelete O | |
| β O | |
| project O | |
| that O | |
| had O | |
| been O | |
| available O | |
| in O | |
| his O | |
| repository O | |
| at O | |
| some O | |
| point O | |
| The O | |
| malicious O | |
| developer O | |
| also O | |
| has O | |
| apps O | |
| in O | |
| Apple B-Organization | |
| β O | |
| s O | |
| App B-System | |
| Store I-System | |
| . O | |
| Some O | |
| of O | |
| them O | |
| are O | |
| iOS B-System | |
| versions O | |
| of O | |
| the O | |
| ones O | |
| removed O | |
| from O | |
| Google B-System | |
| Play I-System | |
| , O | |
| but O | |
| none O | |
| contain O | |
| adware O | |
| functionality O | |
| . O | |
| Figure O | |
| 10 O | |
| . O | |
| The O | |
| malicious O | |
| developer O | |
| β O | |
| s O | |
| apps O | |
| published O | |
| on O | |
| the O | |
| App O | |
| Store O | |
| which O | |
| don O | |
| β O | |
| t O | |
| contain O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| Searching O | |
| further O | |
| for O | |
| the O | |
| malicious O | |
| developer O | |
| β O | |
| s O | |
| activities O | |
| , O | |
| we O | |
| also O | |
| discovered O | |
| his O | |
| Youtube B-System | |
| channel O | |
| propagating O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| and O | |
| his O | |
| other O | |
| projects O | |
| . O | |
| As O | |
| for O | |
| the O | |
| Ashas B-Malware | |
| family O | |
| , O | |
| one O | |
| of O | |
| the O | |
| associated O | |
| promotional O | |
| videos O | |
| , O | |
| β O | |
| Head O | |
| Soccer O | |
| World O | |
| Champion O | |
| 2018 O | |
| β O | |
| Android B-System | |
| , O | |
| ios B-System | |
| β O | |
| was O | |
| viewed O | |
| almost O | |
| three O | |
| million O | |
| times O | |
| and O | |
| two O | |
| others O | |
| reached O | |
| hundreds O | |
| of O | |
| thousands O | |
| of O | |
| views O | |
| , O | |
| as O | |
| seen O | |
| in O | |
| Figure O | |
| 11 O | |
| . O | |
| Figure O | |
| 11 O | |
| . O | |
| YouTube B-System | |
| channel O | |
| of O | |
| the O | |
| malicious O | |
| developer O | |
| His O | |
| YouTube B-System | |
| channel O | |
| provided O | |
| us O | |
| with O | |
| another O | |
| valuable O | |
| piece O | |
| of O | |
| information O | |
| : O | |
| he O | |
| himself O | |
| features O | |
| in O | |
| a O | |
| video O | |
| tutorial O | |
| for O | |
| one O | |
| of O | |
| his O | |
| other O | |
| projects O | |
| . O | |
| Thanks O | |
| to O | |
| that O | |
| project O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| extract O | |
| his O | |
| Facebook B-Organization | |
| profile O | |
| β O | |
| which O | |
| lists O | |
| his O | |
| studies O | |
| at O | |
| the O | |
| aforementioned O | |
| university O | |
| . O | |
| Figure O | |
| 12 O | |
| . O | |
| Facebook B-Organization | |
| profile O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| domain O | |
| registrar O | |
| ( O | |
| cover O | |
| picture O | |
| and O | |
| profile O | |
| picture O | |
| edited O | |
| out O | |
| ) O | |
| Linked O | |
| on O | |
| the O | |
| malicious O | |
| developer O | |
| β O | |
| s O | |
| Facebook B-Organization | |
| profile O | |
| , O | |
| we O | |
| discovered O | |
| a O | |
| Facebook B-Organization | |
| page O | |
| , O | |
| Minigameshouse B-Indicator | |
| , O | |
| and O | |
| an O | |
| associated O | |
| domain O | |
| , O | |
| minigameshouse B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| net I-Indicator | |
| . O | |
| This O | |
| domain O | |
| is O | |
| similar O | |
| to O | |
| the O | |
| one O | |
| the O | |
| malware O | |
| author O | |
| used O | |
| for O | |
| his O | |
| adware O | |
| C O | |
| & O | |
| C O | |
| communication O | |
| , O | |
| minigameshouse B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| us I-Indicator | |
| . O | |
| Checking O | |
| this O | |
| Minigameshouse B-Indicator | |
| page O | |
| further O | |
| indicates O | |
| that O | |
| this O | |
| person O | |
| is O | |
| indeed O | |
| the O | |
| owner O | |
| of O | |
| the O | |
| minigameshouse B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| us I-Indicator | |
| domain I-Indicator | |
| : O | |
| the O | |
| phone O | |
| number O | |
| registered O | |
| with O | |
| this O | |
| domain O | |
| is O | |
| the O | |
| same O | |
| as O | |
| the O | |
| phone O | |
| number O | |
| appearing O | |
| on O | |
| the O | |
| Facebook B-Organization | |
| page O | |
| . O | |
| Figure O | |
| 13 O | |
| . O | |
| Facebook B-Organization | |
| page O | |
| managed O | |
| by O | |
| the O | |
| C O | |
| & O | |
| C O | |
| domain O | |
| registrant O | |
| uses O | |
| the O | |
| same O | |
| base O | |
| domain O | |
| name O | |
| ( O | |
| minigameshouse O | |
| ) O | |
| and O | |
| phone O | |
| number O | |
| as O | |
| the O | |
| registered O | |
| malicious O | |
| C O | |
| & O | |
| C O | |
| used O | |
| by O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| Of O | |
| interest O | |
| is O | |
| that O | |
| on O | |
| the O | |
| Minigameshouse O | |
| Facebook B-Organization | |
| page O | |
| , O | |
| the O | |
| malicious O | |
| developer O | |
| promotes O | |
| a O | |
| slew O | |
| of O | |
| games O | |
| beyond O | |
| the O | |
| Ashas B-Malware | |
| family O | |
| for O | |
| download O | |
| on O | |
| both O | |
| Google B-System | |
| Play I-System | |
| and O | |
| the O | |
| App B-System | |
| Store I-System | |
| . O | |
| However O | |
| , O | |
| all O | |
| of O | |
| those O | |
| have O | |
| been O | |
| removed O | |
| from O | |
| Google B-System | |
| Play I-System | |
| β O | |
| despite O | |
| the O | |
| fact O | |
| that O | |
| some O | |
| of O | |
| them O | |
| didn O | |
| β O | |
| t O | |
| contain O | |
| any O | |
| adware O | |
| functionality O | |
| . O | |
| On O | |
| top O | |
| of O | |
| all O | |
| this O | |
| , O | |
| one O | |
| of O | |
| the O | |
| malicious O | |
| developer O | |
| β O | |
| s O | |
| YouTube B-System | |
| videos O | |
| β O | |
| a O | |
| tutorial O | |
| on O | |
| developing O | |
| an O | |
| β O | |
| Instant O | |
| Game O | |
| β O | |
| for O | |
| Facebook B-Organization | |
| β O | |
| serves O | |
| as O | |
| an O | |
| example O | |
| of O | |
| operational O | |
| security O | |
| completely O | |
| ignored O | |
| . O | |
| We O | |
| were O | |
| able O | |
| to O | |
| see O | |
| that O | |
| his O | |
| recently O | |
| visited O | |
| web O | |
| sites O | |
| were O | |
| Google B-System | |
| Play I-System | |
| pages O | |
| belonging O | |
| to O | |
| apps O | |
| containing O | |
| the O | |
| Ashas B-Malware | |
| adware I-Malware | |
| . O | |
| He O | |
| also O | |
| used O | |
| his O | |
| email O | |
| account O | |
| to O | |
| log O | |
| into O | |
| various O | |
| services O | |
| in O | |
| the O | |
| video O | |
| , O | |
| which O | |
| identifies O | |
| him O | |
| as O | |
| the O | |
| adware O | |
| domain O | |
| owner O | |
| , O | |
| beyond O | |
| any O | |
| doubt O | |
| . O | |
| Thanks O | |
| to O | |
| the O | |
| video O | |
| , O | |
| we O | |
| were O | |
| even O | |
| able O | |
| to O | |
| identify O | |
| three O | |
| further O | |
| apps O | |
| that O | |
| contained O | |
| adware O | |
| functionality O | |
| and O | |
| were O | |
| available O | |
| on O | |
| Google B-System | |
| Play I-System | |
| . O | |
| Figure O | |
| 14 O | |
| . O | |
| Screenshots O | |
| from O | |
| this O | |
| developer O | |
| β O | |
| s O | |
| YouTube B-System | |
| video O | |
| shows O | |
| history O | |
| of O | |
| checking O | |
| Ashas B-Malware | |
| adware O | |
| on O | |
| Google B-System | |
| Play I-System | |
| ESET B-Organization | |
| telemetry O | |
| Figure O | |
| 15 O | |
| . O | |
| ESET B-Organization | |
| detections O | |
| of O | |
| Android/AdDisplay.Ashas B-Malware | |
| on O | |
| Android O | |
| devices O | |
| by O | |
| country O | |
| Is O | |
| adware O | |
| harmful O | |
| ? O | |
| Because O | |
| the O | |
| real O | |
| nature O | |
| of O | |
| apps O | |
| containing O | |
| adware O | |
| is O | |
| usually O | |
| hidden O | |
| to O | |
| the O | |
| user O | |
| , O | |
| these O | |
| apps O | |
| and O | |
| their O | |
| developers O | |
| should O | |
| be O | |
| considered O | |
| untrustworthy O | |
| . O | |
| When O | |
| installed O | |
| on O | |
| a O | |
| device O | |
| , O | |
| apps O | |
| containing O | |
| adware O | |
| may O | |
| , O | |
| among O | |
| other O | |
| things O | |
| : O | |
| Annoy O | |
| users O | |
| with O | |
| intrusive O | |
| advertisements O | |
| , O | |
| including O | |
| scam O | |
| ads O | |
| Waste O | |
| the O | |
| device O | |
| β O | |
| s O | |
| battery O | |
| resources O | |
| Generate O | |
| increased O | |
| network O | |
| traffic O | |
| Gather O | |
| users O | |
| β O | |
| personal O | |
| information O | |
| Hide O | |
| their O | |
| presence O | |
| on O | |
| the O | |
| affected O | |
| device O | |
| to O | |
| achieve O | |
| persistence O | |
| Generate O | |
| revenue O | |
| for O | |
| their O | |
| operator O | |
| without O | |
| any O | |
| user O | |
| interaction O | |
| Conclusion O | |
| Based O | |
| solely O | |
| on O | |
| open O | |
| source O | |
| intelligence O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| trace O | |
| the O | |
| developer O | |
| of O | |
| the O | |
| Ashas B-Malware | |
| adware O | |
| and O | |
| establish O | |
| his O | |
| identity O | |
| and O | |
| discover O | |
| additional O | |
| related O | |
| adware-infected O | |
| apps O | |
| . O | |
| Seeing O | |
| that O | |
| the O | |
| developer O | |
| did O | |
| not O | |
| take O | |
| any O | |
| measures O | |
| to O | |
| protect O | |
| his O | |
| identity O | |
| , O | |
| it O | |
| seems O | |
| likely O | |
| that O | |
| his O | |
| intentions O | |
| weren O | |
| β O | |
| t O | |
| dishonest O | |
| at O | |
| first O | |
| β O | |
| and O | |
| this O | |
| is O | |
| also O | |
| supported O | |
| by O | |
| the O | |
| fact O | |
| that O | |
| not O | |
| all O | |
| his O | |
| published O | |
| apps O | |
| contained O | |
| unwanted O | |
| ads O | |
| . O | |
| At O | |
| some O | |
| point O | |
| in O | |
| his O | |
| Google B-System | |
| Play I-System | |
| β O | |
| career O | |
| β O | |
| , O | |
| he O | |
| apparently O | |
| decided O | |
| to O | |
| increase O | |
| his O | |
| ad O | |
| revenue O | |
| by O | |
| implementing O | |
| adware O | |
| functionality O | |
| in O | |
| his O | |
| apps O | |
| β O | |
| code O | |
| . O | |
| The O | |
| various O | |
| stealth O | |
| and O | |
| resilience O | |
| techniques O | |
| implemented O | |
| in O | |
| the O | |
| adware O | |
| show O | |
| us O | |
| that O | |
| the O | |
| culprit O | |
| was O | |
| aware O | |
| of O | |
| the O | |
| malicious O | |
| nature O | |
| of O | |
| the O | |
| added O | |
| functionality O | |
| and O | |
| attempted O | |
| to O | |
| keep O | |
| it O | |
| hidden O | |
| . O | |
| Sneaking O | |
| unwanted O | |
| or O | |
| harmful O | |
| functionality O | |
| into O | |
| popular O | |
| , O | |
| benign O | |
| apps O | |
| is O | |
| a O | |
| common O | |
| practice O | |
| among O | |
| β O | |
| bad O | |
| β O | |
| developers O | |
| , O | |
| and O | |
| we O | |
| are O | |
| committed O | |
| to O | |
| tracking O | |
| down O | |
| such O | |
| apps O | |
| . O | |
| We O | |
| report O | |
| them O | |
| to O | |
| Google B-Organization | |
| and O | |
| take O | |
| other O | |
| steps O | |
| to O | |
| disrupt O | |
| malicious O | |
| campaigns O | |
| we O | |
| discover O | |
| . O | |
| Last O | |
| but O | |
| not O | |
| least O | |
| , O | |
| we O | |
| publish O | |
| our O | |
| findings O | |
| to O | |
| help O | |
| Android B-System | |
| users O | |
| protect O | |
| themselves O | |
| . O | |
| MITRE B-Organization | |
| ATT O | |
| & O | |
| CK O | |
| techniques O | |
| Tactic O | |
| ID O | |
| Name O | |
| Description O | |
| Initial O | |
| Access O | |
| T1475 O | |
| Deliver O | |
| Malicious O | |
| App O | |
| via O | |
| Authorized O | |
| App O | |
| Store O | |
| The O | |
| malware O | |
| impersonates O | |
| legitimate O | |
| services O | |
| on O | |
| Google B-System | |
| Play I-System | |
| Persistence O | |
| T1402 O | |
| App O | |
| Auto-Start O | |
| at O | |
| Device O | |
| Boot O | |
| An O | |
| Android O | |
| application O | |
| can O | |
| listen O | |
| for O | |
| the O | |
| BOOT_COMPLETED O | |
| broadcast O | |
| , O | |
| ensuring O | |
| that O | |
| the O | |
| app O | |
| 's O | |
| functionality O | |
| will O | |
| be O | |
| activated O | |
| every O | |
| time O | |
| the O | |
| device O | |
| starts O | |
| Impact O | |
| T1472 O | |
| Generate O | |
| Fraudulent O | |
| Advertising O | |
| Revenue O | |
| Generates O | |
| revenue O | |
| by O | |
| automatically O | |
| displaying O | |
| ads O | |
| The O | |
| Rotexy B-Malware | |
| mobile O | |
| Trojan O | |
| β O | |
| banker O | |
| and O | |
| ransomware O | |
| 22 O | |
| NOV O | |
| 2018 O | |
| On O | |
| the O | |
| back O | |
| of O | |
| a O | |
| surge O | |
| in O | |
| Trojan O | |
| activity O | |
| , O | |
| we O | |
| decided O | |
| to O | |
| carry O | |
| out O | |
| an O | |
| in-depth O | |
| analysis O | |
| and O | |
| track O | |
| the O | |
| evolution O | |
| of O | |
| some O | |
| other O | |
| popular O | |
| malware O | |
| families O | |
| besides O | |
| Asacub B-Malware | |
| . O | |
| One O | |
| of O | |
| the O | |
| most O | |
| interesting O | |
| and O | |
| active O | |
| specimens O | |
| to O | |
| date O | |
| was O | |
| a O | |
| mobile O | |
| Trojan O | |
| from O | |
| the O | |
| Rotexy B-Malware | |
| family O | |
| . O | |
| In O | |
| a O | |
| three-month O | |
| period O | |
| from O | |
| August O | |
| to O | |
| October O | |
| 2018 O | |
| , O | |
| it O | |
| launched O | |
| over O | |
| 70,000 O | |
| attacks O | |
| against O | |
| users O | |
| located O | |
| primarily O | |
| in O | |
| Russia O | |
| . O | |
| An O | |
| interesting O | |
| feature O | |
| of O | |
| this O | |
| family O | |
| of O | |
| banking O | |
| Trojans O | |
| is O | |
| the O | |
| simultaneous O | |
| use O | |
| of O | |
| three O | |
| command O | |
| sources O | |
| : O | |
| Google O | |
| Cloud O | |
| Messaging O | |
| ( O | |
| GCM O | |
| ) O | |
| service O | |
| β O | |
| used O | |
| to O | |
| send O | |
| small O | |
| messages O | |
| in O | |
| JSON O | |
| format O | |
| to O | |
| a O | |
| mobile O | |
| device O | |
| via O | |
| Google O | |
| servers O | |
| ; O | |
| malicious O | |
| C O | |
| & O | |
| C O | |
| server O | |
| ; O | |
| incoming O | |
| SMS O | |
| messages O | |
| . O | |
| This O | |
| β O | |
| versatility O | |
| β O | |
| was O | |
| present O | |
| in O | |
| the O | |
| first O | |
| version O | |
| of O | |
| Rotexy B-Malware | |
| and O | |
| has O | |
| been O | |
| a O | |
| feature O | |
| of O | |
| all O | |
| the O | |
| family O | |
| β O | |
| s O | |
| subsequent O | |
| representatives O | |
| . O | |
| During O | |
| our O | |
| research O | |
| we O | |
| also O | |
| arrived O | |
| at O | |
| the O | |
| conclusion O | |
| that O | |
| this O | |
| Trojan O | |
| evolved O | |
| from O | |
| an O | |
| SMS O | |
| spyware O | |
| Trojan O | |
| that O | |
| was O | |
| first O | |
| spotted O | |
| in O | |
| October O | |
| 2014 O | |
| . O | |
| Back O | |
| then O | |
| it O | |
| was O | |
| detected O | |
| as O | |
| Trojan-Spy.AndroidOS.SmsThief B-Malware | |
| , O | |
| but O | |
| later O | |
| versions O | |
| were O | |
| assigned O | |
| to O | |
| another O | |
| family O | |
| β O | |
| Trojan-Banker.AndroidOS.Rotexy B-Malware | |
| . O | |
| The O | |
| modern O | |
| version O | |
| of O | |
| Rotexy B-Malware | |
| combines O | |
| the O | |
| functions O | |
| of O | |
| a O | |
| banking O | |
| Trojan O | |
| and O | |
| ransomware O | |
| . O | |
| It O | |
| spreads O | |
| under O | |
| the O | |
| name O | |
| AvitoPay.apk B-Indicator | |
| ( O | |
| or O | |
| similar O | |
| ) O | |
| and O | |
| downloads O | |
| from O | |
| websites O | |
| with O | |
| names O | |
| like O | |
| youla9d6h.tk B-Indicator | |
| , O | |
| prodam8n9.tk B-Indicator | |
| , O | |
| prodamfkz.ml B-Indicator | |
| , O | |
| avitoe0ys.tk B-Indicator | |
| , O | |
| etc O | |
| . O | |
| These O | |
| website O | |
| names O | |
| are O | |
| generated O | |
| according O | |
| to O | |
| a O | |
| clear O | |
| algorithm O | |
| : O | |
| the O | |
| first O | |
| few O | |
| letters O | |
| are O | |
| suggestive O | |
| of O | |
| popular O | |
| classified O | |
| ad O | |
| services O | |
| , O | |
| followed O | |
| by O | |
| a O | |
| random O | |
| string O | |
| of O | |
| characters O | |
| , O | |
| followed O | |
| by O | |
| a O | |
| two-letter O | |
| top-level O | |
| domain O | |
| . O | |
| But O | |
| before O | |
| we O | |
| go O | |
| into O | |
| the O | |
| details O | |
| of O | |
| what O | |
| the O | |
| latest O | |
| version O | |
| of O | |
| Rotexy B-Malware | |
| can O | |
| do O | |
| and O | |
| why O | |
| it O | |
| β O | |
| s O | |
| distinctive O | |
| , O | |
| we O | |
| would O | |
| like O | |
| to O | |
| give O | |
| a O | |
| summary O | |
| of O | |
| the O | |
| path O | |
| the O | |
| Trojan O | |
| has O | |
| taken O | |
| since O | |
| 2014 O | |
| up O | |
| to O | |
| the O | |
| present O | |
| day O | |
| . O | |
| Evolution O | |
| of O | |
| Rotexy B-Malware | |
| 2014β2015 O | |
| Since O | |
| the O | |
| malicious O | |
| program O | |
| was O | |
| detected O | |
| in O | |
| 2014 O | |
| , O | |
| its O | |
| main O | |
| functions O | |
| and O | |
| propagation O | |
| method O | |
| have O | |
| not O | |
| changed O | |
| : O | |
| Rotexy B-Malware | |
| spreads O | |
| via O | |
| links O | |
| sent O | |
| in O | |
| phishing O | |
| SMSs O | |
| that O | |
| prompt O | |
| the O | |
| user O | |
| to O | |
| install O | |
| an O | |
| app O | |
| . O | |
| As O | |
| it O | |
| launches O | |
| , O | |
| it O | |
| requests O | |
| device O | |
| administrator O | |
| rights O | |
| , O | |
| and O | |
| then O | |
| starts O | |
| communicating O | |
| with O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| Until O | |
| mid-2015 O | |
| , O | |
| Rotexy B-Malware | |
| used O | |
| a O | |
| plain-text O | |
| JSON O | |
| format O | |
| to O | |
| communicate O | |
| with O | |
| its O | |
| C O | |
| & O | |
| C O | |
| . O | |
| The O | |
| C O | |
| & O | |
| C O | |
| address O | |
| was O | |
| specified O | |
| in O | |
| the O | |
| code O | |
| and O | |
| was O | |
| also O | |
| unencrypted O | |
| : O | |
| In O | |
| some O | |
| versions O | |
| , O | |
| a O | |
| dynamically O | |
| generated O | |
| low-level O | |
| domain O | |
| was O | |
| used O | |
| as O | |
| an O | |
| address O | |
| : O | |
| In O | |
| its O | |
| first O | |
| communication O | |
| , O | |
| the O | |
| Trojan O | |
| sent O | |
| the O | |
| infected O | |
| device O | |
| β O | |
| s O | |
| IMEI O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| , O | |
| and O | |
| in O | |
| return O | |
| it O | |
| received O | |
| a O | |
| set O | |
| of O | |
| rules O | |
| for O | |
| processing O | |
| incoming O | |
| SMSs O | |
| ( O | |
| phone O | |
| numbers O | |
| , O | |
| keywords O | |
| and O | |
| regular O | |
| expressions O | |
| ) O | |
| β O | |
| these O | |
| applied O | |
| mainly O | |
| to O | |
| messages O | |
| from O | |
| banks O | |
| , O | |
| payment O | |
| systems O | |
| and O | |
| mobile O | |
| network O | |
| operators O | |
| . O | |
| For O | |
| instance O | |
| , O | |
| the O | |
| Trojan O | |
| could O | |
| automatically O | |
| reply O | |
| to O | |
| an O | |
| SMS O | |
| and O | |
| immediately O | |
| delete O | |
| it O | |
| . O | |
| Rotexy B-Malware | |
| then O | |
| sent O | |
| information O | |
| about O | |
| the O | |
| smartphone O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| , O | |
| including O | |
| the O | |
| phone O | |
| model O | |
| , O | |
| number O | |
| , O | |
| name O | |
| of O | |
| the O | |
| mobile O | |
| network O | |
| operator O | |
| , O | |
| versions O | |
| of O | |
| the O | |
| operating O | |
| system O | |
| and O | |
| IMEI O | |
| . O | |
| With O | |
| each O | |
| subsequent O | |
| request O | |
| , O | |
| a O | |
| new O | |
| subdomain O | |
| was O | |
| generated O | |
| . O | |
| The O | |
| algorithm O | |
| for O | |
| generating O | |
| the O | |
| lowest-level O | |
| domain O | |
| name O | |
| was O | |
| hardwired O | |
| in O | |
| the O | |
| Trojan O | |
| β O | |
| s O | |
| code O | |
| . O | |
| The O | |
| Trojan O | |
| also O | |
| registered O | |
| in O | |
| Google B-System | |
| Cloud I-System | |
| Messaging I-System | |
| ( I-System | |
| GCM I-System | |
| ) I-System | |
| , O | |
| meaning O | |
| it O | |
| could O | |
| then O | |
| receive O | |
| commands O | |
| via O | |
| that O | |
| service O | |
| . O | |
| The O | |
| Trojan O | |
| β O | |
| s O | |
| list O | |
| of O | |
| possible O | |
| commands O | |
| has O | |
| remained O | |
| practically O | |
| unchanged O | |
| throughout O | |
| its O | |
| life O | |
| , O | |
| and O | |
| will O | |
| be O | |
| described O | |
| below O | |
| in O | |
| detail O | |
| . O | |
| The O | |
| Trojan O | |
| β O | |
| s O | |
| assets O | |
| folder O | |
| contained O | |
| the O | |
| file O | |
| data.db B-Indicator | |
| with O | |
| a O | |
| list O | |
| of O | |
| possible O | |
| values O | |
| for O | |
| the O | |
| User-Agent O | |
| field O | |
| for O | |
| the O | |
| PAGE O | |
| command O | |
| ( O | |
| which O | |
| downloads O | |
| the O | |
| specified O | |
| webpage O | |
| ) O | |
| . O | |
| If O | |
| the O | |
| value O | |
| of O | |
| this O | |
| field O | |
| failed O | |
| to O | |
| arrive O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| , O | |
| it O | |
| was O | |
| selected O | |
| from O | |
| the O | |
| file O | |
| data.db B-Indicator | |
| using O | |
| a O | |
| pseudo-random O | |
| algorithm O | |
| . O | |
| 2015β2016 O | |
| Starting O | |
| from O | |
| mid-2015 O | |
| , O | |
| the O | |
| Trojan O | |
| began O | |
| using O | |
| the O | |
| AES O | |
| algorithm O | |
| to O | |
| encrypt O | |
| data O | |
| communicated O | |
| between O | |
| the O | |
| infected O | |
| device O | |
| and O | |
| the O | |
| C O | |
| & O | |
| C O | |
| : O | |
| Also O | |
| starting O | |
| with O | |
| the O | |
| same O | |
| version O | |
| , O | |
| data O | |
| is O | |
| sent O | |
| in O | |
| a O | |
| POST O | |
| request O | |
| to O | |
| the O | |
| relative O | |
| address O | |
| with O | |
| the O | |
| format O | |
| β O | |
| / O | |
| [ O | |
| number O | |
| ] O | |
| β O | |
| ( O | |
| a O | |
| pseudo-randomly O | |
| generated O | |
| number O | |
| in O | |
| the O | |
| range O | |
| 0β9999 O | |
| ) O | |
| . O | |
| In O | |
| some O | |
| samples O | |
| , O | |
| starting O | |
| from O | |
| January O | |
| 2016 O | |
| , O | |
| an O | |
| algorithm O | |
| has O | |
| been O | |
| implemented O | |
| for O | |
| unpacking O | |
| the O | |
| encrypted O | |
| executable O | |
| DEX O | |
| file O | |
| from O | |
| the O | |
| assets O | |
| folder O | |
| . O | |
| In O | |
| this O | |
| version O | |
| of O | |
| Rotexy B-Malware | |
| , O | |
| dynamic O | |
| generation O | |
| of O | |
| lowest-level O | |
| domains O | |
| was O | |
| not O | |
| used O | |
| . O | |
| 2016 O | |
| From O | |
| mid-2016 O | |
| on O | |
| , O | |
| the O | |
| cybercriminals O | |
| returned O | |
| to O | |
| dynamic O | |
| generation O | |
| of O | |
| lowest-level O | |
| domains O | |
| . O | |
| No O | |
| other O | |
| significant O | |
| changes O | |
| were O | |
| observed O | |
| in O | |
| the O | |
| Trojan O | |
| β O | |
| s O | |
| network O | |
| behavior O | |
| . O | |
| In O | |
| late O | |
| 2016 O | |
| , O | |
| versions O | |
| of O | |
| the O | |
| Trojan O | |
| emerged O | |
| that O | |
| contained O | |
| the O | |
| card.html B-Indicator | |
| phishing O | |
| page O | |
| in O | |
| the O | |
| assets/www B-Indicator | |
| folder O | |
| . O | |
| The O | |
| page O | |
| was O | |
| designed O | |
| to O | |
| steal O | |
| users O | |
| β O | |
| bank O | |
| card O | |
| details O | |
| : O | |
| 2017β2018 O | |
| From O | |
| early O | |
| 2017 O | |
| , O | |
| the O | |
| HTML O | |
| phishing O | |
| pages O | |
| bank.html B-Indicator | |
| , O | |
| update.html B-Indicator | |
| and O | |
| extortionist.html B-Indicator | |
| started O | |
| appearing O | |
| in O | |
| the O | |
| assets O | |
| folder O | |
| . O | |
| Also O | |
| , O | |
| in O | |
| some O | |
| versions O | |
| of O | |
| the O | |
| Trojan O | |
| the O | |
| file O | |
| names O | |
| were O | |
| random O | |
| strings O | |
| of O | |
| characters O | |
| . O | |
| In O | |
| 2018 O | |
| , O | |
| versions O | |
| of O | |
| Rotexy B-Malware | |
| emerged O | |
| that O | |
| contacted O | |
| the O | |
| C O | |
| & O | |
| C O | |
| using O | |
| its O | |
| IP O | |
| address O | |
| . O | |
| β O | |
| One-time O | |
| β O | |
| domains O | |
| also O | |
| appeared O | |
| with O | |
| names O | |
| made O | |
| up O | |
| of O | |
| random O | |
| strings O | |
| of O | |
| characters O | |
| and O | |
| numbers O | |
| , O | |
| combined O | |
| with O | |
| the O | |
| top-level O | |
| domains O | |
| .cf O | |
| , O | |
| .ga O | |
| , O | |
| .gq O | |
| , O | |
| .ml O | |
| , O | |
| or O | |
| .tk O | |
| . O | |
| At O | |
| this O | |
| time O | |
| , O | |
| the O | |
| Trojan O | |
| also O | |
| began O | |
| actively O | |
| using O | |
| different O | |
| methods O | |
| of O | |
| obfuscation O | |
| . O | |
| For O | |
| example O | |
| , O | |
| the O | |
| DEX O | |
| file O | |
| is O | |
| packed O | |
| with O | |
| garbage O | |
| strings O | |
| and/or O | |
| operations O | |
| , O | |
| and O | |
| contains O | |
| a O | |
| key O | |
| to O | |
| decipher O | |
| the O | |
| main O | |
| executable O | |
| file O | |
| from O | |
| the O | |
| APK O | |
| . O | |
| Latest O | |
| version O | |
| ( O | |
| 2018 O | |
| ) O | |
| Let O | |
| β O | |
| s O | |
| now O | |
| return O | |
| to O | |
| the O | |
| present O | |
| day O | |
| and O | |
| a O | |
| detailed O | |
| description O | |
| of O | |
| the O | |
| functionality O | |
| of O | |
| a O | |
| current O | |
| representative O | |
| of O | |
| the O | |
| Rotexy B-Malware | |
| family O | |
| ( O | |
| SHA256 O | |
| : O | |
| ba4beb97f5d4ba33162f769f43ec8e7d1ae501acdade792a4a577cd6449e1a84 B-Indicator | |
| ) O | |
| . O | |
| Application O | |
| launch O | |
| When O | |
| launching O | |
| for O | |
| the O | |
| first O | |
| time O | |
| , O | |
| the O | |
| Trojan O | |
| checks O | |
| if O | |
| it O | |
| is O | |
| being O | |
| launched O | |
| in O | |
| an O | |
| emulation O | |
| environment O | |
| , O | |
| and O | |
| in O | |
| which O | |
| country O | |
| it O | |
| is O | |
| being O | |
| launched O | |
| . O | |
| If O | |
| the O | |
| device O | |
| is O | |
| located O | |
| outside O | |
| Russia O | |
| or O | |
| is O | |
| an O | |
| emulator O | |
| , O | |
| the O | |
| application O | |
| displays O | |
| a O | |
| stub O | |
| page O | |
| : O | |
| In O | |
| this O | |
| case O | |
| , O | |
| the O | |
| Trojan O | |
| β O | |
| s O | |
| logs O | |
| contain O | |
| records O | |
| in O | |
| Russian O | |
| with O | |
| grammatical O | |
| errors O | |
| and O | |
| spelling O | |
| mistakes O | |
| : O | |
| If O | |
| the O | |
| check O | |
| is O | |
| successful O | |
| , O | |
| Rotexy B-Malware | |
| registers O | |
| with O | |
| GCM B-System | |
| and O | |
| launches O | |
| SuperService O | |
| which O | |
| tracks O | |
| if O | |
| the O | |
| Trojan O | |
| has O | |
| device O | |
| administrator O | |
| privileges O | |
| . O | |
| SuperService O | |
| also O | |
| tracks O | |
| its O | |
| own O | |
| status O | |
| and O | |
| relaunches O | |
| if O | |
| stopped O | |
| . O | |
| It O | |
| performs O | |
| a O | |
| privilege O | |
| check O | |
| once O | |
| every O | |
| second O | |
| ; O | |
| if O | |
| unavailable O | |
| , O | |
| the O | |
| Trojan O | |
| starts O | |
| requesting O | |
| them O | |
| from O | |
| the O | |
| user O | |
| in O | |
| an O | |
| infinite O | |
| loop O | |
| : O | |
| If O | |
| the O | |
| user O | |
| agrees O | |
| and O | |
| gives O | |
| the O | |
| application O | |
| the O | |
| requested O | |
| privileges O | |
| , O | |
| another O | |
| stub O | |
| page O | |
| is O | |
| displayed O | |
| , O | |
| and O | |
| the O | |
| app O | |
| hides O | |
| its O | |
| icon O | |
| : O | |
| If O | |
| the O | |
| Trojan O | |
| detects O | |
| an O | |
| attempt O | |
| to O | |
| revoke O | |
| its O | |
| administrator O | |
| privileges O | |
| , O | |
| it O | |
| starts O | |
| periodically O | |
| switching O | |
| off O | |
| the O | |
| phone O | |
| screen O | |
| , O | |
| trying O | |
| to O | |
| stop O | |
| the O | |
| user O | |
| actions O | |
| . O | |
| If O | |
| the O | |
| privileges O | |
| are O | |
| revoked O | |
| successfully O | |
| , O | |
| the O | |
| Trojan O | |
| relaunches O | |
| the O | |
| cycle O | |
| of O | |
| requesting O | |
| administrator O | |
| privileges O | |
| . O | |
| If O | |
| , O | |
| for O | |
| some O | |
| reason O | |
| , O | |
| SuperService O | |
| does O | |
| not O | |
| switch O | |
| off O | |
| the O | |
| screen O | |
| when O | |
| there O | |
| is O | |
| an O | |
| attempt O | |
| to O | |
| revoke O | |
| the O | |
| device O | |
| administrator O | |
| privileges O | |
| , O | |
| the O | |
| Trojan O | |
| tries O | |
| to O | |
| intimidate O | |
| the O | |
| user O | |
| : O | |
| While O | |
| running O | |
| , O | |
| Rotexy B-Malware | |
| tracks O | |
| the O | |
| following O | |
| : O | |
| switching O | |
| on O | |
| and O | |
| rebooting O | |
| of O | |
| the O | |
| phone O | |
| ; O | |
| termination O | |
| of O | |
| its O | |
| operation O | |
| β O | |
| in O | |
| this O | |
| case O | |
| , O | |
| it O | |
| relaunches O | |
| ; O | |
| sending O | |
| of O | |
| an O | |
| SMS O | |
| by O | |
| the O | |
| app O | |
| β O | |
| in O | |
| this O | |
| case O | |
| , O | |
| the O | |
| phone O | |
| is O | |
| switched O | |
| to O | |
| silent O | |
| mode O | |
| . O | |
| C O | |
| & O | |
| C O | |
| communications O | |
| The O | |
| default O | |
| C O | |
| & O | |
| C O | |
| address O | |
| is O | |
| hardwired O | |
| in O | |
| the O | |
| Rotexy B-Malware | |
| code O | |
| : O | |
| The O | |
| relative O | |
| address O | |
| to O | |
| which O | |
| the O | |
| Trojan O | |
| will O | |
| send O | |
| information O | |
| from O | |
| the O | |
| device O | |
| is O | |
| generated O | |
| in O | |
| a O | |
| pseudo-random O | |
| manner O | |
| . O | |
| Depending O | |
| on O | |
| the O | |
| Trojan O | |
| version O | |
| , O | |
| dynamically O | |
| generated O | |
| subdomains O | |
| can O | |
| also O | |
| be O | |
| used O | |
| . O | |
| The O | |
| Trojan O | |
| stores O | |
| information O | |
| about O | |
| C O | |
| & O | |
| C O | |
| servers O | |
| and O | |
| the O | |
| data O | |
| harvested O | |
| from O | |
| the O | |
| infected O | |
| device O | |
| in O | |
| a O | |
| local O | |
| SQLite O | |
| database O | |
| . O | |
| First O | |
| off O | |
| , O | |
| the O | |
| Trojan O | |
| registers O | |
| in O | |
| the O | |
| administration O | |
| panel O | |
| and O | |
| receives O | |
| the O | |
| information O | |
| it O | |
| needs O | |
| to O | |
| operate O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| ( O | |
| the O | |
| SMS O | |
| interception O | |
| templates O | |
| and O | |
| the O | |
| text O | |
| that O | |
| will O | |
| be O | |
| displayed O | |
| on O | |
| HTML O | |
| pages O | |
| ) O | |
| : O | |
| Rotexy B-Malware | |
| intercepts O | |
| all O | |
| incoming O | |
| SMSs O | |
| and O | |
| processes O | |
| them O | |
| according O | |
| to O | |
| the O | |
| templates O | |
| it O | |
| received O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| . O | |
| Also O | |
| , O | |
| when O | |
| an O | |
| SMS O | |
| arrives O | |
| , O | |
| the O | |
| Trojan O | |
| puts O | |
| the O | |
| phone O | |
| into O | |
| silent O | |
| mode O | |
| and O | |
| switches O | |
| off O | |
| the O | |
| screen O | |
| so O | |
| the O | |
| user O | |
| doesn O | |
| β O | |
| t O | |
| notice O | |
| that O | |
| a O | |
| new O | |
| SMS O | |
| has O | |
| arrived O | |
| . O | |
| When O | |
| required O | |
| , O | |
| the O | |
| Trojan O | |
| sends O | |
| an O | |
| SMS O | |
| to O | |
| the O | |
| specified O | |
| phone O | |
| number O | |
| with O | |
| the O | |
| information O | |
| it O | |
| has O | |
| received O | |
| from O | |
| the O | |
| intercepted O | |
| message O | |
| . O | |
| ( O | |
| It O | |
| is O | |
| specified O | |
| in O | |
| the O | |
| interception O | |
| template O | |
| whether O | |
| a O | |
| reply O | |
| must O | |
| be O | |
| sent O | |
| , O | |
| and O | |
| which O | |
| text O | |
| should O | |
| be O | |
| sent O | |
| to O | |
| which O | |
| address O | |
| . O | |
| ) O | |
| If O | |
| the O | |
| application O | |
| hasn O | |
| β O | |
| t O | |
| received O | |
| instructions O | |
| about O | |
| the O | |
| rules O | |
| for O | |
| processing O | |
| incoming O | |
| SMSs O | |
| , O | |
| it O | |
| simply O | |
| saves O | |
| all O | |
| SMSs O | |
| to O | |
| a O | |
| local O | |
| database O | |
| and O | |
| uploads O | |
| them O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| . O | |
| Apart O | |
| from O | |
| general O | |
| information O | |
| about O | |
| the O | |
| device O | |
| , O | |
| the O | |
| Trojan O | |
| sends O | |
| a O | |
| list O | |
| of O | |
| all O | |
| the O | |
| running O | |
| processes O | |
| and O | |
| installed O | |
| applications O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| . O | |
| It O | |
| β O | |
| s O | |
| possible O | |
| the O | |
| threat O | |
| actors O | |
| use O | |
| this O | |
| list O | |
| to O | |
| find O | |
| running O | |
| antivirus O | |
| or O | |
| banking O | |
| applications O | |
| . O | |
| Rotexy B-Malware | |
| will O | |
| perform O | |
| further O | |
| actions O | |
| after O | |
| it O | |
| receives O | |
| the O | |
| corresponding O | |
| commands O | |
| : O | |
| START O | |
| , O | |
| STOP O | |
| , O | |
| RESTART O | |
| β O | |
| start O | |
| , O | |
| stop O | |
| , O | |
| restart O | |
| SuperService O | |
| . O | |
| URL O | |
| β O | |
| update O | |
| C O | |
| & O | |
| C O | |
| address O | |
| . O | |
| MESSAGE O | |
| β O | |
| send O | |
| SMS O | |
| containing O | |
| specified O | |
| text O | |
| to O | |
| a O | |
| specified O | |
| number O | |
| . O | |
| UPDATE_PATTERNS O | |
| β O | |
| reregister O | |
| in O | |
| the O | |
| administration O | |
| panel O | |
| . O | |
| UNBLOCK O | |
| β O | |
| unblock O | |
| the O | |
| telephone O | |
| ( O | |
| revoke O | |
| device O | |
| administrator O | |
| privileges O | |
| from O | |
| the O | |
| app O | |
| ) O | |
| . O | |
| UPDATE O | |
| β O | |
| download O | |
| APK O | |
| file O | |
| from O | |
| C O | |
| & O | |
| C O | |
| and O | |
| install O | |
| it O | |
| . O | |
| This O | |
| command O | |
| can O | |
| be O | |
| used O | |
| not O | |
| just O | |
| to O | |
| update O | |
| the O | |
| app O | |
| but O | |
| to O | |
| install O | |
| any O | |
| other O | |
| software O | |
| on O | |
| the O | |
| infected O | |
| device O | |
| . O | |
| CONTACTS O | |
| β O | |
| send O | |
| text O | |
| received O | |
| from O | |
| C O | |
| & O | |
| C O | |
| to O | |
| all O | |
| user O | |
| contacts O | |
| . O | |
| This O | |
| is O | |
| most O | |
| probably O | |
| how O | |
| the O | |
| application O | |
| spreads O | |
| . O | |
| CONTACTS_PRO O | |
| β O | |
| request O | |
| unique O | |
| message O | |
| text O | |
| for O | |
| contacts O | |
| from O | |
| the O | |
| address O | |
| book O | |
| . O | |
| PAGE O | |
| β O | |
| contact O | |
| URL O | |
| received O | |
| from O | |
| C O | |
| & O | |
| C O | |
| using O | |
| User-Agent O | |
| value O | |
| that O | |
| was O | |
| also O | |
| received O | |
| from O | |
| C O | |
| & O | |
| C O | |
| or O | |
| local O | |
| database O | |
| . O | |
| ALLMSG O | |
| β O | |
| send O | |
| C O | |
| & O | |
| C O | |
| all O | |
| SMSs O | |
| received O | |
| and O | |
| sent O | |
| by O | |
| user O | |
| , O | |
| as O | |
| stored O | |
| in O | |
| phone O | |
| memory O | |
| . O | |
| ALLCONTACTS O | |
| β O | |
| send O | |
| all O | |
| contacts O | |
| from O | |
| phone O | |
| memory O | |
| to O | |
| C O | |
| & O | |
| C O | |
| . O | |
| ONLINE O | |
| β O | |
| send O | |
| information O | |
| about O | |
| Trojan O | |
| β O | |
| s O | |
| current O | |
| status O | |
| to O | |
| C O | |
| & O | |
| C O | |
| : O | |
| whether O | |
| it O | |
| has O | |
| device O | |
| administrator O | |
| privileges O | |
| , O | |
| which O | |
| HTML O | |
| page O | |
| is O | |
| currently O | |
| displayed O | |
| , O | |
| whether O | |
| screen O | |
| is O | |
| on O | |
| or O | |
| off O | |
| , O | |
| etc O | |
| . O | |
| NEWMSG O | |
| β O | |
| write O | |
| an O | |
| SMS O | |
| to O | |
| the O | |
| device O | |
| memory O | |
| containing O | |
| the O | |
| text O | |
| and O | |
| sender O | |
| number O | |
| sent O | |
| from O | |
| C O | |
| & O | |
| C O | |
| . O | |
| CHANGE_GCM_ID O | |
| β O | |
| change O | |
| GCM O | |
| ID O | |
| . O | |
| BLOCKER_BANKING_START O | |
| β O | |
| display O | |
| phishing O | |
| HTML O | |
| page O | |
| for O | |
| entry O | |
| of O | |
| bank O | |
| card O | |
| details O | |
| . O | |
| BLOCKER_EXTORTIONIST_START O | |
| β O | |
| display O | |
| HTML O | |
| page O | |
| of O | |
| the O | |
| ransomware O | |
| . O | |
| BLOCKER_UPDATE_START O | |
| β O | |
| display O | |
| fake O | |
| HTML O | |
| page O | |
| for O | |
| update O | |
| . O | |
| BLOCKER_STOP O | |
| β O | |
| block O | |
| display O | |
| of O | |
| all O | |
| HTML O | |
| pages O | |
| . O | |
| The O | |
| C O | |
| & O | |
| C O | |
| role O | |
| for O | |
| Rotexy B-Malware | |
| can O | |
| be O | |
| filled O | |
| not O | |
| only O | |
| by O | |
| a O | |
| web O | |
| server O | |
| but O | |
| also O | |
| by O | |
| any O | |
| device O | |
| that O | |
| can O | |
| send O | |
| SMSs O | |
| . O | |
| The O | |
| Trojan O | |
| intercepts O | |
| incoming O | |
| SMSs O | |
| and O | |
| can O | |
| receive O | |
| the O | |
| following O | |
| commands O | |
| from O | |
| them O | |
| : O | |
| β O | |
| 3458 O | |
| β O | |
| β O | |
| revoke O | |
| device O | |
| administrator O | |
| privileges O | |
| from O | |
| the O | |
| app O | |
| ; O | |
| β O | |
| hi O | |
| β O | |
| , O | |
| β O | |
| ask O | |
| β O | |
| β O | |
| enable O | |
| and O | |
| disable O | |
| mobile O | |
| internet O | |
| ; O | |
| β O | |
| privet O | |
| β O | |
| , O | |
| β O | |
| ru O | |
| β O | |
| β O | |
| enable O | |
| and O | |
| disable O | |
| Wi-Fi O | |
| ; O | |
| β O | |
| check O | |
| β O | |
| β O | |
| send O | |
| text O | |
| β O | |
| install O | |
| : O | |
| [ O | |
| device O | |
| IMEI O | |
| ] O | |
| β O | |
| to O | |
| phone O | |
| number O | |
| from O | |
| which O | |
| SMS O | |
| was O | |
| sent O | |
| ; O | |
| β O | |
| stop_blocker O | |
| β O | |
| β O | |
| stop O | |
| displaying O | |
| all O | |
| blocking O | |
| HTML O | |
| pages O | |
| ; O | |
| β O | |
| 393838 O | |
| β O | |
| β O | |
| change O | |
| C O | |
| & O | |
| C O | |
| address O | |
| to O | |
| that O | |
| specified O | |
| in O | |
| the O | |
| SMS O | |
| . O | |
| Information O | |
| about O | |
| all O | |
| actions O | |
| performed O | |
| by O | |
| Rotexy B-Malware | |
| is O | |
| logged O | |
| in O | |
| the O | |
| local O | |
| database O | |
| and O | |
| sent O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| . O | |
| The O | |
| server O | |
| then O | |
| sends O | |
| a O | |
| reply O | |
| that O | |
| contains O | |
| instructions O | |
| on O | |
| further O | |
| actions O | |
| to O | |
| be O | |
| taken O | |
| . O | |
| Displaying O | |
| HTML O | |
| pages O | |
| We O | |
| β O | |
| ll O | |
| now O | |
| look O | |
| at O | |
| the O | |
| HTML O | |
| pages O | |
| that O | |
| Rotexy B-Malware | |
| displays O | |
| and O | |
| the O | |
| actions O | |
| performed O | |
| with O | |
| them O | |
| . O | |
| The O | |
| Trojan O | |
| displays O | |
| a O | |
| fake O | |
| HTML O | |
| update O | |
| page O | |
| ( O | |
| update.html B-Indicator | |
| ) O | |
| that O | |
| blocks O | |
| the O | |
| device O | |
| β O | |
| s O | |
| screen O | |
| for O | |
| a O | |
| long O | |
| period O | |
| of O | |
| time O | |
| . O | |
| The O | |
| Trojan O | |
| displays O | |
| the O | |
| extortion O | |
| page O | |
| ( O | |
| extortionist.html B-Indicator | |
| ) O | |
| that O | |
| blocks O | |
| the O | |
| device O | |
| and O | |
| demands O | |
| a O | |
| ransom O | |
| for O | |
| unblocking O | |
| it O | |
| . O | |
| The O | |
| sexually O | |
| explicit O | |
| images O | |
| in O | |
| this O | |
| screenshot O | |
| have O | |
| been O | |
| covered O | |
| with O | |
| a O | |
| black O | |
| box O | |
| . O | |
| The O | |
| Trojan O | |
| displays O | |
| a O | |
| phishing O | |
| page O | |
| ( O | |
| bank.html B-Indicator | |
| ) O | |
| prompting O | |
| the O | |
| user O | |
| to O | |
| enter O | |
| their O | |
| bank O | |
| card O | |
| details O | |
| . O | |
| This O | |
| page O | |
| mimics O | |
| a O | |
| legitimate O | |
| bank O | |
| form O | |
| and O | |
| blocks O | |
| the O | |
| device O | |
| screen O | |
| until O | |
| the O | |
| user O | |
| enters O | |
| all O | |
| the O | |
| information O | |
| . O | |
| It O | |
| even O | |
| has O | |
| its O | |
| own O | |
| virtual O | |
| keyboard O | |
| that O | |
| supposedly O | |
| protects O | |
| the O | |
| victim O | |
| from O | |
| keyloggers O | |
| . O | |
| In O | |
| the O | |
| areas O | |
| marked O | |
| β O | |
| { O | |
| text O | |
| } O | |
| β O | |
| Rotexy B-Malware | |
| displays O | |
| the O | |
| text O | |
| it O | |
| receives O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| . O | |
| Typically O | |
| , O | |
| it O | |
| is O | |
| a O | |
| message O | |
| saying O | |
| that O | |
| the O | |
| user O | |
| has O | |
| received O | |
| a O | |
| money O | |
| transfer O | |
| , O | |
| and O | |
| that O | |
| they O | |
| must O | |
| enter O | |
| their O | |
| bank O | |
| card O | |
| details O | |
| so O | |
| the O | |
| money O | |
| can O | |
| be O | |
| transferred O | |
| to O | |
| their O | |
| account O | |
| . O | |
| The O | |
| entered O | |
| data O | |
| is O | |
| then O | |
| checked O | |
| and O | |
| the O | |
| last O | |
| four O | |
| digits O | |
| of O | |
| the O | |
| bank O | |
| card O | |
| number O | |
| are O | |
| also O | |
| checked O | |
| against O | |
| the O | |
| data O | |
| sent O | |
| in O | |
| the O | |
| C O | |
| & O | |
| C O | |
| command O | |
| . O | |
| The O | |
| following O | |
| scenario O | |
| may O | |
| play O | |
| out O | |
| : O | |
| according O | |
| to O | |
| the O | |
| templates O | |
| for O | |
| processing O | |
| incoming O | |
| SMSs O | |
| , O | |
| Rotexy B-Malware | |
| intercepts O | |
| a O | |
| message O | |
| from O | |
| the O | |
| bank O | |
| that O | |
| contains O | |
| the O | |
| last O | |
| four O | |
| digits O | |
| of O | |
| the O | |
| bank O | |
| card O | |
| connected O | |
| to O | |
| the O | |
| phone O | |
| number O | |
| . O | |
| The O | |
| Trojan O | |
| sends O | |
| these O | |
| digits O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| , O | |
| which O | |
| in O | |
| turn O | |
| sends O | |
| a O | |
| command O | |
| to O | |
| display O | |
| a O | |
| fake O | |
| data O | |
| entry O | |
| window O | |
| to O | |
| check O | |
| the O | |
| four O | |
| digits O | |
| . O | |
| If O | |
| the O | |
| user O | |
| has O | |
| provided O | |
| the O | |
| details O | |
| of O | |
| another O | |
| card O | |
| , O | |
| then O | |
| the O | |
| following O | |
| window O | |
| is O | |
| displayed O | |
| : O | |
| The O | |
| application O | |
| leaves O | |
| the O | |
| user O | |
| with O | |
| almost O | |
| no O | |
| option O | |
| but O | |
| to O | |
| enter O | |
| the O | |
| correct O | |
| card O | |
| number O | |
| , O | |
| as O | |
| it O | |
| checks O | |
| the O | |
| entered O | |
| number O | |
| against O | |
| the O | |
| bank O | |
| card O | |
| details O | |
| the O | |
| cybercriminals O | |
| received O | |
| earlier O | |
| . O | |
| When O | |
| all O | |
| the O | |
| necessary O | |
| card O | |
| details O | |
| are O | |
| entered O | |
| and O | |
| have O | |
| been O | |
| checked O | |
| , O | |
| all O | |
| the O | |
| information O | |
| is O | |
| uploaded O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| . O | |
| How O | |
| to O | |
| unblock O | |
| the O | |
| phone O | |
| Now O | |
| for O | |
| some O | |
| good O | |
| news O | |
| : O | |
| Rotexy B-Malware | |
| doesn O | |
| β O | |
| t O | |
| have O | |
| a O | |
| very O | |
| well-designed O | |
| module O | |
| for O | |
| processing O | |
| commands O | |
| that O | |
| arrive O | |
| in O | |
| SMSs O | |
| . O | |
| It O | |
| means O | |
| the O | |
| phone O | |
| can O | |
| be O | |
| unblocked O | |
| in O | |
| some O | |
| cases O | |
| when O | |
| it O | |
| has O | |
| been O | |
| blocked O | |
| by O | |
| one O | |
| of O | |
| the O | |
| above O | |
| HTML O | |
| pages O | |
| . O | |
| This O | |
| is O | |
| done O | |
| by O | |
| sending O | |
| β O | |
| 3458 O | |
| β O | |
| in O | |
| an O | |
| SMS O | |
| to O | |
| the O | |
| blocked O | |
| device O | |
| β O | |
| this O | |
| will O | |
| revoke O | |
| the O | |
| administrator O | |
| privileges O | |
| from O | |
| the O | |
| Trojan O | |
| . O | |
| After O | |
| that O | |
| it O | |
| β O | |
| s O | |
| necessary O | |
| to O | |
| send O | |
| β O | |
| stop_blocker O | |
| β O | |
| to O | |
| the O | |
| same O | |
| number O | |
| β O | |
| this O | |
| will O | |
| disable O | |
| the O | |
| display O | |
| of O | |
| HTML O | |
| pages O | |
| that O | |
| extort O | |
| money O | |
| and O | |
| block O | |
| the O | |
| screen O | |
| . O | |
| Rotexy B-Malware | |
| may O | |
| start O | |
| requesting O | |
| device O | |
| administrator O | |
| privileges O | |
| again O | |
| in O | |
| an O | |
| infinite O | |
| loop O | |
| ; O | |
| in O | |
| that O | |
| case O | |
| , O | |
| restart O | |
| the O | |
| device O | |
| in O | |
| safe O | |
| mode O | |
| and O | |
| remove O | |
| the O | |
| malicious O | |
| program O | |
| . O | |
| However O | |
| , O | |
| this O | |
| method O | |
| may O | |
| not O | |
| work O | |
| if O | |
| the O | |
| threat O | |
| actors O | |
| react O | |
| quickly O | |
| to O | |
| an O | |
| attempt O | |
| to O | |
| remove O | |
| the O | |
| Trojan O | |
| . O | |
| In O | |
| that O | |
| case O | |
| , O | |
| you O | |
| first O | |
| need O | |
| to O | |
| send O | |
| the O | |
| text O | |
| β O | |
| 393838 O | |
| β O | |
| in O | |
| an O | |
| SMS O | |
| to O | |
| the O | |
| infected O | |
| device O | |
| and O | |
| then O | |
| repeat O | |
| all O | |
| the O | |
| actions O | |
| described O | |
| above O | |
| ; O | |
| that O | |
| text O | |
| message O | |
| will O | |
| change O | |
| the O | |
| C O | |
| & O | |
| C O | |
| address O | |
| to O | |
| β O | |
| : O | |
| // O | |
| β O | |
| , O | |
| so O | |
| the O | |
| phone O | |
| will O | |
| no O | |
| longer O | |
| receive O | |
| commands O | |
| from O | |
| the O | |
| real O | |
| C O | |
| & O | |
| C O | |
| . O | |
| Please O | |
| note O | |
| that O | |
| these O | |
| unblocking O | |
| instructions O | |
| are O | |
| based O | |
| on O | |
| an O | |
| analysis O | |
| of O | |
| the O | |
| current O | |
| version O | |
| of O | |
| Rotexy B-Malware | |
| and O | |
| have O | |
| been O | |
| tested O | |
| on O | |
| it O | |
| . O | |
| However O | |
| , O | |
| it O | |
| β O | |
| s O | |
| possible O | |
| the O | |
| set O | |
| of O | |
| commands O | |
| may O | |
| change O | |
| in O | |
| future O | |
| versions O | |
| of O | |
| the O | |
| Trojan O | |
| . O | |
| Geography O | |
| of O | |
| Rotexy B-Malware | |
| attacks O | |
| According O | |
| to O | |
| our O | |
| data O | |
| , O | |
| 98 O | |
| % O | |
| of O | |
| all O | |
| Rotexy B-Malware | |
| attacks O | |
| target O | |
| users O | |
| in O | |
| Russia O | |
| . O | |
| Indeed O | |
| , O | |
| the O | |
| Trojan O | |
| explicitly O | |
| targets O | |
| Russian-speaking O | |
| users O | |
| . O | |
| There O | |
| have O | |
| also O | |
| been O | |
| cases O | |
| of O | |
| users O | |
| in O | |
| Ukraine O | |
| , O | |
| Germany O | |
| , O | |
| Turkey O | |
| and O | |
| several O | |
| other O | |
| countries O | |
| being O | |
| affected O | |
| . O | |
| Kaspersky B-System | |
| Internet I-System | |
| Security I-System | |
| for O | |
| Android B-System | |
| and O | |
| the O | |
| Sberbank B-System | |
| Online I-System | |
| app I-System | |
| securely O | |
| protect O | |
| users O | |
| against O | |
| attacks O | |
| by O | |
| this O | |
| Trojan O | |
| . O | |
| IOCs O | |
| SHA256 O | |
| 0ca09d4fde9e00c0987de44ae2ad51a01b3c4c2c11606fe8308a083805760ee7 B-Indicator | |
| 4378f3680ff070a1316663880f47eba54510beaeb2d897e7bbb8d6b45de63f96 B-Indicator | |
| 76c9d8226ce558c87c81236a9b95112b83c7b546863e29b88fec4dba5c720c0b B-Indicator | |
| 7cc2d8d43093c3767c7c73dc2b4daeb96f70a7c455299e0c7824b4210edd6386 B-Indicator | |
| 9b2fd7189395b2f34781b499f5cae10ec86aa7ab373fbdc2a14ec4597d4799ba B-Indicator | |
| ac216d502233ca0fe51ac2bb64cfaf553d906dc19b7da4c023fec39b000bc0d7 B-Indicator | |
| b1ccb5618925c8f0dda8d13efe4a1e1a93d1ceed9e26ec4a388229a28d1f8d5b B-Indicator | |
| ba4beb97f5d4ba33162f769f43ec8e7d1ae501acdade792a4a577cd6449e1a84 B-Indicator | |
| ba9f4d3f4eba3fa7dce726150fe402e37359a7f36c07f3932a92bd711436f88c B-Indicator | |
| e194268bf682d81fc7dc1e437c53c952ffae55a9d15a1fc020f0219527b7c2ec B-Indicator | |
| Π‘ O | |
| & O | |
| C O | |
| 2014β2015 O | |
| : O | |
| secondby.ru B-Indicator | |
| darkclub.net B-Indicator | |
| holerole.org B-Indicator | |
| googleapis.link B-Indicator | |
| 2015β2016 O | |
| : O | |
| test2016.ru B-Indicator | |
| blackstar.pro B-Indicator | |
| synchronize.pw B-Indicator | |
| lineout.pw B-Indicator | |
| sync-weather.pw B-Indicator | |
| 2016 O | |
| freedns.website O | |
| streamout.space B-Indicator | |
| 2017β2018 O | |
| : O | |
| streamout.space B-Indicator | |
| sky-sync.pw B-Indicator | |
| gms-service.info B-Indicator | |
| EventBot B-Malware | |
| : O | |
| A O | |
| New O | |
| Mobile O | |
| Banking O | |
| Trojan O | |
| is O | |
| Born O | |
| April O | |
| 30 O | |
| , O | |
| 2020 O | |
| KEY O | |
| FINDINGS O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| is O | |
| investigating O | |
| EventBot B-Malware | |
| , O | |
| a O | |
| new O | |
| type O | |
| of O | |
| Android B-System | |
| mobile O | |
| malware O | |
| that O | |
| emerged O | |
| around O | |
| March O | |
| 2020 O | |
| . O | |
| EventBot B-Malware | |
| is O | |
| a O | |
| mobile O | |
| banking O | |
| trojan O | |
| and O | |
| infostealer O | |
| that O | |
| abuses O | |
| Android B-System | |
| β O | |
| s O | |
| accessibility O | |
| features O | |
| to O | |
| steal O | |
| user O | |
| data O | |
| from O | |
| financial O | |
| applications O | |
| , O | |
| read O | |
| user O | |
| SMS O | |
| messages O | |
| , O | |
| and O | |
| steal O | |
| SMS O | |
| messages O | |
| to O | |
| allow O | |
| the O | |
| malware O | |
| to O | |
| bypass O | |
| two-factor O | |
| authentication O | |
| . O | |
| EventBot B-Malware | |
| targets O | |
| users O | |
| of O | |
| over O | |
| 200 O | |
| different O | |
| financial O | |
| applications O | |
| , O | |
| including O | |
| banking O | |
| , O | |
| money O | |
| transfer O | |
| services O | |
| , O | |
| and O | |
| crypto-currency O | |
| wallets O | |
| . O | |
| Those O | |
| targeted O | |
| include O | |
| applications O | |
| like O | |
| Paypal B-System | |
| Business I-System | |
| , O | |
| Revolut B-System | |
| , O | |
| Barclays B-System | |
| , O | |
| UniCredit B-System | |
| , O | |
| CapitalOne B-System | |
| UK I-System | |
| , O | |
| HSBC B-System | |
| UK I-System | |
| , O | |
| Santander B-System | |
| UK I-System | |
| , O | |
| TransferWise B-System | |
| , O | |
| Coinbase B-System | |
| , O | |
| paysafecard B-System | |
| , O | |
| and O | |
| many O | |
| more O | |
| . O | |
| It O | |
| specifically O | |
| targets O | |
| financial O | |
| banking O | |
| applications O | |
| across O | |
| the O | |
| United O | |
| States O | |
| and O | |
| Europe O | |
| , O | |
| including O | |
| Italy O | |
| , O | |
| the O | |
| UK O | |
| , O | |
| Spain O | |
| , O | |
| Switzerland O | |
| , O | |
| France O | |
| , O | |
| and O | |
| Germany O | |
| . O | |
| The O | |
| full O | |
| list O | |
| of O | |
| banking O | |
| applications O | |
| targeted O | |
| is O | |
| included O | |
| in O | |
| the O | |
| appendix O | |
| . O | |
| EventBot B-Organization | |
| is O | |
| particularly O | |
| interesting O | |
| because O | |
| it O | |
| is O | |
| in O | |
| such O | |
| early O | |
| stages O | |
| . O | |
| This O | |
| brand O | |
| new O | |
| malware O | |
| has O | |
| real O | |
| potential O | |
| to O | |
| become O | |
| the O | |
| next O | |
| big O | |
| mobile O | |
| malware O | |
| , O | |
| as O | |
| it O | |
| is O | |
| under O | |
| constant O | |
| iterative O | |
| improvements O | |
| , O | |
| abuses O | |
| a O | |
| critical O | |
| operating O | |
| system O | |
| feature O | |
| , O | |
| and O | |
| targets O | |
| financial O | |
| applications O | |
| . O | |
| This O | |
| research O | |
| gives O | |
| a O | |
| rare O | |
| look O | |
| into O | |
| the O | |
| process O | |
| improvements O | |
| malware O | |
| authors O | |
| make O | |
| when O | |
| optimizing O | |
| before O | |
| launch O | |
| . O | |
| By O | |
| going O | |
| on O | |
| the O | |
| offensive O | |
| and O | |
| hunting O | |
| the O | |
| attackers O | |
| , O | |
| our O | |
| team O | |
| was O | |
| able O | |
| to O | |
| unearth O | |
| the O | |
| early O | |
| stages O | |
| of O | |
| what O | |
| may O | |
| be O | |
| a O | |
| very O | |
| dangerous O | |
| mobile O | |
| malware O | |
| . O | |
| TABLE O | |
| OF O | |
| CONTENTS O | |
| Security O | |
| Recommendations O | |
| Introduction O | |
| Threat O | |
| Analysis O | |
| Common O | |
| Features O | |
| Unique O | |
| Features O | |
| by O | |
| Version O | |
| Malware O | |
| Under O | |
| Active O | |
| Development O | |
| Suspected O | |
| Detection O | |
| Tests O | |
| by O | |
| the O | |
| Threat O | |
| Actor O | |
| EventBot B-Malware | |
| Infrastructure O | |
| Cybereason O | |
| Mobile O | |
| Conclusion O | |
| Indicators O | |
| of O | |
| Compromise O | |
| MITRE B-Organization | |
| ATT O | |
| & O | |
| CK O | |
| for O | |
| Mobile O | |
| Breakdown O | |
| SECURITY O | |
| RECOMMENDATIONS O | |
| Keep O | |
| your O | |
| mobile O | |
| device O | |
| up-to-date O | |
| with O | |
| the O | |
| latest O | |
| software O | |
| updates O | |
| from O | |
| legitimate O | |
| sources O | |
| . O | |
| Keep O | |
| Google B-System | |
| Play I-System | |
| Protect I-System | |
| on O | |
| . O | |
| Do O | |
| not O | |
| download O | |
| mobile O | |
| apps O | |
| from O | |
| unofficial O | |
| or O | |
| unauthorized O | |
| sources O | |
| . O | |
| Most O | |
| legitimate O | |
| Android B-System | |
| apps O | |
| are O | |
| available O | |
| on O | |
| the O | |
| Google B-System | |
| Play I-System | |
| Store I-System | |
| . O | |
| Always O | |
| apply O | |
| critical O | |
| thinking O | |
| and O | |
| consider O | |
| whether O | |
| you O | |
| should O | |
| give O | |
| a O | |
| certain O | |
| app O | |
| the O | |
| permissions O | |
| it O | |
| requests O | |
| . O | |
| When O | |
| in O | |
| doubt O | |
| , O | |
| check O | |
| the O | |
| APK O | |
| signature O | |
| and O | |
| hash O | |
| in O | |
| sources O | |
| like O | |
| VirusTotal B-Organization | |
| before O | |
| installing O | |
| it O | |
| on O | |
| your O | |
| device O | |
| . O | |
| Use O | |
| mobile O | |
| threat O | |
| detection O | |
| solutions O | |
| for O | |
| enhanced O | |
| security O | |
| . O | |
| INTRODUCTION O | |
| For O | |
| the O | |
| past O | |
| few O | |
| weeks O | |
| , O | |
| the O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| has O | |
| been O | |
| investigating O | |
| a O | |
| new O | |
| type O | |
| of O | |
| Android B-System | |
| malware O | |
| dubbed O | |
| EventBot B-Malware | |
| , O | |
| which O | |
| was O | |
| first O | |
| identified O | |
| in O | |
| March O | |
| 2020 O | |
| . O | |
| This O | |
| malware O | |
| appears O | |
| to O | |
| be O | |
| newly O | |
| developed O | |
| with O | |
| code O | |
| that O | |
| differs O | |
| significantly O | |
| from O | |
| previously O | |
| known O | |
| Android B-System | |
| malware O | |
| . O | |
| EventBot B-Malware | |
| is O | |
| under O | |
| active O | |
| development O | |
| and O | |
| is O | |
| evolving O | |
| rapidly O | |
| ; O | |
| new O | |
| versions O | |
| are O | |
| released O | |
| every O | |
| few O | |
| days O | |
| with O | |
| improvements O | |
| and O | |
| new O | |
| capabilities O | |
| . O | |
| EventBot B-Malware | |
| abuses O | |
| Android B-System | |
| β O | |
| s O | |
| accessibility O | |
| feature O | |
| to O | |
| access O | |
| valuable O | |
| user O | |
| information O | |
| , O | |
| system O | |
| information O | |
| , O | |
| and O | |
| data O | |
| stored O | |
| in O | |
| other O | |
| applications O | |
| . O | |
| In O | |
| particular O | |
| , O | |
| EventBot B-Malware | |
| can O | |
| intercept O | |
| SMS O | |
| messages O | |
| and O | |
| bypass O | |
| two-factor O | |
| authentication O | |
| mechanisms O | |
| . O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| has O | |
| concluded O | |
| that O | |
| EventBot B-Malware | |
| is O | |
| designed O | |
| to O | |
| target O | |
| over O | |
| 200 O | |
| different O | |
| banking O | |
| and O | |
| finance O | |
| applications O | |
| , O | |
| the O | |
| majority O | |
| of O | |
| which O | |
| are O | |
| European O | |
| bank O | |
| and O | |
| crypto-currency O | |
| exchange O | |
| applications O | |
| . O | |
| By O | |
| accessing O | |
| and O | |
| stealing O | |
| this O | |
| data O | |
| , O | |
| Eventbot B-Malware | |
| has O | |
| the O | |
| potential O | |
| to O | |
| access O | |
| key O | |
| business O | |
| data O | |
| , O | |
| including O | |
| financial O | |
| data O | |
| . O | |
| 60 O | |
| % O | |
| of O | |
| devices O | |
| containing O | |
| or O | |
| accessing O | |
| enterprise O | |
| data O | |
| are O | |
| mobile O | |
| , O | |
| and O | |
| mobile O | |
| devices O | |
| tend O | |
| to O | |
| include O | |
| a O | |
| significant O | |
| amount O | |
| of O | |
| personal O | |
| and O | |
| business O | |
| data O | |
| , O | |
| assuming O | |
| the O | |
| organization O | |
| has O | |
| a O | |
| bring-your-own-device O | |
| policy O | |
| in O | |
| place O | |
| . O | |
| Mobile O | |
| malware O | |
| is O | |
| a O | |
| significant O | |
| risk O | |
| for O | |
| organizations O | |
| and O | |
| consumers O | |
| alike O | |
| , O | |
| and O | |
| must O | |
| be O | |
| considered O | |
| when O | |
| protecting O | |
| personal O | |
| and O | |
| business O | |
| data O | |
| . O | |
| EventBot B-Malware | |
| mobile O | |
| banking O | |
| applications O | |
| targetedApplications O | |
| targeted O | |
| by O | |
| EventBot B-Malware | |
| . O | |
| Cybereason B-Organization | |
| Mobile I-Organization | |
| Detecting O | |
| EventBotCybereason O | |
| Mobile O | |
| detecting O | |
| EventBot B-Malware | |
| . O | |
| THREAT O | |
| ANALYSIS O | |
| Initial O | |
| Access O | |
| Though O | |
| EventBot B-Malware | |
| is O | |
| not O | |
| currently O | |
| on O | |
| the O | |
| Google B-System | |
| Play I-System | |
| Store O | |
| , O | |
| we O | |
| were O | |
| able O | |
| to O | |
| find O | |
| several O | |
| icons O | |
| EventBot B-Malware | |
| is O | |
| using O | |
| to O | |
| masquerade O | |
| as O | |
| a O | |
| legitimate O | |
| application O | |
| . O | |
| We O | |
| believe O | |
| that O | |
| , O | |
| when O | |
| it O | |
| is O | |
| officially O | |
| released O | |
| , O | |
| it O | |
| will O | |
| most O | |
| likely O | |
| be O | |
| uploaded O | |
| to O | |
| rogue O | |
| APK O | |
| stores O | |
| and O | |
| other O | |
| shady O | |
| websites O | |
| , O | |
| while O | |
| masquerading O | |
| as O | |
| real O | |
| applications O | |
| . O | |
| Icons O | |
| used O | |
| for O | |
| EventBot B-Malware | |
| masqueraded O | |
| as O | |
| legitimate O | |
| with O | |
| these O | |
| icons.application O | |
| . O | |
| Malware O | |
| Capabilities O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| has O | |
| been O | |
| following O | |
| EventBot B-Malware | |
| since O | |
| the O | |
| beginning O | |
| of O | |
| March O | |
| 2020 O | |
| . O | |
| The O | |
| team O | |
| has O | |
| encountered O | |
| different O | |
| versions O | |
| of O | |
| the O | |
| malware O | |
| over O | |
| time O | |
| as O | |
| it O | |
| has O | |
| rapidly O | |
| evolved O | |
| . O | |
| At O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| this O | |
| research O | |
| , O | |
| four O | |
| versions O | |
| of O | |
| the O | |
| EventBot B-Malware | |
| malware O | |
| were O | |
| observed O | |
| : O | |
| Version O | |
| 0.0.0.1 O | |
| , O | |
| 0.0.0.2 O | |
| , O | |
| and O | |
| 0.3.0.1 O | |
| and O | |
| 0.4.0.1 O | |
| . O | |
| Each O | |
| version O | |
| expands O | |
| the O | |
| bot O | |
| β O | |
| s O | |
| functionality O | |
| and O | |
| works O | |
| to O | |
| obfuscate O | |
| the O | |
| malware O | |
| against O | |
| analysis O | |
| . O | |
| In O | |
| this O | |
| research O | |
| , O | |
| we O | |
| review O | |
| common O | |
| features O | |
| of O | |
| the O | |
| malware O | |
| and O | |
| examine O | |
| the O | |
| improvements O | |
| the O | |
| threat O | |
| actor O | |
| made O | |
| in O | |
| each O | |
| version O | |
| . O | |
| COMMON O | |
| FEATURES O | |
| Permissions O | |
| When O | |
| installed O | |
| , O | |
| EventBot B-Malware | |
| requests O | |
| the O | |
| following O | |
| permissions O | |
| on O | |
| the O | |
| device O | |
| : O | |
| SYSTEM_ALERT_WINDOW O | |
| - O | |
| allow O | |
| the O | |
| app O | |
| to O | |
| create O | |
| windows O | |
| that O | |
| are O | |
| shown O | |
| on O | |
| top O | |
| of O | |
| other O | |
| apps O | |
| . O | |
| READ_EXTERNAL_STORAGE O | |
| - O | |
| read O | |
| from O | |
| external O | |
| storage O | |
| . O | |
| REQUEST_INSTALL_PACKAGES O | |
| - O | |
| make O | |
| a O | |
| request O | |
| to O | |
| install O | |
| packages O | |
| . O | |
| INTERNET O | |
| - O | |
| open O | |
| network O | |
| sockets O | |
| . O | |
| REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O | |
| - O | |
| whitelist O | |
| the O | |
| app O | |
| to O | |
| allow O | |
| it O | |
| to O | |
| ignore O | |
| battery O | |
| optimizations O | |
| . O | |
| WAKE_LOCK O | |
| - O | |
| prevent O | |
| the O | |
| processor O | |
| from O | |
| sleeping O | |
| and O | |
| dimming O | |
| the O | |
| screen O | |
| . O | |
| ACCESS_NETWORK_STATE O | |
| - O | |
| allow O | |
| the O | |
| app O | |
| to O | |
| access O | |
| information O | |
| about O | |
| networks O | |
| . O | |
| REQUEST_COMPANION_RUN_IN_BACKGROUND O | |
| - O | |
| let O | |
| the O | |
| app O | |
| run O | |
| in O | |
| the O | |
| background O | |
| . O | |
| REQUEST_COMPANION_USE_DATA_IN_BACKGROUND O | |
| - O | |
| let O | |
| the O | |
| app O | |
| use O | |
| data O | |
| in O | |
| the O | |
| background O | |
| . O | |
| RECEIVE_BOOT_COMPLETED O | |
| - O | |
| allow O | |
| the O | |
| application O | |
| to O | |
| launch O | |
| itself O | |
| after O | |
| system O | |
| boot O | |
| . O | |
| EventBot B-Malware | |
| uses O | |
| this O | |
| permission O | |
| in O | |
| order O | |
| to O | |
| achieve O | |
| persistence O | |
| and O | |
| run O | |
| in O | |
| the O | |
| background O | |
| as O | |
| a O | |
| service O | |
| . O | |
| RECEIVE_SMS O | |
| - O | |
| allow O | |
| the O | |
| application O | |
| to O | |
| receive O | |
| text O | |
| messages O | |
| . O | |
| READ_SMS O | |
| - O | |
| allow O | |
| the O | |
| application O | |
| to O | |
| read O | |
| text O | |
| messages O | |
| . O | |
| EventBot B-Malware | |
| permissions O | |
| EventBot B-Malware | |
| β O | |
| s O | |
| permissions O | |
| as O | |
| seen O | |
| in O | |
| the O | |
| manifest O | |
| file O | |
| . O | |
| THE O | |
| INITIAL O | |
| INSTALLATION O | |
| PROCESS O | |
| Once O | |
| installed O | |
| , O | |
| EventBot B-Malware | |
| prompts O | |
| the O | |
| user O | |
| to O | |
| give O | |
| it O | |
| access O | |
| to O | |
| accessibility O | |
| services O | |
| . O | |
| Initial O | |
| request O | |
| by O | |
| EventBot B-Malware | |
| Initial O | |
| request O | |
| by O | |
| EventBot B-Malware | |
| to O | |
| run O | |
| as O | |
| a O | |
| service O | |
| . O | |
| Once O | |
| the O | |
| malware O | |
| can O | |
| use O | |
| accessibility O | |
| services O | |
| , O | |
| it O | |
| has O | |
| the O | |
| ability O | |
| to O | |
| operate O | |
| as O | |
| a O | |
| keylogger O | |
| and O | |
| can O | |
| retrieve O | |
| notifications O | |
| about O | |
| other O | |
| installed O | |
| applications O | |
| and O | |
| content O | |
| of O | |
| open O | |
| windows O | |
| . O | |
| EventBot O | |
| β O | |
| s O | |
| request O | |
| to O | |
| use O | |
| accessibility O | |
| services O | |
| . O | |
| In O | |
| more O | |
| up-to-date O | |
| versions O | |
| of O | |
| Android B-System | |
| , O | |
| EventBot B-Malware | |
| will O | |
| ask O | |
| for O | |
| permissions O | |
| to O | |
| run O | |
| in O | |
| the O | |
| background O | |
| before O | |
| deleting O | |
| itself O | |
| from O | |
| the O | |
| launcher O | |
| . O | |
| EventBot B-Malware | |
| requests O | |
| permissions O | |
| to O | |
| always O | |
| run O | |
| in O | |
| the O | |
| background O | |
| . O | |
| DOWNLOAD O | |
| AND O | |
| UPDATE O | |
| THE O | |
| TARGET O | |
| CONFIGURATION O | |
| FILE O | |
| By O | |
| analyzing O | |
| and O | |
| decoding O | |
| the O | |
| HTTP O | |
| packets O | |
| in O | |
| EventBot B-Malware | |
| Version O | |
| 0.0.0.1 O | |
| , O | |
| we O | |
| can O | |
| see O | |
| that O | |
| EventBot B-Malware | |
| downloads O | |
| and O | |
| updates O | |
| a O | |
| configuration O | |
| file O | |
| with O | |
| almost O | |
| 200 O | |
| different O | |
| financial O | |
| application O | |
| targets O | |
| . O | |
| Following O | |
| is O | |
| the O | |
| HTTP O | |
| response O | |
| from O | |
| the O | |
| C2 O | |
| server O | |
| , O | |
| containing O | |
| the O | |
| encrypted O | |
| configuration O | |
| : O | |
| EventBot B-Malware | |
| Encrypted O | |
| HTTP O | |
| response O | |
| returned O | |
| from O | |
| the O | |
| C2 O | |
| Encrypted O | |
| HTTP O | |
| response O | |
| returned O | |
| from O | |
| the O | |
| C2 O | |
| . O | |
| In O | |
| Version O | |
| 0.0.0.1 O | |
| , O | |
| the O | |
| communication O | |
| with O | |
| the O | |
| C2 O | |
| is O | |
| encrypted O | |
| using O | |
| Base64 O | |
| and O | |
| RC4 O | |
| . O | |
| The O | |
| RC4 O | |
| key O | |
| is O | |
| hardcoded O | |
| in O | |
| EventBot B-Malware | |
| . O | |
| Upon O | |
| decryption O | |
| , O | |
| we O | |
| can O | |
| see O | |
| that O | |
| the O | |
| response O | |
| from O | |
| the O | |
| server O | |
| is O | |
| a O | |
| JSON O | |
| object O | |
| of O | |
| EventBot B-Malware | |
| β O | |
| s O | |
| configuration O | |
| , O | |
| which O | |
| contains O | |
| C2 O | |
| URLs O | |
| and O | |
| a O | |
| targeted O | |
| applications O | |
| list O | |
| . O | |
| Decrypted O | |
| EventBot B-Malware | |
| configuration O | |
| Decrypted O | |
| EventBot B-Malware | |
| configuration O | |
| returned O | |
| from O | |
| the O | |
| C2 O | |
| . O | |
| The O | |
| configuration O | |
| file O | |
| contains O | |
| a O | |
| list O | |
| of O | |
| financial O | |
| applications O | |
| that O | |
| can O | |
| be O | |
| targeted O | |
| by O | |
| EventBot B-Malware | |
| . O | |
| This O | |
| version O | |
| includes O | |
| 185 O | |
| different O | |
| applications O | |
| , O | |
| including O | |
| official O | |
| applications O | |
| of O | |
| worldwide O | |
| banks O | |
| . O | |
| 26 O | |
| of O | |
| the O | |
| targeted O | |
| applications O | |
| are O | |
| from O | |
| Italy O | |
| , O | |
| 25 O | |
| are O | |
| from O | |
| the O | |
| UK O | |
| , O | |
| 6 O | |
| are O | |
| from O | |
| Germany O | |
| , O | |
| 5 O | |
| are O | |
| from O | |
| France O | |
| , O | |
| and O | |
| 3 O | |
| are O | |
| from O | |
| Spain O | |
| . O | |
| However O | |
| , O | |
| it O | |
| also O | |
| targets O | |
| applications O | |
| from O | |
| Romania O | |
| , O | |
| Ireland O | |
| , O | |
| India O | |
| , O | |
| Austria O | |
| , O | |
| Switzerland O | |
| , O | |
| Australia O | |
| , O | |
| Poland O | |
| and O | |
| the O | |
| USA O | |
| . O | |
| In O | |
| addition O | |
| to O | |
| official O | |
| banking O | |
| applications O | |
| , O | |
| the O | |
| target O | |
| list O | |
| includes O | |
| 111 O | |
| other O | |
| global O | |
| financial O | |
| applications O | |
| for O | |
| banking O | |
| and O | |
| credit O | |
| card O | |
| management O | |
| , O | |
| money O | |
| transfers O | |
| , O | |
| and O | |
| cryptocurrency O | |
| wallets O | |
| and O | |
| exchanges O | |
| . O | |
| Those O | |
| targeted O | |
| include O | |
| Paypal B-System | |
| Business I-System | |
| , O | |
| Revolut B-System | |
| , O | |
| Barclays B-System | |
| , O | |
| UniCredit B-System | |
| , O | |
| CapitalOne B-System | |
| UK I-System | |
| , O | |
| HSBC B-System | |
| UK I-System | |
| , O | |
| Santander B-System | |
| UK I-System | |
| , O | |
| TransferWise B-System | |
| , O | |
| Coinbase B-System | |
| , O | |
| paysafecard B-System | |
| , O | |
| and O | |
| many O | |
| more O | |
| . O | |
| The O | |
| full O | |
| list O | |
| of O | |
| banking O | |
| applications O | |
| targeted O | |
| is O | |
| included O | |
| in O | |
| the O | |
| appendix O | |
| . O | |
| ABUSE O | |
| OF O | |
| ACCESSIBILITY O | |
| SERVICES O | |
| EventBot B-Malware | |
| abuses O | |
| the O | |
| accessibility O | |
| services O | |
| of O | |
| Android B-System | |
| devices O | |
| for O | |
| the O | |
| majority O | |
| of O | |
| its O | |
| activity O | |
| . O | |
| Accessibility O | |
| features O | |
| are O | |
| typically O | |
| used O | |
| to O | |
| help O | |
| users O | |
| with O | |
| disabilities O | |
| by O | |
| giving O | |
| the O | |
| device O | |
| the O | |
| ability O | |
| to O | |
| write O | |
| into O | |
| input O | |
| fields O | |
| , O | |
| auto-generate O | |
| permissions O | |
| , O | |
| perform O | |
| gestures O | |
| for O | |
| the O | |
| user O | |
| , O | |
| etc O | |
| . O | |
| However O | |
| , O | |
| when O | |
| used O | |
| maliciously O | |
| , O | |
| accessibility O | |
| features O | |
| can O | |
| be O | |
| used O | |
| to O | |
| exploit O | |
| legitimate O | |
| services O | |
| for O | |
| malicious O | |
| purposes O | |
| , O | |
| like O | |
| with O | |
| EventBot B-Malware | |
| . O | |
| EventBot B-Malware | |
| uses O | |
| multiple O | |
| methods O | |
| to O | |
| exploit O | |
| accessibility O | |
| events O | |
| for O | |
| webinjects O | |
| and O | |
| other O | |
| information O | |
| stealing O | |
| purposes O | |
| . O | |
| DATA O | |
| GATHERING O | |
| Getting O | |
| a O | |
| list O | |
| of O | |
| all O | |
| installed O | |
| applications O | |
| : O | |
| Once O | |
| EventBot B-Malware | |
| is O | |
| installed O | |
| on O | |
| the O | |
| target O | |
| machine O | |
| , O | |
| it O | |
| lists O | |
| all O | |
| the O | |
| applications O | |
| on O | |
| the O | |
| target O | |
| machine O | |
| and O | |
| sends O | |
| them O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| Device O | |
| information O | |
| : O | |
| EventBot B-Malware | |
| queries O | |
| for O | |
| device O | |
| information O | |
| like O | |
| OS O | |
| , O | |
| model O | |
| , O | |
| etc O | |
| , O | |
| and O | |
| also O | |
| sends O | |
| that O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| EventBot B-Malware | |
| infected O | |
| device O | |
| to O | |
| be O | |
| sent O | |
| to O | |
| the O | |
| C O | |
| Information O | |
| gathered O | |
| about O | |
| the O | |
| infected O | |
| device O | |
| to O | |
| be O | |
| sent O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| Data O | |
| encryption O | |
| : O | |
| In O | |
| the O | |
| initial O | |
| version O | |
| of O | |
| EventBot B-Malware | |
| , O | |
| the O | |
| data O | |
| being O | |
| exfiltrated O | |
| is O | |
| encrypted O | |
| using O | |
| Base64 O | |
| and O | |
| RC4 O | |
| . O | |
| In O | |
| later O | |
| versions O | |
| , O | |
| another O | |
| encryption O | |
| layer O | |
| is O | |
| added O | |
| using O | |
| Curve25519 O | |
| encryption O | |
| . O | |
| All O | |
| of O | |
| the O | |
| most O | |
| recent O | |
| versions O | |
| of O | |
| EventBot B-Malware | |
| contain O | |
| a O | |
| ChaCha20 B-System | |
| library O | |
| that O | |
| can O | |
| improve O | |
| performance O | |
| when O | |
| compared O | |
| to O | |
| other O | |
| algorithms O | |
| like O | |
| RC4 O | |
| and O | |
| AES O | |
| . O | |
| This O | |
| implies O | |
| that O | |
| the O | |
| authors O | |
| are O | |
| actively O | |
| working O | |
| to O | |
| optimize O | |
| EventBot B-Malware | |
| over O | |
| time O | |
| . O | |
| SMS O | |
| grabbing O | |
| : O | |
| EventBot B-Malware | |
| has O | |
| the O | |
| ability O | |
| to O | |
| parse O | |
| SMS O | |
| messages O | |
| by O | |
| using O | |
| the O | |
| targeted O | |
| device O | |
| β O | |
| s O | |
| SDK O | |
| version O | |
| to O | |
| parse O | |
| them O | |
| correctly O | |
| . O | |
| EventBot B-Malware | |
| parsing O | |
| of O | |
| grabbed O | |
| SMS O | |
| messages O | |
| Parsing O | |
| of O | |
| grabbed O | |
| SMS O | |
| messages O | |
| . O | |
| Webinjects O | |
| : O | |
| According O | |
| to O | |
| the O | |
| bot O | |
| β O | |
| s O | |
| configuration O | |
| , O | |
| if O | |
| a O | |
| webinject O | |
| is O | |
| set O | |
| for O | |
| a O | |
| given O | |
| application O | |
| , O | |
| it O | |
| will O | |
| be O | |
| executed O | |
| . O | |
| EventBot B-Malware | |
| web O | |
| injects O | |
| execution O | |
| method O | |
| Web O | |
| injects O | |
| execution O | |
| method O | |
| by O | |
| a O | |
| pre-established O | |
| configuration O | |
| . O | |
| BOT O | |
| UPDATES O | |
| EventBot B-Malware | |
| has O | |
| a O | |
| long O | |
| method O | |
| called O | |
| parseCommand O | |
| that O | |
| can O | |
| update O | |
| EventBot B-Malware | |
| β O | |
| s O | |
| configuration O | |
| XML O | |
| files O | |
| , O | |
| located O | |
| in O | |
| the O | |
| shared O | |
| preferences O | |
| folder O | |
| on O | |
| the O | |
| device O | |
| . O | |
| EventBot B-Malware | |
| Dropped O | |
| XML O | |
| configuration O | |
| files O | |
| Dropped O | |
| XML O | |
| configuration O | |
| files O | |
| on O | |
| the O | |
| device O | |
| . O | |
| EventBot B-Malware | |
| uses O | |
| this O | |
| function O | |
| to O | |
| update O | |
| its O | |
| C2s O | |
| , O | |
| the O | |
| configuration O | |
| of O | |
| webinjects O | |
| , O | |
| etc O | |
| . O | |
| The O | |
| following O | |
| code O | |
| shows O | |
| EventBot B-Malware | |
| parsing O | |
| instructions O | |
| sent O | |
| from O | |
| the O | |
| C2 O | |
| . O | |
| Parsing O | |
| of O | |
| instructions O | |
| by O | |
| EventBot B-Malware | |
| Parsing O | |
| of O | |
| instructions O | |
| by O | |
| the O | |
| bot O | |
| from O | |
| the O | |
| C2 O | |
| . O | |
| UNIQUE O | |
| FEATURES O | |
| BY O | |
| VERSION O | |
| EventBot B-Malware | |
| Version O | |
| 0.0.0.1 O | |
| RC4 O | |
| and O | |
| Base64 O | |
| Packet O | |
| Encryption O | |
| EventBot B-Malware | |
| RC4 O | |
| and O | |
| Base64 O | |
| data O | |
| decryption O | |
| from O | |
| the O | |
| C2 O | |
| RC4 O | |
| and O | |
| Base64 O | |
| data O | |
| decryption O | |
| from O | |
| the O | |
| C2 O | |
| . O | |
| As O | |
| mentioned O | |
| above O | |
| , O | |
| EventBot B-Malware | |
| Version O | |
| 0.0.0.1 O | |
| sends O | |
| a O | |
| JSON O | |
| object O | |
| containing O | |
| the O | |
| Android B-System | |
| package O | |
| names O | |
| of O | |
| all O | |
| the O | |
| apps O | |
| installed O | |
| on O | |
| the O | |
| victim O | |
| β O | |
| s O | |
| device O | |
| alongside O | |
| additional O | |
| metadata O | |
| , O | |
| including O | |
| the O | |
| bot O | |
| version O | |
| , O | |
| botnetID O | |
| , O | |
| and O | |
| the O | |
| reason O | |
| this O | |
| package O | |
| is O | |
| sent O | |
| . O | |
| For O | |
| this O | |
| particular O | |
| packet O | |
| , O | |
| the O | |
| reason O | |
| is O | |
| registration O | |
| of O | |
| the O | |
| bot O | |
| . O | |
| If O | |
| the O | |
| connection O | |
| to O | |
| the O | |
| C2 O | |
| fails O | |
| , O | |
| it O | |
| will O | |
| continue O | |
| to O | |
| retry O | |
| until O | |
| it O | |
| is O | |
| successful O | |
| . O | |
| EventBot B-Malware | |
| Logcat O | |
| from O | |
| the O | |
| infected O | |
| device O | |
| Logcat O | |
| from O | |
| the O | |
| infected O | |
| device O | |
| . O | |
| EVENTBOT B-Malware | |
| VERSION O | |
| 0.0.0.2 O | |
| Dynamic O | |
| Library O | |
| Loading O | |
| As O | |
| of O | |
| Version O | |
| 0.0.0.2 O | |
| , O | |
| EventBot B-Malware | |
| attempts O | |
| to O | |
| hide O | |
| its O | |
| main O | |
| functionality O | |
| from O | |
| static O | |
| analysis O | |
| . O | |
| With O | |
| Version O | |
| 0.0.0.1 O | |
| , O | |
| there O | |
| is O | |
| a O | |
| dedicated O | |
| functions O | |
| class O | |
| where O | |
| all O | |
| main O | |
| malicious O | |
| activity O | |
| happens O | |
| and O | |
| can O | |
| be O | |
| observed O | |
| . O | |
| Instead O | |
| , O | |
| in O | |
| Version O | |
| 0.0.0.2 O | |
| , O | |
| EventBot B-Malware | |
| dynamically O | |
| loads O | |
| its O | |
| main O | |
| module O | |
| . O | |
| EventBot B-Malware | |
| loaded O | |
| library O | |
| Loaded O | |
| library O | |
| as O | |
| seen O | |
| in O | |
| Logcat O | |
| . O | |
| By O | |
| browsing O | |
| EventBot B-Malware | |
| β O | |
| s O | |
| installation O | |
| path O | |
| on O | |
| the O | |
| device O | |
| , O | |
| we O | |
| can O | |
| see O | |
| the O | |
| library O | |
| dropped O | |
| in O | |
| the O | |
| app_dex O | |
| folder O | |
| . O | |
| EventBot B-Malware | |
| loaded O | |
| library O | |
| The O | |
| loaded O | |
| library O | |
| dropped O | |
| on O | |
| the O | |
| device O | |
| . O | |
| The O | |
| code O | |
| to O | |
| load O | |
| the O | |
| main O | |
| module O | |
| dynamically O | |
| can O | |
| also O | |
| be O | |
| seen O | |
| statically O | |
| . O | |
| The O | |
| malicious O | |
| library O | |
| is O | |
| loaded O | |
| from O | |
| Eventbot B-Malware | |
| β O | |
| s O | |
| assets O | |
| that O | |
| contain O | |
| a O | |
| font O | |
| file O | |
| called O | |
| default.ttf B-Indicator | |
| which O | |
| is O | |
| actually O | |
| the O | |
| hidden O | |
| library O | |
| and O | |
| then O | |
| decoded O | |
| using O | |
| RC4 O | |
| . O | |
| EventBot O | |
| method O | |
| responsible O | |
| for O | |
| the O | |
| library O | |
| loading O | |
| The O | |
| method O | |
| responsible O | |
| for O | |
| the O | |
| library O | |
| loading O | |
| . O | |
| EventBot B-Malware | |
| has O | |
| the O | |
| ability O | |
| to O | |
| update O | |
| its O | |
| library O | |
| or O | |
| potentially O | |
| even O | |
| download O | |
| a O | |
| second O | |
| library O | |
| when O | |
| given O | |
| a O | |
| command O | |
| from O | |
| the O | |
| C2 O | |
| . O | |
| An O | |
| updated O | |
| library O | |
| name O | |
| is O | |
| generated O | |
| by O | |
| calculating O | |
| the O | |
| md5sum O | |
| of O | |
| several O | |
| device O | |
| properties O | |
| , O | |
| while O | |
| concatenating O | |
| the O | |
| build O | |
| model O | |
| twice O | |
| in O | |
| case O | |
| of O | |
| an O | |
| update O | |
| to O | |
| the O | |
| library O | |
| . O | |
| EventBot O | |
| Updated O | |
| library O | |
| naming O | |
| convention O | |
| EventBot B-Malware | |
| New O | |
| library O | |
| naming O | |
| convention O | |
| . O | |
| Data O | |
| Encryption O | |
| The O | |
| Curve25519 O | |
| encryption O | |
| algorithm O | |
| was O | |
| implemented O | |
| as O | |
| of O | |
| EventBot B-Malware | |
| Version O | |
| 0.0.0.2 O | |
| . O | |
| This O | |
| encryption O | |
| algorithm O | |
| is O | |
| an O | |
| extra O | |
| security O | |
| layer O | |
| for O | |
| communicating O | |
| with O | |
| the O | |
| C2 O | |
| , O | |
| an O | |
| improvement O | |
| over O | |
| the O | |
| previous O | |
| version O | |
| of O | |
| a O | |
| plain O | |
| RC4 O | |
| encryption O | |
| . O | |
| When O | |
| reviewing O | |
| the O | |
| decrypted O | |
| packet O | |
| , O | |
| it O | |
| β O | |
| s O | |
| clear O | |
| it O | |
| has O | |
| the O | |
| same O | |
| content O | |
| as O | |
| previous O | |
| versions O | |
| . O | |
| EventBot B-Malware | |
| decryption O | |
| of O | |
| packets O | |
| from O | |
| the O | |
| C2 O | |
| Decryption O | |
| of O | |
| packets O | |
| from O | |
| the O | |
| C2 O | |
| using O | |
| Curve25519 O | |
| . O | |
| EVENTBOT O | |
| VERSION O | |
| 0.3.0.1 O | |
| Additional O | |
| Assets O | |
| Based O | |
| on O | |
| Country O | |
| / O | |
| Region O | |
| EventBot-23aEventBot O | |
| Spanish O | |
| and O | |
| Italian O | |
| Images O | |
| in O | |
| Spanish O | |
| and O | |
| Italian O | |
| added O | |
| in O | |
| version O | |
| 0.3.0.1 O | |
| . O | |
| Version O | |
| 0.3.0.1 O | |
| includes O | |
| Italian O | |
| and O | |
| Spanish O | |
| language O | |
| compatibility O | |
| within O | |
| the O | |
| resources O | |
| section O | |
| . O | |
| Presumably O | |
| , O | |
| this O | |
| was O | |
| done O | |
| to O | |
| make O | |
| the O | |
| app O | |
| seem O | |
| more O | |
| credible O | |
| to O | |
| targeted O | |
| users O | |
| in O | |
| different O | |
| countries O | |
| . O | |
| Grabbing O | |
| the O | |
| Screen O | |
| PIN O | |
| with O | |
| Support O | |
| for O | |
| Samsung B-Organization | |
| Devices O | |
| Version O | |
| 0.3.0.1 O | |
| added O | |
| an O | |
| ~800 O | |
| line O | |
| long O | |
| method O | |
| called O | |
| grabScreenPin O | |
| , O | |
| which O | |
| uses O | |
| accessibility O | |
| features O | |
| to O | |
| track O | |
| pin O | |
| code O | |
| changes O | |
| in O | |
| the O | |
| device O | |
| β O | |
| s O | |
| settings O | |
| . O | |
| It O | |
| listens O | |
| to O | |
| events O | |
| like O | |
| TYPE_VIEW_TEXT_CHANGED O | |
| . O | |
| We O | |
| suspect O | |
| the O | |
| updated O | |
| PIN O | |
| is O | |
| sent O | |
| to O | |
| the O | |
| C2 O | |
| , O | |
| most O | |
| likely O | |
| to O | |
| give O | |
| the O | |
| malware O | |
| the O | |
| option O | |
| to O | |
| perform O | |
| privileged O | |
| activities O | |
| on O | |
| the O | |
| infected O | |
| device O | |
| related O | |
| to O | |
| payments O | |
| , O | |
| system O | |
| configuration O | |
| options O | |
| , O | |
| etc O | |
| . O | |
| EventBot B-Malware | |
| Listening O | |
| to O | |
| TYPE_VIEW_TEXT_CHANGED O | |
| accessibility O | |
| event O | |
| Listening O | |
| to O | |
| TYPE_VIEW_TEXT_CHANGED O | |
| accessibility O | |
| event O | |
| . O | |
| After O | |
| collecting O | |
| the O | |
| changed O | |
| PIN O | |
| code O | |
| , O | |
| it O | |
| is O | |
| sent O | |
| back O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| EventBot B-Malware | |
| Sending O | |
| the O | |
| pin O | |
| code O | |
| back O | |
| to O | |
| the O | |
| C2 O | |
| Sending O | |
| the O | |
| pin O | |
| code O | |
| back O | |
| to O | |
| the O | |
| C2 O | |
| . O | |
| Eventually O | |
| , O | |
| the O | |
| screen O | |
| PIN O | |
| preferences O | |
| will O | |
| be O | |
| saved O | |
| to O | |
| an O | |
| additional O | |
| XML O | |
| file O | |
| in O | |
| the O | |
| shared O | |
| preferences O | |
| folder O | |
| . O | |
| EventBot O | |
| screenPinPrefs.xml B-Indicator | |
| The O | |
| content O | |
| of O | |
| screenPinPrefs.xml B-Indicator | |
| . O | |
| The O | |
| grabScreenPin O | |
| method O | |
| has O | |
| separate O | |
| conditioning O | |
| to O | |
| handle O | |
| screen O | |
| lock O | |
| events O | |
| in O | |
| Samsung B-Organization | |
| devices O | |
| . O | |
| EventBot B-Malware | |
| screen O | |
| lock O | |
| with O | |
| support O | |
| for O | |
| Samsung B-Organization | |
| devices O | |
| A O | |
| new O | |
| method O | |
| to O | |
| handle O | |
| screen O | |
| lock O | |
| with O | |
| support O | |
| for O | |
| Samsung B-Organization | |
| devices O | |
| . O | |
| EVENTBOT O | |
| VERSION O | |
| 0.4.0.1 O | |
| Package O | |
| Name O | |
| Randomization O | |
| In O | |
| this O | |
| version O | |
| , O | |
| the O | |
| package O | |
| name O | |
| is O | |
| no O | |
| longer O | |
| named O | |
| β O | |
| com.example.eventbot B-Indicator | |
| β O | |
| , O | |
| which O | |
| makes O | |
| it O | |
| more O | |
| difficult O | |
| to O | |
| track O | |
| down O | |
| . O | |
| EventBot B-Malware | |
| Randomized O | |
| package O | |
| name O | |
| Randomized O | |
| package O | |
| name O | |
| instead O | |
| of O | |
| com.example.eventbot B-Indicator | |
| . O | |
| ProGuard B-System | |
| Obfuscation O | |
| As O | |
| with O | |
| many O | |
| other O | |
| Android B-System | |
| applications O | |
| , O | |
| EventBot B-Malware | |
| is O | |
| now O | |
| using O | |
| obfuscation O | |
| . O | |
| Both O | |
| the O | |
| loader O | |
| and O | |
| dropped O | |
| class O | |
| are O | |
| obfuscated O | |
| using O | |
| ProGuard B-Indicator | |
| , O | |
| which O | |
| obfuscates O | |
| names O | |
| using O | |
| alphabet O | |
| letters O | |
| . O | |
| The O | |
| code O | |
| itself O | |
| is O | |
| not O | |
| modified O | |
| by O | |
| this O | |
| type O | |
| of O | |
| obfuscation O | |
| though O | |
| , O | |
| making O | |
| the O | |
| analysis O | |
| easier O | |
| . O | |
| EventBot B-Malware | |
| Obfuscated O | |
| class O | |
| names O | |
| Obfuscated O | |
| class O | |
| names O | |
| using O | |
| letters O | |
| of O | |
| the O | |
| alphabet O | |
| . O | |
| Hidden O | |
| Configuration O | |
| Data O | |
| As O | |
| mentioned O | |
| above O | |
| , O | |
| EventBot B-Malware | |
| begins O | |
| using O | |
| obfuscation O | |
| . O | |
| Due O | |
| to O | |
| this O | |
| obfuscation O | |
| , O | |
| a O | |
| part O | |
| of O | |
| the O | |
| previously O | |
| mentioned O | |
| cfg O | |
| class O | |
| is O | |
| now O | |
| mapped O | |
| to O | |
| c/b/a/a/a O | |
| or O | |
| c/a/a/a/a O | |
| . O | |
| EventBot O | |
| C2 O | |
| URLs O | |
| C2 O | |
| URLs O | |
| and O | |
| other O | |
| settings O | |
| in O | |
| a O | |
| nested O | |
| class O | |
| . O | |
| Other O | |
| configuration O | |
| data O | |
| is O | |
| located O | |
| elsewhere O | |
| , O | |
| and O | |
| some O | |
| of O | |
| it O | |
| can O | |
| been O | |
| seen O | |
| here O | |
| : O | |
| The O | |
| encrypted O | |
| library O | |
| path O | |
| The O | |
| output O | |
| folder O | |
| on O | |
| the O | |
| device O | |
| for O | |
| the O | |
| dropped O | |
| library O | |
| The O | |
| name O | |
| of O | |
| the O | |
| library O | |
| after O | |
| it O | |
| is O | |
| loaded O | |
| eventBot O | |
| name O | |
| string O | |
| Version O | |
| number O | |
| A O | |
| string O | |
| used O | |
| as O | |
| an O | |
| RC4 O | |
| key O | |
| , O | |
| both O | |
| for O | |
| decrypting O | |
| the O | |
| library O | |
| and O | |
| as O | |
| a O | |
| part O | |
| of O | |
| the O | |
| network O | |
| data O | |
| encryption O | |
| ( O | |
| hasn O | |
| β O | |
| t O | |
| changed O | |
| from O | |
| the O | |
| previous O | |
| version O | |
| ) O | |
| The O | |
| C2 O | |
| URLs O | |
| A O | |
| randomized O | |
| class O | |
| name O | |
| using O | |
| the O | |
| device O | |
| β O | |
| s O | |
| accessibility O | |
| services O | |
| EventBot B-Malware | |
| extracted O | |
| configuration O | |
| Part O | |
| of O | |
| the O | |
| extracted O | |
| configuration O | |
| of O | |
| the O | |
| new O | |
| version O | |
| . O | |
| MALWARE O | |
| UNDER O | |
| ACTIVE O | |
| DEVELOPMENT O | |
| EventBot B-Malware | |
| β O | |
| cfg O | |
| β O | |
| class O | |
| EventBot B-Malware | |
| β O | |
| cfg O | |
| β O | |
| class O | |
| . O | |
| EventBot B-Malware | |
| is O | |
| in O | |
| constant O | |
| development O | |
| , O | |
| as O | |
| seen O | |
| with O | |
| the O | |
| botnetID O | |
| string O | |
| above O | |
| , O | |
| which O | |
| shows O | |
| consecutive O | |
| numbering O | |
| across O | |
| versions O | |
| . O | |
| This O | |
| example O | |
| is O | |
| from O | |
| a O | |
| later O | |
| version O | |
| of O | |
| EventBot B-Malware | |
| , O | |
| and O | |
| in O | |
| other O | |
| versions O | |
| the O | |
| naming O | |
| convention O | |
| is O | |
| very O | |
| similar O | |
| , O | |
| with O | |
| bot O | |
| IDs O | |
| such O | |
| as O | |
| word100 O | |
| , O | |
| word101 O | |
| , O | |
| word102 O | |
| , O | |
| and O | |
| test2005 O | |
| , O | |
| test2006 O | |
| etc O | |
| . O | |
| In O | |
| the O | |
| latest O | |
| version O | |
| , O | |
| a O | |
| layer O | |
| of O | |
| obfuscation O | |
| was O | |
| added O | |
| , O | |
| perhaps O | |
| taking O | |
| the O | |
| malware O | |
| one O | |
| step O | |
| closer O | |
| to O | |
| being O | |
| fully O | |
| operational O | |
| . O | |
| SUSPECTED O | |
| DETECTION O | |
| TESTS O | |
| BY O | |
| THE O | |
| THREAT O | |
| ACTOR O | |
| In O | |
| searching O | |
| for O | |
| EventBot B-Malware | |
| , O | |
| we O | |
| β O | |
| ve O | |
| identified O | |
| multiple O | |
| submissions O | |
| from O | |
| the O | |
| same O | |
| submitter O | |
| hash O | |
| , O | |
| 22b3c7b0 B-Indicator | |
| : O | |
| EventBot B-Malware | |
| 22b3c7b0 B-Indicator | |
| submitter O | |
| hash O | |
| The O | |
| 22b3c7b0 B-Indicator | |
| submitter O | |
| hash O | |
| that O | |
| submitted O | |
| most O | |
| of O | |
| the O | |
| EventBot B-Malware | |
| samples O | |
| to O | |
| VirusTotal O | |
| . O | |
| This O | |
| submitter O | |
| has O | |
| thousands O | |
| of O | |
| other O | |
| submissions O | |
| in O | |
| VirusTotal O | |
| , O | |
| however O | |
| , O | |
| it O | |
| is O | |
| the O | |
| only O | |
| one O | |
| that O | |
| continues O | |
| to O | |
| submit O | |
| EventBot B-Malware | |
| samples O | |
| via O | |
| the O | |
| VirusTotal O | |
| API O | |
| . O | |
| Also O | |
| , O | |
| the O | |
| botnet O | |
| IDs O | |
| increment O | |
| over O | |
| time O | |
| as O | |
| they O | |
| are O | |
| submitted O | |
| . O | |
| Given O | |
| this O | |
| , O | |
| and O | |
| the O | |
| naming O | |
| convention O | |
| of O | |
| the O | |
| submissions O | |
| ( O | |
| .virus O | |
| ) O | |
| , O | |
| the O | |
| submitter O | |
| hash O | |
| most O | |
| likely O | |
| belongs O | |
| to O | |
| an O | |
| AV O | |
| vendor O | |
| or O | |
| sandboxing O | |
| environment O | |
| that O | |
| automatically O | |
| submits O | |
| samples O | |
| to O | |
| online O | |
| malware O | |
| databases O | |
| . O | |
| It O | |
| may O | |
| be O | |
| that O | |
| these O | |
| submissions O | |
| are O | |
| made O | |
| from O | |
| the O | |
| author O | |
| β O | |
| s O | |
| machine O | |
| , O | |
| or O | |
| that O | |
| they O | |
| submit O | |
| it O | |
| to O | |
| a O | |
| detection O | |
| service O | |
| that O | |
| in O | |
| turn O | |
| submits O | |
| to O | |
| online O | |
| malware O | |
| databases O | |
| . O | |
| EVENTBOT B-Malware | |
| THREAT O | |
| ACTORS O | |
| As O | |
| a O | |
| part O | |
| of O | |
| this O | |
| investigation O | |
| , O | |
| the O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| has O | |
| attempted O | |
| to O | |
| identify O | |
| the O | |
| threat O | |
| actors O | |
| behind O | |
| the O | |
| development O | |
| of O | |
| EventBot B-Malware | |
| . O | |
| The O | |
| evidence O | |
| above O | |
| suggests O | |
| that O | |
| EventBot B-Malware | |
| is O | |
| still O | |
| in O | |
| the O | |
| development O | |
| stage O | |
| , O | |
| and O | |
| as O | |
| such O | |
| , O | |
| is O | |
| not O | |
| likely O | |
| to O | |
| have O | |
| been O | |
| used O | |
| for O | |
| large O | |
| attack O | |
| campaigns O | |
| thus O | |
| far O | |
| . O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| is O | |
| monitoring O | |
| multiple O | |
| underground O | |
| platforms O | |
| in O | |
| an O | |
| attempt O | |
| to O | |
| identify O | |
| chatter O | |
| relating O | |
| to O | |
| EventBot B-Malware | |
| . O | |
| New O | |
| malware O | |
| is O | |
| often O | |
| introduced O | |
| to O | |
| underground O | |
| communities O | |
| by O | |
| being O | |
| promoted O | |
| and O | |
| sold O | |
| or O | |
| offered O | |
| as O | |
| a O | |
| giveaway O | |
| . O | |
| However O | |
| , O | |
| at O | |
| the O | |
| time O | |
| of O | |
| writing O | |
| , O | |
| we O | |
| were O | |
| unable O | |
| to O | |
| identify O | |
| relevant O | |
| conversations O | |
| about O | |
| the O | |
| EventBot B-Malware | |
| malware O | |
| . O | |
| This O | |
| strengthens O | |
| our O | |
| suspicion O | |
| that O | |
| this O | |
| malware O | |
| is O | |
| still O | |
| undergoing O | |
| development O | |
| and O | |
| has O | |
| not O | |
| been O | |
| officially O | |
| marketed O | |
| or O | |
| released O | |
| yet O | |
| . O | |
| EVENTBOT B-Malware | |
| INFRASTRUCTURE O | |
| By O | |
| mapping O | |
| the O | |
| C2 O | |
| servers O | |
| , O | |
| a O | |
| clear O | |
| , O | |
| repeated O | |
| pattern O | |
| emerges O | |
| based O | |
| on O | |
| the O | |
| specific O | |
| URL O | |
| gate_cb8a5aea1ab302f0_c O | |
| . O | |
| As O | |
| of O | |
| this O | |
| writing O | |
| , O | |
| all O | |
| the O | |
| domains O | |
| were O | |
| registered O | |
| recently O | |
| and O | |
| some O | |
| are O | |
| already O | |
| offline O | |
| . O | |
| URL O | |
| Status O | |
| IP O | |
| Domain O | |
| registration O | |
| date O | |
| http B-Indicator | |
| : I-Indicator | |
| //ora.studiolegalebasili I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/gate_cb8a5aea1ab302f0_c I-Indicator | |
| offline O | |
| 31.214.157 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 6 I-Indicator | |
| 2020-02-29 O | |
| http B-Indicator | |
| : I-Indicator | |
| //themoil I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| site/gate_cb8a5aea1ab302f0_c I-Indicator | |
| online O | |
| 208.91.197 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 91 I-Indicator | |
| 2020-03-04 O | |
| http B-Indicator | |
| : I-Indicator | |
| //ora.carlaarrabitoarchitetto I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/gate_cb8a5aea1ab302f0_c I-Indicator | |
| offline O | |
| 31.214.157 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 6 I-Indicator | |
| 2020-03-26 O | |
| http B-Indicator | |
| : I-Indicator | |
| //rxc.rxcoordinator I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/gate_cb8a5aea1ab302f0_c I-Indicator | |
| online O | |
| 185.158.248 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 102 I-Indicator | |
| 2020-03-29 O | |
| http B-Indicator | |
| : I-Indicator | |
| //ora.blindsidefantasy I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/gate_cb8a5aea1ab302f0_c I-Indicator | |
| online O | |
| 185.158.248 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 102 I-Indicator | |
| 2020-04-02 O | |
| http B-Indicator | |
| : I-Indicator | |
| //marta.martatovaglieri I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| it/gate_cb8a5aea1ab302f0_c I-Indicator | |
| online O | |
| 185.158.248 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 102 I-Indicator | |
| 2020-04-14 O | |
| http B-Indicator | |
| : I-Indicator | |
| //pub.douglasshome I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/gate_cb8a5aea1ab302f0_c I-Indicator | |
| online O | |
| 185.158.249 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 141 I-Indicator | |
| 2020-04-26 O | |
| In O | |
| the O | |
| course O | |
| of O | |
| the O | |
| investigation O | |
| , O | |
| the O | |
| team O | |
| discovered O | |
| a O | |
| potential O | |
| link O | |
| to O | |
| an O | |
| additional O | |
| Android B-Malware | |
| infostealer I-Malware | |
| . O | |
| The O | |
| IP O | |
| address O | |
| of O | |
| both O | |
| ora.carlaarrabitoarchitetto B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| and O | |
| ora.studiolegalebasili B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| , O | |
| 31.214.157 B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| 6 I-Indicator | |
| , O | |
| was O | |
| previously O | |
| hosting O | |
| the O | |
| domain B-Indicator | |
| next.nextuptravel I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| . O | |
| This O | |
| was O | |
| the O | |
| C2 O | |
| for O | |
| an O | |
| Android B-Malware | |
| infostealer I-Malware | |
| responsible O | |
| for O | |
| several O | |
| attacks O | |
| in O | |
| Italy O | |
| back O | |
| in O | |
| late O | |
| 2019 O | |
| . O | |
| EventBot B-Malware | |
| VirusTotal O | |
| search O | |
| for O | |
| the O | |
| malicious O | |
| IP O | |
| address O | |
| VirusTotal O | |
| search O | |
| for O | |
| the O | |
| malicious O | |
| IP O | |
| address O | |
| . O | |
| IMPACT O | |
| EventBot B-Malware | |
| is O | |
| a O | |
| mobile O | |
| malware O | |
| banking O | |
| trojan O | |
| that O | |
| steals O | |
| financial O | |
| information O | |
| , O | |
| is O | |
| able O | |
| to O | |
| hijack O | |
| transactions O | |
| . O | |
| Once O | |
| this O | |
| malware O | |
| has O | |
| successfully O | |
| installed O | |
| , O | |
| it O | |
| will O | |
| collect O | |
| personal O | |
| data O | |
| , O | |
| passwords O | |
| , O | |
| keystrokes O | |
| , O | |
| banking O | |
| information O | |
| , O | |
| and O | |
| more O | |
| . O | |
| This O | |
| information O | |
| can O | |
| give O | |
| the O | |
| attacker O | |
| access O | |
| to O | |
| personal O | |
| and O | |
| business O | |
| bank O | |
| accounts O | |
| , O | |
| personal O | |
| and O | |
| business O | |
| data O | |
| , O | |
| and O | |
| more O | |
| . O | |
| Letting O | |
| an O | |
| attacker O | |
| get O | |
| access O | |
| to O | |
| this O | |
| kind O | |
| of O | |
| data O | |
| can O | |
| have O | |
| severe O | |
| consequences O | |
| . O | |
| 60 O | |
| % O | |
| of O | |
| devices O | |
| containing O | |
| or O | |
| accessing O | |
| enterprise O | |
| data O | |
| are O | |
| mobile O | |
| . O | |
| Giving O | |
| an O | |
| attacker O | |
| access O | |
| to O | |
| a O | |
| mobile O | |
| device O | |
| can O | |
| have O | |
| severe O | |
| business O | |
| consequences O | |
| , O | |
| especially O | |
| if O | |
| the O | |
| end O | |
| user O | |
| is O | |
| using O | |
| their O | |
| mobile O | |
| device O | |
| to O | |
| discuss O | |
| sensitive O | |
| business O | |
| topics O | |
| or O | |
| access O | |
| enterprise O | |
| financial O | |
| information O | |
| . O | |
| This O | |
| can O | |
| result O | |
| in O | |
| brand O | |
| degradation O | |
| , O | |
| loss O | |
| of O | |
| individual O | |
| reputation O | |
| , O | |
| or O | |
| loss O | |
| of O | |
| consumer O | |
| trust O | |
| . O | |
| Much O | |
| like O | |
| we O | |
| have O | |
| seen O | |
| in O | |
| recent O | |
| months O | |
| , O | |
| anyone O | |
| can O | |
| be O | |
| impacted O | |
| by O | |
| a O | |
| mobile O | |
| device O | |
| attack O | |
| . O | |
| These O | |
| attacks O | |
| are O | |
| only O | |
| becoming O | |
| more O | |
| common O | |
| , O | |
| with O | |
| one O | |
| third O | |
| of O | |
| all O | |
| malware O | |
| now O | |
| targeting O | |
| mobile O | |
| endpoints O | |
| . O | |
| Care O | |
| and O | |
| concern O | |
| both O | |
| for O | |
| using O | |
| a O | |
| mobile O | |
| device O | |
| and O | |
| for O | |
| securing O | |
| a O | |
| mobile O | |
| device O | |
| is O | |
| critical O | |
| , O | |
| especially O | |
| for O | |
| those O | |
| organizations O | |
| that O | |
| allow O | |
| bring-your-own-devices O | |
| . O | |
| CYBEREASON B-System | |
| MOBILE I-System | |
| Cybereason B-System | |
| Mobile I-System | |
| detects I-System | |
| EventBot B-Malware | |
| and O | |
| immediately O | |
| takes O | |
| remediation O | |
| actions O | |
| to O | |
| protect O | |
| the O | |
| end O | |
| user O | |
| . O | |
| With O | |
| Cybereason B-System | |
| Mobile I-System | |
| , O | |
| analysts O | |
| can O | |
| address O | |
| mobile O | |
| threats O | |
| in O | |
| the O | |
| same O | |
| platform O | |
| as O | |
| traditional O | |
| endpoint O | |
| threats O | |
| , O | |
| all O | |
| as O | |
| part O | |
| of O | |
| one O | |
| incident O | |
| . O | |
| Without O | |
| mobile O | |
| threat O | |
| detection O | |
| , O | |
| this O | |
| attack O | |
| would O | |
| not O | |
| be O | |
| detected O | |
| , O | |
| leaving O | |
| end O | |
| users O | |
| and O | |
| organizations O | |
| at O | |
| risk O | |
| . O | |
| Cybereason B-System | |
| Mobile I-System | |
| detects O | |
| EventBot B-Malware | |
| and O | |
| provides O | |
| the O | |
| user O | |
| with O | |
| immediate O | |
| actions O | |
| . O | |
| CONCLUSION O | |
| In O | |
| this O | |
| research O | |
| , O | |
| the O | |
| Nocturnus B-Organization | |
| team O | |
| has O | |
| dissected O | |
| a O | |
| rapidly O | |
| evolving O | |
| Android B-Malware | |
| malware O | |
| in O | |
| the O | |
| making O | |
| . O | |
| This O | |
| malware O | |
| abuses O | |
| the O | |
| Android B-System | |
| accessibility O | |
| feature O | |
| to O | |
| steal O | |
| user O | |
| information O | |
| and O | |
| is O | |
| able O | |
| to O | |
| update O | |
| its O | |
| code O | |
| and O | |
| release O | |
| new O | |
| features O | |
| every O | |
| few O | |
| days O | |
| . O | |
| With O | |
| each O | |
| new O | |
| version O | |
| , O | |
| the O | |
| malware O | |
| adds O | |
| new O | |
| features O | |
| like O | |
| dynamic O | |
| library O | |
| loading O | |
| , O | |
| encryption O | |
| , O | |
| and O | |
| adjustments O | |
| to O | |
| different O | |
| locales O | |
| and O | |
| manufacturers O | |
| . O | |
| EventBot B-Malware | |
| appears O | |
| to O | |
| be O | |
| a O | |
| completely O | |
| new O | |
| malware O | |
| in O | |
| the O | |
| early O | |
| stages O | |
| of O | |
| development O | |
| , O | |
| giving O | |
| us O | |
| an O | |
| interesting O | |
| view O | |
| into O | |
| how O | |
| attackers O | |
| create O | |
| and O | |
| test O | |
| their O | |
| malware O | |
| . O | |
| Cybereason B-Organization | |
| classifies O | |
| EventBot B-Malware | |
| as O | |
| a O | |
| mobile O | |
| banking O | |
| trojan O | |
| and O | |
| infostealer O | |
| based O | |
| on O | |
| the O | |
| stealing O | |
| features O | |
| discussed O | |
| in O | |
| this O | |
| research O | |
| . O | |
| It O | |
| leverages O | |
| webinjects O | |
| and O | |
| SMS O | |
| reading O | |
| capabilities O | |
| to O | |
| bypass O | |
| two-factor O | |
| authentication O | |
| , O | |
| and O | |
| is O | |
| clearly O | |
| targeting O | |
| financial O | |
| applications O | |
| . O | |
| Although O | |
| the O | |
| threat O | |
| actor O | |
| responsible O | |
| for O | |
| the O | |
| development O | |
| of O | |
| EventBot B-Malware | |
| is O | |
| still O | |
| unknown O | |
| and O | |
| the O | |
| malware O | |
| does O | |
| not O | |
| appear O | |
| to O | |
| be O | |
| involved O | |
| in O | |
| major O | |
| attacks O | |
| , O | |
| it O | |
| is O | |
| interesting O | |
| to O | |
| follow O | |
| the O | |
| early O | |
| stages O | |
| of O | |
| mobile O | |
| malware O | |
| development O | |
| . O | |
| The O | |
| Cybereason B-Organization | |
| Nocturnus I-Organization | |
| team O | |
| will O | |
| continue O | |
| to O | |
| monitor O | |
| EventBot B-Malware | |
| β O | |
| s O | |
| development O | |
| . O | |
| In O | |
| recent O | |
| years O | |
| , O | |
| online O | |
| activity O | |
| has O | |
| gradually O | |
| been O | |
| shifting O | |
| from O | |
| personal O | |
| computers O | |
| to O | |
| mobile O | |
| devices O | |
| . O | |
| Naturally O | |
| , O | |
| this O | |
| resulted O | |
| in O | |
| the O | |
| introduction O | |
| of O | |
| malware O | |
| for O | |
| mobile O | |
| platforms O | |
| , O | |
| especially O | |
| Android B-System | |
| devices O | |
| , O | |
| including O | |
| Cerberus B-Malware | |
| , O | |
| Xhelper B-Malware | |
| and O | |
| the O | |
| Anubis B-Malware | |
| Banking O | |
| Trojan O | |
| . O | |
| As O | |
| many O | |
| people O | |
| use O | |
| their O | |
| mobile O | |
| devices O | |
| for O | |
| online O | |
| shopping O | |
| and O | |
| even O | |
| to O | |
| manage O | |
| their O | |
| bank O | |
| accounts O | |
| , O | |
| the O | |
| mobile O | |
| arena O | |
| became O | |
| increasingly O | |
| profitable O | |
| for O | |
| cyber O | |
| criminals O | |
| . O | |
| This O | |
| is O | |
| why O | |
| we O | |
| recently O | |
| released O | |
| Cybereason B-System | |
| Mobile I-System | |
| , O | |
| a O | |
| new O | |
| offering O | |
| that O | |
| strengthens O | |
| the O | |
| Cybereason B-System | |
| Defense I-System | |
| Platform I-System | |
| by O | |
| bringing O | |
| prevention O | |
| , O | |
| detection O | |
| , O | |
| and O | |
| response O | |
| capabilities O | |
| to O | |
| mobile O | |
| devices O | |
| . O | |
| With O | |
| Cybereason B-System | |
| Mobile I-System | |
| , O | |
| our O | |
| customers O | |
| can O | |
| protect O | |
| against O | |
| modern O | |
| threats O | |
| across O | |
| traditional O | |
| and O | |
| mobile O | |
| endpoints O | |
| , O | |
| all O | |
| within O | |
| a O | |
| single O | |
| console O | |
| . O | |
| Check B-Organization | |
| Point I-Organization | |
| Mobile B-System | |
| Threat I-System | |
| Prevention I-System | |
| has O | |
| detected O | |
| two O | |
| instances O | |
| of O | |
| a O | |
| mobile O | |
| malware O | |
| variant O | |
| infecting O | |
| multiple O | |
| devices O | |
| within O | |
| the O | |
| Check B-Organization | |
| Point I-Organization | |
| customer O | |
| base O | |
| . O | |
| The O | |
| malware O | |
| , O | |
| packaged O | |
| within O | |
| an O | |
| Android B-System | |
| game O | |
| app O | |
| called O | |
| BrainTest B-Malware | |
| , O | |
| had O | |
| been O | |
| published O | |
| to O | |
| Google B-System | |
| Play I-System | |
| twice O | |
| . O | |
| Each O | |
| instance O | |
| had O | |
| between O | |
| 100,000 O | |
| and O | |
| 500,000 O | |
| downloads O | |
| according O | |
| to O | |
| Google B-System | |
| Play I-System | |
| statistics O | |
| , O | |
| reaching O | |
| an O | |
| aggregated O | |
| infection O | |
| rate O | |
| of O | |
| between O | |
| 200,000 O | |
| and O | |
| 1 O | |
| million O | |
| users O | |
| . O | |
| Check B-Organization | |
| Point I-Organization | |
| reached O | |
| out O | |
| to O | |
| Google B-Organization | |
| on O | |
| September O | |
| 10 O | |
| , O | |
| 2015 O | |
| , O | |
| and O | |
| the O | |
| app O | |
| containing O | |
| the O | |
| malware O | |
| was O | |
| removed O | |
| from O | |
| Google B-System | |
| Play I-System | |
| on O | |
| September O | |
| 15 O | |
| , O | |
| 2015 O | |
| . O | |
| Overview O | |
| The O | |
| malware O | |
| was O | |
| first O | |
| detected O | |
| on O | |
| a O | |
| Nexus B-System | |
| 5 I-System | |
| smartphone O | |
| , O | |
| and O | |
| although O | |
| the O | |
| user O | |
| attempted O | |
| to O | |
| remove O | |
| the O | |
| infected O | |
| app O | |
| , O | |
| the O | |
| malware O | |
| reappeared O | |
| on O | |
| the O | |
| same O | |
| device O | |
| shortly O | |
| thereafter O | |
| . O | |
| Our O | |
| analysis O | |
| of O | |
| the O | |
| malware O | |
| shows O | |
| it O | |
| uses O | |
| multiple O | |
| , O | |
| advanced O | |
| techniques O | |
| to O | |
| avoid O | |
| Google B-System | |
| Play I-System | |
| malware O | |
| detection O | |
| and O | |
| to O | |
| maintain O | |
| persistency O | |
| on O | |
| target O | |
| devices O | |
| . O | |
| Once O | |
| this O | |
| malware O | |
| was O | |
| detected O | |
| on O | |
| a O | |
| device O | |
| , O | |
| Mobile B-System | |
| Threat I-System | |
| Prevention I-System | |
| adjusted O | |
| security O | |
| policies O | |
| on O | |
| the O | |
| Mobile O | |
| Device O | |
| Management O | |
| solution O | |
| ( O | |
| MobileIron O | |
| ) O | |
| managing O | |
| the O | |
| affected O | |
| devices O | |
| automatically O | |
| , O | |
| thereby O | |
| blocking O | |
| enterprise O | |
| access O | |
| from O | |
| the O | |
| infected O | |
| devices O | |
| . O | |
| While O | |
| the O | |
| malware O | |
| is O | |
| capable O | |
| of O | |
| facilitating O | |
| various O | |
| cyber-criminal O | |
| goals O | |
| , O | |
| our O | |
| team O | |
| confirmed O | |
| it O | |
| β O | |
| s O | |
| currently O | |
| installing O | |
| additional O | |
| apps O | |
| on O | |
| infected O | |
| devices O | |
| . O | |
| Disturbingly O | |
| , O | |
| the O | |
| malware O | |
| establishes O | |
| a O | |
| rootkit O | |
| on O | |
| the O | |
| device O | |
| , O | |
| allowing O | |
| it O | |
| to O | |
| download O | |
| and O | |
| execute O | |
| any O | |
| code O | |
| a O | |
| cybercriminal O | |
| would O | |
| want O | |
| to O | |
| run O | |
| on O | |
| a O | |
| device O | |
| . O | |
| For O | |
| example O | |
| , O | |
| it O | |
| could O | |
| be O | |
| used O | |
| to O | |
| display O | |
| unwanted O | |
| and O | |
| annoying O | |
| advertisements O | |
| on O | |
| a O | |
| device O | |
| , O | |
| or O | |
| potentially O | |
| , O | |
| to O | |
| download O | |
| and O | |
| deploy O | |
| a O | |
| payload O | |
| that O | |
| steals O | |
| credentials O | |
| from O | |
| an O | |
| infected O | |
| device O | |
| . O | |
| Highlights O | |
| Samples O | |
| of O | |
| the O | |
| malicious O | |
| code O | |
| found O | |
| in O | |
| BrainTest B-Malware | |
| have O | |
| been O | |
| found O | |
| on O | |
| Google B-System | |
| Play I-System | |
| , O | |
| and O | |
| its O | |
| creator O | |
| has O | |
| used O | |
| multiple O | |
| methods O | |
| to O | |
| evade O | |
| detection O | |
| by O | |
| Google B-Organization | |
| including O | |
| Bypassing O | |
| Google B-System | |
| Bouncer I-System | |
| by O | |
| detecting O | |
| if O | |
| the O | |
| malware O | |
| is O | |
| being O | |
| run O | |
| from O | |
| an O | |
| IP O | |
| or O | |
| domain O | |
| mapped O | |
| to O | |
| Google B-System | |
| Bouncer I-System | |
| and O | |
| , O | |
| if O | |
| so O | |
| , O | |
| it O | |
| will O | |
| not O | |
| perform O | |
| its O | |
| intended O | |
| malicious O | |
| activities O | |
| . O | |
| Combining O | |
| timebombs O | |
| , O | |
| dynamic O | |
| code O | |
| loading O | |
| , O | |
| and O | |
| use O | |
| of O | |
| reflection O | |
| to O | |
| complicate O | |
| reverse O | |
| engineering O | |
| of O | |
| the O | |
| malware O | |
| . O | |
| Using O | |
| off-the-shelf O | |
| obfuscation O | |
| ( O | |
| packer O | |
| ) O | |
| from O | |
| Baidu B-Organization | |
| to O | |
| re-introduce O | |
| the O | |
| malware O | |
| to O | |
| Google B-System | |
| Play I-System | |
| after O | |
| the O | |
| first O | |
| instance O | |
| was O | |
| removed O | |
| on O | |
| Aug O | |
| 24th O | |
| . O | |
| BrainTest B-Malware | |
| uses O | |
| four O | |
| privilege B-Vulnerability | |
| escalation I-Vulnerability | |
| exploits I-Vulnerability | |
| to O | |
| gain O | |
| root O | |
| access O | |
| on O | |
| a O | |
| device O | |
| and O | |
| to O | |
| install O | |
| a O | |
| persistent O | |
| malware O | |
| as O | |
| a O | |
| system O | |
| application O | |
| . O | |
| BrainTest B-Malware | |
| leverages O | |
| an O | |
| anti-uninstall B-Vulnerability | |
| watchdog I-Vulnerability | |
| that O | |
| uses O | |
| two O | |
| system O | |
| applications O | |
| to O | |
| monitor O | |
| the O | |
| removal O | |
| of O | |
| one O | |
| of O | |
| the O | |
| components O | |
| and O | |
| reinstall O | |
| the O | |
| component O | |
| . O | |
| After O | |
| the O | |
| the O | |
| first O | |
| instance O | |
| of O | |
| BrainTest B-Malware | |
| was O | |
| detected O | |
| , O | |
| Google B-Organization | |
| removed O | |
| the O | |
| app O | |
| from O | |
| Google B-System | |
| Play I-System | |
| . O | |
| Within O | |
| days O | |
| , O | |
| the O | |
| Check B-Organization | |
| Point I-Organization | |
| research O | |
| team O | |
| detected O | |
| another O | |
| instance O | |
| with O | |
| a O | |
| different O | |
| package O | |
| name O | |
| but O | |
| which O | |
| uses O | |
| the O | |
| same O | |
| code O | |
| . O | |
| The O | |
| malware O | |
| β O | |
| s O | |
| creators O | |
| had O | |
| used O | |
| obfuscation O | |
| to O | |
| upload O | |
| the O | |
| new O | |
| piece O | |
| of O | |
| malware O | |
| to O | |
| Google B-System | |
| Play I-System | |
| . O | |
| Technical O | |
| Analysis O | |
| The O | |
| malware O | |
| consists O | |
| of O | |
| 2 O | |
| applications O | |
| : O | |
| The O | |
| Dropper O | |
| : O | |
| Brain O | |
| Test O | |
| ( O | |
| Unpacked O | |
| β O | |
| com.mile.brain B-Indicator | |
| , O | |
| Packed O | |
| β O | |
| com.zmhitlte.brain B-Indicator | |
| ) O | |
| This O | |
| is O | |
| installed O | |
| from O | |
| Google B-System | |
| Play I-System | |
| and O | |
| downloads O | |
| an O | |
| exploit O | |
| pack O | |
| from O | |
| the O | |
| server O | |
| to O | |
| obtain O | |
| root O | |
| access O | |
| on O | |
| a O | |
| device O | |
| . O | |
| If O | |
| root O | |
| access O | |
| is O | |
| obtained O | |
| , O | |
| the O | |
| application O | |
| downloads O | |
| a O | |
| malicious O | |
| .apk O | |
| file O | |
| ( O | |
| The O | |
| Backdoor O | |
| ) O | |
| from O | |
| the O | |
| server O | |
| and O | |
| installs O | |
| it O | |
| as O | |
| system O | |
| application O | |
| . O | |
| The O | |
| Backdoor O | |
| : O | |
| System O | |
| malware O | |
| ( O | |
| mcpef.apk B-Indicator | |
| and O | |
| brother.apk B-Indicator | |
| ) O | |
| This O | |
| tries O | |
| a O | |
| few O | |
| persistence O | |
| methods O | |
| by O | |
| using O | |
| few O | |
| anti-uninstall O | |
| techniques O | |
| ( O | |
| described O | |
| below O | |
| ) O | |
| and O | |
| downloads O | |
| and O | |
| executes O | |
| code O | |
| from O | |
| server O | |
| without O | |
| user O | |
| consent O | |
| . O | |
| Detailed O | |
| Malware O | |
| Structure O | |
| Malware O | |
| Strucutre O | |
| com.mile.brain B-Indicator | |
| ( O | |
| SHA256 O | |
| : O | |
| 135d6acff3ca27e6e7997429e5f8051f88215d12351e4103f8344cd66611e0f3 B-Indicator | |
| ) O | |
| : O | |
| This O | |
| is O | |
| the O | |
| main O | |
| application O | |
| found O | |
| on O | |
| Google B-System | |
| Play I-System | |
| . O | |
| It O | |
| contains O | |
| encrypted O | |
| java O | |
| archive O | |
| β O | |
| start.ogg B-Indicator | |
| β O | |
| in O | |
| the O | |
| assets O | |
| directory O | |
| and O | |
| dynamically O | |
| loads O | |
| code O | |
| with O | |
| dalvik.system.DexClassLoader B-Indicator | |
| . O | |
| do.jar B-Indicator | |
| ( O | |
| SHA256 O | |
| : O | |
| a711e620246d9954510d3f1c8d5c784bacc78069a5c57b9ec09c3e234bc33a8b B-Indicator | |
| ) O | |
| : O | |
| The O | |
| decrypted O | |
| file O | |
| that O | |
| was O | |
| created O | |
| by O | |
| β O | |
| start.ogg. B-Indicator | |
| β O | |
| It O | |
| sends O | |
| a O | |
| request O | |
| to O | |
| the O | |
| server O | |
| with O | |
| the O | |
| device O | |
| β O | |
| s O | |
| configuration O | |
| . O | |
| The O | |
| server O | |
| β O | |
| s O | |
| response O | |
| is O | |
| a O | |
| json O | |
| , O | |
| containing O | |
| a O | |
| link O | |
| to O | |
| a O | |
| .jar O | |
| file O | |
| , O | |
| class O | |
| name O | |
| and O | |
| method O | |
| name O | |
| to O | |
| be O | |
| executed O | |
| with O | |
| reflection O | |
| API O | |
| . O | |
| The O | |
| application O | |
| downloads O | |
| the O | |
| file O | |
| and O | |
| dynamically O | |
| loads O | |
| it O | |
| using O | |
| dalvik.system.DexClassLoader O | |
| and O | |
| invokes O | |
| class O | |
| and O | |
| method O | |
| specified O | |
| in O | |
| json B-Indicator | |
| . I-Indicator | |
| jhfrte.jar I-Indicator | |
| : O | |
| This O | |
| is O | |
| a O | |
| java O | |
| archive O | |
| file O | |
| downloaded O | |
| from O | |
| server O | |
| . O | |
| If O | |
| a O | |
| device O | |
| isn O | |
| β O | |
| t O | |
| rooted O | |
| , O | |
| it O | |
| downloads O | |
| from O | |
| the O | |
| server O | |
| an O | |
| exploit O | |
| pack O | |
| and O | |
| executes O | |
| it O | |
| to O | |
| obtain O | |
| root O | |
| on O | |
| device O | |
| . O | |
| Once O | |
| root O | |
| is O | |
| obtained O | |
| , O | |
| it O | |
| downloads O | |
| an O | |
| additional O | |
| APK O | |
| file O | |
| from O | |
| the O | |
| server O | |
| ( O | |
| mcpef.apk B-Indicator | |
| ) O | |
| and O | |
| installs O | |
| it O | |
| as O | |
| system O | |
| application O | |
| ( O | |
| /system O | |
| directory O | |
| ) O | |
| . O | |
| r1-r4 O | |
| : O | |
| This O | |
| is O | |
| a O | |
| local O | |
| privilege O | |
| escalation O | |
| ( O | |
| root O | |
| ) O | |
| exploit O | |
| , O | |
| which O | |
| includes O | |
| : O | |
| CVE-2013-6282 B-Vulnerability | |
| , O | |
| camerageroot O | |
| ( O | |
| http B-Indicator | |
| : I-Indicator | |
| //www.77169.org/exploits/2013/20130414031700 I-Indicator | |
| ) I-Indicator | |
| , O | |
| a O | |
| rooting O | |
| tool O | |
| for O | |
| mtk6592 O | |
| and O | |
| addtional O | |
| exploit O | |
| . O | |
| nis O | |
| : O | |
| The O | |
| su O | |
| application O | |
| used O | |
| to O | |
| execute O | |
| shell O | |
| commands O | |
| with O | |
| root O | |
| privileges O | |
| . O | |
| mcpef.apk B-Indicator | |
| ( O | |
| SHA256 O | |
| : O | |
| a8e7dfac00adf661d371ac52bddc03b543bd6b7aa41314b255e53d810931ceac B-Indicator | |
| ) O | |
| : O | |
| The O | |
| malicious O | |
| system O | |
| application O | |
| downloaded O | |
| from O | |
| server O | |
| ( O | |
| package O | |
| name O | |
| β O | |
| com.android.music.helper B-Indicator | |
| ) O | |
| . O | |
| This O | |
| installs O | |
| additional O | |
| application O | |
| from O | |
| assets O | |
| directory O | |
| ( O | |
| brother.apk B-System | |
| ) O | |
| and O | |
| listens O | |
| for O | |
| PACKAGE_REMOVED O | |
| events O | |
| . O | |
| If O | |
| brother.apk B-System | |
| application O | |
| is O | |
| removed O | |
| , O | |
| mcpef.apk B-System | |
| reinstalls O | |
| brother.apk B-System | |
| from O | |
| assets O | |
| . O | |
| brother.apk B-System | |
| ( O | |
| SHA256 O | |
| : O | |
| 422fec2e201600bb2ea3140951563f8c6fbd4f8279a04a164aca5e8e753c40e8 B-Indicator | |
| ) O | |
| : O | |
| The O | |
| package O | |
| name O | |
| β O | |
| com.android.system.certificate B-Indicator | |
| . O | |
| System O | |
| application O | |
| installed O | |
| by O | |
| mcpef.apk B-Indicator | |
| . O | |
| This O | |
| has O | |
| the O | |
| same O | |
| functionality O | |
| as O | |
| mcpef.apk B-Indicator | |
| . O | |
| In O | |
| addition O | |
| , O | |
| it O | |
| monitors O | |
| to O | |
| verify O | |
| if O | |
| com.android.music.helper B-Indicator | |
| package O | |
| is O | |
| removed O | |
| . O | |
| If O | |
| mcpef.apk B-Indicator | |
| is O | |
| removed O | |
| , O | |
| brother.apk B-Indicator | |
| reinstalls O | |
| it O | |
| from O | |
| a O | |
| META-INF/brother O | |
| file O | |
| boy O | |
| , O | |
| post.sh B-Indicator | |
| : O | |
| The O | |
| shell O | |
| scripts O | |
| u O | |
| sed O | |
| for O | |
| application O | |
| persistency O | |
| . O | |
| Application O | |
| lifecycle O | |
| Application O | |
| Lifecycle O | |
| Google B-System | |
| Bouncer I-System | |
| Bypass O | |
| On O | |
| start O | |
| , O | |
| the O | |
| application O | |
| checks O | |
| if O | |
| it O | |
| is O | |
| executed O | |
| on O | |
| one O | |
| of O | |
| the O | |
| Google O | |
| servers O | |
| : O | |
| IP O | |
| ranges O | |
| 209.85.128.0-209.85.255.255 B-Indicator | |
| , O | |
| 216.58.192.0-216.58.223.255 B-Indicator | |
| , O | |
| 173.194.0.0-173.194.255.255 B-Indicator | |
| , O | |
| 74.125.0.0-74.125.255.255 B-Indicator | |
| or O | |
| if O | |
| it O | |
| is O | |
| executed O | |
| on O | |
| IP O | |
| hosted O | |
| domain O | |
| that O | |
| contains O | |
| the O | |
| following O | |
| strings O | |
| : O | |
| β O | |
| google O | |
| β O | |
| , O | |
| β O | |
| android B-System | |
| β O | |
| , O | |
| β O | |
| 1e100 O | |
| β O | |
| . O | |
| If O | |
| any O | |
| of O | |
| these O | |
| conditions O | |
| is O | |
| true O | |
| , O | |
| the O | |
| application O | |
| does O | |
| not O | |
| continue O | |
| to O | |
| execute O | |
| the O | |
| malicious O | |
| flow O | |
| . O | |
| This O | |
| method O | |
| is O | |
| design O | |
| to O | |
| bypass O | |
| the O | |
| automatic O | |
| Google B-System | |
| Play I-System | |
| protection O | |
| mechanism O | |
| called O | |
| Bouncer B-System | |
| . O | |
| Timebombs O | |
| , O | |
| Dynamic O | |
| Code O | |
| Loading O | |
| and O | |
| Reflection O | |
| If O | |
| Google B-System | |
| Bouncer I-System | |
| was O | |
| not O | |
| detected O | |
| , O | |
| the O | |
| application O | |
| starts O | |
| a O | |
| time O | |
| bomb O | |
| which O | |
| initiates O | |
| the O | |
| malicious O | |
| flow O | |
| only O | |
| after O | |
| 20 O | |
| seconds O | |
| and O | |
| will O | |
| run O | |
| every O | |
| 2 O | |
| hours O | |
| . O | |
| The O | |
| time O | |
| bomb O | |
| triggers O | |
| unpacker O | |
| thread O | |
| . O | |
| Unpacker O | |
| thread O | |
| decrypt O | |
| java O | |
| archive O | |
| from O | |
| assets O | |
| directory O | |
| β O | |
| start.ogg B-Indicator | |
| β O | |
| , O | |
| and O | |
| dynamically O | |
| loads O | |
| it O | |
| and O | |
| calls O | |
| the O | |
| method O | |
| β O | |
| a.a.a.b O | |
| β O | |
| from O | |
| this O | |
| archive O | |
| . O | |
| This O | |
| method O | |
| checks O | |
| if O | |
| eight O | |
| hours O | |
| have O | |
| passed O | |
| from O | |
| the O | |
| first O | |
| run O | |
| of O | |
| application O | |
| , O | |
| and O | |
| if O | |
| so O | |
| , O | |
| request O | |
| containing O | |
| the O | |
| device O | |
| β O | |
| s O | |
| data O | |
| to O | |
| the O | |
| server O | |
| . O | |
| The O | |
| server O | |
| sends O | |
| back O | |
| encoded O | |
| json O | |
| containing O | |
| URL O | |
| , O | |
| class O | |
| name O | |
| and O | |
| method O | |
| name O | |
| . O | |
| Then O | |
| the O | |
| application O | |
| downloads O | |
| java O | |
| archive O | |
| from O | |
| the O | |
| URL O | |
| specified O | |
| in O | |
| json O | |
| , O | |
| dynamically O | |
| loads O | |
| it O | |
| with O | |
| class O | |
| loader O | |
| API O | |
| . O | |
| Once O | |
| archive O | |
| is O | |
| loaded O | |
| , O | |
| the O | |
| application O | |
| uses O | |
| reflection O | |
| api O | |
| to O | |
| call O | |
| methods O | |
| from O | |
| the O | |
| class O | |
| names O | |
| specified O | |
| in O | |
| the O | |
| json O | |
| . O | |
| Rooting O | |
| and O | |
| Ad O | |
| Network O | |
| Presentation O | |
| The O | |
| reflection O | |
| loaded O | |
| methods O | |
| check O | |
| if O | |
| the O | |
| device O | |
| is O | |
| rooted O | |
| . O | |
| If O | |
| not O | |
| , O | |
| the O | |
| application O | |
| downloads O | |
| a O | |
| pack O | |
| of O | |
| exploits O | |
| from O | |
| the O | |
| server O | |
| and O | |
| runs O | |
| them O | |
| one-by-one O | |
| up O | |
| until O | |
| root O | |
| is O | |
| achieved O | |
| . O | |
| As O | |
| root O | |
| , O | |
| the O | |
| application O | |
| copies O | |
| su O | |
| binary O | |
| to O | |
| /system/bin O | |
| directory O | |
| and O | |
| silently O | |
| downloads O | |
| apk O | |
| file O | |
| from O | |
| the O | |
| server O | |
| . O | |
| Then O | |
| , O | |
| the O | |
| APK O | |
| is O | |
| installed O | |
| as O | |
| system O | |
| application O | |
| and O | |
| registers O | |
| listener O | |
| on O | |
| USER_PRESENT O | |
| event O | |
| . O | |
| This O | |
| event O | |
| triggers O | |
| archive O | |
| downloading O | |
| thread O | |
| . O | |
| Once O | |
| the O | |
| event O | |
| is O | |
| triggered O | |
| , O | |
| it O | |
| registers O | |
| a O | |
| timer O | |
| . O | |
| The O | |
| timer O | |
| triggers O | |
| additional O | |
| thread O | |
| which O | |
| makes O | |
| a O | |
| request O | |
| to O | |
| the O | |
| server O | |
| . O | |
| It O | |
| expects O | |
| a O | |
| json O | |
| with O | |
| url O | |
| , O | |
| class O | |
| and O | |
| method O | |
| name O | |
| . O | |
| It O | |
| downloads O | |
| one O | |
| more O | |
| archive O | |
| and O | |
| dynamically O | |
| loads O | |
| code O | |
| from O | |
| it O | |
| . O | |
| The O | |
| final O | |
| APK O | |
| is O | |
| downloaded O | |
| from O | |
| a O | |
| different O | |
| URL O | |
| that O | |
| is O | |
| currently O | |
| down O | |
| , O | |
| we O | |
| assume O | |
| that O | |
| the O | |
| apk O | |
| purpose O | |
| is O | |
| overlaying O | |
| ads O | |
| on O | |
| the O | |
| screen O | |
| , O | |
| we O | |
| assume O | |
| this O | |
| based O | |
| on O | |
| the O | |
| research O | |
| we O | |
| have O | |
| done O | |
| on O | |
| the O | |
| API O | |
| we O | |
| found O | |
| which O | |
| returns O | |
| URL O | |
| of O | |
| random O | |
| APK O | |
| file O | |
| containing O | |
| different O | |
| advertising O | |
| networks O | |
| . O | |
| Persistency O | |
| Watch-Dog O | |
| The O | |
| application O | |
| contains O | |
| protection O | |
| against O | |
| its O | |
| own O | |
| removal O | |
| . O | |
| As O | |
| outlined O | |
| in O | |
| the O | |
| diagram O | |
| above O | |
| , O | |
| It O | |
| installs O | |
| an O | |
| additional O | |
| application O | |
| with O | |
| the O | |
| same O | |
| functionality O | |
| and O | |
| these O | |
| two O | |
| applications O | |
| monitor O | |
| the O | |
| removal O | |
| of O | |
| each O | |
| other O | |
| . O | |
| If O | |
| one O | |
| of O | |
| the O | |
| applications O | |
| is O | |
| deleted O | |
| , O | |
| the O | |
| second O | |
| application O | |
| downloads O | |
| and O | |
| re-installs O | |
| the O | |
| removed O | |
| one O | |
| . O | |
| Network O | |
| activity O | |
| BrainTest O | |
| communicates O | |
| with O | |
| five O | |
| servers O | |
| : O | |
| APK O | |
| files O | |
| provider O | |
| ( O | |
| http B-Indicator | |
| : I-Indicator | |
| //psserviceonline I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/ I-Indicator | |
| ) I-Indicator | |
| : O | |
| This O | |
| server O | |
| provides O | |
| APK O | |
| files O | |
| with O | |
| advertising O | |
| network O | |
| . O | |
| We O | |
| found O | |
| two O | |
| functions O | |
| : O | |
| The O | |
| first O | |
| function O | |
| is O | |
| http B-Indicator | |
| : I-Indicator | |
| //s.psserviceonline I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/api/s2s/tracks/ I-Indicator | |
| and O | |
| is O | |
| used O | |
| for O | |
| activation O | |
| . O | |
| The O | |
| second O | |
| function O | |
| is O | |
| http B-Indicator | |
| : I-Indicator | |
| //s.psserviceonline I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com/api/ads/ I-Indicator | |
| which O | |
| is O | |
| used O | |
| for O | |
| obtaining O | |
| a O | |
| link O | |
| to O | |
| APK O | |
| file O | |
| . O | |
| Regardless O | |
| of O | |
| the O | |
| parameters O | |
| , O | |
| it O | |
| returns O | |
| a O | |
| json O | |
| containing O | |
| a O | |
| link O | |
| for O | |
| APK O | |
| file O | |
| . O | |
| File O | |
| Server O | |
| ( O | |
| http B-Indicator | |
| : I-Indicator | |
| //www.psservicedl I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| ) O | |
| : O | |
| Contains O | |
| android B-System | |
| packages O | |
| , O | |
| java O | |
| archives O | |
| and O | |
| zip O | |
| archives O | |
| with O | |
| exploits O | |
| Archive O | |
| Link O | |
| domains O | |
| : O | |
| Three O | |
| domains O | |
| with O | |
| the O | |
| same O | |
| functionality O | |
| , O | |
| but O | |
| the O | |
| application O | |
| chooses O | |
| one O | |
| of O | |
| them O | |
| to O | |
| send O | |
| request O | |
| for O | |
| archive O | |
| link O | |
| . O | |
| http B-Indicator | |
| : I-Indicator | |
| //www.himobilephone I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //www.adsuperiorstore I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| http B-Indicator | |
| : I-Indicator | |
| //www.i4vip I-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| Counter O | |
| Measures O | |
| Use O | |
| an O | |
| up O | |
| to O | |
| date O | |
| anti-malware O | |
| software O | |
| that O | |
| is O | |
| capable O | |
| of O | |
| identifying O | |
| this O | |
| threat O | |
| . O | |
| If O | |
| the O | |
| threat O | |
| reappears O | |
| on O | |
| the O | |
| device O | |
| after O | |
| the O | |
| first O | |
| installation O | |
| , O | |
| it O | |
| means O | |
| that O | |
| the O | |
| malware O | |
| managed O | |
| to O | |
| install O | |
| the O | |
| persistency O | |
| module O | |
| in O | |
| the O | |
| System O | |
| directory O | |
| . O | |
| In O | |
| this O | |
| case O | |
| , O | |
| the O | |
| device O | |
| should O | |
| be O | |
| re-flashed O | |
| with O | |
| an O | |
| official O | |
| ROM O | |
| . O | |
| Lookout B-Organization | |
| Discovers O | |
| Phishing O | |
| Sites O | |
| Distributing O | |
| New O | |
| IOS B-System | |
| And O | |
| Android B-System | |
| Surveillanceware B-Malware | |
| April O | |
| 8 O | |
| , O | |
| 2019 O | |
| For O | |
| the O | |
| past O | |
| year O | |
| , O | |
| Lookout B-Organization | |
| researchers O | |
| have O | |
| been O | |
| tracking O | |
| Android B-System | |
| and O | |
| iOS B-System | |
| surveillanceware B-Malware | |
| , O | |
| that O | |
| can O | |
| exfiltrate O | |
| contacts O | |
| , O | |
| audio O | |
| recordings O | |
| , O | |
| photos O | |
| , O | |
| location O | |
| , O | |
| and O | |
| more O | |
| from O | |
| devices O | |
| . O | |
| As O | |
| has O | |
| been O | |
| previously O | |
| reported O | |
| , O | |
| some O | |
| versions O | |
| of O | |
| the O | |
| Android B-System | |
| malware O | |
| were O | |
| present O | |
| in O | |
| the O | |
| Google B-System | |
| Play I-System | |
| Store I-System | |
| . O | |
| The O | |
| iOS B-System | |
| versions O | |
| were O | |
| available O | |
| outside O | |
| the O | |
| app B-System | |
| store I-System | |
| , O | |
| through O | |
| phishing O | |
| sites O | |
| , O | |
| and O | |
| abused O | |
| the O | |
| Apple B-Organization | |
| Developer I-Organization | |
| Enterprise I-Organization | |
| program O | |
| . O | |
| Background O | |
| : O | |
| Android B-System | |
| surveillanceware O | |
| Early O | |
| last O | |
| year O | |
| , O | |
| Lookout B-Organization | |
| discovered O | |
| a O | |
| sophisticated O | |
| Android B-System | |
| surveillanceware O | |
| agent O | |
| that O | |
| appears O | |
| to O | |
| have O | |
| been O | |
| created O | |
| for O | |
| the O | |
| lawful O | |
| intercept O | |
| market O | |
| . O | |
| The O | |
| agent O | |
| appears O | |
| to O | |
| have O | |
| been O | |
| under O | |
| development O | |
| for O | |
| at O | |
| least O | |
| five O | |
| years O | |
| and O | |
| consists O | |
| of O | |
| three O | |
| stages O | |
| . O | |
| First O | |
| , O | |
| there O | |
| is O | |
| a O | |
| small O | |
| dropper O | |
| , O | |
| then O | |
| a O | |
| large O | |
| second O | |
| stage O | |
| payload O | |
| that O | |
| contains O | |
| multiple O | |
| binaries O | |
| ( O | |
| where O | |
| most O | |
| of O | |
| the O | |
| surveillance O | |
| functionality O | |
| is O | |
| implemented O | |
| ) O | |
| , O | |
| and O | |
| finally O | |
| a O | |
| third O | |
| stage O | |
| which O | |
| typically O | |
| uses O | |
| the O | |
| DirtyCOW B-Vulnerability | |
| exploit I-Vulnerability | |
| ( O | |
| CVE-2016-5195 B-Vulnerability | |
| ) O | |
| to O | |
| obtain O | |
| root O | |
| . O | |
| Security B-Organization | |
| Without I-Organization | |
| Borders I-Organization | |
| has O | |
| recently O | |
| published O | |
| an O | |
| analysis O | |
| of O | |
| this O | |
| family O | |
| , O | |
| independently O | |
| , O | |
| through O | |
| their O | |
| blog O | |
| . O | |
| Several O | |
| technical O | |
| details O | |
| indicated O | |
| that O | |
| the O | |
| software O | |
| was O | |
| likely O | |
| the O | |
| product O | |
| of O | |
| a O | |
| well-funded O | |
| development O | |
| effort O | |
| and O | |
| aimed O | |
| at O | |
| the O | |
| lawful O | |
| intercept O | |
| market O | |
| . O | |
| These O | |
| included O | |
| the O | |
| use O | |
| of O | |
| certificate O | |
| pinning O | |
| and O | |
| public O | |
| key O | |
| encryption O | |
| for O | |
| C2 O | |
| communications O | |
| , O | |
| geo-restrictions O | |
| imposed O | |
| by O | |
| the O | |
| C2 O | |
| when O | |
| delivering O | |
| the O | |
| second O | |
| stage O | |
| , O | |
| and O | |
| the O | |
| comprehensive O | |
| and O | |
| well O | |
| implemented O | |
| suite O | |
| of O | |
| surveillance O | |
| features O | |
| . O | |
| Early O | |
| versions O | |
| of O | |
| the O | |
| Android B-System | |
| application O | |
| used O | |
| infrastructure O | |
| which O | |
| belonged O | |
| to O | |
| a O | |
| company O | |
| named O | |
| Connexxa B-Organization | |
| S.R.L I-Organization | |
| . I-Organization | |
| and O | |
| were O | |
| signed O | |
| using O | |
| the O | |
| name O | |
| of O | |
| an O | |
| engineer O | |
| who O | |
| appears O | |
| to O | |
| hold O | |
| equity O | |
| in O | |
| Connexxa B-Organization | |
| . O | |
| This O | |
| engineer O | |
| β O | |
| s O | |
| name O | |
| is O | |
| also O | |
| associated O | |
| with O | |
| a O | |
| company O | |
| called O | |
| eSurv B-Organization | |
| S.R.L I-Organization | |
| . I-Organization | |
| eSurv B-Organization | |
| β O | |
| s O | |
| public O | |
| marketing O | |
| is O | |
| centered O | |
| around O | |
| video O | |
| surveillance O | |
| software O | |
| and O | |
| image O | |
| recognition O | |
| systems O | |
| , O | |
| but O | |
| there O | |
| are O | |
| a O | |
| number O | |
| of O | |
| individuals O | |
| claiming O | |
| to O | |
| be O | |
| mobile O | |
| security O | |
| researchers O | |
| working O | |
| at O | |
| the O | |
| company O | |
| , O | |
| including O | |
| one O | |
| who O | |
| has O | |
| publically O | |
| made O | |
| claims O | |
| to O | |
| be O | |
| developing O | |
| a O | |
| mobile O | |
| surveillance O | |
| agent O | |
| . O | |
| Moreover O | |
| , O | |
| eSurv B-Organization | |
| was O | |
| a O | |
| business O | |
| unit O | |
| of O | |
| Connexxa B-Organization | |
| and O | |
| was O | |
| leased O | |
| to O | |
| eSurv B-Organization | |
| S.R.L I-Organization | |
| in O | |
| 2014 O | |
| . O | |
| This O | |
| business O | |
| unit O | |
| and O | |
| the O | |
| eSurv B-Organization | |
| software O | |
| and O | |
| brand O | |
| was O | |
| sold O | |
| from O | |
| Connexxa B-Organization | |
| S.R.L I-Organization | |
| . I-Organization | |
| to O | |
| eSurv B-Organization | |
| S.R.L I-Organization | |
| . I-Organization | |
| on O | |
| Feb O | |
| 28 O | |
| , O | |
| 2016 O | |
| . O | |
| Lookout B-Organization | |
| notified O | |
| Google B-Organization | |
| of O | |
| the O | |
| potential O | |
| threat O | |
| shortly O | |
| after O | |
| it O | |
| was O | |
| discovered O | |
| . O | |
| Together O | |
| , O | |
| during O | |
| the O | |
| latter O | |
| half O | |
| of O | |
| 2018 O | |
| , O | |
| we O | |
| worked O | |
| to O | |
| remove O | |
| the O | |
| apps O | |
| from O | |
| the O | |
| Play B-System | |
| store I-System | |
| while O | |
| it O | |
| was O | |
| being O | |
| deployed O | |
| in O | |
| the O | |
| wild O | |
| . O | |
| iOS B-System | |
| development O | |
| Analysis O | |
| of O | |
| these O | |
| Android B-System | |
| samples O | |
| led O | |
| to O | |
| the O | |
| discovery O | |
| of O | |
| infrastructure O | |
| that O | |
| contained O | |
| several O | |
| samples O | |
| of O | |
| an O | |
| iOS B-System | |
| port O | |
| . O | |
| So O | |
| far O | |
| , O | |
| this O | |
| software O | |
| ( O | |
| along O | |
| with O | |
| the O | |
| Android B-System | |
| version O | |
| ) O | |
| has O | |
| been O | |
| made O | |
| available O | |
| through O | |
| phishing O | |
| sites O | |
| that O | |
| imitated O | |
| Italian O | |
| and O | |
| Turkmenistani O | |
| mobile O | |
| carriers O | |
| . O | |
| Wind B-Organization | |
| Tre I-Organization | |
| SpA I-Organization | |
| - O | |
| an O | |
| Italian O | |
| telecom O | |
| operator O | |
| TMCell B-Organization | |
| - O | |
| the O | |
| state O | |
| owned O | |
| mobile O | |
| operator O | |
| in O | |
| Turkmenistan O | |
| Deployment O | |
| to O | |
| users O | |
| outside O | |
| Apple B-Organization | |
| β O | |
| s O | |
| app O | |
| store O | |
| was O | |
| made O | |
| possible O | |
| through O | |
| abuse O | |
| of O | |
| Apple B-Organization | |
| β O | |
| s O | |
| enterprise O | |
| provisioning O | |
| system O | |
| . O | |
| The O | |
| Apple B-Organization | |
| Developer I-Organization | |
| Enterprise I-Organization | |
| program O | |
| is O | |
| intended O | |
| to O | |
| allow O | |
| organizations O | |
| to O | |
| distribute O | |
| proprietary O | |
| , O | |
| in-house O | |
| apps O | |
| to O | |
| their O | |
| employees O | |
| without O | |
| needing O | |
| to O | |
| use O | |
| the O | |
| iOS B-System | |
| App B-System | |
| Store I-System | |
| . O | |
| A O | |
| business O | |
| can O | |
| obtain O | |
| access O | |
| to O | |
| this O | |
| program O | |
| only O | |
| provided O | |
| they O | |
| meet O | |
| requirements O | |
| set O | |
| out O | |
| by O | |
| Apple B-Organization | |
| . O | |
| It O | |
| is O | |
| not O | |
| common O | |
| to O | |
| use O | |
| this O | |
| program O | |
| to O | |
| distribute O | |
| malware O | |
| , O | |
| although O | |
| there O | |
| have O | |
| been O | |
| past O | |
| cases O | |
| where O | |
| malware O | |
| authors O | |
| have O | |
| done O | |
| so O | |
| . O | |
| Each O | |
| of O | |
| the O | |
| phishing O | |
| sites O | |
| contained O | |
| links O | |
| to O | |
| a O | |
| distribution O | |
| manifest O | |
| , O | |
| which O | |
| contained O | |
| metadata O | |
| such O | |
| as O | |
| the O | |
| application O | |
| name O | |
| , O | |
| version O | |
| , O | |
| icon O | |
| , O | |
| and O | |
| a O | |
| URL O | |
| for O | |
| the O | |
| IPA O | |
| file O | |
| . O | |
| To O | |
| be O | |
| distributed O | |
| outside O | |
| the O | |
| app O | |
| store O | |
| , O | |
| an O | |
| IPA O | |
| package O | |
| must O | |
| contain O | |
| a O | |
| mobile O | |
| provisioning O | |
| profile O | |
| with O | |
| an O | |
| enterprise O | |
| β O | |
| s O | |
| certificate O | |
| . O | |
| All O | |
| these O | |
| packages O | |
| used O | |
| provisioning O | |
| profiles O | |
| with O | |
| distribution O | |
| certificates O | |
| associated O | |
| with O | |
| the O | |
| company O | |
| Connexxa B-Organization | |
| S.R.L I-Organization | |
| . I-Organization | |
| Certificate O | |
| Used O | |
| The O | |
| apps O | |
| themselves O | |
| pretended O | |
| to O | |
| be O | |
| carrier O | |
| assistance O | |
| apps O | |
| which O | |
| instructed O | |
| the O | |
| user O | |
| to O | |
| β O | |
| keep O | |
| the O | |
| app O | |
| installed O | |
| on O | |
| your O | |
| device O | |
| and O | |
| stay O | |
| under O | |
| Wi-Fi O | |
| coverage O | |
| to O | |
| be O | |
| contacted O | |
| by O | |
| one O | |
| of O | |
| our O | |
| operators O | |
| β O | |
| . O | |
| One O | |
| of O | |
| the O | |
| packages O | |
| after O | |
| initial O | |
| launch O | |
| The O | |
| iOS B-System | |
| variant O | |
| is O | |
| not O | |
| as O | |
| sophisticated O | |
| as O | |
| the O | |
| Android B-System | |
| version O | |
| , O | |
| and O | |
| contained O | |
| a O | |
| subset O | |
| of O | |
| the O | |
| functionality O | |
| the O | |
| Android B-System | |
| releases O | |
| offered O | |
| . O | |
| In O | |
| particular O | |
| , O | |
| these O | |
| packages O | |
| have O | |
| not O | |
| been O | |
| observed O | |
| to O | |
| contain O | |
| or O | |
| to O | |
| download O | |
| exploits O | |
| which O | |
| would O | |
| be O | |
| required O | |
| to O | |
| perform O | |
| certain O | |
| types O | |
| of O | |
| activities O | |
| on O | |
| iOS B-System | |
| devices O | |
| . O | |
| Even O | |
| without O | |
| capabilities O | |
| to O | |
| exploit O | |
| a O | |
| device O | |
| , O | |
| the O | |
| packages O | |
| were O | |
| able O | |
| to O | |
| exfiltrate O | |
| the O | |
| following O | |
| types O | |
| of O | |
| data O | |
| using O | |
| documented O | |
| APIs O | |
| : O | |
| Contacts O | |
| Audio O | |
| recordings O | |
| Photos O | |
| Videos O | |
| GPS B-System | |
| location O | |
| Device O | |
| information O | |
| In O | |
| addition O | |
| , O | |
| the O | |
| packages O | |
| offered O | |
| a O | |
| feature O | |
| to O | |
| perform O | |
| remote O | |
| audio O | |
| recording O | |
| . O | |
| Though O | |
| different O | |
| versions O | |
| of O | |
| the O | |
| app O | |
| vary O | |
| in O | |
| structure O | |
| , O | |
| malicious O | |
| code O | |
| was O | |
| initialized O | |
| at O | |
| application O | |
| launch O | |
| without O | |
| the O | |
| user O | |
| β O | |
| s O | |
| knowledge O | |
| , O | |
| and O | |
| a O | |
| number O | |
| of O | |
| timers O | |
| were O | |
| setup O | |
| to O | |
| gather O | |
| and O | |
| upload O | |
| data O | |
| periodically O | |
| . O | |
| Upload O | |
| data O | |
| was O | |
| queued O | |
| and O | |
| transmitted O | |
| via O | |
| HTTP B-Indicator | |
| PUT O | |
| requests O | |
| to O | |
| an O | |
| endpoint O | |
| on O | |
| the O | |
| C2 O | |
| . O | |
| The O | |
| iOS B-System | |
| apps O | |
| leverage O | |
| the O | |
| same O | |
| C2 O | |
| infrastructure O | |
| as O | |
| the O | |
| Android B-System | |
| version O | |
| and O | |
| use O | |
| similar O | |
| communications O | |
| protocols O | |
| . O | |
| Push O | |
| notifications O | |
| were O | |
| also O | |
| used O | |
| to O | |
| control O | |
| audio O | |
| recording O | |
| . O | |
| Lookout B-Organization | |
| has O | |
| shared O | |
| information O | |
| about O | |
| this O | |
| family O | |
| with O | |
| Apple B-Organization | |
| , O | |
| and O | |
| they O | |
| have O | |
| revoked O | |
| the O | |
| affected O | |
| certificates O | |
| . O | |
| As O | |
| a O | |
| result O | |
| , O | |
| no O | |
| new O | |
| instances O | |
| of O | |
| this O | |
| app O | |
| can O | |
| be O | |
| installed O | |
| on O | |
| iOS B-System | |
| devices O | |
| and O | |
| existing O | |
| installations O | |
| can O | |
| no O | |
| longer O | |
| be O | |
| run O | |
| . O | |
| Lookout B-Organization | |
| customers O | |
| are O | |
| also O | |
| protected O | |
| from O | |
| this O | |
| threat O | |
| on O | |
| both O | |
| Android B-System | |
| and O | |
| iOS B-System | |
| . O | |
| Android B-System | |
| Trojan O | |
| Found O | |
| in O | |
| Targeted O | |
| Attack O | |
| 26 O | |
| MAR O | |
| 2013 O | |
| In O | |
| the O | |
| past O | |
| , O | |
| we O | |
| β O | |
| ve O | |
| seen O | |
| targeted O | |
| attacks O | |
| against O | |
| Tibetan O | |
| and O | |
| Uyghur O | |
| activists O | |
| on O | |
| Windows B-System | |
| and O | |
| Mac B-System | |
| OS I-System | |
| X I-System | |
| platforms O | |
| . O | |
| We O | |
| β O | |
| ve O | |
| documented O | |
| several O | |
| interesting O | |
| attacks O | |
| ( O | |
| A O | |
| Gift O | |
| for O | |
| Dalai O | |
| Lamas O | |
| Birthday O | |
| and O | |
| Cyber O | |
| Attacks O | |
| Against O | |
| Uyghur O | |
| Mac B-System | |
| OS I-System | |
| X I-System | |
| Users O | |
| Intensify O | |
| ) O | |
| which O | |
| used O | |
| ZIP O | |
| files O | |
| as O | |
| well O | |
| as O | |
| DOC O | |
| , O | |
| XLS O | |
| and O | |
| PDF O | |
| documents O | |
| rigged O | |
| with O | |
| exploits O | |
| . O | |
| Several O | |
| days O | |
| ago O | |
| , O | |
| the O | |
| e-mail O | |
| account O | |
| of O | |
| a O | |
| high-profile O | |
| Tibetan O | |
| activist O | |
| was O | |
| hacked O | |
| and O | |
| used O | |
| to O | |
| send O | |
| targeted O | |
| attacks O | |
| to O | |
| other O | |
| activists O | |
| and O | |
| human O | |
| rights O | |
| advocates O | |
| . O | |
| Perhaps O | |
| the O | |
| most O | |
| interesting O | |
| part O | |
| is O | |
| that O | |
| the O | |
| attack O | |
| e-mails O | |
| had O | |
| an O | |
| APK O | |
| attachment O | |
| β O | |
| a O | |
| malicious O | |
| program O | |
| for O | |
| Android B-System | |
| . O | |
| The O | |
| attack O | |
| On O | |
| March O | |
| 24th O | |
| , O | |
| 2013 O | |
| , O | |
| the O | |
| e-mail O | |
| account O | |
| of O | |
| a O | |
| high-profile O | |
| Tibetan O | |
| activist O | |
| was O | |
| hacked O | |
| and O | |
| used O | |
| to O | |
| send O | |
| spear O | |
| phishing O | |
| e-mails O | |
| to O | |
| their O | |
| contact O | |
| list O | |
| . O | |
| This O | |
| is O | |
| what O | |
| the O | |
| spear O | |
| phishing O | |
| e-mail O | |
| looked O | |
| like O | |
| : O | |
| In O | |
| regards O | |
| to O | |
| the O | |
| message O | |
| text O | |
| above O | |
| , O | |
| multiple O | |
| activist O | |
| groups O | |
| have O | |
| recently O | |
| organized O | |
| a O | |
| human O | |
| rights O | |
| conference O | |
| event O | |
| in O | |
| Geneva O | |
| . O | |
| We O | |
| β O | |
| ve O | |
| noticed O | |
| an O | |
| increase O | |
| in O | |
| the O | |
| number O | |
| of O | |
| attacks O | |
| using O | |
| this O | |
| event O | |
| as O | |
| a O | |
| lure O | |
| . O | |
| Here O | |
| β O | |
| s O | |
| another O | |
| example O | |
| of O | |
| such O | |
| an O | |
| attack O | |
| hitting O | |
| Windows B-System | |
| users O | |
| : O | |
| Going O | |
| back O | |
| to O | |
| the O | |
| Android B-System | |
| Package I-System | |
| ( O | |
| APK O | |
| ) O | |
| file O | |
| was O | |
| attached O | |
| to O | |
| the O | |
| e-mail O | |
| , O | |
| this O | |
| is O | |
| pushing O | |
| an O | |
| Android O | |
| application O | |
| named O | |
| β O | |
| WUC B-Malware | |
| β I-Malware | |
| s I-Malware | |
| Conference.apk I-Malware | |
| β O | |
| . O | |
| This O | |
| malicious O | |
| APK O | |
| is O | |
| 334326 O | |
| bytes O | |
| file O | |
| , O | |
| MD5 O | |
| : O | |
| 0b8806b38b52bebfe39ff585639e2ea2 B-Indicator | |
| and O | |
| is O | |
| detected O | |
| by O | |
| Kaspersky B-Organization | |
| Lab I-Organization | |
| products O | |
| as O | |
| β O | |
| Backdoor.AndroidOS.Chuli.a B-Indicator | |
| β O | |
| . O | |
| After O | |
| the O | |
| installation O | |
| , O | |
| an O | |
| application O | |
| named O | |
| β O | |
| Conference O | |
| β O | |
| appears O | |
| on O | |
| the O | |
| desktop O | |
| : O | |
| If O | |
| the O | |
| victim O | |
| launches O | |
| this O | |
| app O | |
| , O | |
| he O | |
| will O | |
| see O | |
| text O | |
| which O | |
| β O | |
| enlightens O | |
| β O | |
| the O | |
| information O | |
| about O | |
| the O | |
| upcoming O | |
| event O | |
| : O | |
| The O | |
| full O | |
| text O | |
| reads O | |
| follows O | |
| . O | |
| Notice O | |
| notice O | |
| the O | |
| use O | |
| of O | |
| the O | |
| mistaken O | |
| β O | |
| Word O | |
| β O | |
| instead O | |
| of O | |
| β O | |
| World O | |
| β O | |
| : O | |
| β O | |
| On O | |
| behalf O | |
| of O | |
| all O | |
| at O | |
| the O | |
| Word B-Organization | |
| Uyghur I-Organization | |
| Congress I-Organization | |
| ( I-Organization | |
| WUC I-Organization | |
| ) I-Organization | |
| , O | |
| the O | |
| Unrepresented B-Organization | |
| Nations I-Organization | |
| and I-Organization | |
| Peoples I-Organization | |
| Organization I-Organization | |
| ( I-Organization | |
| UNPO I-Organization | |
| ) I-Organization | |
| and O | |
| the O | |
| Society B-Organization | |
| for I-Organization | |
| Threatened I-Organization | |
| Peoples I-Organization | |
| ( I-Organization | |
| STP I-Organization | |
| ) I-Organization | |
| , O | |
| Human O | |
| Rights O | |
| in O | |
| China O | |
| : O | |
| Implications O | |
| for O | |
| East O | |
| Turkestan O | |
| , O | |
| Tibet O | |
| and O | |
| Southern O | |
| Mongolia O | |
| In O | |
| what O | |
| was O | |
| an O | |
| unprecedented O | |
| coming-together O | |
| of O | |
| leading O | |
| Uyghur O | |
| , O | |
| Mongolian O | |
| , O | |
| Tibetan O | |
| and O | |
| Chinese O | |
| activists O | |
| , O | |
| as O | |
| well O | |
| as O | |
| other O | |
| leading O | |
| international O | |
| experts O | |
| , O | |
| we O | |
| were O | |
| greatly O | |
| humbled O | |
| by O | |
| the O | |
| great O | |
| enthusiasm O | |
| , O | |
| contribution O | |
| and O | |
| desire O | |
| from O | |
| all O | |
| in O | |
| attendance O | |
| to O | |
| make O | |
| this O | |
| occasion O | |
| something O | |
| meaningful O | |
| , O | |
| the O | |
| outcome O | |
| of O | |
| which O | |
| produced O | |
| some O | |
| concrete O | |
| , O | |
| action-orientated O | |
| solutions O | |
| to O | |
| our O | |
| shared O | |
| grievances O | |
| . O | |
| We O | |
| are O | |
| especially O | |
| delighted O | |
| about O | |
| the O | |
| platform O | |
| and O | |
| programme O | |
| of O | |
| work O | |
| established O | |
| in O | |
| the O | |
| declaration O | |
| of O | |
| the O | |
| conference O | |
| , O | |
| upon O | |
| which O | |
| we O | |
| sincerely O | |
| hope O | |
| will O | |
| be O | |
| built O | |
| a O | |
| strong O | |
| and O | |
| resolute O | |
| working O | |
| relationship O | |
| on O | |
| our O | |
| shared O | |
| goals O | |
| for O | |
| the O | |
| future O | |
| . O | |
| With O | |
| this O | |
| in O | |
| mind O | |
| , O | |
| we O | |
| thoroughly O | |
| look O | |
| forward O | |
| to O | |
| working O | |
| with O | |
| you O | |
| on O | |
| these O | |
| matters O | |
| . O | |
| Dolkun O | |
| lsa O | |
| Chairman O | |
| of O | |
| the O | |
| Executive B-Organization | |
| Committee I-Organization | |
| Word I-Organization | |
| Uyghur I-Organization | |
| Congress I-Organization | |
| β O | |
| While O | |
| the O | |
| victim O | |
| reads O | |
| this O | |
| fake O | |
| message O | |
| , O | |
| the O | |
| malware O | |
| secretly O | |
| reports O | |
| the O | |
| infection O | |
| to O | |
| a O | |
| command-and-control O | |
| server O | |
| . O | |
| After O | |
| that O | |
| , O | |
| it O | |
| begins O | |
| to O | |
| harvest O | |
| information O | |
| stored O | |
| on O | |
| the O | |
| device O | |
| . O | |
| The O | |
| stolen O | |
| data O | |
| includes O | |
| : O | |
| Contacts O | |
| ( O | |
| stored O | |
| both O | |
| on O | |
| the O | |
| phone O | |
| and O | |
| the O | |
| SIM O | |
| card O | |
| ) O | |
| . O | |
| Call O | |
| logs O | |
| . O | |
| SMS O | |
| messages O | |
| . O | |
| Geo-location O | |
| . O | |
| Phone O | |
| data O | |
| ( O | |
| phone O | |
| number O | |
| , O | |
| OS O | |
| version O | |
| , O | |
| phone O | |
| model O | |
| , O | |
| SDK O | |
| version O | |
| ) O | |
| . O | |
| It O | |
| is O | |
| important O | |
| to O | |
| note O | |
| that O | |
| the O | |
| data O | |
| won O | |
| β O | |
| t O | |
| be O | |
| uploaded O | |
| to O | |
| C O | |
| & O | |
| C O | |
| server O | |
| automatically O | |
| . O | |
| The O | |
| Trojan O | |
| waits O | |
| for O | |
| incoming O | |
| SMS O | |
| messages O | |
| ( O | |
| the O | |
| β O | |
| alarmReceiver.class B-Indicator | |
| β O | |
| ) O | |
| and O | |
| checks O | |
| whether O | |
| these O | |
| messages O | |
| contain O | |
| one O | |
| of O | |
| the O | |
| following O | |
| commands O | |
| : O | |
| β O | |
| sms O | |
| β O | |
| , O | |
| β O | |
| contact O | |
| β O | |
| , O | |
| β O | |
| location O | |
| β O | |
| , O | |
| β O | |
| other O | |
| β O | |
| . O | |
| If O | |
| one O | |
| these O | |
| commands O | |
| is O | |
| found O | |
| , O | |
| then O | |
| the O | |
| malware O | |
| will O | |
| encode O | |
| the O | |
| stolen O | |
| data O | |
| with O | |
| Base64 O | |
| and O | |
| upload O | |
| it O | |
| to O | |
| the O | |
| command O | |
| and O | |
| control O | |
| server O | |
| . O | |
| The O | |
| C2 O | |
| URL O | |
| is O | |
| : O | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //64.78.161.133/ I-Indicator | |
| * I-Indicator | |
| victims I-Indicator | |
| β I-Indicator | |
| s_cell_phone_number I-Indicator | |
| * I-Indicator | |
| /process.php I-Indicator | |
| In O | |
| addition O | |
| to O | |
| this O | |
| , O | |
| the O | |
| malware O | |
| also O | |
| reports O | |
| to O | |
| another O | |
| script O | |
| , O | |
| β O | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //64.78.161.33/android.php I-Indicator | |
| β O | |
| . O | |
| First O | |
| , O | |
| it O | |
| will O | |
| get O | |
| the O | |
| β O | |
| nativenumber O | |
| β O | |
| variable O | |
| from O | |
| the O | |
| β O | |
| telmark O | |
| β O | |
| value O | |
| of O | |
| β O | |
| AndroidManifest.xml B-System | |
| β O | |
| . O | |
| This O | |
| is O | |
| hardcoded O | |
| and O | |
| equals O | |
| β O | |
| phone O | |
| β O | |
| . O | |
| Then O | |
| , O | |
| it O | |
| will O | |
| add O | |
| the O | |
| result O | |
| of O | |
| the O | |
| public O | |
| method O | |
| localDate.getTime O | |
| ( O | |
| ) O | |
| , O | |
| which O | |
| simply O | |
| gets O | |
| the O | |
| current O | |
| date O | |
| . O | |
| An O | |
| example O | |
| of O | |
| the O | |
| string O | |
| which O | |
| is O | |
| sent O | |
| to O | |
| the O | |
| command-and-control O | |
| would O | |
| be O | |
| β O | |
| phone O | |
| 26.03.2013 O | |
| β O | |
| . O | |
| It O | |
| is O | |
| interesting O | |
| that O | |
| the O | |
| attackers O | |
| used O | |
| Java O | |
| Base64 O | |
| library O | |
| developed O | |
| by O | |
| Sauron B-Organization | |
| Software I-Organization | |
| . O | |
| This O | |
| software O | |
| is O | |
| free O | |
| and O | |
| distributed O | |
| under O | |
| LGPL O | |
| license O | |
| . O | |
| Also O | |
| , O | |
| command O | |
| communications O | |
| with O | |
| the O | |
| malware O | |
| are O | |
| parsed O | |
| with O | |
| a O | |
| function O | |
| named O | |
| β O | |
| chuli O | |
| ( O | |
| ) O | |
| β O | |
| prior O | |
| to O | |
| POSTing O | |
| stolen O | |
| data O | |
| to O | |
| the O | |
| command-and-control O | |
| server O | |
| . O | |
| It O | |
| appears O | |
| that O | |
| the O | |
| attackers O | |
| are O | |
| somewhat O | |
| familiar O | |
| with O | |
| the O | |
| language O | |
| and O | |
| mountain-trekking O | |
| culture O | |
| of O | |
| the O | |
| targets O | |
| β O | |
| the O | |
| meaning O | |
| of O | |
| β O | |
| chuli O | |
| β O | |
| is O | |
| β O | |
| summit O | |
| β O | |
| : O | |
| The O | |
| command-and-control O | |
| server O | |
| and O | |
| parameters O | |
| can O | |
| be O | |
| easily O | |
| seen O | |
| in O | |
| the O | |
| decompiled O | |
| source O | |
| code O | |
| : O | |
| Command O | |
| and O | |
| control O | |
| server O | |
| interaction O | |
| code O | |
| Throughout O | |
| the O | |
| code O | |
| , O | |
| the O | |
| attackers O | |
| log O | |
| all O | |
| important O | |
| actions O | |
| , O | |
| which O | |
| include O | |
| various O | |
| messages O | |
| in O | |
| Chinese O | |
| . O | |
| This O | |
| was O | |
| probably O | |
| done O | |
| for O | |
| debugging O | |
| purposes O | |
| , O | |
| indicating O | |
| the O | |
| malware O | |
| may O | |
| be O | |
| an O | |
| early O | |
| prototype O | |
| version O | |
| . O | |
| Some O | |
| actions O | |
| include O | |
| ( O | |
| with O | |
| rough O | |
| translations O | |
| ) O | |
| : O | |
| The O | |
| command-and-control O | |
| server O | |
| The O | |
| command-and-control O | |
| server O | |
| is O | |
| located O | |
| at O | |
| IP O | |
| 64.78.161.133 B-Indicator | |
| . O | |
| This O | |
| IP O | |
| is O | |
| located O | |
| in O | |
| Los O | |
| Angeles O | |
| , O | |
| U.S.A. O | |
| , O | |
| at O | |
| a O | |
| hosting O | |
| company O | |
| named O | |
| β O | |
| Emagine B-Organization | |
| Concept I-Organization | |
| Inc I-Organization | |
| β O | |
| . O | |
| Interestingly O | |
| , O | |
| there O | |
| is O | |
| a O | |
| domain O | |
| which O | |
| used O | |
| to O | |
| point O | |
| there O | |
| , O | |
| β O | |
| DlmDocumentsExchange.com B-Indicator | |
| β O | |
| . O | |
| The O | |
| domain O | |
| was O | |
| registered O | |
| on O | |
| March O | |
| 8th O | |
| , O | |
| 2013 O | |
| : O | |
| Registration O | |
| Service O | |
| Provided O | |
| By O | |
| : O | |
| SHANGHAI B-Organization | |
| MEICHENG I-Organization | |
| TECHNOLOGY I-Organization | |
| INFORMATION I-Organization | |
| DEVELOPMENT I-Organization | |
| CO. I-Organization | |
| , I-Organization | |
| LTD. I-Organization | |
| Domain O | |
| Name O | |
| : O | |
| DLMDOCUMENTSEXCHANGE.COM B-Indicator | |
| Registration O | |
| Date O | |
| : O | |
| 08-Mar-2013 O | |
| Expiration O | |
| Date O | |
| : O | |
| 08-Mar-2014 O | |
| Status O | |
| : O | |
| LOCKED O | |
| The O | |
| domain O | |
| registration O | |
| data O | |
| indicates O | |
| the O | |
| following O | |
| owner O | |
| : O | |
| Registrant O | |
| Contact O | |
| Details O | |
| : O | |
| peng O | |
| jia O | |
| peng O | |
| jia O | |
| ( O | |
| bdoufwke123010 B-Indicator | |
| @ I-Indicator | |
| gmail.com I-Indicator | |
| ) O | |
| beijingshiahiidienquc.d B-Indicator | |
| beijingshi O | |
| beijing,100000 O | |
| CN O | |
| Tel O | |
| . O | |
| +86.01078456689 O | |
| Fax O | |
| . O | |
| +86.01078456689 O | |
| The O | |
| command-and-control O | |
| server O | |
| is O | |
| hosting O | |
| an O | |
| index O | |
| page O | |
| which O | |
| also O | |
| serves O | |
| an O | |
| APK O | |
| file O | |
| : O | |
| The O | |
| referenced O | |
| β O | |
| Document.apk B-Indicator | |
| β O | |
| is O | |
| 333583 O | |
| bytes O | |
| in O | |
| size O | |
| , O | |
| MD5 O | |
| : O | |
| c4c4077e9449147d754afd972e247efc B-Indicator | |
| . O | |
| It O | |
| has O | |
| the O | |
| same O | |
| functionality O | |
| as O | |
| the O | |
| one O | |
| described O | |
| above O | |
| but O | |
| contains O | |
| different O | |
| text O | |
| . O | |
| The O | |
| new O | |
| text O | |
| ( O | |
| in O | |
| Chinese O | |
| , O | |
| about O | |
| relations O | |
| between O | |
| China O | |
| , O | |
| Japan O | |
| and O | |
| the O | |
| disputed O | |
| β O | |
| Senkaku O | |
| Islands O | |
| / O | |
| Diaoyudao O | |
| Islands O | |
| / O | |
| Diaoyutai O | |
| Islands O | |
| β O | |
| ) O | |
| is O | |
| shown O | |
| to O | |
| the O | |
| victims O | |
| and O | |
| reads O | |
| as O | |
| following O | |
| : O | |
| When O | |
| opened O | |
| in O | |
| a O | |
| browser O | |
| , O | |
| this O | |
| is O | |
| what O | |
| the O | |
| command-and-control O | |
| index O | |
| page O | |
| looks O | |
| like O | |
| : O | |
| The O | |
| text O | |
| on O | |
| the O | |
| top O | |
| means O | |
| β O | |
| Title O | |
| Title O | |
| Title O | |
| β O | |
| in O | |
| Chinese O | |
| , O | |
| while O | |
| the O | |
| other O | |
| strings O | |
| appear O | |
| to O | |
| be O | |
| random O | |
| characters O | |
| typed O | |
| from O | |
| the O | |
| keyboard O | |
| . O | |
| Interestingly O | |
| , O | |
| the O | |
| command O | |
| and O | |
| control O | |
| server O | |
| includes O | |
| a O | |
| publicly O | |
| accessible O | |
| interface O | |
| to O | |
| work O | |
| with O | |
| the O | |
| victims O | |
| : O | |
| Some O | |
| of O | |
| the O | |
| commands O | |
| with O | |
| rough O | |
| translations O | |
| : O | |
| The O | |
| command-and-control O | |
| server O | |
| is O | |
| running O | |
| Windows B-System | |
| Server I-System | |
| 2003 O | |
| and O | |
| has O | |
| been O | |
| configured O | |
| for O | |
| Chinese O | |
| language O | |
| : O | |
| This O | |
| , O | |
| together O | |
| with O | |
| the O | |
| logs O | |
| , O | |
| is O | |
| a O | |
| strong O | |
| indicator O | |
| that O | |
| the O | |
| attackers O | |
| are O | |
| Chinese-speaking O | |
| . O | |
| Conclusions O | |
| Every O | |
| day O | |
| , O | |
| there O | |
| are O | |
| hundreds O | |
| if O | |
| not O | |
| thousands O | |
| of O | |
| targeted O | |
| attacks O | |
| against O | |
| Tibetan O | |
| and O | |
| Uyghur O | |
| supporters O | |
| . O | |
| The O | |
| vast O | |
| majority O | |
| of O | |
| these O | |
| target O | |
| Windows B-System | |
| machines O | |
| through O | |
| Word B-System | |
| documents O | |
| exploiting O | |
| known O | |
| vulnerabilities O | |
| such O | |
| as O | |
| CVE-2012-0158 B-Vulnerability | |
| , O | |
| CVE-2010-3333 B-Vulnerability | |
| and O | |
| CVE-2009-3129 B-Vulnerability | |
| . O | |
| In O | |
| this O | |
| case O | |
| , O | |
| the O | |
| attackers O | |
| hacked O | |
| a O | |
| Tibetan O | |
| activist O | |
| β O | |
| s O | |
| account O | |
| and O | |
| used O | |
| it O | |
| to O | |
| attack O | |
| Uyghur O | |
| activists O | |
| . O | |
| It O | |
| indicates O | |
| perhaps O | |
| an O | |
| interesting O | |
| trend O | |
| which O | |
| is O | |
| exploiting O | |
| the O | |
| trust O | |
| relationships O | |
| between O | |
| the O | |
| two O | |
| communities O | |
| . O | |
| This O | |
| technique O | |
| reminds O | |
| us O | |
| of O | |
| a O | |
| combination O | |
| between O | |
| ages O | |
| old O | |
| war O | |
| strategies O | |
| β O | |
| Divide O | |
| et O | |
| impera O | |
| β O | |
| and O | |
| β O | |
| By O | |
| way O | |
| of O | |
| deception O | |
| β O | |
| . O | |
| Until O | |
| now O | |
| , O | |
| we O | |
| haven O | |
| β O | |
| t O | |
| seen O | |
| targeted O | |
| attacks O | |
| against O | |
| mobile O | |
| phones O | |
| , O | |
| although O | |
| we O | |
| β O | |
| ve O | |
| seen O | |
| indications O | |
| that O | |
| these O | |
| were O | |
| in O | |
| development O | |
| . O | |
| The O | |
| current O | |
| attack O | |
| took O | |
| advantage O | |
| of O | |
| the O | |
| compromise O | |
| of O | |
| a O | |
| high-profile O | |
| Tibetan O | |
| activist O | |
| . O | |
| It O | |
| is O | |
| perhaps O | |
| the O | |
| first O | |
| in O | |
| a O | |
| new O | |
| wave O | |
| of O | |
| targeted O | |
| attacks O | |
| aimed O | |
| at O | |
| Android B-System | |
| users O | |
| . O | |
| So O | |
| far O | |
| , O | |
| the O | |
| attackers O | |
| relied O | |
| entirely O | |
| on O | |
| social O | |
| engineering O | |
| to O | |
| infect O | |
| the O | |
| targets O | |
| . O | |
| History O | |
| has O | |
| shown O | |
| us O | |
| that O | |
| , O | |
| in O | |
| time O | |
| , O | |
| these O | |
| attacks O | |
| will O | |
| use O | |
| zero-day B-Vulnerability | |
| vulnerabilities I-Vulnerability | |
| , O | |
| exploits O | |
| or O | |
| a O | |
| combination O | |
| of O | |
| techniques O | |
| . O | |
| For O | |
| now O | |
| , O | |
| the O | |
| best O | |
| protection O | |
| is O | |
| to O | |
| avoid O | |
| any O | |
| APK O | |
| attachments O | |
| that O | |
| arrive O | |
| on O | |
| mobile O | |
| phones O | |
| via O | |
| e-mail O | |
| . O | |
| We O | |
| detect O | |
| the O | |
| malware O | |
| used O | |
| in O | |
| this O | |
| attack O | |
| as O | |
| β O | |
| Backdoor.AndroidOS.Chuli.a B-Malware | |
| β O | |
| . O | |
| MD5s O | |
| : O | |
| c4c4077e9449147d754afd972e247efc B-Indicator | |
| Document.apk B-Indicator | |
| 0b8806b38b52bebfe39ff585639e2ea2 B-Indicator | |
| WUC O | |
| β O | |
| s O | |
| Conference.apk B-Indicator | |
| Triada B-Malware | |
| : O | |
| organized O | |
| crime O | |
| on O | |
| Android B-System | |
| Triada B-Malware | |
| is O | |
| a O | |
| modular O | |
| mobile O | |
| Trojan O | |
| that O | |
| actively O | |
| uses O | |
| root O | |
| privileges O | |
| to O | |
| substitute O | |
| system O | |
| files O | |
| and O | |
| uses O | |
| several O | |
| clever O | |
| methods O | |
| to O | |
| become O | |
| almost O | |
| invisible O | |
| March O | |
| 3 O | |
| , O | |
| 2016 O | |
| You O | |
| know O | |
| how O | |
| armies O | |
| typically O | |
| move O | |
| : O | |
| first O | |
| come O | |
| the O | |
| scouts O | |
| to O | |
| make O | |
| sure O | |
| everything O | |
| is O | |
| ok. O | |
| Then O | |
| the O | |
| heavy O | |
| troops O | |
| arrive O | |
| ; O | |
| at O | |
| least O | |
| that O | |
| was O | |
| how O | |
| it O | |
| used O | |
| to O | |
| be O | |
| before O | |
| the O | |
| age O | |
| of O | |
| cyber O | |
| wars O | |
| . O | |
| It O | |
| turns O | |
| out O | |
| , O | |
| that O | |
| Trojans O | |
| behave O | |
| quite O | |
| the O | |
| same O | |
| way O | |
| . O | |
| There O | |
| are O | |
| a O | |
| lot O | |
| of O | |
| small O | |
| Trojans O | |
| for O | |
| Android B-System | |
| capable O | |
| of O | |
| leveraging O | |
| access O | |
| privileges O | |
| , O | |
| in O | |
| other O | |
| words O | |
| β O | |
| gaining O | |
| root O | |
| access O | |
| . O | |
| Our O | |
| malware O | |
| analysts O | |
| Nikita O | |
| Buchka O | |
| and O | |
| Mikhail O | |
| Kuzin O | |
| can O | |
| easily O | |
| name O | |
| 11 O | |
| families O | |
| of O | |
| such O | |
| Trojans O | |
| . O | |
| Most O | |
| of O | |
| them O | |
| are O | |
| almost O | |
| harmless O | |
| β O | |
| all O | |
| they O | |
| did O | |
| until O | |
| recently O | |
| was O | |
| injecting O | |
| tons O | |
| of O | |
| ads O | |
| and O | |
| downloading O | |
| others O | |
| of O | |
| their O | |
| kind O | |
| . O | |
| If O | |
| you O | |
| want O | |
| to O | |
| know O | |
| more O | |
| about O | |
| them O | |
| β O | |
| our O | |
| researchers O | |
| have O | |
| an O | |
| article O | |
| about O | |
| them O | |
| on O | |
| Securelist B-Organization | |
| . O | |
| If O | |
| you O | |
| follow O | |
| the O | |
| military O | |
| analogy O | |
| β O | |
| those O | |
| are O | |
| the O | |
| scouts O | |
| . O | |
| As O | |
| you O | |
| probably O | |
| have O | |
| noticed O | |
| , O | |
| gaining O | |
| root O | |
| access O | |
| gives O | |
| them O | |
| the O | |
| capability O | |
| to O | |
| download O | |
| and O | |
| install O | |
| applications O | |
| β O | |
| that O | |
| β O | |
| s O | |
| the O | |
| reason O | |
| why O | |
| once O | |
| one O | |
| of O | |
| them O | |
| get O | |
| into O | |
| the O | |
| system O | |
| , O | |
| in O | |
| a O | |
| few O | |
| minutes O | |
| there O | |
| are O | |
| all O | |
| the O | |
| others O | |
| . O | |
| But O | |
| our O | |
| researchers O | |
| have O | |
| predicted O | |
| that O | |
| these O | |
| small O | |
| Trojans O | |
| would O | |
| certainly O | |
| be O | |
| used O | |
| to O | |
| download O | |
| some O | |
| really O | |
| bad O | |
| malware O | |
| that O | |
| can O | |
| actually O | |
| harm O | |
| the O | |
| owners O | |
| of O | |
| the O | |
| infected O | |
| devices O | |
| . O | |
| And O | |
| that O | |
| β O | |
| s O | |
| exactly O | |
| what O | |
| has O | |
| happened O | |
| recently O | |
| . O | |
| Small O | |
| Trojans O | |
| like O | |
| Leech B-Malware | |
| , O | |
| Ztorg B-Malware | |
| and O | |
| Gopro B-Malware | |
| now O | |
| download O | |
| one O | |
| of O | |
| the O | |
| most O | |
| advanced O | |
| mobile O | |
| Trojans O | |
| our O | |
| malware O | |
| analysts O | |
| have O | |
| ever O | |
| encountered O | |
| β O | |
| we O | |
| call O | |
| it O | |
| Triada B-Malware | |
| . O | |
| Triada B-Malware | |
| is O | |
| a O | |
| modular O | |
| mobile O | |
| Trojan O | |
| that O | |
| actively O | |
| uses O | |
| root O | |
| privileges O | |
| to O | |
| substitute O | |
| system O | |
| files O | |
| and O | |
| exists O | |
| mostly O | |
| in O | |
| the O | |
| device O | |
| β O | |
| s O | |
| RAM O | |
| , O | |
| which O | |
| makes O | |
| it O | |
| extremely O | |
| hard O | |
| to O | |
| detect O | |
| . O | |
| The O | |
| dark O | |
| ways O | |
| of O | |
| the O | |
| Triada B-Malware | |
| Once O | |
| downloaded O | |
| and O | |
| installed O | |
| , O | |
| the O | |
| Triada B-Malware | |
| Trojan O | |
| first O | |
| tries O | |
| to O | |
| collect O | |
| some O | |
| information O | |
| about O | |
| the O | |
| system O | |
| β O | |
| like O | |
| the O | |
| device O | |
| model O | |
| , O | |
| the O | |
| OS O | |
| version O | |
| , O | |
| the O | |
| amount O | |
| of O | |
| the O | |
| SD O | |
| card O | |
| space O | |
| , O | |
| the O | |
| list O | |
| of O | |
| the O | |
| installed O | |
| applications O | |
| and O | |
| other O | |
| things O | |
| . O | |
| Then O | |
| it O | |
| sends O | |
| all O | |
| that O | |
| information O | |
| to O | |
| the O | |
| Command O | |
| & O | |
| Control O | |
| server O | |
| . O | |
| We O | |
| have O | |
| detected O | |
| a O | |
| total O | |
| of O | |
| 17 O | |
| C O | |
| & O | |
| C O | |
| servers O | |
| on O | |
| 4 O | |
| different O | |
| domains O | |
| , O | |
| which O | |
| probably O | |
| means O | |
| the O | |
| bad O | |
| guys O | |
| are O | |
| quite O | |
| familiar O | |
| with O | |
| what O | |
| redundancy O | |
| is O | |
| . O | |
| The O | |
| C O | |
| & O | |
| C O | |
| server O | |
| then O | |
| responds O | |
| with O | |
| a O | |
| configuration O | |
| file O | |
| , O | |
| containing O | |
| the O | |
| personal O | |
| identification O | |
| number O | |
| for O | |
| the O | |
| device O | |
| and O | |
| some O | |
| settings O | |
| β O | |
| the O | |
| time O | |
| interval O | |
| between O | |
| contacting O | |
| the O | |
| server O | |
| , O | |
| the O | |
| list O | |
| of O | |
| modules O | |
| to O | |
| be O | |
| installed O | |
| and O | |
| so O | |
| on O | |
| . O | |
| After O | |
| the O | |
| modules O | |
| are O | |
| installed O | |
| they O | |
| are O | |
| deployed O | |
| to O | |
| the O | |
| short O | |
| term O | |
| memory O | |
| and O | |
| deleted O | |
| from O | |
| the O | |
| device O | |
| storage O | |
| , O | |
| which O | |
| makes O | |
| the O | |
| Trojan O | |
| a O | |
| lot O | |
| harder O | |
| to O | |
| catch O | |
| . O | |
| There O | |
| are O | |
| two O | |
| more O | |
| reasons O | |
| why O | |
| Triada B-Malware | |
| is O | |
| so O | |
| hard O | |
| to O | |
| detect O | |
| and O | |
| why O | |
| it O | |
| had O | |
| impressed O | |
| our O | |
| researchers O | |
| so O | |
| much O | |
| . O | |
| First O | |
| , O | |
| it O | |
| modifies O | |
| the O | |
| Zygote B-System | |
| process O | |
| . O | |
| Zygote B-System | |
| is O | |
| the O | |
| core O | |
| process O | |
| in O | |
| the O | |
| Android B-System | |
| OS O | |
| that O | |
| is O | |
| used O | |
| as O | |
| a O | |
| template O | |
| for O | |
| every O | |
| application O | |
| , O | |
| which O | |
| means O | |
| that O | |
| once O | |
| the O | |
| Trojan O | |
| gets O | |
| into O | |
| Zygote B-System | |
| , O | |
| it O | |
| becomes O | |
| a O | |
| part O | |
| of O | |
| literally O | |
| every O | |
| app O | |
| that O | |
| is O | |
| launched O | |
| on O | |
| the O | |
| device O | |
| . O | |
| Triada B-Malware | |
| : O | |
| organized O | |
| crime O | |
| on O | |
| Android B-System | |
| Second O | |
| , O | |
| it O | |
| substitutes O | |
| the O | |
| system O | |
| functions O | |
| and O | |
| conceals O | |
| its O | |
| modules O | |
| from O | |
| the O | |
| list O | |
| of O | |
| the O | |
| running O | |
| processes O | |
| and O | |
| installed O | |
| apps O | |
| . O | |
| So O | |
| the O | |
| system O | |
| doesn O | |
| β O | |
| t O | |
| see O | |
| any O | |
| strange O | |
| processes O | |
| running O | |
| and O | |
| thus O | |
| does O | |
| not O | |
| cry O | |
| the O | |
| alarm O | |
| . O | |
| Those O | |
| are O | |
| not O | |
| the O | |
| only O | |
| system O | |
| functions O | |
| Triada B-Malware | |
| modifies O | |
| . O | |
| As O | |
| our O | |
| researchers O | |
| discovered O | |
| , O | |
| it O | |
| also O | |
| lays O | |
| its O | |
| hands O | |
| on O | |
| the O | |
| outgoing O | |
| SMS O | |
| and O | |
| filters O | |
| the O | |
| incoming O | |
| ones O | |
| . O | |
| That O | |
| is O | |
| actually O | |
| how O | |
| the O | |
| bad O | |
| guys O | |
| decided O | |
| to O | |
| monetize O | |
| the O | |
| Trojan O | |
| . O | |
| Some O | |
| applications O | |
| rely O | |
| on O | |
| SMS O | |
| when O | |
| it O | |
| comes O | |
| to O | |
| in-app O | |
| purchases O | |
| β O | |
| the O | |
| transaction O | |
| data O | |
| is O | |
| transferred O | |
| via O | |
| a O | |
| short O | |
| text O | |
| message O | |
| . O | |
| The O | |
| main O | |
| reason O | |
| for O | |
| developers O | |
| to O | |
| choose O | |
| SMS O | |
| over O | |
| traditional O | |
| payments O | |
| via O | |
| Internet O | |
| is O | |
| that O | |
| in O | |
| the O | |
| case O | |
| with O | |
| SMS O | |
| no O | |
| Internet O | |
| connection O | |
| is O | |
| required O | |
| . O | |
| Users O | |
| do O | |
| not O | |
| see O | |
| those O | |
| SMS O | |
| because O | |
| they O | |
| are O | |
| processed O | |
| not O | |
| by O | |
| the O | |
| SMS O | |
| app O | |
| , O | |
| but O | |
| by O | |
| the O | |
| app O | |
| that O | |
| has O | |
| initiated O | |
| the O | |
| transaction O | |
| β O | |
| e.g O | |
| a O | |
| free-to-play O | |
| game O | |
| . O | |
| Triada B-Malware | |
| β O | |
| s O | |
| functionality O | |
| allows O | |
| it O | |
| to O | |
| modify O | |
| those O | |
| messages O | |
| , O | |
| so O | |
| the O | |
| money O | |
| is O | |
| sent O | |
| not O | |
| to O | |
| some O | |
| app O | |
| developer O | |
| , O | |
| but O | |
| to O | |
| the O | |
| malware O | |
| operators O | |
| . O | |
| Triada B-Malware | |
| steals O | |
| the O | |
| money O | |
| either O | |
| from O | |
| the O | |
| users O | |
| β O | |
| if O | |
| they O | |
| haven O | |
| β O | |
| t O | |
| succeeded O | |
| in O | |
| purchasing O | |
| whatever O | |
| they O | |
| wanted O | |
| , O | |
| or O | |
| from O | |
| the O | |
| app O | |
| developers O | |
| , O | |
| in O | |
| case O | |
| the O | |
| user O | |
| has O | |
| completed O | |
| the O | |
| purchase O | |
| successfully O | |
| . O | |
| For O | |
| now O | |
| , O | |
| that O | |
| is O | |
| the O | |
| only O | |
| way O | |
| how O | |
| cybercriminals O | |
| can O | |
| profit O | |
| from O | |
| Triada B-Malware | |
| , O | |
| but O | |
| don O | |
| β O | |
| t O | |
| forget O | |
| that O | |
| it O | |
| β O | |
| s O | |
| a O | |
| modular O | |
| Trojan O | |
| , O | |
| so O | |
| it O | |
| can O | |
| be O | |
| turned O | |
| into O | |
| literally O | |
| everything O | |
| on O | |
| one O | |
| command O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| Fighting O | |
| organized O | |
| crime O | |
| in O | |
| your O | |
| phone O | |
| One O | |
| of O | |
| the O | |
| main O | |
| problems O | |
| with O | |
| Triada B-Malware | |
| is O | |
| that O | |
| it O | |
| can O | |
| potentially O | |
| hurt O | |
| a O | |
| LOT O | |
| of O | |
| people O | |
| . O | |
| As O | |
| we O | |
| β O | |
| ve O | |
| mentioned O | |
| earlier O | |
| , O | |
| Triada B-Malware | |
| is O | |
| downloaded O | |
| by O | |
| smaller O | |
| Trojans O | |
| that O | |
| have O | |
| leveraged O | |
| the O | |
| access O | |
| privileges O | |
| . O | |
| And O | |
| our O | |
| researchers O | |
| estimate O | |
| that O | |
| in O | |
| every O | |
| 10 O | |
| Android B-System | |
| users O | |
| 1 O | |
| was O | |
| attacked O | |
| by O | |
| either O | |
| one O | |
| or O | |
| several O | |
| of O | |
| those O | |
| Trojans O | |
| during O | |
| the O | |
| second O | |
| half O | |
| of O | |
| 2015 O | |
| , O | |
| so O | |
| there O | |
| are O | |
| millions O | |
| of O | |
| devices O | |
| with O | |
| a O | |
| huge O | |
| possibility O | |
| of O | |
| being O | |
| infected O | |
| with O | |
| Triada B-Malware | |
| . O | |
| So O | |
| , O | |
| what O | |
| can O | |
| you O | |
| do O | |
| to O | |
| protect O | |
| yourself O | |
| from O | |
| this O | |
| stealthy O | |
| beast O | |
| ? O | |
| 1 O | |
| . O | |
| Never O | |
| forget O | |
| to O | |
| update O | |
| your O | |
| system O | |
| . O | |
| It O | |
| turns O | |
| out O | |
| that O | |
| those O | |
| smaller O | |
| Trojans O | |
| face O | |
| serious O | |
| problems O | |
| trying O | |
| to O | |
| get O | |
| root O | |
| access O | |
| on O | |
| Android B-System | |
| 4.4.4 I-System | |
| and O | |
| above O | |
| , O | |
| because O | |
| a O | |
| lot O | |
| of O | |
| vulnerabilities O | |
| were O | |
| patched O | |
| in O | |
| these O | |
| versions O | |
| . O | |
| So O | |
| if O | |
| you O | |
| have O | |
| Android B-System | |
| 4.4.4 I-System | |
| or O | |
| some O | |
| more O | |
| recent O | |
| version O | |
| of O | |
| this O | |
| OS O | |
| on O | |
| your O | |
| device O | |
| , O | |
| your O | |
| chances O | |
| of O | |
| getting O | |
| infected O | |
| with O | |
| Triada B-Malware | |
| are O | |
| significantly O | |
| lower O | |
| . O | |
| Yet O | |
| our O | |
| statistics O | |
| says O | |
| that O | |
| about O | |
| 60 O | |
| % O | |
| of O | |
| Android B-System | |
| users O | |
| are O | |
| still O | |
| sitting O | |
| with O | |
| Android B-System | |
| 4.4.2 I-System | |
| and I-System | |
| below I-System | |
| . O | |
| Triada B-Malware | |
| : O | |
| organized O | |
| crime O | |
| on O | |
| Android B-System | |
| 2 O | |
| . O | |
| Better O | |
| not O | |
| to O | |
| take O | |
| any O | |
| chances O | |
| at O | |
| all O | |
| , O | |
| no O | |
| matter O | |
| which O | |
| version O | |
| of O | |
| the O | |
| OS O | |
| you O | |
| use O | |
| . O | |
| So O | |
| we O | |
| recommend O | |
| installing O | |
| an O | |
| anti-virus O | |
| solution O | |
| on O | |
| your O | |
| Android O | |
| device O | |
| . O | |
| Kaspersky B-System | |
| Internet I-System | |
| Security I-System | |
| for O | |
| Android B-System | |
| detects O | |
| all O | |
| three O | |
| of O | |
| Triada B-Malware | |
| β O | |
| s O | |
| modules O | |
| , O | |
| so O | |
| it O | |
| can O | |
| save O | |
| your O | |
| money O | |
| from O | |
| cybercriminals O | |
| that O | |
| are O | |
| behind O | |
| Triada B-Malware | |
| . O | |
| Just O | |
| don O | |
| β O | |
| t O | |
| forget O | |
| that O | |
| the O | |
| scan O | |
| does O | |
| not O | |
| run O | |
| automatically O | |
| in O | |
| the O | |
| free O | |
| version O | |
| . O | |
| But O | |
| all O | |
| in O | |
| all O | |
| Triada B-Malware | |
| is O | |
| yet O | |
| another O | |
| example O | |
| of O | |
| a O | |
| really O | |
| bad O | |
| trend O | |
| : O | |
| malware O | |
| developers O | |
| are O | |
| taking O | |
| Android B-System | |
| seriously O | |
| , O | |
| and O | |
| the O | |
| latest O | |
| samples O | |
| are O | |
| almost O | |
| as O | |
| complex O | |
| and O | |
| hard O | |
| to O | |
| withstand O | |
| , O | |
| as O | |
| their O | |
| Windows-based B-System | |
| kin O | |
| . O | |
| The O | |
| only O | |
| good O | |
| way O | |
| to O | |
| fight O | |
| all O | |
| these O | |
| threats O | |
| is O | |
| to O | |
| be O | |
| proactive O | |
| , O | |
| and O | |
| so O | |
| a O | |
| good O | |
| security O | |
| solution O | |
| is O | |
| a O | |
| must O | |
| . O | |
| TrickBot B-Malware | |
| Pushing O | |
| a O | |
| 2FA O | |
| Bypass O | |
| App O | |
| to O | |
| Bank O | |
| Customers O | |
| in O | |
| Germany O | |
| March O | |
| 24 O | |
| , O | |
| 2020 O | |
| IBM B-Organization | |
| X-Force I-Organization | |
| researchers O | |
| analyzed O | |
| an O | |
| Android B-System | |
| malware O | |
| app O | |
| that O | |
| β O | |
| s O | |
| likely O | |
| being O | |
| pushed O | |
| to O | |
| infected O | |
| users O | |
| by O | |
| the O | |
| TrickBot B-Malware | |
| Trojan O | |
| . O | |
| This O | |
| app O | |
| , O | |
| dubbed O | |
| β O | |
| TrickMo B-Malware | |
| β O | |
| by O | |
| our O | |
| team O | |
| , O | |
| is O | |
| designed O | |
| to O | |
| bypass O | |
| second O | |
| factor O | |
| and O | |
| strong O | |
| authentication O | |
| pushed O | |
| to O | |
| bank O | |
| customers O | |
| when O | |
| they O | |
| need O | |
| to O | |
| authorize O | |
| a O | |
| transaction O | |
| . O | |
| While O | |
| it O | |
| β O | |
| s O | |
| not O | |
| the O | |
| first O | |
| of O | |
| its O | |
| kind O | |
| , O | |
| this O | |
| Android B-System | |
| malware O | |
| app O | |
| is O | |
| more O | |
| sophisticated O | |
| than O | |
| similar O | |
| apps O | |
| and O | |
| possesses O | |
| interesting O | |
| features O | |
| that O | |
| enable O | |
| its O | |
| operators O | |
| to O | |
| steal O | |
| transaction O | |
| authorization O | |
| codes O | |
| from O | |
| victims O | |
| who O | |
| download O | |
| the O | |
| app O | |
| . O | |
| According O | |
| to O | |
| our O | |
| research O | |
| , O | |
| TrickMo B-Malware | |
| is O | |
| still O | |
| under O | |
| active O | |
| development O | |
| as O | |
| we O | |
| expect O | |
| to O | |
| see O | |
| frequent O | |
| changes O | |
| and O | |
| updates O | |
| . O | |
| While O | |
| it O | |
| can O | |
| be O | |
| used O | |
| anywhere O | |
| and O | |
| target O | |
| any O | |
| bank O | |
| or O | |
| region O | |
| , O | |
| at O | |
| this O | |
| time O | |
| , O | |
| we O | |
| are O | |
| seeing O | |
| it O | |
| deployed O | |
| specifically O | |
| in O | |
| Germany O | |
| . O | |
| Germany O | |
| is O | |
| one O | |
| of O | |
| the O | |
| first O | |
| attack O | |
| turfs O | |
| TrickBot B-Malware | |
| spread O | |
| to O | |
| when O | |
| it O | |
| first O | |
| emerged O | |
| in O | |
| 2016 O | |
| . O | |
| In O | |
| 2020 O | |
| , O | |
| it O | |
| appears O | |
| that O | |
| TrickBot B-Malware | |
| β O | |
| s O | |
| vast O | |
| bank O | |
| fraud O | |
| is O | |
| an O | |
| ongoing O | |
| project O | |
| that O | |
| helps O | |
| the O | |
| gang O | |
| monetize O | |
| compromised O | |
| accounts O | |
| . O | |
| First O | |
| Signs O | |
| in O | |
| September O | |
| 2019 O | |
| In O | |
| September O | |
| 2019 O | |
| , O | |
| a O | |
| tweet O | |
| by O | |
| CERT-Bund B-Organization | |
| caught O | |
| the O | |
| attention O | |
| of O | |
| the O | |
| IBM B-Organization | |
| Trusteer I-Organization | |
| Mobile I-Organization | |
| Security I-Organization | |
| Research I-Organization | |
| team O | |
| . O | |
| The O | |
| tweet O | |
| stated O | |
| that O | |
| TrickBot B-Malware | |
| , O | |
| a O | |
| well-known O | |
| banking O | |
| Trojan O | |
| owned O | |
| by O | |
| an O | |
| organized O | |
| cybercrime O | |
| gang O | |
| , O | |
| uses O | |
| man-in-the-browser O | |
| ( O | |
| MITB O | |
| ) O | |
| web O | |
| injects O | |
| in O | |
| online O | |
| banking O | |
| sessions O | |
| to O | |
| ask O | |
| infected O | |
| users O | |
| for O | |
| their O | |
| mobile O | |
| phone O | |
| number O | |
| and O | |
| device O | |
| type O | |
| . O | |
| Machine O | |
| translation O | |
| of O | |
| this O | |
| tweet O | |
| reads O | |
| : O | |
| β O | |
| Watch O | |
| out O | |
| for O | |
| online O | |
| banking O | |
| : O | |
| Emotet B-Malware | |
| reloads O | |
| TrickBot B-Malware | |
| . O | |
| On O | |
| infected O | |
| PCs O | |
| , O | |
| TrickBot B-Malware | |
| displays O | |
| a O | |
| query O | |
| for O | |
| the O | |
| mobile O | |
| phone O | |
| number O | |
| and O | |
| the O | |
| device O | |
| type O | |
| used O | |
| for O | |
| banking O | |
| and O | |
| then O | |
| prompts O | |
| users O | |
| to O | |
| install O | |
| an O | |
| alleged O | |
| security O | |
| app. O | |
| β O | |
| When O | |
| banking O | |
| Trojans O | |
| ask O | |
| for O | |
| this O | |
| type O | |
| of O | |
| information O | |
| , O | |
| it O | |
| usually O | |
| means O | |
| the O | |
| next O | |
| step O | |
| will O | |
| be O | |
| an O | |
| attempt O | |
| to O | |
| infect O | |
| the O | |
| victim O | |
| β O | |
| s O | |
| mobile O | |
| device O | |
| . O | |
| Our O | |
| team O | |
| went O | |
| ahead O | |
| and O | |
| hunted O | |
| for O | |
| samples O | |
| of O | |
| the O | |
| app O | |
| and O | |
| analyzed O | |
| it O | |
| in O | |
| our O | |
| labs O | |
| . O | |
| In O | |
| this O | |
| analysis O | |
| , O | |
| we O | |
| get O | |
| into O | |
| the O | |
| capabilities O | |
| of O | |
| the O | |
| new O | |
| variant O | |
| and O | |
| what O | |
| we O | |
| found O | |
| to O | |
| be O | |
| a O | |
| β O | |
| kill O | |
| switch O | |
| β O | |
| that O | |
| can O | |
| eliminate O | |
| the O | |
| malware O | |
| remotely O | |
| from O | |
| an O | |
| infected O | |
| device O | |
| . O | |
| Desktop O | |
| Trojans O | |
| and O | |
| Their O | |
| Mobile O | |
| Component O | |
| The O | |
| process O | |
| by O | |
| which O | |
| Trojans O | |
| attempt O | |
| to O | |
| infect O | |
| mobile O | |
| devices O | |
| is O | |
| at O | |
| least O | |
| a O | |
| decade O | |
| old O | |
| . O | |
| Usually O | |
| , O | |
| when O | |
| users O | |
| are O | |
| already O | |
| infected O | |
| with O | |
| malware O | |
| like O | |
| TrickBot B-Malware | |
| on O | |
| their O | |
| desktop O | |
| , O | |
| they O | |
| will O | |
| see O | |
| a O | |
| web O | |
| injection O | |
| asking O | |
| for O | |
| their O | |
| mobile O | |
| device O | |
| operating O | |
| system O | |
| ( O | |
| OS O | |
| ) O | |
| type O | |
| and O | |
| phone O | |
| number O | |
| . O | |
| Next O | |
| , O | |
| if O | |
| they O | |
| indicate O | |
| that O | |
| they O | |
| use O | |
| an O | |
| Android-based B-System | |
| device O | |
| , O | |
| the O | |
| Trojan O | |
| , O | |
| impersonating O | |
| their O | |
| bank O | |
| with O | |
| web O | |
| injections O | |
| , O | |
| fools O | |
| the O | |
| victim O | |
| into O | |
| installing O | |
| a O | |
| fake O | |
| security O | |
| app O | |
| . O | |
| The O | |
| supposed O | |
| purpose O | |
| of O | |
| that O | |
| app O | |
| is O | |
| to O | |
| obtain O | |
| and O | |
| use O | |
| a O | |
| required O | |
| β O | |
| security O | |
| code O | |
| β O | |
| to O | |
| log O | |
| in O | |
| to O | |
| their O | |
| online O | |
| banking O | |
| site O | |
| . O | |
| Our O | |
| research O | |
| team O | |
| analyzed O | |
| the O | |
| malicious O | |
| Android B-System | |
| application O | |
| that O | |
| is O | |
| most O | |
| likely O | |
| being O | |
| spread O | |
| by O | |
| TrickBot B-Malware | |
| and O | |
| dubbed O | |
| it O | |
| β O | |
| TrickMo. B-Malware | |
| β O | |
| Targeting O | |
| users O | |
| in O | |
| Germany O | |
| at O | |
| this O | |
| time O | |
| , O | |
| TrickMo B-Malware | |
| is O | |
| the O | |
| latest O | |
| variation O | |
| in O | |
| the O | |
| transaction O | |
| authentication O | |
| number O | |
| ( O | |
| TAN O | |
| ) O | |
| -stealing O | |
| malware O | |
| category O | |
| . O | |
| Its O | |
| main O | |
| capabilities O | |
| include O | |
| : O | |
| Stealing O | |
| personal O | |
| device O | |
| information O | |
| Intercepting O | |
| SMS O | |
| messages O | |
| Recording O | |
| targeted O | |
| applications O | |
| for O | |
| one-time O | |
| password O | |
| ( O | |
| TAN O | |
| ) O | |
| Lockdown O | |
| of O | |
| the O | |
| phone O | |
| Stealing O | |
| pictures O | |
| from O | |
| the O | |
| device O | |
| Self-destruction O | |
| and O | |
| removal O | |
| As O | |
| banks O | |
| release O | |
| more O | |
| advanced O | |
| security O | |
| measures O | |
| , O | |
| banking O | |
| malware O | |
| evolves O | |
| to O | |
| keep O | |
| up O | |
| with O | |
| the O | |
| perpetual O | |
| arms O | |
| race O | |
| . O | |
| From O | |
| our O | |
| analysis O | |
| of O | |
| the O | |
| TrickMo B-Malware | |
| mobile O | |
| malware O | |
| , O | |
| it O | |
| is O | |
| apparent O | |
| that O | |
| TrickMo B-Malware | |
| is O | |
| designed O | |
| to O | |
| break O | |
| the O | |
| newest O | |
| methods O | |
| of O | |
| OTP O | |
| and O | |
| , O | |
| specifically O | |
| , O | |
| TAN O | |
| codes O | |
| often O | |
| used O | |
| in O | |
| Germany O | |
| . O | |
| Among O | |
| the O | |
| various O | |
| features O | |
| we O | |
| discuss O | |
| in O | |
| this O | |
| post O | |
| , O | |
| we O | |
| believe O | |
| that O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| most O | |
| significant O | |
| novelty O | |
| is O | |
| an O | |
| app O | |
| recording O | |
| feature O | |
| , O | |
| which O | |
| gives O | |
| it O | |
| the O | |
| ability O | |
| to O | |
| overcome O | |
| the O | |
| newer O | |
| pushTAN O | |
| app O | |
| validations O | |
| used O | |
| by O | |
| German O | |
| banks O | |
| . O | |
| In O | |
| the O | |
| analysis O | |
| that O | |
| follows O | |
| , O | |
| we O | |
| describe O | |
| in O | |
| detail O | |
| the O | |
| capabilities O | |
| of O | |
| this O | |
| new O | |
| variant O | |
| and O | |
| a O | |
| β O | |
| kill O | |
| switch O | |
| β O | |
| that O | |
| can O | |
| remotely O | |
| eliminate O | |
| the O | |
| malware O | |
| from O | |
| a O | |
| mobile O | |
| device O | |
| . O | |
| Why O | |
| Do O | |
| Desktop O | |
| Trojans O | |
| Use O | |
| a O | |
| Mobile O | |
| Component O | |
| ? O | |
| About O | |
| a O | |
| decade O | |
| ago O | |
| , O | |
| attackers O | |
| wielding O | |
| banking O | |
| Trojans O | |
| could O | |
| simply O | |
| use O | |
| stolen O | |
| credentials O | |
| to O | |
| access O | |
| a O | |
| victim O | |
| β O | |
| s O | |
| online O | |
| banking O | |
| account O | |
| and O | |
| perform O | |
| money O | |
| transfers O | |
| . O | |
| As O | |
| a O | |
| countermeasure O | |
| , O | |
| financial O | |
| institutions O | |
| introduced O | |
| various O | |
| second O | |
| factor O | |
| authentication O | |
| ( O | |
| 2FA O | |
| ) O | |
| methods O | |
| . O | |
| One O | |
| method O | |
| , O | |
| which O | |
| was O | |
| popular O | |
| in O | |
| Germany O | |
| , O | |
| is O | |
| known O | |
| as O | |
| mobile O | |
| TAN O | |
| ( O | |
| mTAN O | |
| ) O | |
| . O | |
| It O | |
| was O | |
| implemented O | |
| by O | |
| sending O | |
| an O | |
| SMS O | |
| message O | |
| containing O | |
| a O | |
| one-time O | |
| password O | |
| ( O | |
| OTP O | |
| ) O | |
| to O | |
| the O | |
| client O | |
| β O | |
| s O | |
| mobile O | |
| device O | |
| . O | |
| The O | |
| transaction O | |
| would O | |
| only O | |
| be O | |
| authorized O | |
| after O | |
| the O | |
| client O | |
| enters O | |
| the O | |
| TAN O | |
| into O | |
| the O | |
| online O | |
| banking O | |
| website O | |
| in O | |
| their O | |
| browser O | |
| . O | |
| Keep O | |
| in O | |
| mind O | |
| that O | |
| while O | |
| this O | |
| case O | |
| is O | |
| about O | |
| TANs O | |
| , O | |
| it O | |
| can O | |
| be O | |
| any O | |
| OTP O | |
| , O | |
| depending O | |
| on O | |
| which O | |
| bank O | |
| is O | |
| being O | |
| targeted O | |
| . O | |
| Meanwhile O | |
| , O | |
| desktop O | |
| banking O | |
| Trojans O | |
| developed O | |
| the O | |
| ability O | |
| to O | |
| execute O | |
| various O | |
| social O | |
| engineering O | |
| schemes O | |
| by O | |
| using O | |
| web O | |
| injections O | |
| , O | |
| a O | |
| method O | |
| that O | |
| alters O | |
| the O | |
| content O | |
| presented O | |
| to O | |
| the O | |
| infected O | |
| victim O | |
| in O | |
| their O | |
| browser O | |
| . O | |
| In O | |
| some O | |
| cases O | |
| , O | |
| sophisticated O | |
| web O | |
| injects O | |
| were O | |
| used O | |
| to O | |
| trick O | |
| victims O | |
| into O | |
| entering O | |
| their O | |
| 2FA O | |
| codes O | |
| directly O | |
| into O | |
| the O | |
| web O | |
| forms O | |
| controlled O | |
| by O | |
| the O | |
| malware O | |
| to O | |
| eliminate O | |
| the O | |
| need O | |
| for O | |
| the O | |
| mobile O | |
| malware O | |
| component O | |
| . O | |
| But O | |
| attackers O | |
| were O | |
| still O | |
| constantly O | |
| looking O | |
| for O | |
| new O | |
| methods O | |
| to O | |
| steal O | |
| TANs O | |
| . O | |
| Around O | |
| 2011 O | |
| , O | |
| the O | |
| infamous O | |
| Zeus B-Malware | |
| Trojan I-Malware | |
| started O | |
| using O | |
| web O | |
| injects O | |
| that O | |
| tricked O | |
| users O | |
| into O | |
| downloading O | |
| a O | |
| mobile O | |
| component O | |
| called O | |
| β O | |
| ZitMo B-Malware | |
| β O | |
| ( O | |
| Zeus B-Malware | |
| in O | |
| the O | |
| Mobile O | |
| ) O | |
| . O | |
| This O | |
| was O | |
| used O | |
| to O | |
| bypass O | |
| 2FA O | |
| methods O | |
| by O | |
| intercepting O | |
| the O | |
| SMS O | |
| messages O | |
| coming O | |
| from O | |
| the O | |
| bank O | |
| and O | |
| stealing O | |
| the O | |
| mTANs O | |
| without O | |
| the O | |
| victim O | |
| β O | |
| s O | |
| knowledge O | |
| . O | |
| Many O | |
| other O | |
| banking O | |
| malware O | |
| families O | |
| followed O | |
| suit O | |
| and O | |
| released O | |
| their O | |
| own O | |
| Android O | |
| malware O | |
| components O | |
| designed O | |
| to O | |
| steal O | |
| those O | |
| OTPs O | |
| and O | |
| TANs O | |
| . O | |
| From O | |
| mTAN O | |
| to O | |
| pushTAN O | |
| In O | |
| the O | |
| past O | |
| few O | |
| years O | |
| , O | |
| some O | |
| banks O | |
| in O | |
| Europe O | |
| , O | |
| especially O | |
| in O | |
| Germany O | |
| , O | |
| stopped O | |
| using O | |
| SMS-based O | |
| authentication O | |
| and O | |
| switched O | |
| to O | |
| dedicated O | |
| pushTAN O | |
| applications O | |
| for O | |
| 2FA O | |
| schemes O | |
| . O | |
| Instead O | |
| of O | |
| relying O | |
| on O | |
| SMS O | |
| messages O | |
| , O | |
| which O | |
| can O | |
| be O | |
| easily O | |
| intercepted O | |
| by O | |
| third-party O | |
| apps O | |
| , O | |
| these O | |
| applications O | |
| started O | |
| using O | |
| push O | |
| notifications O | |
| for O | |
| users O | |
| , O | |
| containing O | |
| the O | |
| transaction O | |
| details O | |
| and O | |
| the O | |
| TAN O | |
| . O | |
| The O | |
| pushTAN O | |
| method O | |
| has O | |
| a O | |
| clear O | |
| advantage O | |
| : O | |
| It O | |
| improves O | |
| security O | |
| by O | |
| mitigating O | |
| the O | |
| risk O | |
| of O | |
| SIM O | |
| swapping O | |
| attacks O | |
| and O | |
| SMS O | |
| stealers O | |
| . O | |
| TrickMo B-Malware | |
| Calls O | |
| pushTAN O | |
| The O | |
| pushTAN O | |
| method O | |
| is O | |
| a O | |
| hurdle O | |
| for O | |
| malware O | |
| apps O | |
| that O | |
| may O | |
| reside O | |
| on O | |
| the O | |
| same O | |
| device O | |
| , O | |
| and O | |
| it O | |
| β O | |
| s O | |
| particularly O | |
| challenging O | |
| for O | |
| mobile O | |
| malware O | |
| due O | |
| to O | |
| Android B-System | |
| β O | |
| s O | |
| application O | |
| sandbox O | |
| . O | |
| This O | |
| feature O | |
| is O | |
| designed O | |
| to O | |
| block O | |
| one O | |
| application O | |
| from O | |
| accessing O | |
| the O | |
| data O | |
| of O | |
| other O | |
| applications O | |
| without O | |
| rooting O | |
| the O | |
| device O | |
| . O | |
| To O | |
| get O | |
| around O | |
| this O | |
| challenge O | |
| , O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| developers O | |
| added O | |
| some O | |
| new O | |
| features O | |
| to O | |
| steal O | |
| TANs O | |
| using O | |
| screen O | |
| video O | |
| recording O | |
| and O | |
| screen O | |
| data O | |
| scraping O | |
| . O | |
| The O | |
| Root O | |
| of O | |
| All O | |
| ( O | |
| Android B-System | |
| ) O | |
| Evil O | |
| So O | |
| how O | |
| does O | |
| TrickMo B-Malware | |
| get O | |
| around O | |
| these O | |
| security O | |
| features O | |
| ? O | |
| It O | |
| abuses O | |
| accessibility O | |
| services O | |
| . O | |
| Android B-System | |
| β O | |
| s O | |
| accessibility O | |
| services O | |
| were O | |
| originally O | |
| developed O | |
| by O | |
| Google B-Organization | |
| for O | |
| the O | |
| benefit O | |
| of O | |
| users O | |
| with O | |
| disabilities O | |
| . O | |
| Any O | |
| app O | |
| can O | |
| ask O | |
| for O | |
| accessibility O | |
| permissions O | |
| and O | |
| implement O | |
| features O | |
| such O | |
| as O | |
| screen O | |
| reading O | |
| , O | |
| changing O | |
| sizes O | |
| and O | |
| colors O | |
| of O | |
| objects O | |
| , O | |
| hearing O | |
| enhancements O | |
| , O | |
| replacing O | |
| touch O | |
| with O | |
| other O | |
| forms O | |
| of O | |
| control O | |
| and O | |
| more O | |
| . O | |
| In O | |
| recent O | |
| years O | |
| , O | |
| some O | |
| malicious O | |
| Android B-System | |
| applications O | |
| abused O | |
| these O | |
| accessibility O | |
| services O | |
| in O | |
| various O | |
| attack O | |
| scenarios O | |
| . O | |
| Once O | |
| on O | |
| the O | |
| device O | |
| , O | |
| as O | |
| installed O | |
| by O | |
| a O | |
| duped O | |
| user O | |
| , O | |
| the O | |
| TrickMo B-Malware | |
| component O | |
| opens O | |
| and O | |
| sends O | |
| an O | |
| intent O | |
| to O | |
| start O | |
| the O | |
| accessibility O | |
| settings O | |
| activity O | |
| , O | |
| coercing O | |
| the O | |
| user O | |
| to O | |
| grant O | |
| it O | |
| with O | |
| accessibility O | |
| permissions O | |
| . O | |
| Then O | |
| , O | |
| it O | |
| uses O | |
| the O | |
| accessibility O | |
| service O | |
| for O | |
| its O | |
| malicious O | |
| operations O | |
| , O | |
| some O | |
| of O | |
| which O | |
| include O | |
| : O | |
| Preventing O | |
| the O | |
| user O | |
| from O | |
| uninstalling O | |
| the O | |
| app O | |
| Becoming O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| by O | |
| changing O | |
| device O | |
| settings O | |
| Monitoring O | |
| the O | |
| currently O | |
| running O | |
| application O | |
| ( O | |
| s O | |
| ) O | |
| Scraping O | |
| on-screen O | |
| text O | |
| Android B-System | |
| operating O | |
| systems O | |
| include O | |
| many O | |
| dialog O | |
| screens O | |
| that O | |
| require O | |
| the O | |
| denial O | |
| , O | |
| or O | |
| approval O | |
| , O | |
| of O | |
| app O | |
| permissions O | |
| and O | |
| actions O | |
| that O | |
| have O | |
| to O | |
| receive O | |
| input O | |
| from O | |
| the O | |
| user O | |
| by O | |
| tapping O | |
| a O | |
| button O | |
| on O | |
| the O | |
| screen O | |
| . O | |
| TrickMo B-Malware | |
| uses O | |
| accessibility O | |
| services O | |
| to O | |
| identify O | |
| and O | |
| control O | |
| some O | |
| of O | |
| these O | |
| screens O | |
| and O | |
| make O | |
| its O | |
| own O | |
| choices O | |
| before O | |
| giving O | |
| the O | |
| user O | |
| a O | |
| chance O | |
| to O | |
| react O | |
| . O | |
| In O | |
| the O | |
| image O | |
| below O | |
| , O | |
| we O | |
| see O | |
| the O | |
| malware O | |
| function O | |
| that O | |
| detects O | |
| such O | |
| dialogs O | |
| when O | |
| they O | |
| are O | |
| presented O | |
| to O | |
| the O | |
| user O | |
| , O | |
| asking O | |
| them O | |
| to O | |
| tap O | |
| an O | |
| option O | |
| based O | |
| on O | |
| predefined O | |
| choices O | |
| . O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| Persistence O | |
| Capabilities O | |
| When O | |
| it O | |
| comes O | |
| to O | |
| Android-based B-System | |
| devices O | |
| , O | |
| many O | |
| applications O | |
| must O | |
| find O | |
| a O | |
| way O | |
| to O | |
| run O | |
| on O | |
| the O | |
| device O | |
| after O | |
| a O | |
| system O | |
| reboot O | |
| . O | |
| The O | |
| most O | |
| common O | |
| way O | |
| to O | |
| achieve O | |
| this O | |
| is O | |
| by O | |
| creating O | |
| a O | |
| broadcast O | |
| receiver O | |
| that O | |
| is O | |
| registered O | |
| to O | |
| the O | |
| β O | |
| android.intent.action.BOOT_COMPLETED B-Indicator | |
| β O | |
| broadcast O | |
| action O | |
| and O | |
| adding O | |
| code O | |
| that O | |
| boots O | |
| the O | |
| application O | |
| when O | |
| the O | |
| broadcast O | |
| is O | |
| fired O | |
| . O | |
| This O | |
| instruction O | |
| is O | |
| especially O | |
| important O | |
| for O | |
| malware O | |
| that O | |
| tries O | |
| to O | |
| avoid O | |
| user O | |
| interaction O | |
| by O | |
| running O | |
| in O | |
| the O | |
| background O | |
| as O | |
| a O | |
| service O | |
| . O | |
| But O | |
| TrickMo B-Malware | |
| does O | |
| things O | |
| differently O | |
| . O | |
| Instead O | |
| of O | |
| running O | |
| its O | |
| service O | |
| only O | |
| at O | |
| boot O | |
| time O | |
| , O | |
| it O | |
| registers O | |
| a O | |
| receiver O | |
| that O | |
| listens O | |
| to O | |
| the O | |
| β O | |
| android.intent.action.SCREEN_ON B-Indicator | |
| β O | |
| and O | |
| β O | |
| android.provider.Telephony.SMS_DELIVER B-Indicator | |
| β O | |
| broadcast O | |
| actions O | |
| . O | |
| It O | |
| then O | |
| uses O | |
| the O | |
| AlarmManager B-System | |
| to O | |
| set O | |
| a O | |
| pending O | |
| intent O | |
| that O | |
| will O | |
| run O | |
| its O | |
| own O | |
| service O | |
| after O | |
| a O | |
| predefined O | |
| interval O | |
| . O | |
| In O | |
| other O | |
| words O | |
| , O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| service O | |
| will O | |
| start O | |
| either O | |
| after O | |
| the O | |
| device O | |
| becomes O | |
| interactive O | |
| or O | |
| after O | |
| a O | |
| new O | |
| SMS O | |
| message O | |
| is O | |
| received O | |
| . O | |
| Tricky O | |
| Configurations O | |
| TrickMo B-Malware | |
| uses O | |
| the O | |
| shared O | |
| preferences O | |
| mechanism O | |
| to O | |
| store O | |
| settings O | |
| and O | |
| data O | |
| that O | |
| the O | |
| malware O | |
| uses O | |
| at O | |
| runtime O | |
| . O | |
| Some O | |
| of O | |
| the O | |
| settings O | |
| are O | |
| Boolean O | |
| values O | |
| that O | |
| act O | |
| as O | |
| switches O | |
| . O | |
| They O | |
| represent O | |
| features O | |
| and O | |
| can O | |
| be O | |
| turned O | |
| on O | |
| and O | |
| off O | |
| from O | |
| the O | |
| command-and-control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| server O | |
| or O | |
| by O | |
| an O | |
| SMS O | |
| message O | |
| , O | |
| effectively O | |
| instructing O | |
| the O | |
| malware O | |
| to O | |
| execute O | |
| certain O | |
| tasks O | |
| . O | |
| Some O | |
| of O | |
| the O | |
| settings O | |
| include O | |
| : O | |
| The O | |
| URL O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| Service O | |
| wake-up O | |
| intervals O | |
| Important O | |
| package O | |
| names O | |
| Accessibility O | |
| permissions O | |
| status O | |
| Lockdown O | |
| screen O | |
| status O | |
| Recording O | |
| status O | |
| SMS O | |
| app O | |
| status O | |
| Kill O | |
| switch O | |
| status O | |
| Stealth O | |
| To O | |
| keep O | |
| its O | |
| resources O | |
| safer O | |
| and O | |
| make O | |
| analysis O | |
| more O | |
| difficult O | |
| for O | |
| researchers O | |
| , O | |
| TrickMo B-Malware | |
| uses O | |
| an O | |
| obfuscator O | |
| to O | |
| scramble O | |
| the O | |
| names O | |
| of O | |
| its O | |
| functions O | |
| , O | |
| classes O | |
| and O | |
| variables O | |
| . O | |
| A O | |
| TrickMo B-Malware | |
| version O | |
| from O | |
| January O | |
| 2020 O | |
| contained O | |
| code O | |
| that O | |
| checks O | |
| if O | |
| the O | |
| app O | |
| is O | |
| running O | |
| on O | |
| a O | |
| rooted O | |
| device O | |
| or O | |
| an O | |
| emulator O | |
| to O | |
| prevent O | |
| analysis O | |
| . O | |
| As O | |
| an O | |
| example O | |
| , O | |
| in O | |
| the O | |
| two O | |
| images O | |
| below O | |
| , O | |
| we O | |
| can O | |
| see O | |
| the O | |
| encrypted O | |
| and O | |
| decrypted O | |
| shared O | |
| preferences O | |
| file O | |
| , O | |
| which O | |
| is O | |
| encrypted O | |
| using O | |
| the O | |
| java O | |
| β O | |
| PBEWithMD5AndDES O | |
| β O | |
| algorithm O | |
| . O | |
| C O | |
| & O | |
| C O | |
| Communications O | |
| Exfiltrating O | |
| Device O | |
| Data O | |
| To O | |
| communicate O | |
| with O | |
| its O | |
| master O | |
| , O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| code O | |
| contains O | |
| a O | |
| hardcoded O | |
| URL O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| When O | |
| it O | |
| runs O | |
| , O | |
| it O | |
| periodically O | |
| connects O | |
| to O | |
| its O | |
| designated O | |
| server O | |
| via O | |
| an O | |
| unencrypted O | |
| HTTP O | |
| request O | |
| and O | |
| sends O | |
| over O | |
| a O | |
| JSON O | |
| object O | |
| that O | |
| contains O | |
| data O | |
| gleaned O | |
| from O | |
| the O | |
| victim O | |
| β O | |
| s O | |
| phone O | |
| . O | |
| The O | |
| stolen O | |
| parameters O | |
| follow O | |
| : O | |
| ID O | |
| IMSI O | |
| IMEI O | |
| Phone O | |
| number O | |
| Operator O | |
| AID O | |
| Model O | |
| Brand O | |
| Version O | |
| Build O | |
| Battery O | |
| percentage O | |
| Wi-Fi O | |
| connection O | |
| state O | |
| Wake O | |
| time O | |
| Are O | |
| logs O | |
| enabled O | |
| ? O | |
| Is O | |
| the O | |
| malware O | |
| already O | |
| set O | |
| as O | |
| the O | |
| default O | |
| SMS O | |
| application O | |
| ? O | |
| [ O | |
| True/False O | |
| ] O | |
| Signal O | |
| strength O | |
| Screen O | |
| active O | |
| [ O | |
| True/False O | |
| ] O | |
| Orientation O | |
| Was O | |
| accessibility O | |
| permission O | |
| granted O | |
| ? O | |
| [ O | |
| True/False O | |
| ] O | |
| Screen O | |
| size O | |
| List O | |
| of O | |
| the O | |
| installed O | |
| applications O | |
| SMS O | |
| messages O | |
| saved O | |
| on O | |
| the O | |
| device O | |
| It O | |
| is O | |
| not O | |
| uncommon O | |
| for O | |
| banking O | |
| malware O | |
| to O | |
| harvest O | |
| extensive O | |
| amounts O | |
| of O | |
| data O | |
| from O | |
| the O | |
| victim O | |
| β O | |
| s O | |
| device O | |
| . O | |
| The O | |
| collected O | |
| data O | |
| can O | |
| then O | |
| be O | |
| used O | |
| to O | |
| generate O | |
| a O | |
| unique O | |
| identifier O | |
| of O | |
| the O | |
| bot O | |
| or O | |
| for O | |
| monetization O | |
| purposes O | |
| . O | |
| It O | |
| can O | |
| also O | |
| be O | |
| sold O | |
| on O | |
| the O | |
| dark O | |
| web O | |
| and O | |
| used O | |
| in O | |
| various O | |
| spoofing O | |
| attacks O | |
| . O | |
| For O | |
| example O | |
| , O | |
| since O | |
| some O | |
| banks O | |
| use O | |
| anti-fraud O | |
| solutions O | |
| that O | |
| only O | |
| check O | |
| device O | |
| fingerprinting O | |
| , O | |
| fraudsters O | |
| can O | |
| use O | |
| the O | |
| collected O | |
| information O | |
| to O | |
| perform O | |
| fraudulent O | |
| transactions O | |
| from O | |
| a O | |
| device O | |
| that O | |
| mimics O | |
| that O | |
| same O | |
| fingerprint O | |
| . O | |
| Stealing O | |
| and O | |
| Concealing O | |
| SMS O | |
| Messages O | |
| As O | |
| some O | |
| banks O | |
| still O | |
| use O | |
| SMS-based O | |
| transaction O | |
| authorization O | |
| , O | |
| TrickMo B-Malware | |
| is O | |
| configured O | |
| to O | |
| automatically O | |
| steal O | |
| all O | |
| SMS O | |
| messages O | |
| that O | |
| are O | |
| stored O | |
| on O | |
| the O | |
| device O | |
| . O | |
| Once O | |
| in O | |
| a O | |
| while O | |
| , O | |
| it O | |
| sends O | |
| a O | |
| packet O | |
| to O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| containing O | |
| the O | |
| collected O | |
| device O | |
| data O | |
| along O | |
| with O | |
| all O | |
| the O | |
| saved O | |
| SMS O | |
| messages O | |
| . O | |
| Since O | |
| it O | |
| can O | |
| use O | |
| the O | |
| accessibility O | |
| service O | |
| to O | |
| become O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| , O | |
| it O | |
| can O | |
| also O | |
| delete O | |
| the O | |
| SMS O | |
| messages O | |
| so O | |
| only O | |
| the O | |
| attackers O | |
| can O | |
| see O | |
| them O | |
| . O | |
| In O | |
| the O | |
| image O | |
| below O | |
| , O | |
| we O | |
| can O | |
| see O | |
| a O | |
| packet O | |
| that O | |
| was O | |
| sent O | |
| to O | |
| the O | |
| attacker O | |
| β O | |
| s O | |
| C O | |
| & O | |
| C O | |
| containing O | |
| collected O | |
| information O | |
| along O | |
| with O | |
| stolen O | |
| SMS O | |
| data O | |
| . O | |
| A O | |
| Communication O | |
| Channel O | |
| via O | |
| Stolen O | |
| SMS O | |
| In O | |
| addition O | |
| , O | |
| TrickMo B-Malware | |
| has O | |
| an O | |
| automatic O | |
| mechanism O | |
| to O | |
| send O | |
| SMS O | |
| messages O | |
| to O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| In O | |
| some O | |
| cases O | |
| , O | |
| it O | |
| uses O | |
| this O | |
| mechanism O | |
| to O | |
| send O | |
| log O | |
| data O | |
| of O | |
| important O | |
| actions O | |
| . O | |
| It O | |
| can O | |
| save O | |
| an O | |
| SMS O | |
| message O | |
| on O | |
| the O | |
| device O | |
| , O | |
| marking O | |
| with O | |
| β O | |
| internal O | |
| β O | |
| in O | |
| the O | |
| phone O | |
| number O | |
| field O | |
| . O | |
| The O | |
| SMS O | |
| message O | |
| will O | |
| be O | |
| instantly O | |
| sent O | |
| to O | |
| the O | |
| server O | |
| , O | |
| informing O | |
| the O | |
| malware O | |
| operator O | |
| of O | |
| executed O | |
| tasks O | |
| . O | |
| In O | |
| the O | |
| image O | |
| below O | |
| , O | |
| we O | |
| see O | |
| a O | |
| log O | |
| TrickMo B-Malware | |
| sent O | |
| to O | |
| the O | |
| attacker O | |
| upon O | |
| becoming O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| . O | |
| If O | |
| the O | |
| malware O | |
| successfully O | |
| became O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| , O | |
| it O | |
| sends O | |
| the O | |
| words O | |
| β O | |
| the O | |
| app O | |
| has O | |
| been O | |
| replaced O | |
| β O | |
| in O | |
| Russian O | |
| . O | |
| If O | |
| the O | |
| original O | |
| SMS O | |
| app O | |
| has O | |
| been O | |
| restored O | |
| , O | |
| it O | |
| will O | |
| send O | |
| β O | |
| the O | |
| app O | |
| returned O | |
| to O | |
| its O | |
| original O | |
| place. O | |
| β O | |
| Controlling O | |
| TrickMo B-Malware | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| operators O | |
| can O | |
| control O | |
| the O | |
| malware O | |
| via O | |
| two O | |
| channels O | |
| : O | |
| Through O | |
| its O | |
| C O | |
| & O | |
| C O | |
| via O | |
| a O | |
| plaintext O | |
| HTTP O | |
| protocol O | |
| using O | |
| JSON O | |
| objects O | |
| Through O | |
| encrypted O | |
| SMS O | |
| messages O | |
| There O | |
| are O | |
| predefined O | |
| commands O | |
| to O | |
| change O | |
| the O | |
| malware O | |
| β O | |
| s O | |
| configuration O | |
| and O | |
| make O | |
| it O | |
| execute O | |
| certain O | |
| tasks O | |
| . O | |
| Some O | |
| of O | |
| the O | |
| more O | |
| interesting O | |
| commands O | |
| include O | |
| : O | |
| SMS O | |
| Control O | |
| Update O | |
| the O | |
| address O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| β O | |
| SMS O | |
| starting O | |
| with O | |
| β O | |
| http O | |
| : O | |
| // O | |
| β O | |
| Send O | |
| AES-encrypted O | |
| SMS O | |
| message O | |
| back O | |
| to O | |
| sender O | |
| β O | |
| SMS O | |
| starting O | |
| with O | |
| β O | |
| sms O | |
| : O | |
| // O | |
| β O | |
| Update O | |
| service O | |
| wake-up O | |
| interval O | |
| β O | |
| β O | |
| 2 O | |
| β O | |
| Kill O | |
| switch O | |
| β O | |
| β O | |
| 4 O | |
| β O | |
| C O | |
| & O | |
| C O | |
| Control O | |
| Update O | |
| the O | |
| address O | |
| of O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| β O | |
| β O | |
| 1 O | |
| β O | |
| Update O | |
| service O | |
| wake-up O | |
| interval O | |
| β O | |
| β O | |
| 2 O | |
| β O | |
| Lock O | |
| the O | |
| screen O | |
| β O | |
| β O | |
| 5 O | |
| β O | |
| Display O | |
| a O | |
| picture O | |
| in O | |
| a O | |
| WebView O | |
| from O | |
| an O | |
| arbitrary O | |
| URL O | |
| β O | |
| β O | |
| 11 O | |
| β O | |
| Send O | |
| an O | |
| arbitrary O | |
| SMS O | |
| message O | |
| β O | |
| β O | |
| 8 O | |
| β O | |
| Steal O | |
| images O | |
| saved O | |
| on O | |
| the O | |
| device O | |
| β O | |
| β O | |
| 12 O | |
| β O | |
| and O | |
| β O | |
| 13 O | |
| β O | |
| Use O | |
| the O | |
| accessibility O | |
| service O | |
| to O | |
| become O | |
| the O | |
| default O | |
| SMS O | |
| app O | |
| β O | |
| β O | |
| 6 O | |
| β O | |
| Enable O | |
| recording O | |
| of O | |
| other O | |
| apps O | |
| β O | |
| β O | |
| 15 O | |
| β O | |
| Kill O | |
| switch O | |
| β O | |
| β O | |
| 4 O | |
| β O | |
| The O | |
| Lockdown O | |
| Screen O | |
| Most O | |
| thieves O | |
| don O | |
| β O | |
| t O | |
| want O | |
| to O | |
| be O | |
| caught O | |
| red-handed O | |
| as O | |
| they O | |
| steal O | |
| β O | |
| they O | |
| want O | |
| to O | |
| buy O | |
| some O | |
| time O | |
| to O | |
| get O | |
| away O | |
| with O | |
| the O | |
| loot O | |
| . O | |
| The O | |
| same O | |
| is O | |
| true O | |
| for O | |
| banking O | |
| malware O | |
| . O | |
| Desktop O | |
| banking O | |
| malware O | |
| often O | |
| blocks O | |
| the O | |
| user O | |
| β O | |
| s O | |
| access O | |
| to O | |
| their O | |
| banking O | |
| website O | |
| after O | |
| a O | |
| successful O | |
| transaction O | |
| by O | |
| using O | |
| web O | |
| injects O | |
| that O | |
| show O | |
| a O | |
| variety O | |
| of O | |
| β O | |
| service O | |
| unavailable O | |
| β O | |
| screens O | |
| . O | |
| TrickMo B-Malware | |
| is O | |
| no O | |
| different O | |
| ; O | |
| the O | |
| goal O | |
| is O | |
| to O | |
| complete O | |
| the O | |
| operation O | |
| while O | |
| raising O | |
| minimal O | |
| suspicion O | |
| . O | |
| After O | |
| performing O | |
| a O | |
| fraudulent O | |
| action O | |
| , O | |
| stealing O | |
| the O | |
| OTP/mTAN O | |
| , O | |
| TrickMo B-Malware | |
| buys O | |
| some O | |
| time O | |
| by O | |
| activating O | |
| the O | |
| lock O | |
| screen O | |
| and O | |
| preventing O | |
| the O | |
| user O | |
| from O | |
| accessing O | |
| their O | |
| device O | |
| . O | |
| This O | |
| lockdown O | |
| screen O | |
| includes O | |
| two O | |
| parts O | |
| : O | |
| A O | |
| WebView O | |
| containing O | |
| a O | |
| background O | |
| picture O | |
| loaded O | |
| from O | |
| a O | |
| predefined O | |
| URL O | |
| . O | |
| This O | |
| background O | |
| image O | |
| likely O | |
| contains O | |
| a O | |
| fake O | |
| β O | |
| software O | |
| update O | |
| β O | |
| screen O | |
| . O | |
| A O | |
| lockdown O | |
| activity O | |
| , O | |
| which O | |
| is O | |
| a O | |
| transparent O | |
| window O | |
| shown O | |
| at O | |
| the O | |
| top O | |
| of O | |
| the O | |
| screen O | |
| that O | |
| contains O | |
| a O | |
| β O | |
| loading O | |
| β O | |
| cursor O | |
| . O | |
| This O | |
| screen O | |
| persists O | |
| on O | |
| the O | |
| screen O | |
| and O | |
| prevents O | |
| the O | |
| user O | |
| from O | |
| using O | |
| the O | |
| navigation O | |
| buttons O | |
| . O | |
| Due O | |
| to O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| persistence O | |
| implementation O | |
| mentioned O | |
| earlier O | |
| , O | |
| this O | |
| lockdown O | |
| screen O | |
| persists O | |
| after O | |
| a O | |
| restart O | |
| and O | |
| is O | |
| re-initiated O | |
| every O | |
| time O | |
| the O | |
| device O | |
| becomes O | |
| interactive O | |
| . O | |
| In O | |
| some O | |
| cases O | |
| , O | |
| TrickMo B-Malware | |
| may O | |
| use O | |
| this O | |
| feature O | |
| to O | |
| intercept O | |
| SMS O | |
| messages O | |
| without O | |
| the O | |
| knowledge O | |
| of O | |
| the O | |
| user O | |
| by O | |
| activating O | |
| the O | |
| lockdown O | |
| screen O | |
| and O | |
| intercepting O | |
| SMS O | |
| messages O | |
| in O | |
| the O | |
| background O | |
| . O | |
| Application O | |
| Recording O | |
| β O | |
| Stealing O | |
| OTPs O | |
| and O | |
| TANs O | |
| The O | |
| feature O | |
| that O | |
| makes O | |
| TrickMo B-Malware | |
| different O | |
| from O | |
| standard O | |
| SMS O | |
| stealers O | |
| is O | |
| its O | |
| unique O | |
| ability O | |
| to O | |
| record O | |
| the O | |
| screen O | |
| when O | |
| targeted O | |
| apps O | |
| are O | |
| running O | |
| . O | |
| This O | |
| feature O | |
| was O | |
| enabled O | |
| only O | |
| in O | |
| newer O | |
| versions O | |
| of O | |
| TrickMo B-Malware | |
| that O | |
| were O | |
| tailored O | |
| specifically O | |
| for O | |
| German O | |
| banks O | |
| and O | |
| use O | |
| a O | |
| special O | |
| application O | |
| for O | |
| implementing O | |
| TAN-based O | |
| 2FA O | |
| . O | |
| The O | |
| application O | |
| recording O | |
| is O | |
| implemented O | |
| via O | |
| two O | |
| methods O | |
| : O | |
| Using O | |
| the O | |
| Android B-System | |
| MediaRecorder O | |
| class O | |
| to O | |
| capture O | |
| a O | |
| video O | |
| of O | |
| the O | |
| screen O | |
| when O | |
| the O | |
| targeted O | |
| application O | |
| is O | |
| presented O | |
| to O | |
| the O | |
| user O | |
| Using O | |
| the O | |
| accessibility O | |
| service O | |
| to O | |
| save O | |
| a O | |
| text O | |
| file O | |
| containing O | |
| the O | |
| data O | |
| of O | |
| all O | |
| the O | |
| objects O | |
| on O | |
| the O | |
| screen O | |
| Both O | |
| files O | |
| are O | |
| later O | |
| sent O | |
| to O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| of O | |
| the O | |
| attacker O | |
| . O | |
| In O | |
| the O | |
| following O | |
| image O | |
| , O | |
| we O | |
| can O | |
| see O | |
| how O | |
| the O | |
| malware O | |
| receives O | |
| a O | |
| JSON O | |
| object O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| containing O | |
| the O | |
| command O | |
| to O | |
| start O | |
| recording O | |
| , O | |
| the O | |
| targeted O | |
| apps O | |
| and O | |
| the O | |
| recorded O | |
| video O | |
| size O | |
| ratio O | |
| . O | |
| In O | |
| the O | |
| image O | |
| below O | |
| , O | |
| the O | |
| function O | |
| recursively O | |
| collects O | |
| all O | |
| the O | |
| text O | |
| data O | |
| from O | |
| the O | |
| child O | |
| nodes O | |
| of O | |
| each O | |
| accessibility O | |
| node O | |
| . O | |
| In O | |
| other O | |
| words O | |
| , O | |
| it O | |
| goes O | |
| through O | |
| every O | |
| object O | |
| on O | |
| the O | |
| screen O | |
| and O | |
| saves O | |
| its O | |
| text O | |
| data O | |
| . O | |
| A O | |
| TrickMo B-Malware | |
| Kill O | |
| Switch O | |
| One O | |
| of O | |
| the O | |
| most O | |
| interesting O | |
| features O | |
| of O | |
| the O | |
| TrickMo B-Malware | |
| malware I-Malware | |
| is O | |
| having O | |
| its O | |
| own O | |
| kill O | |
| switch O | |
| . O | |
| Kill O | |
| switches O | |
| are O | |
| used O | |
| by O | |
| many O | |
| malware O | |
| authors O | |
| to O | |
| remove O | |
| traces O | |
| from O | |
| a O | |
| device O | |
| after O | |
| a O | |
| successful O | |
| operation O | |
| . O | |
| Since O | |
| TrickMo O | |
| β O | |
| s O | |
| HTTP B-Indicator | |
| traffic O | |
| with O | |
| its O | |
| C O | |
| & O | |
| C O | |
| server O | |
| is O | |
| not O | |
| encrypted O | |
| , O | |
| it O | |
| can O | |
| easily O | |
| be O | |
| tampered O | |
| with O | |
| . O | |
| In O | |
| the O | |
| following O | |
| image O | |
| , O | |
| we O | |
| can O | |
| see O | |
| the O | |
| function O | |
| that O | |
| parses O | |
| the O | |
| commands O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| server O | |
| . O | |
| If O | |
| the O | |
| returned O | |
| JSON O | |
| object O | |
| has O | |
| the O | |
| β O | |
| 4 O | |
| β O | |
| key O | |
| , O | |
| it O | |
| will O | |
| turn O | |
| on O | |
| the O | |
| kill O | |
| switch O | |
| and O | |
| initiate O | |
| its O | |
| own O | |
| removal O | |
| by O | |
| sending O | |
| an O | |
| intent O | |
| and O | |
| seamlessly O | |
| confirming O | |
| the O | |
| uninstall O | |
| using O | |
| the O | |
| accessibility O | |
| service O | |
| , O | |
| all O | |
| without O | |
| the O | |
| victim O | |
| ever O | |
| noticing O | |
| anything O | |
| . O | |
| The O | |
| kill O | |
| switch O | |
| can O | |
| also O | |
| be O | |
| turned O | |
| on O | |
| by O | |
| SMS O | |
| . O | |
| This O | |
| is O | |
| a O | |
| bit O | |
| more O | |
| complicated O | |
| since O | |
| the O | |
| SMS O | |
| commands O | |
| are O | |
| encrypted O | |
| and O | |
| encoded O | |
| with O | |
| base64 O | |
| . O | |
| The O | |
| encryption O | |
| algorithm O | |
| used O | |
| is O | |
| RSA O | |
| , O | |
| and O | |
| interestingly O | |
| , O | |
| the O | |
| authors O | |
| chose O | |
| to O | |
| use O | |
| the O | |
| private O | |
| key O | |
| for O | |
| decryption O | |
| and O | |
| leave O | |
| it O | |
| in O | |
| the O | |
| code O | |
| as O | |
| a O | |
| hardcoded O | |
| string O | |
| . O | |
| The O | |
| image O | |
| below O | |
| shows O | |
| the O | |
| function O | |
| that O | |
| parses O | |
| the O | |
| SMS O | |
| messages O | |
| , O | |
| decrypts O | |
| them O | |
| using O | |
| the O | |
| hardcoded O | |
| RSA O | |
| private O | |
| key O | |
| and O | |
| executes O | |
| the O | |
| commands O | |
| . O | |
| Having O | |
| analyzed O | |
| a O | |
| few O | |
| variants O | |
| of O | |
| the O | |
| malware O | |
| , O | |
| we O | |
| noticed O | |
| that O | |
| the O | |
| private O | |
| key O | |
| was O | |
| exposed O | |
| in O | |
| the O | |
| code O | |
| and O | |
| did O | |
| not O | |
| change O | |
| . O | |
| Therefore O | |
| , O | |
| our O | |
| team O | |
| managed O | |
| to O | |
| generate O | |
| the O | |
| public O | |
| key O | |
| and O | |
| craft O | |
| an O | |
| SMS O | |
| message O | |
| that O | |
| activated O | |
| the O | |
| kill O | |
| switch O | |
| . O | |
| This O | |
| means O | |
| that O | |
| the O | |
| malware O | |
| can O | |
| be O | |
| remotely O | |
| eliminated O | |
| by O | |
| an O | |
| SMS O | |
| message O | |
| . O | |
| Our O | |
| team O | |
| was O | |
| also O | |
| able O | |
| to O | |
| test O | |
| other O | |
| commands O | |
| in O | |
| the O | |
| lab O | |
| either O | |
| by O | |
| tampering O | |
| with O | |
| the O | |
| HTTP O | |
| traffic O | |
| from O | |
| the O | |
| C O | |
| & O | |
| C O | |
| or O | |
| by O | |
| sending O | |
| crafted O | |
| SMS O | |
| messages O | |
| . O | |
| Suspect O | |
| You O | |
| β O | |
| re O | |
| Infected O | |
| ? O | |
| The O | |
| following O | |
| SMS O | |
| message O | |
| can O | |
| be O | |
| used O | |
| to O | |
| kill O | |
| the O | |
| sample O | |
| analyzed O | |
| in O | |
| this O | |
| research O | |
| and O | |
| all O | |
| other O | |
| variants O | |
| that O | |
| use O | |
| the O | |
| same O | |
| private O | |
| key O | |
| : O | |
| HrLbpr3x/htAVnAgYepBuH2xmFDb68TYTt7FwGn0ddGlQJv/hqsctL57ocFU0Oz3L+uhLcOGG7GVBAfHKL1TBQ== O | |
| Sending O | |
| this O | |
| SMS O | |
| will O | |
| trigger O | |
| TrickMo B-Malware | |
| β O | |
| s O | |
| kill O | |
| switch O | |
| by O | |
| sending O | |
| the O | |
| string O | |
| β O | |
| 4 O | |
| β O | |
| encrypted O | |
| with O | |
| the O | |
| generated O | |
| RSA O | |
| public O | |
| key O | |
| and O | |
| base64 O | |
| encoded O | |
| . O | |
| Indicators O | |
| of O | |
| Compromise O | |
| ( O | |
| IoCs O | |
| ) O | |
| hxxp B-Indicator | |
| : I-Indicator | |
| //mcsoft365.com/c I-Indicator | |
| hxxp I-Indicator | |
| : I-Indicator | |
| //pingconnect.net/c I-Indicator | |
| Hashes O | |
| MD5 O | |
| : O | |
| 5c749c9fce8c41bf6bcc9bd8a691621b B-Indicator | |
| SHA256 O | |
| : O | |
| 284bd2d16092b4d13b6bc85d87950eb4c5e8cbba9af2a04d76d88da2f26c485c B-Indicator | |
| MD5 O | |
| : O | |
| b264af5d2f3390e465052ab502b0726d B-Indicator | |
| SHA256 O | |
| : O | |
| 8ab1712ce9ca2d7952ab763d8a4872aa6a278c3f60dc13e0aebe59f50e6e30f6 B-Indicator | |
| The O | |
| TrickMo B-Malware | |
| Factor O | |
| The O | |
| TrickBot B-Malware | |
| Trojan I-Malware | |
| was O | |
| one O | |
| of O | |
| the O | |
| most O | |
| active O | |
| banking O | |
| malware O | |
| strains O | |
| in O | |
| the O | |
| cybercrime O | |
| arena O | |
| in O | |
| 2019 O | |
| . O | |
| From O | |
| our O | |
| analysis O | |
| , O | |
| it O | |
| is O | |
| apparent O | |
| that O | |
| TrickMo B-Malware | |
| is O | |
| designed O | |
| to O | |
| help O | |
| TrickBot B-Malware | |
| break O | |
| the O | |
| most O | |
| recent O | |
| methods O | |
| of O | |
| TAN-based O | |
| authentication O | |
| . O | |
| One O | |
| of O | |
| the O | |
| most O | |
| significant O | |
| features O | |
| TrickMo B-Malware | |
| possesses O | |
| is O | |
| the O | |
| app O | |
| recording O | |
| feature O | |
| , O | |
| which O | |
| is O | |
| what O | |
| gives O | |
| TrickBot B-Malware | |
| the O | |
| ability O | |
| to O | |
| overcome O | |
| the O | |
| newer O | |
| pushTAN O | |
| app O | |
| validations O | |
| deployed O | |
| by O | |
| banks O | |
| . O | |
| SimBad B-Malware | |
| : O | |
| A O | |
| Rogue O | |
| Adware O | |
| Campaign O | |
| On O | |
| Google B-System | |
| Play I-System | |
| March O | |
| 13 O | |
| , O | |
| 2019 O | |
| Check B-Organization | |
| Point I-Organization | |
| researchers O | |
| from O | |
| the O | |
| Mobile O | |
| Threat O | |
| Team O | |
| have O | |
| discovered O | |
| a O | |
| new O | |
| adware O | |
| campaign O | |
| on O | |
| the O | |
| Google B-System | |
| Play I-System | |
| Store I-System | |
| . O | |
| This O | |
| particular O | |
| strain O | |
| of O | |
| Adware O | |
| was O | |
| found O | |
| in O | |
| 206 O | |
| applications O | |
| , O | |
| and O | |
| the O | |
| combined O | |
| download O | |
| count O | |
| has O | |
| reached O | |
| almost O | |
| 150 O | |
| million O | |
| . O | |
| Google B-Organization | |
| was O | |
| swiftly O | |
| notified O | |
| and O | |
| removed O | |
| the O | |
| infected O | |
| applications O | |
| from O | |
| the O | |
| Google B-System | |
| Play I-System | |
| Store O | |
| . O | |
| Inside O | |
| the O | |
| SDK O | |
| The O | |
| malware O | |
| resides O | |
| within O | |
| the O | |
| β O | |
| RXDrioder O | |
| β O | |
| Software O | |
| Development O | |
| Kit O | |
| ( O | |
| SDK O | |
| ) O | |
| , O | |
| which O | |
| is O | |
| provided O | |
| by O | |
| β O | |
| addroider B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| β O | |
| as O | |
| an O | |
| ad-related O | |
| SDK O | |
| . O | |
| We O | |
| believe O | |
| the O | |
| developers O | |
| were O | |
| scammed O | |
| to O | |
| use O | |
| this O | |
| malicious O | |
| SDK O | |
| , O | |
| unaware O | |
| of O | |
| its O | |
| content O | |
| , O | |
| leading O | |
| to O | |
| the O | |
| fact O | |
| that O | |
| this O | |
| campaign O | |
| was O | |
| not O | |
| targeting O | |
| a O | |
| specific O | |
| county O | |
| or O | |
| developed O | |
| by O | |
| the O | |
| same O | |
| developer O | |
| . O | |
| The O | |
| malware O | |
| has O | |
| been O | |
| dubbed O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| due O | |
| to O | |
| the O | |
| fact O | |
| that O | |
| a O | |
| large O | |
| portion O | |
| of O | |
| the O | |
| infected O | |
| applications O | |
| are O | |
| simulator O | |
| games O | |
| . O | |
| The O | |
| Infection O | |
| Chain O | |
| Once O | |
| the O | |
| user O | |
| downloads O | |
| and O | |
| installs O | |
| one O | |
| of O | |
| the O | |
| infected O | |
| applications O | |
| , O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| registers O | |
| itself O | |
| to O | |
| the O | |
| β O | |
| BOOT_COMPLETE O | |
| β O | |
| and O | |
| β O | |
| USER_PRESENT O | |
| β O | |
| intents O | |
| , O | |
| which O | |
| lets O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| to O | |
| perform O | |
| actions O | |
| after O | |
| the O | |
| device O | |
| has O | |
| finished O | |
| booting O | |
| and O | |
| while O | |
| the O | |
| user O | |
| is O | |
| using O | |
| his O | |
| device O | |
| respectively O | |
| . O | |
| After O | |
| installation O | |
| , O | |
| the O | |
| malware O | |
| connects O | |
| to O | |
| the O | |
| designated O | |
| Command O | |
| and O | |
| Control O | |
| ( O | |
| C O | |
| & O | |
| C O | |
| ) O | |
| server O | |
| , O | |
| and O | |
| receives O | |
| a O | |
| command O | |
| to O | |
| perform O | |
| . O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| comes O | |
| with O | |
| a O | |
| respected O | |
| list O | |
| of O | |
| capabilities O | |
| on O | |
| the O | |
| user O | |
| β O | |
| s O | |
| device O | |
| , O | |
| such O | |
| as O | |
| removing O | |
| the O | |
| icon O | |
| from O | |
| the O | |
| launcher O | |
| , O | |
| thus O | |
| making O | |
| it O | |
| harder O | |
| for O | |
| the O | |
| user O | |
| to O | |
| uninstall O | |
| , O | |
| start O | |
| to O | |
| display O | |
| background O | |
| ads O | |
| and O | |
| open O | |
| a O | |
| browser O | |
| with O | |
| a O | |
| given O | |
| URL O | |
| . O | |
| What O | |
| Does O | |
| SimBad B-Malware | |
| Do O | |
| ? O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| has O | |
| capabilities O | |
| that O | |
| can O | |
| be O | |
| divided O | |
| into O | |
| three O | |
| groups O | |
| β O | |
| Show O | |
| Ads O | |
| , O | |
| Phishing O | |
| , O | |
| and O | |
| Exposure O | |
| to O | |
| other O | |
| applications O | |
| . O | |
| With O | |
| the O | |
| capability O | |
| to O | |
| open O | |
| a O | |
| given O | |
| URL O | |
| in O | |
| a O | |
| browser O | |
| , O | |
| the O | |
| actor O | |
| behind O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| can O | |
| generate O | |
| phishing O | |
| pages O | |
| for O | |
| multiple O | |
| platforms O | |
| and O | |
| open O | |
| them O | |
| in O | |
| a O | |
| browser O | |
| , O | |
| thus O | |
| performing O | |
| spear-phishing O | |
| attacks O | |
| on O | |
| the O | |
| user O | |
| . O | |
| With O | |
| the O | |
| capability O | |
| to O | |
| open O | |
| market O | |
| applications O | |
| , O | |
| such O | |
| as O | |
| Google B-System | |
| Play I-System | |
| and O | |
| 9Apps B-System | |
| , O | |
| with O | |
| a O | |
| specific O | |
| keyword O | |
| search O | |
| or O | |
| even O | |
| a O | |
| single O | |
| application O | |
| β O | |
| s O | |
| page O | |
| , O | |
| the O | |
| actor O | |
| can O | |
| gain O | |
| exposure O | |
| for O | |
| other O | |
| threat O | |
| actors O | |
| and O | |
| increase O | |
| his O | |
| profits O | |
| . O | |
| The O | |
| actor O | |
| can O | |
| even O | |
| take O | |
| his O | |
| malicious O | |
| activities O | |
| to O | |
| the O | |
| next O | |
| level O | |
| by O | |
| installing O | |
| a O | |
| remote O | |
| application O | |
| from O | |
| a O | |
| designated O | |
| server O | |
| , O | |
| thus O | |
| allowing O | |
| him O | |
| to O | |
| install O | |
| new O | |
| malware O | |
| once O | |
| it O | |
| is O | |
| required O | |
| . O | |
| The O | |
| C O | |
| & O | |
| C O | |
| server O | |
| observed O | |
| in O | |
| this O | |
| campaign O | |
| is O | |
| β O | |
| www B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| addroider.com I-Indicator | |
| β O | |
| . O | |
| This O | |
| server O | |
| runs O | |
| an O | |
| instance O | |
| of O | |
| β O | |
| Parse O | |
| Server O | |
| β O | |
| ( O | |
| source O | |
| on O | |
| GitHub B-Organization | |
| ) O | |
| , O | |
| an O | |
| open O | |
| source O | |
| version O | |
| of O | |
| the O | |
| Parse O | |
| Backend O | |
| infrastructure O | |
| , O | |
| which O | |
| is O | |
| a O | |
| model O | |
| for O | |
| providing O | |
| web O | |
| app O | |
| and O | |
| mobile O | |
| app O | |
| developers O | |
| with O | |
| a O | |
| way O | |
| to O | |
| link O | |
| their O | |
| applications O | |
| to O | |
| backend O | |
| cloud O | |
| storage O | |
| and O | |
| APIs O | |
| exposed O | |
| by O | |
| back-end O | |
| applications O | |
| , O | |
| while O | |
| also O | |
| providing O | |
| features O | |
| such O | |
| as O | |
| user O | |
| management O | |
| , O | |
| push O | |
| notifications O | |
| and O | |
| more O | |
| . O | |
| The O | |
| domain O | |
| β O | |
| addroider B-Indicator | |
| [ I-Indicator | |
| . I-Indicator | |
| ] I-Indicator | |
| com I-Indicator | |
| β O | |
| was O | |
| registered O | |
| via O | |
| GoDaddy B-Organization | |
| , O | |
| and O | |
| uses O | |
| privacy O | |
| protection O | |
| service O | |
| . O | |
| While O | |
| accessing O | |
| the O | |
| domain O | |
| from O | |
| a O | |
| browser O | |
| you O | |
| get O | |
| a O | |
| login O | |
| page O | |
| very O | |
| similar O | |
| to O | |
| other O | |
| malware O | |
| panels O | |
| . O | |
| The O | |
| β O | |
| Register O | |
| β O | |
| and O | |
| β O | |
| Sign O | |
| Up O | |
| β O | |
| links O | |
| are O | |
| broken O | |
| and O | |
| β O | |
| redirects O | |
| β O | |
| the O | |
| user O | |
| back O | |
| to O | |
| the O | |
| login O | |
| page O | |
| . O | |
| According O | |
| to O | |
| RiskIQ B-System | |
| β O | |
| s O | |
| PassiveTotal O | |
| , O | |
| the O | |
| domain O | |
| expired O | |
| 7 O | |
| months O | |
| ago O | |
| . O | |
| As O | |
| a O | |
| result O | |
| , O | |
| it O | |
| may O | |
| be O | |
| that O | |
| are O | |
| looking O | |
| into O | |
| a O | |
| compromised O | |
| , O | |
| parked O | |
| domain O | |
| that O | |
| was O | |
| initially O | |
| used O | |
| legitimately O | |
| , O | |
| but O | |
| is O | |
| now O | |
| participating O | |
| in O | |
| malicious O | |
| activities O | |
| . O | |
| With O | |
| the O | |
| capabilities O | |
| of O | |
| showing O | |
| out-of-scope O | |
| ads O | |
| , O | |
| exposing O | |
| the O | |
| user O | |
| to O | |
| other O | |
| applications O | |
| , O | |
| and O | |
| opening O | |
| a O | |
| URL O | |
| in O | |
| a O | |
| browser O | |
| , O | |
| β O | |
| SimBad B-Malware | |
| β O | |
| acts O | |
| now O | |
| as O | |
| an O | |
| Adware O | |
| , O | |
| but O | |
| already O | |
| has O | |
| the O | |
| infrastructure O | |
| to O | |
| evolve O | |
| into O | |
| a O | |
| much O | |
| larger O | |
| threat O | |
| . O | |