Bonusmain / valid.txt
rizamatya's picture
Upload 3 files
f24f1ea
raw
history blame
164 kB
Riltok B-Malware
mobile O
Trojan O
: O
A O
banker O
with O
global O
reach O
25 O
JUN O
2019 O
Riltok B-Malware
is O
one O
of O
numerous O
families O
of O
mobile O
banking O
Trojans O
with O
standard O
( O
for O
such O
malware O
) O
functions O
and O
distribution O
methods O
. O
Originally O
intended O
to O
target O
the O
Russian O
audience O
, O
the O
banker O
was O
later O
adapted O
, O
with O
minimal O
modifications O
, O
for O
the O
European O
β€œ O
market. O
” O
The O
bulk O
of O
its O
victims O
( O
more O
than O
90 O
% O
) O
reside O
in O
Russia O
, O
with O
France O
in O
second O
place O
( O
4 O
% O
) O
. O
Third O
place O
is O
shared O
by O
Italy O
, O
Ukraine O
, O
and O
the O
United O
Kingdom O
. O
We O
first O
detected O
members O
of O
this O
family O
back O
in O
March O
2018 O
. O
Like O
many O
other O
bankers O
, O
they O
were O
disguised O
as O
apps O
for O
popular O
free O
ad O
services O
in O
Russia O
. O
The O
malware O
was O
distributed O
from O
infected O
devices O
via O
SMS O
in O
the O
form O
β€œ O
% O
USERNAME O
% O
, O
I O
’ O
ll O
buy O
under O
a O
secure O
transaction O
. O
youlabuy B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
ru/7 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
3 I-Indicator
” O
or O
β€œ O
% O
USERNAME O
% O
, O
accept O
25,000 O
on O
Youla O
youla-protect B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
ru/4 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
7 I-Indicator
” O
, O
containing O
a O
link O
to O
download O
the O
Trojan O
. O
Other O
samples O
were O
also O
noticed O
, O
posing O
as O
a O
client O
of O
a O
ticket-finding O
service O
or O
as O
an O
app O
store O
for O
Android B-System
. O
It O
was O
late O
2018 O
when O
Riltok B-Malware
climbed O
onto O
the O
international O
stage O
. O
The O
cybercriminals O
behind O
it O
kept O
the O
same O
masking O
and O
distribution O
methods O
, O
using O
names O
and O
icons O
imitating O
those O
of O
popular O
free O
ad O
services O
. O
In O
November O
2018 O
, O
a O
version O
of O
the O
Trojan O
for O
the O
English O
market O
appeared O
in O
the O
shape O
of O
Gumtree.apk B-Indicator
. O
The O
SMS O
message O
with O
a O
link O
to O
a O
banker O
looked O
as O
follows O
: O
β€œ O
% O
USERNAME O
% O
, O
i O
send O
you O
prepayment O
gumtree B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
cc/3 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
1 I-Indicator
” O
. O
Italian O
( O
Subito.apk B-Indicator
) O
and O
French O
( O
Leboncoin.apk B-Indicator
) O
versions O
appeared O
shortly O
afterwards O
in O
January O
2019 O
. O
The O
messages O
looked O
as O
follows O
: O
β€œ O
% O
USERNAME O
% O
, O
ti O
ho O
inviato O
il O
soldi O
sul O
subito O
subito-a B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
pw/6 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
5 I-Indicator
” O
( O
It O
. O
) O
β€œ O
% O
USERNAME O
% O
, O
ti O
ho O
inviato O
il O
pagamento O
subitop B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
pw/4 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
7 I-Indicator
” O
( O
It O
. O
) O
β€œ O
% O
USERNAME O
% O
, O
je O
vous O
ai O
envoyΓ© O
un O
prepaiement O
m-leboncoin B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
top/7 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
3 I-Indicator
” O
( O
Fr O
. O
) O
β€œ O
% O
USERNAME O
% O
, O
j O
’ O
ai O
fait O
l O
’ O
avance O
( O
suivi O
d O
’ O
un O
lien O
) O
: O
leboncoin-le B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/8 I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
* I-Indicator
9 I-Indicator
” O
( O
Fr O
. O
) O
Let O
’ O
s O
take O
a O
more O
detailed O
look O
at O
how O
this O
banking O
Trojan O
works O
. O
Infection O
The O
user O
receives O
an O
SMS O
with O
a O
malicious O
link O
pointing O
to O
a O
fake O
website O
simulating O
a O
popular O
free O
ad O
service O
. O
There O
, O
they O
are O
prompted O
to O
download O
a O
new O
version O
of O
the O
mobile O
app O
, O
under O
which O
guise O
the O
Trojan O
is O
hidden O
. O
To O
be O
installed O
, O
it O
needs O
the O
victim O
to O
allow O
installation O
of O
apps O
from O
unknown O
sources O
in O
the O
device O
settings O
. O
During O
installation O
, O
Riltok B-Malware
asks O
the O
user O
for O
permission O
to O
use O
special O
features O
in O
AccessibilityService O
by O
displaying O
a O
fake O
warning O
: O
If O
the O
user O
ignores O
or O
declines O
the O
request O
, O
the O
window O
keeps O
opening O
ad O
infinitum O
. O
After O
obtaining O
the O
desired O
rights O
, O
the O
Trojan O
sets O
itself O
as O
the O
default O
SMS O
app O
( O
by O
independently O
clicking O
Yes O
in O
AccessibilityService O
) O
, O
before O
vanishing O
from O
the O
device O
screen O
. O
After O
enabling O
AccessibilityService O
, O
the O
malware O
sets O
itself O
as O
the O
default O
SMS O
app O
Now O
installed O
and O
having O
obtained O
the O
necessary O
permissions O
from O
the O
user O
, O
Riltok B-Malware
contacts O
its O
C O
& O
C O
server O
. O
In O
later O
versions O
, O
when O
it O
starts O
, O
the O
Trojan O
additionally O
opens O
a O
phishing O
site O
in O
the O
browser O
that O
simulates O
a O
free O
ad O
service O
so O
as O
to O
dupe O
the O
user O
into O
entering O
their O
login O
credentials O
and O
bank O
card O
details O
. O
The O
entered O
data O
is O
forwarded O
to O
the O
cybercriminals O
. O
Phishing O
page O
from O
the O
French O
version O
of O
the O
Trojan O
Communication O
with O
C O
& O
C O
Riltok B-Malware
actively O
communicates O
with O
its O
C O
& O
C O
server O
. O
First O
off O
, O
it O
registers O
the O
infected O
device O
in O
the O
administrative O
panel O
by O
sending O
a O
GET O
request O
to O
the O
relative O
address O
gate.php B-Indicator
( O
in O
later O
versions O
gating.php B-Indicator
) O
with O
the O
ID O
( O
device O
identifier O
generated O
by O
the O
setPsuedoID O
function O
in O
a O
pseudo-random O
way O
based O
on O
the O
device O
IMEI O
) O
and O
screen O
( O
shows O
if O
the O
device O
is O
active O
, O
possible O
values O
are O
β€œ O
on O
” O
, O
β€œ O
off O
” O
, O
β€œ O
none O
” O
) O
parameters O
. O
Then O
, O
using O
POST O
requests O
to O
the O
relative O
address O
report.php B-Indicator
, O
it O
sends O
data O
about O
the O
device O
( O
IMEI O
, O
phone O
number O
, O
country O
, O
mobile O
operator O
, O
phone O
model O
, O
availability O
of O
root O
rights O
, O
OS O
version O
) O
, O
list O
of O
contacts O
, O
list O
of O
installed O
apps O
, O
incoming O
SMS O
, O
and O
other O
information O
. O
From O
the O
server O
, O
the O
Trojan O
receives O
commands O
( O
for O
example O
, O
to O
send O
SMS O
) O
and O
changes O
in O
the O
configuration O
. O
Trojan O
anatomy O
The O
family O
was O
named O
Riltok B-Malware
after O
the O
librealtalk-jni.so B-Indicator
library O
contained O
in O
the O
APK O
file O
of O
the O
Trojan O
. O
The O
library O
includes O
such O
operations O
as O
: O
Get O
address O
of O
cybercriminal O
C O
& O
C O
server O
Get O
configuration O
file O
with O
web O
injects O
from O
C O
& O
C O
, O
as O
well O
as O
default O
list O
of O
injects O
Scan O
for O
app O
package O
names O
that O
generated O
AccessibilityEvent O
events O
in O
the O
list O
of O
known O
banking/antivirus/other O
popular O
apps O
Set O
malware O
as O
default O
SMS O
app O
Get O
address O
of O
the O
phishing O
page O
that O
opens O
when O
the O
app O
runs O
, O
and O
others O
getStartWebUrl O
function O
– O
get O
address O
of O
phishing O
page O
The O
configuration O
file O
contains O
a O
list O
of O
injects O
for O
mobile O
banking O
apps O
– O
links O
to O
phishing O
pages O
matching O
the O
mobile O
banking O
app O
used O
by O
the O
user O
. O
In O
most O
so-called O
Western O
versions O
of O
the O
Trojan O
, O
the O
package O
names O
in O
the O
default O
configuration O
file O
are O
erased O
. O
Sample O
configuration O
file O
of O
the O
Trojan O
Through O
AccessibilityService O
, O
the O
malware O
monitors O
AccessibilityEvent O
events O
. O
Depending O
on O
which O
app O
( O
package O
name O
) O
generated O
the O
event O
, O
Riltok B-Malware
can O
: O
Open O
a O
fake O
Google B-System
Play I-System
screen O
requesting O
bank O
card O
details O
Open O
a O
fake O
screen O
or O
phishing O
page O
in O
a O
browser O
( O
inject O
) O
mimicking O
the O
screen O
of O
the O
relevant O
mobile O
banking O
app O
and O
requesting O
user/bank O
card O
details O
Minimize O
the O
app O
( O
for O
example O
, O
antivirus O
applications O
or O
device O
security O
settings O
) O
Additionally O
, O
the O
Trojan O
can O
hide O
notifications O
from O
certain O
banking O
apps O
. O
List O
of O
package O
names O
of O
apps O
on O
events O
from O
which O
the O
Trojan O
opens O
a O
fake O
Google B-System
Play I-System
window O
( O
for O
the O
Russian O
version O
of O
the O
Trojan O
) O
Example O
of O
Trojan O
screen O
overlapping O
other O
apps O
When O
bank O
card O
details O
are O
entered O
in O
the O
fake O
window O
, O
Riltok O
performs O
basic O
validation O
checks O
: O
card O
validity O
period O
, O
number O
checksum O
, O
CVC O
length O
, O
whether O
the O
number O
is O
in O
the O
denylist O
sewn O
into O
the O
Trojan O
code O
: O
Examples O
of O
phishing O
pages O
imitating O
mobile O
banks O
At O
the O
time O
of O
writing O
, O
the O
functionality O
of O
most O
of O
the O
Western O
versions O
of O
Riltok O
was O
somewhat O
pared O
down O
compared O
to O
the O
Russian O
one O
. O
For O
example O
, O
the O
default O
configuration O
file O
with O
injects O
is O
non-operational O
, O
and O
the O
malware O
contains O
no O
fake O
built-in O
windows O
requesting O
bank O
card O
details O
. O
Conclusion O
Threats O
are O
better O
prevented O
than O
cured O
, O
so O
do O
not O
follow O
suspicious O
links O
in O
SMS O
, O
and O
be O
sure O
to O
install O
apps O
only O
from O
official O
sources O
and O
check O
what O
permissions O
you O
are O
granting O
during O
installation O
. O
As O
Riltok B-Malware
shows O
, O
cybercriminals O
can O
apply O
the O
same O
methods O
of O
infection O
to O
victims O
in O
different O
countries O
with O
more O
or O
less O
the O
same O
success O
. O
Kaspersky B-Organization
products O
detect O
the O
above-described O
threat O
with O
the O
verdict O
Trojan-Banker.AndroidOS.Riltok B-Indicator
. O
IoCs O
C O
& O
C O
100.51.100.00 B-Indicator
108.62.118.131 B-Indicator
172.81.134.165 B-Indicator
172.86.120.207 B-Indicator
185.212.128.152 B-Indicator
185.212.128.192 B-Indicator
185.61.000.108 B-Indicator
185.61.138.108 B-Indicator
185.61.138.37 B-Indicator
188.209.52.101 B-Indicator
5.206.225.57 B-Indicator
alr992.date B-Indicator
avito-app.pw B-Indicator
backfround2.pw B-Indicator
background1.xyz B-Indicator
blacksolider93.com B-Indicator
blass9g087.com B-Indicator
brekelter2.com B-Indicator
broplar3hf.xyz B-Indicator
buy-youla.ru B-Indicator
cd78cg210xy0.com B-Indicator
copsoiteess.com B-Indicator
farmatefc93.org B-Indicator
firstclinsop.com B-Indicator
holebrhuhh3.com B-Indicator
holebrhuhh45.com B-Indicator
karambga3j.net B-Indicator
le22999a.pw B-Indicator
leboncoin-bk.top B-Indicator
leboncoin-buy.pw B-Indicator
leboncoin-cz.info B-Indicator
leboncoin-f.pw B-Indicator
leboncoin-jp.info B-Indicator
leboncoin-kp.top B-Indicator
leboncoin-ny.info B-Indicator
leboncoin-ql.top B-Indicator
leboncoin-tr.info B-Indicator
myyoula.ru B-Indicator
sell-avito.ru B-Indicator
sell-youla.ru B-Indicator
sentel8ju67.com B-Indicator
subito-li.pw B-Indicator
subitop.pw B-Indicator
web-gumtree.com B-Indicator
whitehousejosh.com B-Indicator
whitekalgoy3.com B-Indicator
youlaprotect.ru B-Indicator
Examples O
of O
malware O
0497b6000a7a23e9e9b97472bc2d3799caf49cbbea1627ad4d87ae6e0b7e2a98 B-Indicator
417fc112cd0610cc8c402742b0baab0a086b5c4164230009e11d34fdeee7d3fa B-Indicator
54594edbe9055517da2836199600f682dee07e6b405c6fe4b476627e8d184bfe B-Indicator
6e995d68c724f121d43ec2ff59bc4e536192360afa3beaec5646f01094f0b745 B-Indicator
bbc268ca63eeb27e424fec1b3976bab550da304de18e29faff94d9057b1fa25a B-Indicator
dc3dd9d75120934333496d0a4100252b419ee8fcdab5d74cf343bcb0306c9811 B-Indicator
e3f77ff093f322e139940b33994c5a57ae010b66668668dc4945142a81bcc049 B-Indicator
ebd0a8043434edac261cb25b94f417188a5c0d62b5dd4033f156b890d150a4c5 B-Indicator
f51a27163cb0ddd08caa29d865b9f238848118ba2589626af711330481b352df B-Indicator
Tracking O
down O
the O
developer O
of O
Android B-System
adware O
affecting O
millions O
of O
users O
24 O
Oct O
2019 O
- O
11:30AM O
We O
detected O
a O
large O
adware O
campaign O
running O
for O
about O
a O
year O
, O
with O
the O
involved O
apps O
installed O
eight O
million O
times O
from O
Google B-System
Play I-System
alone O
. O
We O
identified O
42 O
apps O
on O
Google B-System
Play I-System
as O
belonging O
to O
the O
campaign O
, O
which O
had O
been O
running O
since O
July O
2018 O
. O
Of O
those O
, O
21 O
were O
still O
available O
at O
the O
time O
of O
discovery O
. O
We O
reported O
the O
apps O
to O
the O
Google O
security O
team O
and O
they O
were O
swiftly O
removed O
. O
However O
, O
the O
apps O
are O
still O
available O
in O
third-party O
app O
stores O
. O
ESET B-Organization
detects O
this O
adware O
, O
collectively O
, O
as O
Android/AdDisplay.Ashas B-Malware
. O
Figure O
1 O
. O
Apps O
of O
the O
Android/AdDisplay.Ashas B-Malware
family O
reported O
to O
Google O
by O
ESET B-Organization
Figure O
2 O
. O
The O
most O
popular O
member O
of O
the O
Android/AdDisplay.Ashas B-Malware
family I-Malware
on O
Google B-System
Play I-System
was O
β€œ O
Video O
downloader O
master O
” O
with O
over O
five O
million O
downloads O
Ashas B-Malware
functionality O
All O
the O
apps O
provide O
the O
functionality O
they O
promise O
, O
besides O
working O
as O
adware O
. O
The O
adware O
functionality O
is O
the O
same O
in O
all O
the O
apps O
we O
analyzed O
. O
[ O
Note O
: O
The O
analysis O
of O
the O
functionality O
below O
describes O
a O
single O
app O
, O
but O
applies O
to O
all O
apps O
of O
the O
Android/AdDisplay.Ashas B-Malware
family I-Malware
. O
] O
Once O
launched O
, O
the O
app O
starts O
to O
communicate O
with O
its O
C O
& O
C O
server O
( O
whose O
IP O
address O
is O
base64-encoded O
in O
the O
app O
) O
. O
It O
sends O
β€œ O
home O
” O
key O
data O
about O
the O
affected O
device O
: O
device O
type O
, O
OS O
version O
, O
language O
, O
number O
of O
installed O
apps O
, O
free O
storage O
space O
, O
battery O
status O
, O
whether O
the O
device O
is O
rooted O
and O
Developer O
mode O
enabled O
, O
and O
whether O
Facebook B-Organization
and O
FB O
Messenger B-System
are O
installed O
. O
Figure O
3 O
. O
Sending O
information O
about O
the O
affected O
device O
The O
app O
receives O
configuration O
data O
from O
the O
C O
& O
C O
server O
, O
needed O
for O
displaying O
ads O
, O
and O
for O
stealth O
and O
resilience O
. O
Figure O
4 O
. O
Configuration O
file O
received O
from O
the O
C O
& O
C O
server O
As O
for O
stealth O
and O
resilience O
, O
the O
attacker O
uses O
a O
number O
of O
tricks O
. O
First O
, O
the O
malicious O
app O
tries O
to O
determine O
whether O
it O
is O
being O
tested O
by O
the O
Google B-System
Play I-System
security O
mechanism O
. O
For O
this O
purpose O
, O
the O
app O
receives O
from O
the O
C O
& O
C O
server O
the O
isGoogleIp O
flag O
, O
which O
indicates O
whether O
the O
IP O
address O
of O
the O
affected O
device O
falls O
within O
the O
range O
of O
known O
IP O
addresses O
for O
Google O
servers O
. O
If O
the O
server O
returns O
this O
flag O
as O
positive O
, O
the O
app O
will O
not O
trigger O
the O
adware O
payload O
. O
Second O
, O
the O
app O
can O
set O
a O
custom O
delay O
between O
displaying O
ads O
. O
The O
samples O
we O
have O
seen O
had O
their O
configuration O
set O
to O
delay O
displaying O
the O
first O
ad O
by O
24 O
minutes O
after O
the O
device O
unlocks O
. O
This O
delay O
means O
that O
a O
typical O
testing O
procedure O
, O
which O
takes O
less O
than O
10 O
minutes O
, O
will O
not O
detect O
any O
unwanted O
behavior O
. O
Also O
, O
the O
longer O
the O
delay O
, O
the O
lower O
the O
risk O
of O
the O
user O
associating O
the O
unwanted O
ads O
with O
a O
particular O
app O
. O
Third O
, O
based O
on O
the O
server O
response O
, O
the O
app O
can O
also O
hide O
its O
icon O
and O
create O
a O
shortcut O
instead O
. O
If O
a O
typical O
user O
tries O
to O
get O
rid O
of O
the O
malicious O
app O
, O
chances O
are O
that O
only O
the O
shortcut O
ends O
up O
getting O
removed O
. O
The O
app O
then O
continues O
to O
run O
in O
the O
background O
without O
the O
user O
’ O
s O
knowledge O
. O
This O
stealth O
technique O
has O
been O
gaining O
popularity O
among O
adware-related O
threats O
distributed O
via O
Google B-System
Play I-System
. O
Figure O
5 O
. O
Time O
delay O
to O
postpone O
displaying O
ads O
implemented O
by O
the O
adware O
Once O
the O
malicious O
app O
receives O
its O
configuration O
data O
, O
the O
affected O
device O
is O
ready O
to O
display O
ads O
as O
per O
the O
attacker O
’ O
s O
choice O
; O
each O
ad O
is O
displayed O
as O
a O
full O
screen O
activity O
. O
If O
the O
user O
wants O
to O
check O
which O
app O
is O
responsible O
for O
the O
ad O
being O
displayed O
, O
by O
hitting O
the O
β€œ O
Recent O
apps O
” O
button O
, O
another O
trick O
is O
used O
: O
the O
app O
displays O
a O
Facebook B-Organization
or O
Google B-Organization
icon O
, O
as O
seen O
in O
Figure O
6 O
. O
The O
adware O
mimics O
these O
two O
apps O
to O
look O
legitimate O
and O
avoid O
suspicion O
– O
and O
thus O
stay O
on O
the O
affected O
device O
for O
as O
long O
as O
possible O
. O
Figure O
6 O
. O
The O
adware O
activity O
impersonates O
Facebook B-Organization
( O
left O
) O
. O
If O
the O
user O
long-presses O
the O
icon O
, O
the O
name O
of O
the O
app O
responsible O
for O
the O
activity O
is O
revealed O
( O
right O
) O
. O
Finally O
, O
the O
Ashas B-Malware
adware O
family O
has O
its O
code O
hidden O
under O
the O
com.google.xxx O
package O
name O
. O
This O
trick O
– O
posing O
as O
a O
part O
of O
a O
legitimate O
Google B-Organization
service O
– O
may O
help O
avoid O
scrutiny O
. O
Some O
detection O
mechanisms O
and O
sandboxes O
may O
whitelist O
such O
package O
names O
, O
in O
an O
effort O
to O
prevent O
wasting O
resources O
. O
Figure O
7 O
. O
Malicious O
code O
hidden O
in O
a O
package O
named O
β€œ O
com.google O
” O
Hunting O
down O
the O
developer O
Using O
open-source O
information O
, O
we O
tracked O
down O
the O
developer O
of O
the O
adware O
, O
who O
we O
also O
identified O
as O
the O
campaign O
’ O
s O
operator O
and O
owner O
of O
the O
C O
& O
C O
server O
. O
In O
the O
following O
paragraphs O
, O
we O
outline O
our O
efforts O
to O
discover O
other O
applications O
from O
the O
same O
developer O
and O
protect O
our O
users O
from O
it O
. O
First O
, O
based O
on O
information O
that O
is O
associated O
with O
the O
registered O
C O
& O
C O
domain O
, O
we O
identified O
the O
name O
of O
the O
registrant O
, O
along O
with O
further O
data O
like O
country O
and O
email O
address O
, O
as O
seen O
in O
Figure O
8 O
. O
Figure O
8 O
. O
Information O
about O
the O
C O
& O
C O
domain O
used O
by O
the O
Ashas B-Malware
adware O
Knowing O
that O
the O
information O
provided O
to O
a O
domain O
registrar O
might O
be O
fake O
, O
we O
continued O
our O
search O
. O
The O
email O
address O
and O
country O
information O
drove O
us O
to O
a O
list O
of O
students O
attending O
a O
class O
at O
a O
Vietnamese O
university O
– O
corroborating O
the O
existence O
of O
the O
person O
under O
whose O
name O
the O
domain O
was O
registered O
. O
Figure O
9 O
. O
A O
university O
class O
student O
list O
including O
the O
C O
& O
C O
domain O
registrant O
Due O
to O
poor O
privacy O
practices O
on O
the O
part O
of O
our O
culprit O
’ O
s O
university O
, O
we O
now O
know O
his O
date O
of O
birth O
( O
probably O
: O
he O
seemingly O
used O
his O
birth O
year O
as O
part O
of O
his O
Gmail B-System
address O
, O
as O
further O
partial O
confirmation O
) O
, O
we O
know O
that O
he O
was O
a O
student O
and O
what O
university O
he O
attended O
. O
We O
were O
also O
able O
to O
confirm O
that O
the O
phone O
number O
he O
provided O
to O
the O
domain O
registrar O
was O
genuine O
. O
Moreover O
, O
we O
retrieved O
his O
University O
ID O
; O
a O
quick O
googling O
showed O
some O
of O
his O
exam O
grades O
. O
However O
, O
his O
study O
results O
are O
out O
of O
the O
scope O
of O
our O
research O
. O
Based O
on O
our O
culprit O
’ O
s O
email O
address O
, O
we O
were O
able O
to O
find O
his O
GitHub B-Organization
repository O
. O
His O
repository O
proves O
that O
he O
is O
indeed O
an O
Android B-System
developer O
, O
but O
it O
contained O
no O
publicly O
available O
code O
of O
the O
Ashas B-Malware
adware O
at O
the O
time O
of O
writing O
of O
this O
blogpost O
. O
However O
, O
a O
simple O
Google B-Organization
search O
for O
the O
adware O
package O
name O
returned O
a O
β€œ O
TestDelete O
” O
project O
that O
had O
been O
available O
in O
his O
repository O
at O
some O
point O
The O
malicious O
developer O
also O
has O
apps O
in O
Apple B-Organization
’ O
s O
App B-System
Store I-System
. O
Some O
of O
them O
are O
iOS B-System
versions O
of O
the O
ones O
removed O
from O
Google B-System
Play I-System
, O
but O
none O
contain O
adware O
functionality O
. O
Figure O
10 O
. O
The O
malicious O
developer O
’ O
s O
apps O
published O
on O
the O
App O
Store O
which O
don O
’ O
t O
contain O
the O
Ashas B-Malware
adware O
Searching O
further O
for O
the O
malicious O
developer O
’ O
s O
activities O
, O
we O
also O
discovered O
his O
Youtube B-System
channel O
propagating O
the O
Ashas B-Malware
adware O
and O
his O
other O
projects O
. O
As O
for O
the O
Ashas B-Malware
family O
, O
one O
of O
the O
associated O
promotional O
videos O
, O
β€œ O
Head O
Soccer O
World O
Champion O
2018 O
– O
Android B-System
, O
ios B-System
” O
was O
viewed O
almost O
three O
million O
times O
and O
two O
others O
reached O
hundreds O
of O
thousands O
of O
views O
, O
as O
seen O
in O
Figure O
11 O
. O
Figure O
11 O
. O
YouTube B-System
channel O
of O
the O
malicious O
developer O
His O
YouTube B-System
channel O
provided O
us O
with O
another O
valuable O
piece O
of O
information O
: O
he O
himself O
features O
in O
a O
video O
tutorial O
for O
one O
of O
his O
other O
projects O
. O
Thanks O
to O
that O
project O
, O
we O
were O
able O
to O
extract O
his O
Facebook B-Organization
profile O
– O
which O
lists O
his O
studies O
at O
the O
aforementioned O
university O
. O
Figure O
12 O
. O
Facebook B-Organization
profile O
of O
the O
C O
& O
C O
domain O
registrar O
( O
cover O
picture O
and O
profile O
picture O
edited O
out O
) O
Linked O
on O
the O
malicious O
developer O
’ O
s O
Facebook B-Organization
profile O
, O
we O
discovered O
a O
Facebook B-Organization
page O
, O
Minigameshouse B-Indicator
, O
and O
an O
associated O
domain O
, O
minigameshouse B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
. O
This O
domain O
is O
similar O
to O
the O
one O
the O
malware O
author O
used O
for O
his O
adware O
C O
& O
C O
communication O
, O
minigameshouse B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
us I-Indicator
. O
Checking O
this O
Minigameshouse B-Indicator
page O
further O
indicates O
that O
this O
person O
is O
indeed O
the O
owner O
of O
the O
minigameshouse B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
us I-Indicator
domain I-Indicator
: O
the O
phone O
number O
registered O
with O
this O
domain O
is O
the O
same O
as O
the O
phone O
number O
appearing O
on O
the O
Facebook B-Organization
page O
. O
Figure O
13 O
. O
Facebook B-Organization
page O
managed O
by O
the O
C O
& O
C O
domain O
registrant O
uses O
the O
same O
base O
domain O
name O
( O
minigameshouse O
) O
and O
phone O
number O
as O
the O
registered O
malicious O
C O
& O
C O
used O
by O
the O
Ashas B-Malware
adware O
Of O
interest O
is O
that O
on O
the O
Minigameshouse O
Facebook B-Organization
page O
, O
the O
malicious O
developer O
promotes O
a O
slew O
of O
games O
beyond O
the O
Ashas B-Malware
family O
for O
download O
on O
both O
Google B-System
Play I-System
and O
the O
App B-System
Store I-System
. O
However O
, O
all O
of O
those O
have O
been O
removed O
from O
Google B-System
Play I-System
– O
despite O
the O
fact O
that O
some O
of O
them O
didn O
’ O
t O
contain O
any O
adware O
functionality O
. O
On O
top O
of O
all O
this O
, O
one O
of O
the O
malicious O
developer O
’ O
s O
YouTube B-System
videos O
– O
a O
tutorial O
on O
developing O
an O
β€œ O
Instant O
Game O
” O
for O
Facebook B-Organization
– O
serves O
as O
an O
example O
of O
operational O
security O
completely O
ignored O
. O
We O
were O
able O
to O
see O
that O
his O
recently O
visited O
web O
sites O
were O
Google B-System
Play I-System
pages O
belonging O
to O
apps O
containing O
the O
Ashas B-Malware
adware I-Malware
. O
He O
also O
used O
his O
email O
account O
to O
log O
into O
various O
services O
in O
the O
video O
, O
which O
identifies O
him O
as O
the O
adware O
domain O
owner O
, O
beyond O
any O
doubt O
. O
Thanks O
to O
the O
video O
, O
we O
were O
even O
able O
to O
identify O
three O
further O
apps O
that O
contained O
adware O
functionality O
and O
were O
available O
on O
Google B-System
Play I-System
. O
Figure O
14 O
. O
Screenshots O
from O
this O
developer O
’ O
s O
YouTube B-System
video O
shows O
history O
of O
checking O
Ashas B-Malware
adware O
on O
Google B-System
Play I-System
ESET B-Organization
telemetry O
Figure O
15 O
. O
ESET B-Organization
detections O
of O
Android/AdDisplay.Ashas B-Malware
on O
Android O
devices O
by O
country O
Is O
adware O
harmful O
? O
Because O
the O
real O
nature O
of O
apps O
containing O
adware O
is O
usually O
hidden O
to O
the O
user O
, O
these O
apps O
and O
their O
developers O
should O
be O
considered O
untrustworthy O
. O
When O
installed O
on O
a O
device O
, O
apps O
containing O
adware O
may O
, O
among O
other O
things O
: O
Annoy O
users O
with O
intrusive O
advertisements O
, O
including O
scam O
ads O
Waste O
the O
device O
’ O
s O
battery O
resources O
Generate O
increased O
network O
traffic O
Gather O
users O
’ O
personal O
information O
Hide O
their O
presence O
on O
the O
affected O
device O
to O
achieve O
persistence O
Generate O
revenue O
for O
their O
operator O
without O
any O
user O
interaction O
Conclusion O
Based O
solely O
on O
open O
source O
intelligence O
, O
we O
were O
able O
to O
trace O
the O
developer O
of O
the O
Ashas B-Malware
adware O
and O
establish O
his O
identity O
and O
discover O
additional O
related O
adware-infected O
apps O
. O
Seeing O
that O
the O
developer O
did O
not O
take O
any O
measures O
to O
protect O
his O
identity O
, O
it O
seems O
likely O
that O
his O
intentions O
weren O
’ O
t O
dishonest O
at O
first O
– O
and O
this O
is O
also O
supported O
by O
the O
fact O
that O
not O
all O
his O
published O
apps O
contained O
unwanted O
ads O
. O
At O
some O
point O
in O
his O
Google B-System
Play I-System
β€œ O
career O
” O
, O
he O
apparently O
decided O
to O
increase O
his O
ad O
revenue O
by O
implementing O
adware O
functionality O
in O
his O
apps O
’ O
code O
. O
The O
various O
stealth O
and O
resilience O
techniques O
implemented O
in O
the O
adware O
show O
us O
that O
the O
culprit O
was O
aware O
of O
the O
malicious O
nature O
of O
the O
added O
functionality O
and O
attempted O
to O
keep O
it O
hidden O
. O
Sneaking O
unwanted O
or O
harmful O
functionality O
into O
popular O
, O
benign O
apps O
is O
a O
common O
practice O
among O
β€œ O
bad O
” O
developers O
, O
and O
we O
are O
committed O
to O
tracking O
down O
such O
apps O
. O
We O
report O
them O
to O
Google B-Organization
and O
take O
other O
steps O
to O
disrupt O
malicious O
campaigns O
we O
discover O
. O
Last O
but O
not O
least O
, O
we O
publish O
our O
findings O
to O
help O
Android B-System
users O
protect O
themselves O
. O
MITRE B-Organization
ATT O
& O
CK O
techniques O
Tactic O
ID O
Name O
Description O
Initial O
Access O
T1475 O
Deliver O
Malicious O
App O
via O
Authorized O
App O
Store O
The O
malware O
impersonates O
legitimate O
services O
on O
Google B-System
Play I-System
Persistence O
T1402 O
App O
Auto-Start O
at O
Device O
Boot O
An O
Android O
application O
can O
listen O
for O
the O
BOOT_COMPLETED O
broadcast O
, O
ensuring O
that O
the O
app O
's O
functionality O
will O
be O
activated O
every O
time O
the O
device O
starts O
Impact O
T1472 O
Generate O
Fraudulent O
Advertising O
Revenue O
Generates O
revenue O
by O
automatically O
displaying O
ads O
The O
Rotexy B-Malware
mobile O
Trojan O
– O
banker O
and O
ransomware O
22 O
NOV O
2018 O
On O
the O
back O
of O
a O
surge O
in O
Trojan O
activity O
, O
we O
decided O
to O
carry O
out O
an O
in-depth O
analysis O
and O
track O
the O
evolution O
of O
some O
other O
popular O
malware O
families O
besides O
Asacub B-Malware
. O
One O
of O
the O
most O
interesting O
and O
active O
specimens O
to O
date O
was O
a O
mobile O
Trojan O
from O
the O
Rotexy B-Malware
family O
. O
In O
a O
three-month O
period O
from O
August O
to O
October O
2018 O
, O
it O
launched O
over O
70,000 O
attacks O
against O
users O
located O
primarily O
in O
Russia O
. O
An O
interesting O
feature O
of O
this O
family O
of O
banking O
Trojans O
is O
the O
simultaneous O
use O
of O
three O
command O
sources O
: O
Google O
Cloud O
Messaging O
( O
GCM O
) O
service O
– O
used O
to O
send O
small O
messages O
in O
JSON O
format O
to O
a O
mobile O
device O
via O
Google O
servers O
; O
malicious O
C O
& O
C O
server O
; O
incoming O
SMS O
messages O
. O
This O
β€˜ O
versatility O
’ O
was O
present O
in O
the O
first O
version O
of O
Rotexy B-Malware
and O
has O
been O
a O
feature O
of O
all O
the O
family O
’ O
s O
subsequent O
representatives O
. O
During O
our O
research O
we O
also O
arrived O
at O
the O
conclusion O
that O
this O
Trojan O
evolved O
from O
an O
SMS O
spyware O
Trojan O
that O
was O
first O
spotted O
in O
October O
2014 O
. O
Back O
then O
it O
was O
detected O
as O
Trojan-Spy.AndroidOS.SmsThief B-Malware
, O
but O
later O
versions O
were O
assigned O
to O
another O
family O
– O
Trojan-Banker.AndroidOS.Rotexy B-Malware
. O
The O
modern O
version O
of O
Rotexy B-Malware
combines O
the O
functions O
of O
a O
banking O
Trojan O
and O
ransomware O
. O
It O
spreads O
under O
the O
name O
AvitoPay.apk B-Indicator
( O
or O
similar O
) O
and O
downloads O
from O
websites O
with O
names O
like O
youla9d6h.tk B-Indicator
, O
prodam8n9.tk B-Indicator
, O
prodamfkz.ml B-Indicator
, O
avitoe0ys.tk B-Indicator
, O
etc O
. O
These O
website O
names O
are O
generated O
according O
to O
a O
clear O
algorithm O
: O
the O
first O
few O
letters O
are O
suggestive O
of O
popular O
classified O
ad O
services O
, O
followed O
by O
a O
random O
string O
of O
characters O
, O
followed O
by O
a O
two-letter O
top-level O
domain O
. O
But O
before O
we O
go O
into O
the O
details O
of O
what O
the O
latest O
version O
of O
Rotexy B-Malware
can O
do O
and O
why O
it O
’ O
s O
distinctive O
, O
we O
would O
like O
to O
give O
a O
summary O
of O
the O
path O
the O
Trojan O
has O
taken O
since O
2014 O
up O
to O
the O
present O
day O
. O
Evolution O
of O
Rotexy B-Malware
2014–2015 O
Since O
the O
malicious O
program O
was O
detected O
in O
2014 O
, O
its O
main O
functions O
and O
propagation O
method O
have O
not O
changed O
: O
Rotexy B-Malware
spreads O
via O
links O
sent O
in O
phishing O
SMSs O
that O
prompt O
the O
user O
to O
install O
an O
app O
. O
As O
it O
launches O
, O
it O
requests O
device O
administrator O
rights O
, O
and O
then O
starts O
communicating O
with O
its O
C O
& O
C O
server O
. O
Until O
mid-2015 O
, O
Rotexy B-Malware
used O
a O
plain-text O
JSON O
format O
to O
communicate O
with O
its O
C O
& O
C O
. O
The O
C O
& O
C O
address O
was O
specified O
in O
the O
code O
and O
was O
also O
unencrypted O
: O
In O
some O
versions O
, O
a O
dynamically O
generated O
low-level O
domain O
was O
used O
as O
an O
address O
: O
In O
its O
first O
communication O
, O
the O
Trojan O
sent O
the O
infected O
device O
’ O
s O
IMEI O
to O
the O
C O
& O
C O
, O
and O
in O
return O
it O
received O
a O
set O
of O
rules O
for O
processing O
incoming O
SMSs O
( O
phone O
numbers O
, O
keywords O
and O
regular O
expressions O
) O
– O
these O
applied O
mainly O
to O
messages O
from O
banks O
, O
payment O
systems O
and O
mobile O
network O
operators O
. O
For O
instance O
, O
the O
Trojan O
could O
automatically O
reply O
to O
an O
SMS O
and O
immediately O
delete O
it O
. O
Rotexy B-Malware
then O
sent O
information O
about O
the O
smartphone O
to O
the O
C O
& O
C O
, O
including O
the O
phone O
model O
, O
number O
, O
name O
of O
the O
mobile O
network O
operator O
, O
versions O
of O
the O
operating O
system O
and O
IMEI O
. O
With O
each O
subsequent O
request O
, O
a O
new O
subdomain O
was O
generated O
. O
The O
algorithm O
for O
generating O
the O
lowest-level O
domain O
name O
was O
hardwired O
in O
the O
Trojan O
’ O
s O
code O
. O
The O
Trojan O
also O
registered O
in O
Google B-System
Cloud I-System
Messaging I-System
( I-System
GCM I-System
) I-System
, O
meaning O
it O
could O
then O
receive O
commands O
via O
that O
service O
. O
The O
Trojan O
’ O
s O
list O
of O
possible O
commands O
has O
remained O
practically O
unchanged O
throughout O
its O
life O
, O
and O
will O
be O
described O
below O
in O
detail O
. O
The O
Trojan O
’ O
s O
assets O
folder O
contained O
the O
file O
data.db B-Indicator
with O
a O
list O
of O
possible O
values O
for O
the O
User-Agent O
field O
for O
the O
PAGE O
command O
( O
which O
downloads O
the O
specified O
webpage O
) O
. O
If O
the O
value O
of O
this O
field O
failed O
to O
arrive O
from O
the O
C O
& O
C O
, O
it O
was O
selected O
from O
the O
file O
data.db B-Indicator
using O
a O
pseudo-random O
algorithm O
. O
2015–2016 O
Starting O
from O
mid-2015 O
, O
the O
Trojan O
began O
using O
the O
AES O
algorithm O
to O
encrypt O
data O
communicated O
between O
the O
infected O
device O
and O
the O
C O
& O
C O
: O
Also O
starting O
with O
the O
same O
version O
, O
data O
is O
sent O
in O
a O
POST O
request O
to O
the O
relative O
address O
with O
the O
format O
β€œ O
/ O
[ O
number O
] O
” O
( O
a O
pseudo-randomly O
generated O
number O
in O
the O
range O
0–9999 O
) O
. O
In O
some O
samples O
, O
starting O
from O
January O
2016 O
, O
an O
algorithm O
has O
been O
implemented O
for O
unpacking O
the O
encrypted O
executable O
DEX O
file O
from O
the O
assets O
folder O
. O
In O
this O
version O
of O
Rotexy B-Malware
, O
dynamic O
generation O
of O
lowest-level O
domains O
was O
not O
used O
. O
2016 O
From O
mid-2016 O
on O
, O
the O
cybercriminals O
returned O
to O
dynamic O
generation O
of O
lowest-level O
domains O
. O
No O
other O
significant O
changes O
were O
observed O
in O
the O
Trojan O
’ O
s O
network O
behavior O
. O
In O
late O
2016 O
, O
versions O
of O
the O
Trojan O
emerged O
that O
contained O
the O
card.html B-Indicator
phishing O
page O
in O
the O
assets/www B-Indicator
folder O
. O
The O
page O
was O
designed O
to O
steal O
users O
’ O
bank O
card O
details O
: O
2017–2018 O
From O
early O
2017 O
, O
the O
HTML O
phishing O
pages O
bank.html B-Indicator
, O
update.html B-Indicator
and O
extortionist.html B-Indicator
started O
appearing O
in O
the O
assets O
folder O
. O
Also O
, O
in O
some O
versions O
of O
the O
Trojan O
the O
file O
names O
were O
random O
strings O
of O
characters O
. O
In O
2018 O
, O
versions O
of O
Rotexy B-Malware
emerged O
that O
contacted O
the O
C O
& O
C O
using O
its O
IP O
address O
. O
β€˜ O
One-time O
’ O
domains O
also O
appeared O
with O
names O
made O
up O
of O
random O
strings O
of O
characters O
and O
numbers O
, O
combined O
with O
the O
top-level O
domains O
.cf O
, O
.ga O
, O
.gq O
, O
.ml O
, O
or O
.tk O
. O
At O
this O
time O
, O
the O
Trojan O
also O
began O
actively O
using O
different O
methods O
of O
obfuscation O
. O
For O
example O
, O
the O
DEX O
file O
is O
packed O
with O
garbage O
strings O
and/or O
operations O
, O
and O
contains O
a O
key O
to O
decipher O
the O
main O
executable O
file O
from O
the O
APK O
. O
Latest O
version O
( O
2018 O
) O
Let O
’ O
s O
now O
return O
to O
the O
present O
day O
and O
a O
detailed O
description O
of O
the O
functionality O
of O
a O
current O
representative O
of O
the O
Rotexy B-Malware
family O
( O
SHA256 O
: O
ba4beb97f5d4ba33162f769f43ec8e7d1ae501acdade792a4a577cd6449e1a84 B-Indicator
) O
. O
Application O
launch O
When O
launching O
for O
the O
first O
time O
, O
the O
Trojan O
checks O
if O
it O
is O
being O
launched O
in O
an O
emulation O
environment O
, O
and O
in O
which O
country O
it O
is O
being O
launched O
. O
If O
the O
device O
is O
located O
outside O
Russia O
or O
is O
an O
emulator O
, O
the O
application O
displays O
a O
stub O
page O
: O
In O
this O
case O
, O
the O
Trojan O
’ O
s O
logs O
contain O
records O
in O
Russian O
with O
grammatical O
errors O
and O
spelling O
mistakes O
: O
If O
the O
check O
is O
successful O
, O
Rotexy B-Malware
registers O
with O
GCM B-System
and O
launches O
SuperService O
which O
tracks O
if O
the O
Trojan O
has O
device O
administrator O
privileges O
. O
SuperService O
also O
tracks O
its O
own O
status O
and O
relaunches O
if O
stopped O
. O
It O
performs O
a O
privilege O
check O
once O
every O
second O
; O
if O
unavailable O
, O
the O
Trojan O
starts O
requesting O
them O
from O
the O
user O
in O
an O
infinite O
loop O
: O
If O
the O
user O
agrees O
and O
gives O
the O
application O
the O
requested O
privileges O
, O
another O
stub O
page O
is O
displayed O
, O
and O
the O
app O
hides O
its O
icon O
: O
If O
the O
Trojan O
detects O
an O
attempt O
to O
revoke O
its O
administrator O
privileges O
, O
it O
starts O
periodically O
switching O
off O
the O
phone O
screen O
, O
trying O
to O
stop O
the O
user O
actions O
. O
If O
the O
privileges O
are O
revoked O
successfully O
, O
the O
Trojan O
relaunches O
the O
cycle O
of O
requesting O
administrator O
privileges O
. O
If O
, O
for O
some O
reason O
, O
SuperService O
does O
not O
switch O
off O
the O
screen O
when O
there O
is O
an O
attempt O
to O
revoke O
the O
device O
administrator O
privileges O
, O
the O
Trojan O
tries O
to O
intimidate O
the O
user O
: O
While O
running O
, O
Rotexy B-Malware
tracks O
the O
following O
: O
switching O
on O
and O
rebooting O
of O
the O
phone O
; O
termination O
of O
its O
operation O
– O
in O
this O
case O
, O
it O
relaunches O
; O
sending O
of O
an O
SMS O
by O
the O
app O
– O
in O
this O
case O
, O
the O
phone O
is O
switched O
to O
silent O
mode O
. O
C O
& O
C O
communications O
The O
default O
C O
& O
C O
address O
is O
hardwired O
in O
the O
Rotexy B-Malware
code O
: O
The O
relative O
address O
to O
which O
the O
Trojan O
will O
send O
information O
from O
the O
device O
is O
generated O
in O
a O
pseudo-random O
manner O
. O
Depending O
on O
the O
Trojan O
version O
, O
dynamically O
generated O
subdomains O
can O
also O
be O
used O
. O
The O
Trojan O
stores O
information O
about O
C O
& O
C O
servers O
and O
the O
data O
harvested O
from O
the O
infected O
device O
in O
a O
local O
SQLite O
database O
. O
First O
off O
, O
the O
Trojan O
registers O
in O
the O
administration O
panel O
and O
receives O
the O
information O
it O
needs O
to O
operate O
from O
the O
C O
& O
C O
( O
the O
SMS O
interception O
templates O
and O
the O
text O
that O
will O
be O
displayed O
on O
HTML O
pages O
) O
: O
Rotexy B-Malware
intercepts O
all O
incoming O
SMSs O
and O
processes O
them O
according O
to O
the O
templates O
it O
received O
from O
the O
C O
& O
C O
. O
Also O
, O
when O
an O
SMS O
arrives O
, O
the O
Trojan O
puts O
the O
phone O
into O
silent O
mode O
and O
switches O
off O
the O
screen O
so O
the O
user O
doesn O
’ O
t O
notice O
that O
a O
new O
SMS O
has O
arrived O
. O
When O
required O
, O
the O
Trojan O
sends O
an O
SMS O
to O
the O
specified O
phone O
number O
with O
the O
information O
it O
has O
received O
from O
the O
intercepted O
message O
. O
( O
It O
is O
specified O
in O
the O
interception O
template O
whether O
a O
reply O
must O
be O
sent O
, O
and O
which O
text O
should O
be O
sent O
to O
which O
address O
. O
) O
If O
the O
application O
hasn O
’ O
t O
received O
instructions O
about O
the O
rules O
for O
processing O
incoming O
SMSs O
, O
it O
simply O
saves O
all O
SMSs O
to O
a O
local O
database O
and O
uploads O
them O
to O
the O
C O
& O
C O
. O
Apart O
from O
general O
information O
about O
the O
device O
, O
the O
Trojan O
sends O
a O
list O
of O
all O
the O
running O
processes O
and O
installed O
applications O
to O
the O
C O
& O
C O
. O
It O
’ O
s O
possible O
the O
threat O
actors O
use O
this O
list O
to O
find O
running O
antivirus O
or O
banking O
applications O
. O
Rotexy B-Malware
will O
perform O
further O
actions O
after O
it O
receives O
the O
corresponding O
commands O
: O
START O
, O
STOP O
, O
RESTART O
β€” O
start O
, O
stop O
, O
restart O
SuperService O
. O
URL O
β€” O
update O
C O
& O
C O
address O
. O
MESSAGE O
– O
send O
SMS O
containing O
specified O
text O
to O
a O
specified O
number O
. O
UPDATE_PATTERNS O
– O
reregister O
in O
the O
administration O
panel O
. O
UNBLOCK O
– O
unblock O
the O
telephone O
( O
revoke O
device O
administrator O
privileges O
from O
the O
app O
) O
. O
UPDATE O
– O
download O
APK O
file O
from O
C O
& O
C O
and O
install O
it O
. O
This O
command O
can O
be O
used O
not O
just O
to O
update O
the O
app O
but O
to O
install O
any O
other O
software O
on O
the O
infected O
device O
. O
CONTACTS O
– O
send O
text O
received O
from O
C O
& O
C O
to O
all O
user O
contacts O
. O
This O
is O
most O
probably O
how O
the O
application O
spreads O
. O
CONTACTS_PRO O
– O
request O
unique O
message O
text O
for O
contacts O
from O
the O
address O
book O
. O
PAGE O
– O
contact O
URL O
received O
from O
C O
& O
C O
using O
User-Agent O
value O
that O
was O
also O
received O
from O
C O
& O
C O
or O
local O
database O
. O
ALLMSG O
– O
send O
C O
& O
C O
all O
SMSs O
received O
and O
sent O
by O
user O
, O
as O
stored O
in O
phone O
memory O
. O
ALLCONTACTS O
– O
send O
all O
contacts O
from O
phone O
memory O
to O
C O
& O
C O
. O
ONLINE O
– O
send O
information O
about O
Trojan O
’ O
s O
current O
status O
to O
C O
& O
C O
: O
whether O
it O
has O
device O
administrator O
privileges O
, O
which O
HTML O
page O
is O
currently O
displayed O
, O
whether O
screen O
is O
on O
or O
off O
, O
etc O
. O
NEWMSG O
– O
write O
an O
SMS O
to O
the O
device O
memory O
containing O
the O
text O
and O
sender O
number O
sent O
from O
C O
& O
C O
. O
CHANGE_GCM_ID O
– O
change O
GCM O
ID O
. O
BLOCKER_BANKING_START O
– O
display O
phishing O
HTML O
page O
for O
entry O
of O
bank O
card O
details O
. O
BLOCKER_EXTORTIONIST_START O
– O
display O
HTML O
page O
of O
the O
ransomware O
. O
BLOCKER_UPDATE_START O
– O
display O
fake O
HTML O
page O
for O
update O
. O
BLOCKER_STOP O
– O
block O
display O
of O
all O
HTML O
pages O
. O
The O
C O
& O
C O
role O
for O
Rotexy B-Malware
can O
be O
filled O
not O
only O
by O
a O
web O
server O
but O
also O
by O
any O
device O
that O
can O
send O
SMSs O
. O
The O
Trojan O
intercepts O
incoming O
SMSs O
and O
can O
receive O
the O
following O
commands O
from O
them O
: O
β€œ O
3458 O
” O
β€” O
revoke O
device O
administrator O
privileges O
from O
the O
app O
; O
β€œ O
hi O
” O
, O
β€œ O
ask O
” O
β€” O
enable O
and O
disable O
mobile O
internet O
; O
β€œ O
privet O
” O
, O
β€œ O
ru O
” O
β€” O
enable O
and O
disable O
Wi-Fi O
; O
β€œ O
check O
” O
β€” O
send O
text O
β€œ O
install O
: O
[ O
device O
IMEI O
] O
” O
to O
phone O
number O
from O
which O
SMS O
was O
sent O
; O
β€œ O
stop_blocker O
” O
β€” O
stop O
displaying O
all O
blocking O
HTML O
pages O
; O
β€œ O
393838 O
” O
β€” O
change O
C O
& O
C O
address O
to O
that O
specified O
in O
the O
SMS O
. O
Information O
about O
all O
actions O
performed O
by O
Rotexy B-Malware
is O
logged O
in O
the O
local O
database O
and O
sent O
to O
the O
C O
& O
C O
. O
The O
server O
then O
sends O
a O
reply O
that O
contains O
instructions O
on O
further O
actions O
to O
be O
taken O
. O
Displaying O
HTML O
pages O
We O
’ O
ll O
now O
look O
at O
the O
HTML O
pages O
that O
Rotexy B-Malware
displays O
and O
the O
actions O
performed O
with O
them O
. O
The O
Trojan O
displays O
a O
fake O
HTML O
update O
page O
( O
update.html B-Indicator
) O
that O
blocks O
the O
device O
’ O
s O
screen O
for O
a O
long O
period O
of O
time O
. O
The O
Trojan O
displays O
the O
extortion O
page O
( O
extortionist.html B-Indicator
) O
that O
blocks O
the O
device O
and O
demands O
a O
ransom O
for O
unblocking O
it O
. O
The O
sexually O
explicit O
images O
in O
this O
screenshot O
have O
been O
covered O
with O
a O
black O
box O
. O
The O
Trojan O
displays O
a O
phishing O
page O
( O
bank.html B-Indicator
) O
prompting O
the O
user O
to O
enter O
their O
bank O
card O
details O
. O
This O
page O
mimics O
a O
legitimate O
bank O
form O
and O
blocks O
the O
device O
screen O
until O
the O
user O
enters O
all O
the O
information O
. O
It O
even O
has O
its O
own O
virtual O
keyboard O
that O
supposedly O
protects O
the O
victim O
from O
keyloggers O
. O
In O
the O
areas O
marked O
β€˜ O
{ O
text O
} O
’ O
Rotexy B-Malware
displays O
the O
text O
it O
receives O
from O
the O
C O
& O
C O
. O
Typically O
, O
it O
is O
a O
message O
saying O
that O
the O
user O
has O
received O
a O
money O
transfer O
, O
and O
that O
they O
must O
enter O
their O
bank O
card O
details O
so O
the O
money O
can O
be O
transferred O
to O
their O
account O
. O
The O
entered O
data O
is O
then O
checked O
and O
the O
last O
four O
digits O
of O
the O
bank O
card O
number O
are O
also O
checked O
against O
the O
data O
sent O
in O
the O
C O
& O
C O
command O
. O
The O
following O
scenario O
may O
play O
out O
: O
according O
to O
the O
templates O
for O
processing O
incoming O
SMSs O
, O
Rotexy B-Malware
intercepts O
a O
message O
from O
the O
bank O
that O
contains O
the O
last O
four O
digits O
of O
the O
bank O
card O
connected O
to O
the O
phone O
number O
. O
The O
Trojan O
sends O
these O
digits O
to O
the O
C O
& O
C O
, O
which O
in O
turn O
sends O
a O
command O
to O
display O
a O
fake O
data O
entry O
window O
to O
check O
the O
four O
digits O
. O
If O
the O
user O
has O
provided O
the O
details O
of O
another O
card O
, O
then O
the O
following O
window O
is O
displayed O
: O
The O
application O
leaves O
the O
user O
with O
almost O
no O
option O
but O
to O
enter O
the O
correct O
card O
number O
, O
as O
it O
checks O
the O
entered O
number O
against O
the O
bank O
card O
details O
the O
cybercriminals O
received O
earlier O
. O
When O
all O
the O
necessary O
card O
details O
are O
entered O
and O
have O
been O
checked O
, O
all O
the O
information O
is O
uploaded O
to O
the O
C O
& O
C O
. O
How O
to O
unblock O
the O
phone O
Now O
for O
some O
good O
news O
: O
Rotexy B-Malware
doesn O
’ O
t O
have O
a O
very O
well-designed O
module O
for O
processing O
commands O
that O
arrive O
in O
SMSs O
. O
It O
means O
the O
phone O
can O
be O
unblocked O
in O
some O
cases O
when O
it O
has O
been O
blocked O
by O
one O
of O
the O
above O
HTML O
pages O
. O
This O
is O
done O
by O
sending O
β€œ O
3458 O
” O
in O
an O
SMS O
to O
the O
blocked O
device O
– O
this O
will O
revoke O
the O
administrator O
privileges O
from O
the O
Trojan O
. O
After O
that O
it O
’ O
s O
necessary O
to O
send O
β€œ O
stop_blocker O
” O
to O
the O
same O
number O
– O
this O
will O
disable O
the O
display O
of O
HTML O
pages O
that O
extort O
money O
and O
block O
the O
screen O
. O
Rotexy B-Malware
may O
start O
requesting O
device O
administrator O
privileges O
again O
in O
an O
infinite O
loop O
; O
in O
that O
case O
, O
restart O
the O
device O
in O
safe O
mode O
and O
remove O
the O
malicious O
program O
. O
However O
, O
this O
method O
may O
not O
work O
if O
the O
threat O
actors O
react O
quickly O
to O
an O
attempt O
to O
remove O
the O
Trojan O
. O
In O
that O
case O
, O
you O
first O
need O
to O
send O
the O
text O
β€œ O
393838 O
” O
in O
an O
SMS O
to O
the O
infected O
device O
and O
then O
repeat O
all O
the O
actions O
described O
above O
; O
that O
text O
message O
will O
change O
the O
C O
& O
C O
address O
to O
β€œ O
: O
// O
” O
, O
so O
the O
phone O
will O
no O
longer O
receive O
commands O
from O
the O
real O
C O
& O
C O
. O
Please O
note O
that O
these O
unblocking O
instructions O
are O
based O
on O
an O
analysis O
of O
the O
current O
version O
of O
Rotexy B-Malware
and O
have O
been O
tested O
on O
it O
. O
However O
, O
it O
’ O
s O
possible O
the O
set O
of O
commands O
may O
change O
in O
future O
versions O
of O
the O
Trojan O
. O
Geography O
of O
Rotexy B-Malware
attacks O
According O
to O
our O
data O
, O
98 O
% O
of O
all O
Rotexy B-Malware
attacks O
target O
users O
in O
Russia O
. O
Indeed O
, O
the O
Trojan O
explicitly O
targets O
Russian-speaking O
users O
. O
There O
have O
also O
been O
cases O
of O
users O
in O
Ukraine O
, O
Germany O
, O
Turkey O
and O
several O
other O
countries O
being O
affected O
. O
Kaspersky B-System
Internet I-System
Security I-System
for O
Android B-System
and O
the O
Sberbank B-System
Online I-System
app I-System
securely O
protect O
users O
against O
attacks O
by O
this O
Trojan O
. O
IOCs O
SHA256 O
0ca09d4fde9e00c0987de44ae2ad51a01b3c4c2c11606fe8308a083805760ee7 B-Indicator
4378f3680ff070a1316663880f47eba54510beaeb2d897e7bbb8d6b45de63f96 B-Indicator
76c9d8226ce558c87c81236a9b95112b83c7b546863e29b88fec4dba5c720c0b B-Indicator
7cc2d8d43093c3767c7c73dc2b4daeb96f70a7c455299e0c7824b4210edd6386 B-Indicator
9b2fd7189395b2f34781b499f5cae10ec86aa7ab373fbdc2a14ec4597d4799ba B-Indicator
ac216d502233ca0fe51ac2bb64cfaf553d906dc19b7da4c023fec39b000bc0d7 B-Indicator
b1ccb5618925c8f0dda8d13efe4a1e1a93d1ceed9e26ec4a388229a28d1f8d5b B-Indicator
ba4beb97f5d4ba33162f769f43ec8e7d1ae501acdade792a4a577cd6449e1a84 B-Indicator
ba9f4d3f4eba3fa7dce726150fe402e37359a7f36c07f3932a92bd711436f88c B-Indicator
e194268bf682d81fc7dc1e437c53c952ffae55a9d15a1fc020f0219527b7c2ec B-Indicator
Π‘ O
& O
C O
2014–2015 O
: O
secondby.ru B-Indicator
darkclub.net B-Indicator
holerole.org B-Indicator
googleapis.link B-Indicator
2015–2016 O
: O
test2016.ru B-Indicator
blackstar.pro B-Indicator
synchronize.pw B-Indicator
lineout.pw B-Indicator
sync-weather.pw B-Indicator
2016 O
freedns.website O
streamout.space B-Indicator
2017–2018 O
: O
streamout.space B-Indicator
sky-sync.pw B-Indicator
gms-service.info B-Indicator
EventBot B-Malware
: O
A O
New O
Mobile O
Banking O
Trojan O
is O
Born O
April O
30 O
, O
2020 O
KEY O
FINDINGS O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
is O
investigating O
EventBot B-Malware
, O
a O
new O
type O
of O
Android B-System
mobile O
malware O
that O
emerged O
around O
March O
2020 O
. O
EventBot B-Malware
is O
a O
mobile O
banking O
trojan O
and O
infostealer O
that O
abuses O
Android B-System
’ O
s O
accessibility O
features O
to O
steal O
user O
data O
from O
financial O
applications O
, O
read O
user O
SMS O
messages O
, O
and O
steal O
SMS O
messages O
to O
allow O
the O
malware O
to O
bypass O
two-factor O
authentication O
. O
EventBot B-Malware
targets O
users O
of O
over O
200 O
different O
financial O
applications O
, O
including O
banking O
, O
money O
transfer O
services O
, O
and O
crypto-currency O
wallets O
. O
Those O
targeted O
include O
applications O
like O
Paypal B-System
Business I-System
, O
Revolut B-System
, O
Barclays B-System
, O
UniCredit B-System
, O
CapitalOne B-System
UK I-System
, O
HSBC B-System
UK I-System
, O
Santander B-System
UK I-System
, O
TransferWise B-System
, O
Coinbase B-System
, O
paysafecard B-System
, O
and O
many O
more O
. O
It O
specifically O
targets O
financial O
banking O
applications O
across O
the O
United O
States O
and O
Europe O
, O
including O
Italy O
, O
the O
UK O
, O
Spain O
, O
Switzerland O
, O
France O
, O
and O
Germany O
. O
The O
full O
list O
of O
banking O
applications O
targeted O
is O
included O
in O
the O
appendix O
. O
EventBot B-Organization
is O
particularly O
interesting O
because O
it O
is O
in O
such O
early O
stages O
. O
This O
brand O
new O
malware O
has O
real O
potential O
to O
become O
the O
next O
big O
mobile O
malware O
, O
as O
it O
is O
under O
constant O
iterative O
improvements O
, O
abuses O
a O
critical O
operating O
system O
feature O
, O
and O
targets O
financial O
applications O
. O
This O
research O
gives O
a O
rare O
look O
into O
the O
process O
improvements O
malware O
authors O
make O
when O
optimizing O
before O
launch O
. O
By O
going O
on O
the O
offensive O
and O
hunting O
the O
attackers O
, O
our O
team O
was O
able O
to O
unearth O
the O
early O
stages O
of O
what O
may O
be O
a O
very O
dangerous O
mobile O
malware O
. O
TABLE O
OF O
CONTENTS O
Security O
Recommendations O
Introduction O
Threat O
Analysis O
Common O
Features O
Unique O
Features O
by O
Version O
Malware O
Under O
Active O
Development O
Suspected O
Detection O
Tests O
by O
the O
Threat O
Actor O
EventBot B-Malware
Infrastructure O
Cybereason O
Mobile O
Conclusion O
Indicators O
of O
Compromise O
MITRE B-Organization
ATT O
& O
CK O
for O
Mobile O
Breakdown O
SECURITY O
RECOMMENDATIONS O
Keep O
your O
mobile O
device O
up-to-date O
with O
the O
latest O
software O
updates O
from O
legitimate O
sources O
. O
Keep O
Google B-System
Play I-System
Protect I-System
on O
. O
Do O
not O
download O
mobile O
apps O
from O
unofficial O
or O
unauthorized O
sources O
. O
Most O
legitimate O
Android B-System
apps O
are O
available O
on O
the O
Google B-System
Play I-System
Store I-System
. O
Always O
apply O
critical O
thinking O
and O
consider O
whether O
you O
should O
give O
a O
certain O
app O
the O
permissions O
it O
requests O
. O
When O
in O
doubt O
, O
check O
the O
APK O
signature O
and O
hash O
in O
sources O
like O
VirusTotal B-Organization
before O
installing O
it O
on O
your O
device O
. O
Use O
mobile O
threat O
detection O
solutions O
for O
enhanced O
security O
. O
INTRODUCTION O
For O
the O
past O
few O
weeks O
, O
the O
Cybereason B-Organization
Nocturnus I-Organization
team O
has O
been O
investigating O
a O
new O
type O
of O
Android B-System
malware O
dubbed O
EventBot B-Malware
, O
which O
was O
first O
identified O
in O
March O
2020 O
. O
This O
malware O
appears O
to O
be O
newly O
developed O
with O
code O
that O
differs O
significantly O
from O
previously O
known O
Android B-System
malware O
. O
EventBot B-Malware
is O
under O
active O
development O
and O
is O
evolving O
rapidly O
; O
new O
versions O
are O
released O
every O
few O
days O
with O
improvements O
and O
new O
capabilities O
. O
EventBot B-Malware
abuses O
Android B-System
’ O
s O
accessibility O
feature O
to O
access O
valuable O
user O
information O
, O
system O
information O
, O
and O
data O
stored O
in O
other O
applications O
. O
In O
particular O
, O
EventBot B-Malware
can O
intercept O
SMS O
messages O
and O
bypass O
two-factor O
authentication O
mechanisms O
. O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
has O
concluded O
that O
EventBot B-Malware
is O
designed O
to O
target O
over O
200 O
different O
banking O
and O
finance O
applications O
, O
the O
majority O
of O
which O
are O
European O
bank O
and O
crypto-currency O
exchange O
applications O
. O
By O
accessing O
and O
stealing O
this O
data O
, O
Eventbot B-Malware
has O
the O
potential O
to O
access O
key O
business O
data O
, O
including O
financial O
data O
. O
60 O
% O
of O
devices O
containing O
or O
accessing O
enterprise O
data O
are O
mobile O
, O
and O
mobile O
devices O
tend O
to O
include O
a O
significant O
amount O
of O
personal O
and O
business O
data O
, O
assuming O
the O
organization O
has O
a O
bring-your-own-device O
policy O
in O
place O
. O
Mobile O
malware O
is O
a O
significant O
risk O
for O
organizations O
and O
consumers O
alike O
, O
and O
must O
be O
considered O
when O
protecting O
personal O
and O
business O
data O
. O
EventBot B-Malware
mobile O
banking O
applications O
targetedApplications O
targeted O
by O
EventBot B-Malware
. O
Cybereason B-Organization
Mobile I-Organization
Detecting O
EventBotCybereason O
Mobile O
detecting O
EventBot B-Malware
. O
THREAT O
ANALYSIS O
Initial O
Access O
Though O
EventBot B-Malware
is O
not O
currently O
on O
the O
Google B-System
Play I-System
Store O
, O
we O
were O
able O
to O
find O
several O
icons O
EventBot B-Malware
is O
using O
to O
masquerade O
as O
a O
legitimate O
application O
. O
We O
believe O
that O
, O
when O
it O
is O
officially O
released O
, O
it O
will O
most O
likely O
be O
uploaded O
to O
rogue O
APK O
stores O
and O
other O
shady O
websites O
, O
while O
masquerading O
as O
real O
applications O
. O
Icons O
used O
for O
EventBot B-Malware
masqueraded O
as O
legitimate O
with O
these O
icons.application O
. O
Malware O
Capabilities O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
has O
been O
following O
EventBot B-Malware
since O
the O
beginning O
of O
March O
2020 O
. O
The O
team O
has O
encountered O
different O
versions O
of O
the O
malware O
over O
time O
as O
it O
has O
rapidly O
evolved O
. O
At O
the O
time O
of O
writing O
this O
research O
, O
four O
versions O
of O
the O
EventBot B-Malware
malware O
were O
observed O
: O
Version O
0.0.0.1 O
, O
0.0.0.2 O
, O
and O
0.3.0.1 O
and O
0.4.0.1 O
. O
Each O
version O
expands O
the O
bot O
’ O
s O
functionality O
and O
works O
to O
obfuscate O
the O
malware O
against O
analysis O
. O
In O
this O
research O
, O
we O
review O
common O
features O
of O
the O
malware O
and O
examine O
the O
improvements O
the O
threat O
actor O
made O
in O
each O
version O
. O
COMMON O
FEATURES O
Permissions O
When O
installed O
, O
EventBot B-Malware
requests O
the O
following O
permissions O
on O
the O
device O
: O
SYSTEM_ALERT_WINDOW O
- O
allow O
the O
app O
to O
create O
windows O
that O
are O
shown O
on O
top O
of O
other O
apps O
. O
READ_EXTERNAL_STORAGE O
- O
read O
from O
external O
storage O
. O
REQUEST_INSTALL_PACKAGES O
- O
make O
a O
request O
to O
install O
packages O
. O
INTERNET O
- O
open O
network O
sockets O
. O
REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O
- O
whitelist O
the O
app O
to O
allow O
it O
to O
ignore O
battery O
optimizations O
. O
WAKE_LOCK O
- O
prevent O
the O
processor O
from O
sleeping O
and O
dimming O
the O
screen O
. O
ACCESS_NETWORK_STATE O
- O
allow O
the O
app O
to O
access O
information O
about O
networks O
. O
REQUEST_COMPANION_RUN_IN_BACKGROUND O
- O
let O
the O
app O
run O
in O
the O
background O
. O
REQUEST_COMPANION_USE_DATA_IN_BACKGROUND O
- O
let O
the O
app O
use O
data O
in O
the O
background O
. O
RECEIVE_BOOT_COMPLETED O
- O
allow O
the O
application O
to O
launch O
itself O
after O
system O
boot O
. O
EventBot B-Malware
uses O
this O
permission O
in O
order O
to O
achieve O
persistence O
and O
run O
in O
the O
background O
as O
a O
service O
. O
RECEIVE_SMS O
- O
allow O
the O
application O
to O
receive O
text O
messages O
. O
READ_SMS O
- O
allow O
the O
application O
to O
read O
text O
messages O
. O
EventBot B-Malware
permissions O
EventBot B-Malware
’ O
s O
permissions O
as O
seen O
in O
the O
manifest O
file O
. O
THE O
INITIAL O
INSTALLATION O
PROCESS O
Once O
installed O
, O
EventBot B-Malware
prompts O
the O
user O
to O
give O
it O
access O
to O
accessibility O
services O
. O
Initial O
request O
by O
EventBot B-Malware
Initial O
request O
by O
EventBot B-Malware
to O
run O
as O
a O
service O
. O
Once O
the O
malware O
can O
use O
accessibility O
services O
, O
it O
has O
the O
ability O
to O
operate O
as O
a O
keylogger O
and O
can O
retrieve O
notifications O
about O
other O
installed O
applications O
and O
content O
of O
open O
windows O
. O
EventBot O
’ O
s O
request O
to O
use O
accessibility O
services O
. O
In O
more O
up-to-date O
versions O
of O
Android B-System
, O
EventBot B-Malware
will O
ask O
for O
permissions O
to O
run O
in O
the O
background O
before O
deleting O
itself O
from O
the O
launcher O
. O
EventBot B-Malware
requests O
permissions O
to O
always O
run O
in O
the O
background O
. O
DOWNLOAD O
AND O
UPDATE O
THE O
TARGET O
CONFIGURATION O
FILE O
By O
analyzing O
and O
decoding O
the O
HTTP O
packets O
in O
EventBot B-Malware
Version O
0.0.0.1 O
, O
we O
can O
see O
that O
EventBot B-Malware
downloads O
and O
updates O
a O
configuration O
file O
with O
almost O
200 O
different O
financial O
application O
targets O
. O
Following O
is O
the O
HTTP O
response O
from O
the O
C2 O
server O
, O
containing O
the O
encrypted O
configuration O
: O
EventBot B-Malware
Encrypted O
HTTP O
response O
returned O
from O
the O
C2 O
Encrypted O
HTTP O
response O
returned O
from O
the O
C2 O
. O
In O
Version O
0.0.0.1 O
, O
the O
communication O
with O
the O
C2 O
is O
encrypted O
using O
Base64 O
and O
RC4 O
. O
The O
RC4 O
key O
is O
hardcoded O
in O
EventBot B-Malware
. O
Upon O
decryption O
, O
we O
can O
see O
that O
the O
response O
from O
the O
server O
is O
a O
JSON O
object O
of O
EventBot B-Malware
’ O
s O
configuration O
, O
which O
contains O
C2 O
URLs O
and O
a O
targeted O
applications O
list O
. O
Decrypted O
EventBot B-Malware
configuration O
Decrypted O
EventBot B-Malware
configuration O
returned O
from O
the O
C2 O
. O
The O
configuration O
file O
contains O
a O
list O
of O
financial O
applications O
that O
can O
be O
targeted O
by O
EventBot B-Malware
. O
This O
version O
includes O
185 O
different O
applications O
, O
including O
official O
applications O
of O
worldwide O
banks O
. O
26 O
of O
the O
targeted O
applications O
are O
from O
Italy O
, O
25 O
are O
from O
the O
UK O
, O
6 O
are O
from O
Germany O
, O
5 O
are O
from O
France O
, O
and O
3 O
are O
from O
Spain O
. O
However O
, O
it O
also O
targets O
applications O
from O
Romania O
, O
Ireland O
, O
India O
, O
Austria O
, O
Switzerland O
, O
Australia O
, O
Poland O
and O
the O
USA O
. O
In O
addition O
to O
official O
banking O
applications O
, O
the O
target O
list O
includes O
111 O
other O
global O
financial O
applications O
for O
banking O
and O
credit O
card O
management O
, O
money O
transfers O
, O
and O
cryptocurrency O
wallets O
and O
exchanges O
. O
Those O
targeted O
include O
Paypal B-System
Business I-System
, O
Revolut B-System
, O
Barclays B-System
, O
UniCredit B-System
, O
CapitalOne B-System
UK I-System
, O
HSBC B-System
UK I-System
, O
Santander B-System
UK I-System
, O
TransferWise B-System
, O
Coinbase B-System
, O
paysafecard B-System
, O
and O
many O
more O
. O
The O
full O
list O
of O
banking O
applications O
targeted O
is O
included O
in O
the O
appendix O
. O
ABUSE O
OF O
ACCESSIBILITY O
SERVICES O
EventBot B-Malware
abuses O
the O
accessibility O
services O
of O
Android B-System
devices O
for O
the O
majority O
of O
its O
activity O
. O
Accessibility O
features O
are O
typically O
used O
to O
help O
users O
with O
disabilities O
by O
giving O
the O
device O
the O
ability O
to O
write O
into O
input O
fields O
, O
auto-generate O
permissions O
, O
perform O
gestures O
for O
the O
user O
, O
etc O
. O
However O
, O
when O
used O
maliciously O
, O
accessibility O
features O
can O
be O
used O
to O
exploit O
legitimate O
services O
for O
malicious O
purposes O
, O
like O
with O
EventBot B-Malware
. O
EventBot B-Malware
uses O
multiple O
methods O
to O
exploit O
accessibility O
events O
for O
webinjects O
and O
other O
information O
stealing O
purposes O
. O
DATA O
GATHERING O
Getting O
a O
list O
of O
all O
installed O
applications O
: O
Once O
EventBot B-Malware
is O
installed O
on O
the O
target O
machine O
, O
it O
lists O
all O
the O
applications O
on O
the O
target O
machine O
and O
sends O
them O
to O
the O
C2 O
. O
Device O
information O
: O
EventBot B-Malware
queries O
for O
device O
information O
like O
OS O
, O
model O
, O
etc O
, O
and O
also O
sends O
that O
to O
the O
C2 O
. O
EventBot B-Malware
infected O
device O
to O
be O
sent O
to O
the O
C O
Information O
gathered O
about O
the O
infected O
device O
to O
be O
sent O
to O
the O
C2 O
. O
Data O
encryption O
: O
In O
the O
initial O
version O
of O
EventBot B-Malware
, O
the O
data O
being O
exfiltrated O
is O
encrypted O
using O
Base64 O
and O
RC4 O
. O
In O
later O
versions O
, O
another O
encryption O
layer O
is O
added O
using O
Curve25519 O
encryption O
. O
All O
of O
the O
most O
recent O
versions O
of O
EventBot B-Malware
contain O
a O
ChaCha20 B-System
library O
that O
can O
improve O
performance O
when O
compared O
to O
other O
algorithms O
like O
RC4 O
and O
AES O
. O
This O
implies O
that O
the O
authors O
are O
actively O
working O
to O
optimize O
EventBot B-Malware
over O
time O
. O
SMS O
grabbing O
: O
EventBot B-Malware
has O
the O
ability O
to O
parse O
SMS O
messages O
by O
using O
the O
targeted O
device O
’ O
s O
SDK O
version O
to O
parse O
them O
correctly O
. O
EventBot B-Malware
parsing O
of O
grabbed O
SMS O
messages O
Parsing O
of O
grabbed O
SMS O
messages O
. O
Webinjects O
: O
According O
to O
the O
bot O
’ O
s O
configuration O
, O
if O
a O
webinject O
is O
set O
for O
a O
given O
application O
, O
it O
will O
be O
executed O
. O
EventBot B-Malware
web O
injects O
execution O
method O
Web O
injects O
execution O
method O
by O
a O
pre-established O
configuration O
. O
BOT O
UPDATES O
EventBot B-Malware
has O
a O
long O
method O
called O
parseCommand O
that O
can O
update O
EventBot B-Malware
’ O
s O
configuration O
XML O
files O
, O
located O
in O
the O
shared O
preferences O
folder O
on O
the O
device O
. O
EventBot B-Malware
Dropped O
XML O
configuration O
files O
Dropped O
XML O
configuration O
files O
on O
the O
device O
. O
EventBot B-Malware
uses O
this O
function O
to O
update O
its O
C2s O
, O
the O
configuration O
of O
webinjects O
, O
etc O
. O
The O
following O
code O
shows O
EventBot B-Malware
parsing O
instructions O
sent O
from O
the O
C2 O
. O
Parsing O
of O
instructions O
by O
EventBot B-Malware
Parsing O
of O
instructions O
by O
the O
bot O
from O
the O
C2 O
. O
UNIQUE O
FEATURES O
BY O
VERSION O
EventBot B-Malware
Version O
0.0.0.1 O
RC4 O
and O
Base64 O
Packet O
Encryption O
EventBot B-Malware
RC4 O
and O
Base64 O
data O
decryption O
from O
the O
C2 O
RC4 O
and O
Base64 O
data O
decryption O
from O
the O
C2 O
. O
As O
mentioned O
above O
, O
EventBot B-Malware
Version O
0.0.0.1 O
sends O
a O
JSON O
object O
containing O
the O
Android B-System
package O
names O
of O
all O
the O
apps O
installed O
on O
the O
victim O
’ O
s O
device O
alongside O
additional O
metadata O
, O
including O
the O
bot O
version O
, O
botnetID O
, O
and O
the O
reason O
this O
package O
is O
sent O
. O
For O
this O
particular O
packet O
, O
the O
reason O
is O
registration O
of O
the O
bot O
. O
If O
the O
connection O
to O
the O
C2 O
fails O
, O
it O
will O
continue O
to O
retry O
until O
it O
is O
successful O
. O
EventBot B-Malware
Logcat O
from O
the O
infected O
device O
Logcat O
from O
the O
infected O
device O
. O
EVENTBOT B-Malware
VERSION O
0.0.0.2 O
Dynamic O
Library O
Loading O
As O
of O
Version O
0.0.0.2 O
, O
EventBot B-Malware
attempts O
to O
hide O
its O
main O
functionality O
from O
static O
analysis O
. O
With O
Version O
0.0.0.1 O
, O
there O
is O
a O
dedicated O
functions O
class O
where O
all O
main O
malicious O
activity O
happens O
and O
can O
be O
observed O
. O
Instead O
, O
in O
Version O
0.0.0.2 O
, O
EventBot B-Malware
dynamically O
loads O
its O
main O
module O
. O
EventBot B-Malware
loaded O
library O
Loaded O
library O
as O
seen O
in O
Logcat O
. O
By O
browsing O
EventBot B-Malware
’ O
s O
installation O
path O
on O
the O
device O
, O
we O
can O
see O
the O
library O
dropped O
in O
the O
app_dex O
folder O
. O
EventBot B-Malware
loaded O
library O
The O
loaded O
library O
dropped O
on O
the O
device O
. O
The O
code O
to O
load O
the O
main O
module O
dynamically O
can O
also O
be O
seen O
statically O
. O
The O
malicious O
library O
is O
loaded O
from O
Eventbot B-Malware
’ O
s O
assets O
that O
contain O
a O
font O
file O
called O
default.ttf B-Indicator
which O
is O
actually O
the O
hidden O
library O
and O
then O
decoded O
using O
RC4 O
. O
EventBot O
method O
responsible O
for O
the O
library O
loading O
The O
method O
responsible O
for O
the O
library O
loading O
. O
EventBot B-Malware
has O
the O
ability O
to O
update O
its O
library O
or O
potentially O
even O
download O
a O
second O
library O
when O
given O
a O
command O
from O
the O
C2 O
. O
An O
updated O
library O
name O
is O
generated O
by O
calculating O
the O
md5sum O
of O
several O
device O
properties O
, O
while O
concatenating O
the O
build O
model O
twice O
in O
case O
of O
an O
update O
to O
the O
library O
. O
EventBot O
Updated O
library O
naming O
convention O
EventBot B-Malware
New O
library O
naming O
convention O
. O
Data O
Encryption O
The O
Curve25519 O
encryption O
algorithm O
was O
implemented O
as O
of O
EventBot B-Malware
Version O
0.0.0.2 O
. O
This O
encryption O
algorithm O
is O
an O
extra O
security O
layer O
for O
communicating O
with O
the O
C2 O
, O
an O
improvement O
over O
the O
previous O
version O
of O
a O
plain O
RC4 O
encryption O
. O
When O
reviewing O
the O
decrypted O
packet O
, O
it O
’ O
s O
clear O
it O
has O
the O
same O
content O
as O
previous O
versions O
. O
EventBot B-Malware
decryption O
of O
packets O
from O
the O
C2 O
Decryption O
of O
packets O
from O
the O
C2 O
using O
Curve25519 O
. O
EVENTBOT O
VERSION O
0.3.0.1 O
Additional O
Assets O
Based O
on O
Country O
/ O
Region O
EventBot-23aEventBot O
Spanish O
and O
Italian O
Images O
in O
Spanish O
and O
Italian O
added O
in O
version O
0.3.0.1 O
. O
Version O
0.3.0.1 O
includes O
Italian O
and O
Spanish O
language O
compatibility O
within O
the O
resources O
section O
. O
Presumably O
, O
this O
was O
done O
to O
make O
the O
app O
seem O
more O
credible O
to O
targeted O
users O
in O
different O
countries O
. O
Grabbing O
the O
Screen O
PIN O
with O
Support O
for O
Samsung B-Organization
Devices O
Version O
0.3.0.1 O
added O
an O
~800 O
line O
long O
method O
called O
grabScreenPin O
, O
which O
uses O
accessibility O
features O
to O
track O
pin O
code O
changes O
in O
the O
device O
’ O
s O
settings O
. O
It O
listens O
to O
events O
like O
TYPE_VIEW_TEXT_CHANGED O
. O
We O
suspect O
the O
updated O
PIN O
is O
sent O
to O
the O
C2 O
, O
most O
likely O
to O
give O
the O
malware O
the O
option O
to O
perform O
privileged O
activities O
on O
the O
infected O
device O
related O
to O
payments O
, O
system O
configuration O
options O
, O
etc O
. O
EventBot B-Malware
Listening O
to O
TYPE_VIEW_TEXT_CHANGED O
accessibility O
event O
Listening O
to O
TYPE_VIEW_TEXT_CHANGED O
accessibility O
event O
. O
After O
collecting O
the O
changed O
PIN O
code O
, O
it O
is O
sent O
back O
to O
the O
C2 O
. O
EventBot B-Malware
Sending O
the O
pin O
code O
back O
to O
the O
C2 O
Sending O
the O
pin O
code O
back O
to O
the O
C2 O
. O
Eventually O
, O
the O
screen O
PIN O
preferences O
will O
be O
saved O
to O
an O
additional O
XML O
file O
in O
the O
shared O
preferences O
folder O
. O
EventBot O
screenPinPrefs.xml B-Indicator
The O
content O
of O
screenPinPrefs.xml B-Indicator
. O
The O
grabScreenPin O
method O
has O
separate O
conditioning O
to O
handle O
screen O
lock O
events O
in O
Samsung B-Organization
devices O
. O
EventBot B-Malware
screen O
lock O
with O
support O
for O
Samsung B-Organization
devices O
A O
new O
method O
to O
handle O
screen O
lock O
with O
support O
for O
Samsung B-Organization
devices O
. O
EVENTBOT O
VERSION O
0.4.0.1 O
Package O
Name O
Randomization O
In O
this O
version O
, O
the O
package O
name O
is O
no O
longer O
named O
β€˜ O
com.example.eventbot B-Indicator
’ O
, O
which O
makes O
it O
more O
difficult O
to O
track O
down O
. O
EventBot B-Malware
Randomized O
package O
name O
Randomized O
package O
name O
instead O
of O
com.example.eventbot B-Indicator
. O
ProGuard B-System
Obfuscation O
As O
with O
many O
other O
Android B-System
applications O
, O
EventBot B-Malware
is O
now O
using O
obfuscation O
. O
Both O
the O
loader O
and O
dropped O
class O
are O
obfuscated O
using O
ProGuard B-Indicator
, O
which O
obfuscates O
names O
using O
alphabet O
letters O
. O
The O
code O
itself O
is O
not O
modified O
by O
this O
type O
of O
obfuscation O
though O
, O
making O
the O
analysis O
easier O
. O
EventBot B-Malware
Obfuscated O
class O
names O
Obfuscated O
class O
names O
using O
letters O
of O
the O
alphabet O
. O
Hidden O
Configuration O
Data O
As O
mentioned O
above O
, O
EventBot B-Malware
begins O
using O
obfuscation O
. O
Due O
to O
this O
obfuscation O
, O
a O
part O
of O
the O
previously O
mentioned O
cfg O
class O
is O
now O
mapped O
to O
c/b/a/a/a O
or O
c/a/a/a/a O
. O
EventBot O
C2 O
URLs O
C2 O
URLs O
and O
other O
settings O
in O
a O
nested O
class O
. O
Other O
configuration O
data O
is O
located O
elsewhere O
, O
and O
some O
of O
it O
can O
been O
seen O
here O
: O
The O
encrypted O
library O
path O
The O
output O
folder O
on O
the O
device O
for O
the O
dropped O
library O
The O
name O
of O
the O
library O
after O
it O
is O
loaded O
eventBot O
name O
string O
Version O
number O
A O
string O
used O
as O
an O
RC4 O
key O
, O
both O
for O
decrypting O
the O
library O
and O
as O
a O
part O
of O
the O
network O
data O
encryption O
( O
hasn O
’ O
t O
changed O
from O
the O
previous O
version O
) O
The O
C2 O
URLs O
A O
randomized O
class O
name O
using O
the O
device O
’ O
s O
accessibility O
services O
EventBot B-Malware
extracted O
configuration O
Part O
of O
the O
extracted O
configuration O
of O
the O
new O
version O
. O
MALWARE O
UNDER O
ACTIVE O
DEVELOPMENT O
EventBot B-Malware
β€œ O
cfg O
” O
class O
EventBot B-Malware
β€œ O
cfg O
” O
class O
. O
EventBot B-Malware
is O
in O
constant O
development O
, O
as O
seen O
with O
the O
botnetID O
string O
above O
, O
which O
shows O
consecutive O
numbering O
across O
versions O
. O
This O
example O
is O
from O
a O
later O
version O
of O
EventBot B-Malware
, O
and O
in O
other O
versions O
the O
naming O
convention O
is O
very O
similar O
, O
with O
bot O
IDs O
such O
as O
word100 O
, O
word101 O
, O
word102 O
, O
and O
test2005 O
, O
test2006 O
etc O
. O
In O
the O
latest O
version O
, O
a O
layer O
of O
obfuscation O
was O
added O
, O
perhaps O
taking O
the O
malware O
one O
step O
closer O
to O
being O
fully O
operational O
. O
SUSPECTED O
DETECTION O
TESTS O
BY O
THE O
THREAT O
ACTOR O
In O
searching O
for O
EventBot B-Malware
, O
we O
’ O
ve O
identified O
multiple O
submissions O
from O
the O
same O
submitter O
hash O
, O
22b3c7b0 B-Indicator
: O
EventBot B-Malware
22b3c7b0 B-Indicator
submitter O
hash O
The O
22b3c7b0 B-Indicator
submitter O
hash O
that O
submitted O
most O
of O
the O
EventBot B-Malware
samples O
to O
VirusTotal O
. O
This O
submitter O
has O
thousands O
of O
other O
submissions O
in O
VirusTotal O
, O
however O
, O
it O
is O
the O
only O
one O
that O
continues O
to O
submit O
EventBot B-Malware
samples O
via O
the O
VirusTotal O
API O
. O
Also O
, O
the O
botnet O
IDs O
increment O
over O
time O
as O
they O
are O
submitted O
. O
Given O
this O
, O
and O
the O
naming O
convention O
of O
the O
submissions O
( O
.virus O
) O
, O
the O
submitter O
hash O
most O
likely O
belongs O
to O
an O
AV O
vendor O
or O
sandboxing O
environment O
that O
automatically O
submits O
samples O
to O
online O
malware O
databases O
. O
It O
may O
be O
that O
these O
submissions O
are O
made O
from O
the O
author O
’ O
s O
machine O
, O
or O
that O
they O
submit O
it O
to O
a O
detection O
service O
that O
in O
turn O
submits O
to O
online O
malware O
databases O
. O
EVENTBOT B-Malware
THREAT O
ACTORS O
As O
a O
part O
of O
this O
investigation O
, O
the O
Cybereason B-Organization
Nocturnus I-Organization
team O
has O
attempted O
to O
identify O
the O
threat O
actors O
behind O
the O
development O
of O
EventBot B-Malware
. O
The O
evidence O
above O
suggests O
that O
EventBot B-Malware
is O
still O
in O
the O
development O
stage O
, O
and O
as O
such O
, O
is O
not O
likely O
to O
have O
been O
used O
for O
large O
attack O
campaigns O
thus O
far O
. O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
is O
monitoring O
multiple O
underground O
platforms O
in O
an O
attempt O
to O
identify O
chatter O
relating O
to O
EventBot B-Malware
. O
New O
malware O
is O
often O
introduced O
to O
underground O
communities O
by O
being O
promoted O
and O
sold O
or O
offered O
as O
a O
giveaway O
. O
However O
, O
at O
the O
time O
of O
writing O
, O
we O
were O
unable O
to O
identify O
relevant O
conversations O
about O
the O
EventBot B-Malware
malware O
. O
This O
strengthens O
our O
suspicion O
that O
this O
malware O
is O
still O
undergoing O
development O
and O
has O
not O
been O
officially O
marketed O
or O
released O
yet O
. O
EVENTBOT B-Malware
INFRASTRUCTURE O
By O
mapping O
the O
C2 O
servers O
, O
a O
clear O
, O
repeated O
pattern O
emerges O
based O
on O
the O
specific O
URL O
gate_cb8a5aea1ab302f0_c O
. O
As O
of O
this O
writing O
, O
all O
the O
domains O
were O
registered O
recently O
and O
some O
are O
already O
offline O
. O
URL O
Status O
IP O
Domain O
registration O
date O
http B-Indicator
: I-Indicator
//ora.studiolegalebasili I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/gate_cb8a5aea1ab302f0_c I-Indicator
offline O
31.214.157 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
6 I-Indicator
2020-02-29 O
http B-Indicator
: I-Indicator
//themoil I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
site/gate_cb8a5aea1ab302f0_c I-Indicator
online O
208.91.197 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
91 I-Indicator
2020-03-04 O
http B-Indicator
: I-Indicator
//ora.carlaarrabitoarchitetto I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/gate_cb8a5aea1ab302f0_c I-Indicator
offline O
31.214.157 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
6 I-Indicator
2020-03-26 O
http B-Indicator
: I-Indicator
//rxc.rxcoordinator I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/gate_cb8a5aea1ab302f0_c I-Indicator
online O
185.158.248 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
102 I-Indicator
2020-03-29 O
http B-Indicator
: I-Indicator
//ora.blindsidefantasy I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/gate_cb8a5aea1ab302f0_c I-Indicator
online O
185.158.248 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
102 I-Indicator
2020-04-02 O
http B-Indicator
: I-Indicator
//marta.martatovaglieri I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
it/gate_cb8a5aea1ab302f0_c I-Indicator
online O
185.158.248 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
102 I-Indicator
2020-04-14 O
http B-Indicator
: I-Indicator
//pub.douglasshome I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/gate_cb8a5aea1ab302f0_c I-Indicator
online O
185.158.249 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
141 I-Indicator
2020-04-26 O
In O
the O
course O
of O
the O
investigation O
, O
the O
team O
discovered O
a O
potential O
link O
to O
an O
additional O
Android B-Malware
infostealer I-Malware
. O
The O
IP O
address O
of O
both O
ora.carlaarrabitoarchitetto B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
and O
ora.studiolegalebasili B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
, O
31.214.157 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
6 I-Indicator
, O
was O
previously O
hosting O
the O
domain B-Indicator
next.nextuptravel I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
. O
This O
was O
the O
C2 O
for O
an O
Android B-Malware
infostealer I-Malware
responsible O
for O
several O
attacks O
in O
Italy O
back O
in O
late O
2019 O
. O
EventBot B-Malware
VirusTotal O
search O
for O
the O
malicious O
IP O
address O
VirusTotal O
search O
for O
the O
malicious O
IP O
address O
. O
IMPACT O
EventBot B-Malware
is O
a O
mobile O
malware O
banking O
trojan O
that O
steals O
financial O
information O
, O
is O
able O
to O
hijack O
transactions O
. O
Once O
this O
malware O
has O
successfully O
installed O
, O
it O
will O
collect O
personal O
data O
, O
passwords O
, O
keystrokes O
, O
banking O
information O
, O
and O
more O
. O
This O
information O
can O
give O
the O
attacker O
access O
to O
personal O
and O
business O
bank O
accounts O
, O
personal O
and O
business O
data O
, O
and O
more O
. O
Letting O
an O
attacker O
get O
access O
to O
this O
kind O
of O
data O
can O
have O
severe O
consequences O
. O
60 O
% O
of O
devices O
containing O
or O
accessing O
enterprise O
data O
are O
mobile O
. O
Giving O
an O
attacker O
access O
to O
a O
mobile O
device O
can O
have O
severe O
business O
consequences O
, O
especially O
if O
the O
end O
user O
is O
using O
their O
mobile O
device O
to O
discuss O
sensitive O
business O
topics O
or O
access O
enterprise O
financial O
information O
. O
This O
can O
result O
in O
brand O
degradation O
, O
loss O
of O
individual O
reputation O
, O
or O
loss O
of O
consumer O
trust O
. O
Much O
like O
we O
have O
seen O
in O
recent O
months O
, O
anyone O
can O
be O
impacted O
by O
a O
mobile O
device O
attack O
. O
These O
attacks O
are O
only O
becoming O
more O
common O
, O
with O
one O
third O
of O
all O
malware O
now O
targeting O
mobile O
endpoints O
. O
Care O
and O
concern O
both O
for O
using O
a O
mobile O
device O
and O
for O
securing O
a O
mobile O
device O
is O
critical O
, O
especially O
for O
those O
organizations O
that O
allow O
bring-your-own-devices O
. O
CYBEREASON B-System
MOBILE I-System
Cybereason B-System
Mobile I-System
detects I-System
EventBot B-Malware
and O
immediately O
takes O
remediation O
actions O
to O
protect O
the O
end O
user O
. O
With O
Cybereason B-System
Mobile I-System
, O
analysts O
can O
address O
mobile O
threats O
in O
the O
same O
platform O
as O
traditional O
endpoint O
threats O
, O
all O
as O
part O
of O
one O
incident O
. O
Without O
mobile O
threat O
detection O
, O
this O
attack O
would O
not O
be O
detected O
, O
leaving O
end O
users O
and O
organizations O
at O
risk O
. O
Cybereason B-System
Mobile I-System
detects O
EventBot B-Malware
and O
provides O
the O
user O
with O
immediate O
actions O
. O
CONCLUSION O
In O
this O
research O
, O
the O
Nocturnus B-Organization
team O
has O
dissected O
a O
rapidly O
evolving O
Android B-Malware
malware O
in O
the O
making O
. O
This O
malware O
abuses O
the O
Android B-System
accessibility O
feature O
to O
steal O
user O
information O
and O
is O
able O
to O
update O
its O
code O
and O
release O
new O
features O
every O
few O
days O
. O
With O
each O
new O
version O
, O
the O
malware O
adds O
new O
features O
like O
dynamic O
library O
loading O
, O
encryption O
, O
and O
adjustments O
to O
different O
locales O
and O
manufacturers O
. O
EventBot B-Malware
appears O
to O
be O
a O
completely O
new O
malware O
in O
the O
early O
stages O
of O
development O
, O
giving O
us O
an O
interesting O
view O
into O
how O
attackers O
create O
and O
test O
their O
malware O
. O
Cybereason B-Organization
classifies O
EventBot B-Malware
as O
a O
mobile O
banking O
trojan O
and O
infostealer O
based O
on O
the O
stealing O
features O
discussed O
in O
this O
research O
. O
It O
leverages O
webinjects O
and O
SMS O
reading O
capabilities O
to O
bypass O
two-factor O
authentication O
, O
and O
is O
clearly O
targeting O
financial O
applications O
. O
Although O
the O
threat O
actor O
responsible O
for O
the O
development O
of O
EventBot B-Malware
is O
still O
unknown O
and O
the O
malware O
does O
not O
appear O
to O
be O
involved O
in O
major O
attacks O
, O
it O
is O
interesting O
to O
follow O
the O
early O
stages O
of O
mobile O
malware O
development O
. O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
will O
continue O
to O
monitor O
EventBot B-Malware
’ O
s O
development O
. O
In O
recent O
years O
, O
online O
activity O
has O
gradually O
been O
shifting O
from O
personal O
computers O
to O
mobile O
devices O
. O
Naturally O
, O
this O
resulted O
in O
the O
introduction O
of O
malware O
for O
mobile O
platforms O
, O
especially O
Android B-System
devices O
, O
including O
Cerberus B-Malware
, O
Xhelper B-Malware
and O
the O
Anubis B-Malware
Banking O
Trojan O
. O
As O
many O
people O
use O
their O
mobile O
devices O
for O
online O
shopping O
and O
even O
to O
manage O
their O
bank O
accounts O
, O
the O
mobile O
arena O
became O
increasingly O
profitable O
for O
cyber O
criminals O
. O
This O
is O
why O
we O
recently O
released O
Cybereason B-System
Mobile I-System
, O
a O
new O
offering O
that O
strengthens O
the O
Cybereason B-System
Defense I-System
Platform I-System
by O
bringing O
prevention O
, O
detection O
, O
and O
response O
capabilities O
to O
mobile O
devices O
. O
With O
Cybereason B-System
Mobile I-System
, O
our O
customers O
can O
protect O
against O
modern O
threats O
across O
traditional O
and O
mobile O
endpoints O
, O
all O
within O
a O
single O
console O
. O
Check B-Organization
Point I-Organization
Mobile B-System
Threat I-System
Prevention I-System
has O
detected O
two O
instances O
of O
a O
mobile O
malware O
variant O
infecting O
multiple O
devices O
within O
the O
Check B-Organization
Point I-Organization
customer O
base O
. O
The O
malware O
, O
packaged O
within O
an O
Android B-System
game O
app O
called O
BrainTest B-Malware
, O
had O
been O
published O
to O
Google B-System
Play I-System
twice O
. O
Each O
instance O
had O
between O
100,000 O
and O
500,000 O
downloads O
according O
to O
Google B-System
Play I-System
statistics O
, O
reaching O
an O
aggregated O
infection O
rate O
of O
between O
200,000 O
and O
1 O
million O
users O
. O
Check B-Organization
Point I-Organization
reached O
out O
to O
Google B-Organization
on O
September O
10 O
, O
2015 O
, O
and O
the O
app O
containing O
the O
malware O
was O
removed O
from O
Google B-System
Play I-System
on O
September O
15 O
, O
2015 O
. O
Overview O
The O
malware O
was O
first O
detected O
on O
a O
Nexus B-System
5 I-System
smartphone O
, O
and O
although O
the O
user O
attempted O
to O
remove O
the O
infected O
app O
, O
the O
malware O
reappeared O
on O
the O
same O
device O
shortly O
thereafter O
. O
Our O
analysis O
of O
the O
malware O
shows O
it O
uses O
multiple O
, O
advanced O
techniques O
to O
avoid O
Google B-System
Play I-System
malware O
detection O
and O
to O
maintain O
persistency O
on O
target O
devices O
. O
Once O
this O
malware O
was O
detected O
on O
a O
device O
, O
Mobile B-System
Threat I-System
Prevention I-System
adjusted O
security O
policies O
on O
the O
Mobile O
Device O
Management O
solution O
( O
MobileIron O
) O
managing O
the O
affected O
devices O
automatically O
, O
thereby O
blocking O
enterprise O
access O
from O
the O
infected O
devices O
. O
While O
the O
malware O
is O
capable O
of O
facilitating O
various O
cyber-criminal O
goals O
, O
our O
team O
confirmed O
it O
’ O
s O
currently O
installing O
additional O
apps O
on O
infected O
devices O
. O
Disturbingly O
, O
the O
malware O
establishes O
a O
rootkit O
on O
the O
device O
, O
allowing O
it O
to O
download O
and O
execute O
any O
code O
a O
cybercriminal O
would O
want O
to O
run O
on O
a O
device O
. O
For O
example O
, O
it O
could O
be O
used O
to O
display O
unwanted O
and O
annoying O
advertisements O
on O
a O
device O
, O
or O
potentially O
, O
to O
download O
and O
deploy O
a O
payload O
that O
steals O
credentials O
from O
an O
infected O
device O
. O
Highlights O
Samples O
of O
the O
malicious O
code O
found O
in O
BrainTest B-Malware
have O
been O
found O
on O
Google B-System
Play I-System
, O
and O
its O
creator O
has O
used O
multiple O
methods O
to O
evade O
detection O
by O
Google B-Organization
including O
Bypassing O
Google B-System
Bouncer I-System
by O
detecting O
if O
the O
malware O
is O
being O
run O
from O
an O
IP O
or O
domain O
mapped O
to O
Google B-System
Bouncer I-System
and O
, O
if O
so O
, O
it O
will O
not O
perform O
its O
intended O
malicious O
activities O
. O
Combining O
timebombs O
, O
dynamic O
code O
loading O
, O
and O
use O
of O
reflection O
to O
complicate O
reverse O
engineering O
of O
the O
malware O
. O
Using O
off-the-shelf O
obfuscation O
( O
packer O
) O
from O
Baidu B-Organization
to O
re-introduce O
the O
malware O
to O
Google B-System
Play I-System
after O
the O
first O
instance O
was O
removed O
on O
Aug O
24th O
. O
BrainTest B-Malware
uses O
four O
privilege B-Vulnerability
escalation I-Vulnerability
exploits I-Vulnerability
to O
gain O
root O
access O
on O
a O
device O
and O
to O
install O
a O
persistent O
malware O
as O
a O
system O
application O
. O
BrainTest B-Malware
leverages O
an O
anti-uninstall B-Vulnerability
watchdog I-Vulnerability
that O
uses O
two O
system O
applications O
to O
monitor O
the O
removal O
of O
one O
of O
the O
components O
and O
reinstall O
the O
component O
. O
After O
the O
the O
first O
instance O
of O
BrainTest B-Malware
was O
detected O
, O
Google B-Organization
removed O
the O
app O
from O
Google B-System
Play I-System
. O
Within O
days O
, O
the O
Check B-Organization
Point I-Organization
research O
team O
detected O
another O
instance O
with O
a O
different O
package O
name O
but O
which O
uses O
the O
same O
code O
. O
The O
malware O
’ O
s O
creators O
had O
used O
obfuscation O
to O
upload O
the O
new O
piece O
of O
malware O
to O
Google B-System
Play I-System
. O
Technical O
Analysis O
The O
malware O
consists O
of O
2 O
applications O
: O
The O
Dropper O
: O
Brain O
Test O
( O
Unpacked O
– O
com.mile.brain B-Indicator
, O
Packed O
– O
com.zmhitlte.brain B-Indicator
) O
This O
is O
installed O
from O
Google B-System
Play I-System
and O
downloads O
an O
exploit O
pack O
from O
the O
server O
to O
obtain O
root O
access O
on O
a O
device O
. O
If O
root O
access O
is O
obtained O
, O
the O
application O
downloads O
a O
malicious O
.apk O
file O
( O
The O
Backdoor O
) O
from O
the O
server O
and O
installs O
it O
as O
system O
application O
. O
The O
Backdoor O
: O
System O
malware O
( O
mcpef.apk B-Indicator
and O
brother.apk B-Indicator
) O
This O
tries O
a O
few O
persistence O
methods O
by O
using O
few O
anti-uninstall O
techniques O
( O
described O
below O
) O
and O
downloads O
and O
executes O
code O
from O
server O
without O
user O
consent O
. O
Detailed O
Malware O
Structure O
Malware O
Strucutre O
com.mile.brain B-Indicator
( O
SHA256 O
: O
135d6acff3ca27e6e7997429e5f8051f88215d12351e4103f8344cd66611e0f3 B-Indicator
) O
: O
This O
is O
the O
main O
application O
found O
on O
Google B-System
Play I-System
. O
It O
contains O
encrypted O
java O
archive O
β€œ O
start.ogg B-Indicator
” O
in O
the O
assets O
directory O
and O
dynamically O
loads O
code O
with O
dalvik.system.DexClassLoader B-Indicator
. O
do.jar B-Indicator
( O
SHA256 O
: O
a711e620246d9954510d3f1c8d5c784bacc78069a5c57b9ec09c3e234bc33a8b B-Indicator
) O
: O
The O
decrypted O
file O
that O
was O
created O
by O
β€œ O
start.ogg. B-Indicator
” O
It O
sends O
a O
request O
to O
the O
server O
with O
the O
device O
’ O
s O
configuration O
. O
The O
server O
’ O
s O
response O
is O
a O
json O
, O
containing O
a O
link O
to O
a O
.jar O
file O
, O
class O
name O
and O
method O
name O
to O
be O
executed O
with O
reflection O
API O
. O
The O
application O
downloads O
the O
file O
and O
dynamically O
loads O
it O
using O
dalvik.system.DexClassLoader O
and O
invokes O
class O
and O
method O
specified O
in O
json B-Indicator
. I-Indicator
jhfrte.jar I-Indicator
: O
This O
is O
a O
java O
archive O
file O
downloaded O
from O
server O
. O
If O
a O
device O
isn O
’ O
t O
rooted O
, O
it O
downloads O
from O
the O
server O
an O
exploit O
pack O
and O
executes O
it O
to O
obtain O
root O
on O
device O
. O
Once O
root O
is O
obtained O
, O
it O
downloads O
an O
additional O
APK O
file O
from O
the O
server O
( O
mcpef.apk B-Indicator
) O
and O
installs O
it O
as O
system O
application O
( O
/system O
directory O
) O
. O
r1-r4 O
: O
This O
is O
a O
local O
privilege O
escalation O
( O
root O
) O
exploit O
, O
which O
includes O
: O
CVE-2013-6282 B-Vulnerability
, O
camerageroot O
( O
http B-Indicator
: I-Indicator
//www.77169.org/exploits/2013/20130414031700 I-Indicator
) I-Indicator
, O
a O
rooting O
tool O
for O
mtk6592 O
and O
addtional O
exploit O
. O
nis O
: O
The O
su O
application O
used O
to O
execute O
shell O
commands O
with O
root O
privileges O
. O
mcpef.apk B-Indicator
( O
SHA256 O
: O
a8e7dfac00adf661d371ac52bddc03b543bd6b7aa41314b255e53d810931ceac B-Indicator
) O
: O
The O
malicious O
system O
application O
downloaded O
from O
server O
( O
package O
name O
– O
com.android.music.helper B-Indicator
) O
. O
This O
installs O
additional O
application O
from O
assets O
directory O
( O
brother.apk B-System
) O
and O
listens O
for O
PACKAGE_REMOVED O
events O
. O
If O
brother.apk B-System
application O
is O
removed O
, O
mcpef.apk B-System
reinstalls O
brother.apk B-System
from O
assets O
. O
brother.apk B-System
( O
SHA256 O
: O
422fec2e201600bb2ea3140951563f8c6fbd4f8279a04a164aca5e8e753c40e8 B-Indicator
) O
: O
The O
package O
name O
– O
com.android.system.certificate B-Indicator
. O
System O
application O
installed O
by O
mcpef.apk B-Indicator
. O
This O
has O
the O
same O
functionality O
as O
mcpef.apk B-Indicator
. O
In O
addition O
, O
it O
monitors O
to O
verify O
if O
com.android.music.helper B-Indicator
package O
is O
removed O
. O
If O
mcpef.apk B-Indicator
is O
removed O
, O
brother.apk B-Indicator
reinstalls O
it O
from O
a O
META-INF/brother O
file O
boy O
, O
post.sh B-Indicator
: O
The O
shell O
scripts O
u O
sed O
for O
application O
persistency O
. O
Application O
lifecycle O
Application O
Lifecycle O
Google B-System
Bouncer I-System
Bypass O
On O
start O
, O
the O
application O
checks O
if O
it O
is O
executed O
on O
one O
of O
the O
Google O
servers O
: O
IP O
ranges O
209.85.128.0-209.85.255.255 B-Indicator
, O
216.58.192.0-216.58.223.255 B-Indicator
, O
173.194.0.0-173.194.255.255 B-Indicator
, O
74.125.0.0-74.125.255.255 B-Indicator
or O
if O
it O
is O
executed O
on O
IP O
hosted O
domain O
that O
contains O
the O
following O
strings O
: O
β€œ O
google O
” O
, O
” O
android B-System
” O
, O
” O
1e100 O
” O
. O
If O
any O
of O
these O
conditions O
is O
true O
, O
the O
application O
does O
not O
continue O
to O
execute O
the O
malicious O
flow O
. O
This O
method O
is O
design O
to O
bypass O
the O
automatic O
Google B-System
Play I-System
protection O
mechanism O
called O
Bouncer B-System
. O
Timebombs O
, O
Dynamic O
Code O
Loading O
and O
Reflection O
If O
Google B-System
Bouncer I-System
was O
not O
detected O
, O
the O
application O
starts O
a O
time O
bomb O
which O
initiates O
the O
malicious O
flow O
only O
after O
20 O
seconds O
and O
will O
run O
every O
2 O
hours O
. O
The O
time O
bomb O
triggers O
unpacker O
thread O
. O
Unpacker O
thread O
decrypt O
java O
archive O
from O
assets O
directory O
β€œ O
start.ogg B-Indicator
” O
, O
and O
dynamically O
loads O
it O
and O
calls O
the O
method O
β€œ O
a.a.a.b O
” O
from O
this O
archive O
. O
This O
method O
checks O
if O
eight O
hours O
have O
passed O
from O
the O
first O
run O
of O
application O
, O
and O
if O
so O
, O
request O
containing O
the O
device O
’ O
s O
data O
to O
the O
server O
. O
The O
server O
sends O
back O
encoded O
json O
containing O
URL O
, O
class O
name O
and O
method O
name O
. O
Then O
the O
application O
downloads O
java O
archive O
from O
the O
URL O
specified O
in O
json O
, O
dynamically O
loads O
it O
with O
class O
loader O
API O
. O
Once O
archive O
is O
loaded O
, O
the O
application O
uses O
reflection O
api O
to O
call O
methods O
from O
the O
class O
names O
specified O
in O
the O
json O
. O
Rooting O
and O
Ad O
Network O
Presentation O
The O
reflection O
loaded O
methods O
check O
if O
the O
device O
is O
rooted O
. O
If O
not O
, O
the O
application O
downloads O
a O
pack O
of O
exploits O
from O
the O
server O
and O
runs O
them O
one-by-one O
up O
until O
root O
is O
achieved O
. O
As O
root O
, O
the O
application O
copies O
su O
binary O
to O
/system/bin O
directory O
and O
silently O
downloads O
apk O
file O
from O
the O
server O
. O
Then O
, O
the O
APK O
is O
installed O
as O
system O
application O
and O
registers O
listener O
on O
USER_PRESENT O
event O
. O
This O
event O
triggers O
archive O
downloading O
thread O
. O
Once O
the O
event O
is O
triggered O
, O
it O
registers O
a O
timer O
. O
The O
timer O
triggers O
additional O
thread O
which O
makes O
a O
request O
to O
the O
server O
. O
It O
expects O
a O
json O
with O
url O
, O
class O
and O
method O
name O
. O
It O
downloads O
one O
more O
archive O
and O
dynamically O
loads O
code O
from O
it O
. O
The O
final O
APK O
is O
downloaded O
from O
a O
different O
URL O
that O
is O
currently O
down O
, O
we O
assume O
that O
the O
apk O
purpose O
is O
overlaying O
ads O
on O
the O
screen O
, O
we O
assume O
this O
based O
on O
the O
research O
we O
have O
done O
on O
the O
API O
we O
found O
which O
returns O
URL O
of O
random O
APK O
file O
containing O
different O
advertising O
networks O
. O
Persistency O
Watch-Dog O
The O
application O
contains O
protection O
against O
its O
own O
removal O
. O
As O
outlined O
in O
the O
diagram O
above O
, O
It O
installs O
an O
additional O
application O
with O
the O
same O
functionality O
and O
these O
two O
applications O
monitor O
the O
removal O
of O
each O
other O
. O
If O
one O
of O
the O
applications O
is O
deleted O
, O
the O
second O
application O
downloads O
and O
re-installs O
the O
removed O
one O
. O
Network O
activity O
BrainTest O
communicates O
with O
five O
servers O
: O
APK O
files O
provider O
( O
http B-Indicator
: I-Indicator
//psserviceonline I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/ I-Indicator
) I-Indicator
: O
This O
server O
provides O
APK O
files O
with O
advertising O
network O
. O
We O
found O
two O
functions O
: O
The O
first O
function O
is O
http B-Indicator
: I-Indicator
//s.psserviceonline I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/api/s2s/tracks/ I-Indicator
and O
is O
used O
for O
activation O
. O
The O
second O
function O
is O
http B-Indicator
: I-Indicator
//s.psserviceonline I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com/api/ads/ I-Indicator
which O
is O
used O
for O
obtaining O
a O
link O
to O
APK O
file O
. O
Regardless O
of O
the O
parameters O
, O
it O
returns O
a O
json O
containing O
a O
link O
for O
APK O
file O
. O
File O
Server O
( O
http B-Indicator
: I-Indicator
//www.psservicedl I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
) O
: O
Contains O
android B-System
packages O
, O
java O
archives O
and O
zip O
archives O
with O
exploits O
Archive O
Link O
domains O
: O
Three O
domains O
with O
the O
same O
functionality O
, O
but O
the O
application O
chooses O
one O
of O
them O
to O
send O
request O
for O
archive O
link O
. O
http B-Indicator
: I-Indicator
//www.himobilephone I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
http B-Indicator
: I-Indicator
//www.adsuperiorstore I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
http B-Indicator
: I-Indicator
//www.i4vip I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
Counter O
Measures O
Use O
an O
up O
to O
date O
anti-malware O
software O
that O
is O
capable O
of O
identifying O
this O
threat O
. O
If O
the O
threat O
reappears O
on O
the O
device O
after O
the O
first O
installation O
, O
it O
means O
that O
the O
malware O
managed O
to O
install O
the O
persistency O
module O
in O
the O
System O
directory O
. O
In O
this O
case O
, O
the O
device O
should O
be O
re-flashed O
with O
an O
official O
ROM O
. O
Lookout B-Organization
Discovers O
Phishing O
Sites O
Distributing O
New O
IOS B-System
And O
Android B-System
Surveillanceware B-Malware
April O
8 O
, O
2019 O
For O
the O
past O
year O
, O
Lookout B-Organization
researchers O
have O
been O
tracking O
Android B-System
and O
iOS B-System
surveillanceware B-Malware
, O
that O
can O
exfiltrate O
contacts O
, O
audio O
recordings O
, O
photos O
, O
location O
, O
and O
more O
from O
devices O
. O
As O
has O
been O
previously O
reported O
, O
some O
versions O
of O
the O
Android B-System
malware O
were O
present O
in O
the O
Google B-System
Play I-System
Store I-System
. O
The O
iOS B-System
versions O
were O
available O
outside O
the O
app B-System
store I-System
, O
through O
phishing O
sites O
, O
and O
abused O
the O
Apple B-Organization
Developer I-Organization
Enterprise I-Organization
program O
. O
Background O
: O
Android B-System
surveillanceware O
Early O
last O
year O
, O
Lookout B-Organization
discovered O
a O
sophisticated O
Android B-System
surveillanceware O
agent O
that O
appears O
to O
have O
been O
created O
for O
the O
lawful O
intercept O
market O
. O
The O
agent O
appears O
to O
have O
been O
under O
development O
for O
at O
least O
five O
years O
and O
consists O
of O
three O
stages O
. O
First O
, O
there O
is O
a O
small O
dropper O
, O
then O
a O
large O
second O
stage O
payload O
that O
contains O
multiple O
binaries O
( O
where O
most O
of O
the O
surveillance O
functionality O
is O
implemented O
) O
, O
and O
finally O
a O
third O
stage O
which O
typically O
uses O
the O
DirtyCOW B-Vulnerability
exploit I-Vulnerability
( O
CVE-2016-5195 B-Vulnerability
) O
to O
obtain O
root O
. O
Security B-Organization
Without I-Organization
Borders I-Organization
has O
recently O
published O
an O
analysis O
of O
this O
family O
, O
independently O
, O
through O
their O
blog O
. O
Several O
technical O
details O
indicated O
that O
the O
software O
was O
likely O
the O
product O
of O
a O
well-funded O
development O
effort O
and O
aimed O
at O
the O
lawful O
intercept O
market O
. O
These O
included O
the O
use O
of O
certificate O
pinning O
and O
public O
key O
encryption O
for O
C2 O
communications O
, O
geo-restrictions O
imposed O
by O
the O
C2 O
when O
delivering O
the O
second O
stage O
, O
and O
the O
comprehensive O
and O
well O
implemented O
suite O
of O
surveillance O
features O
. O
Early O
versions O
of O
the O
Android B-System
application O
used O
infrastructure O
which O
belonged O
to O
a O
company O
named O
Connexxa B-Organization
S.R.L I-Organization
. I-Organization
and O
were O
signed O
using O
the O
name O
of O
an O
engineer O
who O
appears O
to O
hold O
equity O
in O
Connexxa B-Organization
. O
This O
engineer O
’ O
s O
name O
is O
also O
associated O
with O
a O
company O
called O
eSurv B-Organization
S.R.L I-Organization
. I-Organization
eSurv B-Organization
’ O
s O
public O
marketing O
is O
centered O
around O
video O
surveillance O
software O
and O
image O
recognition O
systems O
, O
but O
there O
are O
a O
number O
of O
individuals O
claiming O
to O
be O
mobile O
security O
researchers O
working O
at O
the O
company O
, O
including O
one O
who O
has O
publically O
made O
claims O
to O
be O
developing O
a O
mobile O
surveillance O
agent O
. O
Moreover O
, O
eSurv B-Organization
was O
a O
business O
unit O
of O
Connexxa B-Organization
and O
was O
leased O
to O
eSurv B-Organization
S.R.L I-Organization
in O
2014 O
. O
This O
business O
unit O
and O
the O
eSurv B-Organization
software O
and O
brand O
was O
sold O
from O
Connexxa B-Organization
S.R.L I-Organization
. I-Organization
to O
eSurv B-Organization
S.R.L I-Organization
. I-Organization
on O
Feb O
28 O
, O
2016 O
. O
Lookout B-Organization
notified O
Google B-Organization
of O
the O
potential O
threat O
shortly O
after O
it O
was O
discovered O
. O
Together O
, O
during O
the O
latter O
half O
of O
2018 O
, O
we O
worked O
to O
remove O
the O
apps O
from O
the O
Play B-System
store I-System
while O
it O
was O
being O
deployed O
in O
the O
wild O
. O
iOS B-System
development O
Analysis O
of O
these O
Android B-System
samples O
led O
to O
the O
discovery O
of O
infrastructure O
that O
contained O
several O
samples O
of O
an O
iOS B-System
port O
. O
So O
far O
, O
this O
software O
( O
along O
with O
the O
Android B-System
version O
) O
has O
been O
made O
available O
through O
phishing O
sites O
that O
imitated O
Italian O
and O
Turkmenistani O
mobile O
carriers O
. O
Wind B-Organization
Tre I-Organization
SpA I-Organization
- O
an O
Italian O
telecom O
operator O
TMCell B-Organization
- O
the O
state O
owned O
mobile O
operator O
in O
Turkmenistan O
Deployment O
to O
users O
outside O
Apple B-Organization
’ O
s O
app O
store O
was O
made O
possible O
through O
abuse O
of O
Apple B-Organization
’ O
s O
enterprise O
provisioning O
system O
. O
The O
Apple B-Organization
Developer I-Organization
Enterprise I-Organization
program O
is O
intended O
to O
allow O
organizations O
to O
distribute O
proprietary O
, O
in-house O
apps O
to O
their O
employees O
without O
needing O
to O
use O
the O
iOS B-System
App B-System
Store I-System
. O
A O
business O
can O
obtain O
access O
to O
this O
program O
only O
provided O
they O
meet O
requirements O
set O
out O
by O
Apple B-Organization
. O
It O
is O
not O
common O
to O
use O
this O
program O
to O
distribute O
malware O
, O
although O
there O
have O
been O
past O
cases O
where O
malware O
authors O
have O
done O
so O
. O
Each O
of O
the O
phishing O
sites O
contained O
links O
to O
a O
distribution O
manifest O
, O
which O
contained O
metadata O
such O
as O
the O
application O
name O
, O
version O
, O
icon O
, O
and O
a O
URL O
for O
the O
IPA O
file O
. O
To O
be O
distributed O
outside O
the O
app O
store O
, O
an O
IPA O
package O
must O
contain O
a O
mobile O
provisioning O
profile O
with O
an O
enterprise O
’ O
s O
certificate O
. O
All O
these O
packages O
used O
provisioning O
profiles O
with O
distribution O
certificates O
associated O
with O
the O
company O
Connexxa B-Organization
S.R.L I-Organization
. I-Organization
Certificate O
Used O
The O
apps O
themselves O
pretended O
to O
be O
carrier O
assistance O
apps O
which O
instructed O
the O
user O
to O
β€œ O
keep O
the O
app O
installed O
on O
your O
device O
and O
stay O
under O
Wi-Fi O
coverage O
to O
be O
contacted O
by O
one O
of O
our O
operators O
” O
. O
One O
of O
the O
packages O
after O
initial O
launch O
The O
iOS B-System
variant O
is O
not O
as O
sophisticated O
as O
the O
Android B-System
version O
, O
and O
contained O
a O
subset O
of O
the O
functionality O
the O
Android B-System
releases O
offered O
. O
In O
particular O
, O
these O
packages O
have O
not O
been O
observed O
to O
contain O
or O
to O
download O
exploits O
which O
would O
be O
required O
to O
perform O
certain O
types O
of O
activities O
on O
iOS B-System
devices O
. O
Even O
without O
capabilities O
to O
exploit O
a O
device O
, O
the O
packages O
were O
able O
to O
exfiltrate O
the O
following O
types O
of O
data O
using O
documented O
APIs O
: O
Contacts O
Audio O
recordings O
Photos O
Videos O
GPS B-System
location O
Device O
information O
In O
addition O
, O
the O
packages O
offered O
a O
feature O
to O
perform O
remote O
audio O
recording O
. O
Though O
different O
versions O
of O
the O
app O
vary O
in O
structure O
, O
malicious O
code O
was O
initialized O
at O
application O
launch O
without O
the O
user O
’ O
s O
knowledge O
, O
and O
a O
number O
of O
timers O
were O
setup O
to O
gather O
and O
upload O
data O
periodically O
. O
Upload O
data O
was O
queued O
and O
transmitted O
via O
HTTP B-Indicator
PUT O
requests O
to O
an O
endpoint O
on O
the O
C2 O
. O
The O
iOS B-System
apps O
leverage O
the O
same O
C2 O
infrastructure O
as O
the O
Android B-System
version O
and O
use O
similar O
communications O
protocols O
. O
Push O
notifications O
were O
also O
used O
to O
control O
audio O
recording O
. O
Lookout B-Organization
has O
shared O
information O
about O
this O
family O
with O
Apple B-Organization
, O
and O
they O
have O
revoked O
the O
affected O
certificates O
. O
As O
a O
result O
, O
no O
new O
instances O
of O
this O
app O
can O
be O
installed O
on O
iOS B-System
devices O
and O
existing O
installations O
can O
no O
longer O
be O
run O
. O
Lookout B-Organization
customers O
are O
also O
protected O
from O
this O
threat O
on O
both O
Android B-System
and O
iOS B-System
. O
Android B-System
Trojan O
Found O
in O
Targeted O
Attack O
26 O
MAR O
2013 O
In O
the O
past O
, O
we O
’ O
ve O
seen O
targeted O
attacks O
against O
Tibetan O
and O
Uyghur O
activists O
on O
Windows B-System
and O
Mac B-System
OS I-System
X I-System
platforms O
. O
We O
’ O
ve O
documented O
several O
interesting O
attacks O
( O
A O
Gift O
for O
Dalai O
Lamas O
Birthday O
and O
Cyber O
Attacks O
Against O
Uyghur O
Mac B-System
OS I-System
X I-System
Users O
Intensify O
) O
which O
used O
ZIP O
files O
as O
well O
as O
DOC O
, O
XLS O
and O
PDF O
documents O
rigged O
with O
exploits O
. O
Several O
days O
ago O
, O
the O
e-mail O
account O
of O
a O
high-profile O
Tibetan O
activist O
was O
hacked O
and O
used O
to O
send O
targeted O
attacks O
to O
other O
activists O
and O
human O
rights O
advocates O
. O
Perhaps O
the O
most O
interesting O
part O
is O
that O
the O
attack O
e-mails O
had O
an O
APK O
attachment O
– O
a O
malicious O
program O
for O
Android B-System
. O
The O
attack O
On O
March O
24th O
, O
2013 O
, O
the O
e-mail O
account O
of O
a O
high-profile O
Tibetan O
activist O
was O
hacked O
and O
used O
to O
send O
spear O
phishing O
e-mails O
to O
their O
contact O
list O
. O
This O
is O
what O
the O
spear O
phishing O
e-mail O
looked O
like O
: O
In O
regards O
to O
the O
message O
text O
above O
, O
multiple O
activist O
groups O
have O
recently O
organized O
a O
human O
rights O
conference O
event O
in O
Geneva O
. O
We O
’ O
ve O
noticed O
an O
increase O
in O
the O
number O
of O
attacks O
using O
this O
event O
as O
a O
lure O
. O
Here O
’ O
s O
another O
example O
of O
such O
an O
attack O
hitting O
Windows B-System
users O
: O
Going O
back O
to O
the O
Android B-System
Package I-System
( O
APK O
) O
file O
was O
attached O
to O
the O
e-mail O
, O
this O
is O
pushing O
an O
Android O
application O
named O
β€œ O
WUC B-Malware
’ I-Malware
s I-Malware
Conference.apk I-Malware
” O
. O
This O
malicious O
APK O
is O
334326 O
bytes O
file O
, O
MD5 O
: O
0b8806b38b52bebfe39ff585639e2ea2 B-Indicator
and O
is O
detected O
by O
Kaspersky B-Organization
Lab I-Organization
products O
as O
β€œ O
Backdoor.AndroidOS.Chuli.a B-Indicator
” O
. O
After O
the O
installation O
, O
an O
application O
named O
β€œ O
Conference O
” O
appears O
on O
the O
desktop O
: O
If O
the O
victim O
launches O
this O
app O
, O
he O
will O
see O
text O
which O
β€œ O
enlightens O
” O
the O
information O
about O
the O
upcoming O
event O
: O
The O
full O
text O
reads O
follows O
. O
Notice O
notice O
the O
use O
of O
the O
mistaken O
β€œ O
Word O
” O
instead O
of O
β€œ O
World O
” O
: O
β€œ O
On O
behalf O
of O
all O
at O
the O
Word B-Organization
Uyghur I-Organization
Congress I-Organization
( I-Organization
WUC I-Organization
) I-Organization
, O
the O
Unrepresented B-Organization
Nations I-Organization
and I-Organization
Peoples I-Organization
Organization I-Organization
( I-Organization
UNPO I-Organization
) I-Organization
and O
the O
Society B-Organization
for I-Organization
Threatened I-Organization
Peoples I-Organization
( I-Organization
STP I-Organization
) I-Organization
, O
Human O
Rights O
in O
China O
: O
Implications O
for O
East O
Turkestan O
, O
Tibet O
and O
Southern O
Mongolia O
In O
what O
was O
an O
unprecedented O
coming-together O
of O
leading O
Uyghur O
, O
Mongolian O
, O
Tibetan O
and O
Chinese O
activists O
, O
as O
well O
as O
other O
leading O
international O
experts O
, O
we O
were O
greatly O
humbled O
by O
the O
great O
enthusiasm O
, O
contribution O
and O
desire O
from O
all O
in O
attendance O
to O
make O
this O
occasion O
something O
meaningful O
, O
the O
outcome O
of O
which O
produced O
some O
concrete O
, O
action-orientated O
solutions O
to O
our O
shared O
grievances O
. O
We O
are O
especially O
delighted O
about O
the O
platform O
and O
programme O
of O
work O
established O
in O
the O
declaration O
of O
the O
conference O
, O
upon O
which O
we O
sincerely O
hope O
will O
be O
built O
a O
strong O
and O
resolute O
working O
relationship O
on O
our O
shared O
goals O
for O
the O
future O
. O
With O
this O
in O
mind O
, O
we O
thoroughly O
look O
forward O
to O
working O
with O
you O
on O
these O
matters O
. O
Dolkun O
lsa O
Chairman O
of O
the O
Executive B-Organization
Committee I-Organization
Word I-Organization
Uyghur I-Organization
Congress I-Organization
” O
While O
the O
victim O
reads O
this O
fake O
message O
, O
the O
malware O
secretly O
reports O
the O
infection O
to O
a O
command-and-control O
server O
. O
After O
that O
, O
it O
begins O
to O
harvest O
information O
stored O
on O
the O
device O
. O
The O
stolen O
data O
includes O
: O
Contacts O
( O
stored O
both O
on O
the O
phone O
and O
the O
SIM O
card O
) O
. O
Call O
logs O
. O
SMS O
messages O
. O
Geo-location O
. O
Phone O
data O
( O
phone O
number O
, O
OS O
version O
, O
phone O
model O
, O
SDK O
version O
) O
. O
It O
is O
important O
to O
note O
that O
the O
data O
won O
’ O
t O
be O
uploaded O
to O
C O
& O
C O
server O
automatically O
. O
The O
Trojan O
waits O
for O
incoming O
SMS O
messages O
( O
the O
β€œ O
alarmReceiver.class B-Indicator
” O
) O
and O
checks O
whether O
these O
messages O
contain O
one O
of O
the O
following O
commands O
: O
β€œ O
sms O
” O
, O
β€œ O
contact O
” O
, O
β€œ O
location O
” O
, O
β€œ O
other O
” O
. O
If O
one O
these O
commands O
is O
found O
, O
then O
the O
malware O
will O
encode O
the O
stolen O
data O
with O
Base64 O
and O
upload O
it O
to O
the O
command O
and O
control O
server O
. O
The O
C2 O
URL O
is O
: O
hxxp B-Indicator
: I-Indicator
//64.78.161.133/ I-Indicator
* I-Indicator
victims I-Indicator
’ I-Indicator
s_cell_phone_number I-Indicator
* I-Indicator
/process.php I-Indicator
In O
addition O
to O
this O
, O
the O
malware O
also O
reports O
to O
another O
script O
, O
β€œ O
hxxp B-Indicator
: I-Indicator
//64.78.161.33/android.php I-Indicator
” O
. O
First O
, O
it O
will O
get O
the O
β€œ O
nativenumber O
” O
variable O
from O
the O
β€œ O
telmark O
” O
value O
of O
β€œ O
AndroidManifest.xml B-System
” O
. O
This O
is O
hardcoded O
and O
equals O
β€œ O
phone O
” O
. O
Then O
, O
it O
will O
add O
the O
result O
of O
the O
public O
method O
localDate.getTime O
( O
) O
, O
which O
simply O
gets O
the O
current O
date O
. O
An O
example O
of O
the O
string O
which O
is O
sent O
to O
the O
command-and-control O
would O
be O
β€œ O
phone O
26.03.2013 O
” O
. O
It O
is O
interesting O
that O
the O
attackers O
used O
Java O
Base64 O
library O
developed O
by O
Sauron B-Organization
Software I-Organization
. O
This O
software O
is O
free O
and O
distributed O
under O
LGPL O
license O
. O
Also O
, O
command O
communications O
with O
the O
malware O
are O
parsed O
with O
a O
function O
named O
β€œ O
chuli O
( O
) O
” O
prior O
to O
POSTing O
stolen O
data O
to O
the O
command-and-control O
server O
. O
It O
appears O
that O
the O
attackers O
are O
somewhat O
familiar O
with O
the O
language O
and O
mountain-trekking O
culture O
of O
the O
targets O
– O
the O
meaning O
of O
β€œ O
chuli O
” O
is O
β€œ O
summit O
” O
: O
The O
command-and-control O
server O
and O
parameters O
can O
be O
easily O
seen O
in O
the O
decompiled O
source O
code O
: O
Command O
and O
control O
server O
interaction O
code O
Throughout O
the O
code O
, O
the O
attackers O
log O
all O
important O
actions O
, O
which O
include O
various O
messages O
in O
Chinese O
. O
This O
was O
probably O
done O
for O
debugging O
purposes O
, O
indicating O
the O
malware O
may O
be O
an O
early O
prototype O
version O
. O
Some O
actions O
include O
( O
with O
rough O
translations O
) O
: O
The O
command-and-control O
server O
The O
command-and-control O
server O
is O
located O
at O
IP O
64.78.161.133 B-Indicator
. O
This O
IP O
is O
located O
in O
Los O
Angeles O
, O
U.S.A. O
, O
at O
a O
hosting O
company O
named O
β€œ O
Emagine B-Organization
Concept I-Organization
Inc I-Organization
” O
. O
Interestingly O
, O
there O
is O
a O
domain O
which O
used O
to O
point O
there O
, O
β€œ O
DlmDocumentsExchange.com B-Indicator
” O
. O
The O
domain O
was O
registered O
on O
March O
8th O
, O
2013 O
: O
Registration O
Service O
Provided O
By O
: O
SHANGHAI B-Organization
MEICHENG I-Organization
TECHNOLOGY I-Organization
INFORMATION I-Organization
DEVELOPMENT I-Organization
CO. I-Organization
, I-Organization
LTD. I-Organization
Domain O
Name O
: O
DLMDOCUMENTSEXCHANGE.COM B-Indicator
Registration O
Date O
: O
08-Mar-2013 O
Expiration O
Date O
: O
08-Mar-2014 O
Status O
: O
LOCKED O
The O
domain O
registration O
data O
indicates O
the O
following O
owner O
: O
Registrant O
Contact O
Details O
: O
peng O
jia O
peng O
jia O
( O
bdoufwke123010 B-Indicator
@ I-Indicator
gmail.com I-Indicator
) O
beijingshiahiidienquc.d B-Indicator
beijingshi O
beijing,100000 O
CN O
Tel O
. O
+86.01078456689 O
Fax O
. O
+86.01078456689 O
The O
command-and-control O
server O
is O
hosting O
an O
index O
page O
which O
also O
serves O
an O
APK O
file O
: O
The O
referenced O
β€œ O
Document.apk B-Indicator
” O
is O
333583 O
bytes O
in O
size O
, O
MD5 O
: O
c4c4077e9449147d754afd972e247efc B-Indicator
. O
It O
has O
the O
same O
functionality O
as O
the O
one O
described O
above O
but O
contains O
different O
text O
. O
The O
new O
text O
( O
in O
Chinese O
, O
about O
relations O
between O
China O
, O
Japan O
and O
the O
disputed O
β€œ O
Senkaku O
Islands O
/ O
Diaoyudao O
Islands O
/ O
Diaoyutai O
Islands O
” O
) O
is O
shown O
to O
the O
victims O
and O
reads O
as O
following O
: O
When O
opened O
in O
a O
browser O
, O
this O
is O
what O
the O
command-and-control O
index O
page O
looks O
like O
: O
The O
text O
on O
the O
top O
means O
β€œ O
Title O
Title O
Title O
” O
in O
Chinese O
, O
while O
the O
other O
strings O
appear O
to O
be O
random O
characters O
typed O
from O
the O
keyboard O
. O
Interestingly O
, O
the O
command O
and O
control O
server O
includes O
a O
publicly O
accessible O
interface O
to O
work O
with O
the O
victims O
: O
Some O
of O
the O
commands O
with O
rough O
translations O
: O
The O
command-and-control O
server O
is O
running O
Windows B-System
Server I-System
2003 O
and O
has O
been O
configured O
for O
Chinese O
language O
: O
This O
, O
together O
with O
the O
logs O
, O
is O
a O
strong O
indicator O
that O
the O
attackers O
are O
Chinese-speaking O
. O
Conclusions O
Every O
day O
, O
there O
are O
hundreds O
if O
not O
thousands O
of O
targeted O
attacks O
against O
Tibetan O
and O
Uyghur O
supporters O
. O
The O
vast O
majority O
of O
these O
target O
Windows B-System
machines O
through O
Word B-System
documents O
exploiting O
known O
vulnerabilities O
such O
as O
CVE-2012-0158 B-Vulnerability
, O
CVE-2010-3333 B-Vulnerability
and O
CVE-2009-3129 B-Vulnerability
. O
In O
this O
case O
, O
the O
attackers O
hacked O
a O
Tibetan O
activist O
’ O
s O
account O
and O
used O
it O
to O
attack O
Uyghur O
activists O
. O
It O
indicates O
perhaps O
an O
interesting O
trend O
which O
is O
exploiting O
the O
trust O
relationships O
between O
the O
two O
communities O
. O
This O
technique O
reminds O
us O
of O
a O
combination O
between O
ages O
old O
war O
strategies O
β€œ O
Divide O
et O
impera O
” O
and O
β€œ O
By O
way O
of O
deception O
” O
. O
Until O
now O
, O
we O
haven O
’ O
t O
seen O
targeted O
attacks O
against O
mobile O
phones O
, O
although O
we O
’ O
ve O
seen O
indications O
that O
these O
were O
in O
development O
. O
The O
current O
attack O
took O
advantage O
of O
the O
compromise O
of O
a O
high-profile O
Tibetan O
activist O
. O
It O
is O
perhaps O
the O
first O
in O
a O
new O
wave O
of O
targeted O
attacks O
aimed O
at O
Android B-System
users O
. O
So O
far O
, O
the O
attackers O
relied O
entirely O
on O
social O
engineering O
to O
infect O
the O
targets O
. O
History O
has O
shown O
us O
that O
, O
in O
time O
, O
these O
attacks O
will O
use O
zero-day B-Vulnerability
vulnerabilities I-Vulnerability
, O
exploits O
or O
a O
combination O
of O
techniques O
. O
For O
now O
, O
the O
best O
protection O
is O
to O
avoid O
any O
APK O
attachments O
that O
arrive O
on O
mobile O
phones O
via O
e-mail O
. O
We O
detect O
the O
malware O
used O
in O
this O
attack O
as O
β€œ O
Backdoor.AndroidOS.Chuli.a B-Malware
” O
. O
MD5s O
: O
c4c4077e9449147d754afd972e247efc B-Indicator
Document.apk B-Indicator
0b8806b38b52bebfe39ff585639e2ea2 B-Indicator
WUC O
’ O
s O
Conference.apk B-Indicator
Triada B-Malware
: O
organized O
crime O
on O
Android B-System
Triada B-Malware
is O
a O
modular O
mobile O
Trojan O
that O
actively O
uses O
root O
privileges O
to O
substitute O
system O
files O
and O
uses O
several O
clever O
methods O
to O
become O
almost O
invisible O
March O
3 O
, O
2016 O
You O
know O
how O
armies O
typically O
move O
: O
first O
come O
the O
scouts O
to O
make O
sure O
everything O
is O
ok. O
Then O
the O
heavy O
troops O
arrive O
; O
at O
least O
that O
was O
how O
it O
used O
to O
be O
before O
the O
age O
of O
cyber O
wars O
. O
It O
turns O
out O
, O
that O
Trojans O
behave O
quite O
the O
same O
way O
. O
There O
are O
a O
lot O
of O
small O
Trojans O
for O
Android B-System
capable O
of O
leveraging O
access O
privileges O
, O
in O
other O
words O
β€” O
gaining O
root O
access O
. O
Our O
malware O
analysts O
Nikita O
Buchka O
and O
Mikhail O
Kuzin O
can O
easily O
name O
11 O
families O
of O
such O
Trojans O
. O
Most O
of O
them O
are O
almost O
harmless O
β€” O
all O
they O
did O
until O
recently O
was O
injecting O
tons O
of O
ads O
and O
downloading O
others O
of O
their O
kind O
. O
If O
you O
want O
to O
know O
more O
about O
them O
β€” O
our O
researchers O
have O
an O
article O
about O
them O
on O
Securelist B-Organization
. O
If O
you O
follow O
the O
military O
analogy O
β€” O
those O
are O
the O
scouts O
. O
As O
you O
probably O
have O
noticed O
, O
gaining O
root O
access O
gives O
them O
the O
capability O
to O
download O
and O
install O
applications O
β€” O
that O
’ O
s O
the O
reason O
why O
once O
one O
of O
them O
get O
into O
the O
system O
, O
in O
a O
few O
minutes O
there O
are O
all O
the O
others O
. O
But O
our O
researchers O
have O
predicted O
that O
these O
small O
Trojans O
would O
certainly O
be O
used O
to O
download O
some O
really O
bad O
malware O
that O
can O
actually O
harm O
the O
owners O
of O
the O
infected O
devices O
. O
And O
that O
’ O
s O
exactly O
what O
has O
happened O
recently O
. O
Small O
Trojans O
like O
Leech B-Malware
, O
Ztorg B-Malware
and O
Gopro B-Malware
now O
download O
one O
of O
the O
most O
advanced O
mobile O
Trojans O
our O
malware O
analysts O
have O
ever O
encountered O
β€” O
we O
call O
it O
Triada B-Malware
. O
Triada B-Malware
is O
a O
modular O
mobile O
Trojan O
that O
actively O
uses O
root O
privileges O
to O
substitute O
system O
files O
and O
exists O
mostly O
in O
the O
device O
’ O
s O
RAM O
, O
which O
makes O
it O
extremely O
hard O
to O
detect O
. O
The O
dark O
ways O
of O
the O
Triada B-Malware
Once O
downloaded O
and O
installed O
, O
the O
Triada B-Malware
Trojan O
first O
tries O
to O
collect O
some O
information O
about O
the O
system O
β€” O
like O
the O
device O
model O
, O
the O
OS O
version O
, O
the O
amount O
of O
the O
SD O
card O
space O
, O
the O
list O
of O
the O
installed O
applications O
and O
other O
things O
. O
Then O
it O
sends O
all O
that O
information O
to O
the O
Command O
& O
Control O
server O
. O
We O
have O
detected O
a O
total O
of O
17 O
C O
& O
C O
servers O
on O
4 O
different O
domains O
, O
which O
probably O
means O
the O
bad O
guys O
are O
quite O
familiar O
with O
what O
redundancy O
is O
. O
The O
C O
& O
C O
server O
then O
responds O
with O
a O
configuration O
file O
, O
containing O
the O
personal O
identification O
number O
for O
the O
device O
and O
some O
settings O
β€” O
the O
time O
interval O
between O
contacting O
the O
server O
, O
the O
list O
of O
modules O
to O
be O
installed O
and O
so O
on O
. O
After O
the O
modules O
are O
installed O
they O
are O
deployed O
to O
the O
short O
term O
memory O
and O
deleted O
from O
the O
device O
storage O
, O
which O
makes O
the O
Trojan O
a O
lot O
harder O
to O
catch O
. O
There O
are O
two O
more O
reasons O
why O
Triada B-Malware
is O
so O
hard O
to O
detect O
and O
why O
it O
had O
impressed O
our O
researchers O
so O
much O
. O
First O
, O
it O
modifies O
the O
Zygote B-System
process O
. O
Zygote B-System
is O
the O
core O
process O
in O
the O
Android B-System
OS O
that O
is O
used O
as O
a O
template O
for O
every O
application O
, O
which O
means O
that O
once O
the O
Trojan O
gets O
into O
Zygote B-System
, O
it O
becomes O
a O
part O
of O
literally O
every O
app O
that O
is O
launched O
on O
the O
device O
. O
Triada B-Malware
: O
organized O
crime O
on O
Android B-System
Second O
, O
it O
substitutes O
the O
system O
functions O
and O
conceals O
its O
modules O
from O
the O
list O
of O
the O
running O
processes O
and O
installed O
apps O
. O
So O
the O
system O
doesn O
’ O
t O
see O
any O
strange O
processes O
running O
and O
thus O
does O
not O
cry O
the O
alarm O
. O
Those O
are O
not O
the O
only O
system O
functions O
Triada B-Malware
modifies O
. O
As O
our O
researchers O
discovered O
, O
it O
also O
lays O
its O
hands O
on O
the O
outgoing O
SMS O
and O
filters O
the O
incoming O
ones O
. O
That O
is O
actually O
how O
the O
bad O
guys O
decided O
to O
monetize O
the O
Trojan O
. O
Some O
applications O
rely O
on O
SMS O
when O
it O
comes O
to O
in-app O
purchases O
β€” O
the O
transaction O
data O
is O
transferred O
via O
a O
short O
text O
message O
. O
The O
main O
reason O
for O
developers O
to O
choose O
SMS O
over O
traditional O
payments O
via O
Internet O
is O
that O
in O
the O
case O
with O
SMS O
no O
Internet O
connection O
is O
required O
. O
Users O
do O
not O
see O
those O
SMS O
because O
they O
are O
processed O
not O
by O
the O
SMS O
app O
, O
but O
by O
the O
app O
that O
has O
initiated O
the O
transaction O
β€” O
e.g O
a O
free-to-play O
game O
. O
Triada B-Malware
’ O
s O
functionality O
allows O
it O
to O
modify O
those O
messages O
, O
so O
the O
money O
is O
sent O
not O
to O
some O
app O
developer O
, O
but O
to O
the O
malware O
operators O
. O
Triada B-Malware
steals O
the O
money O
either O
from O
the O
users O
β€” O
if O
they O
haven O
’ O
t O
succeeded O
in O
purchasing O
whatever O
they O
wanted O
, O
or O
from O
the O
app O
developers O
, O
in O
case O
the O
user O
has O
completed O
the O
purchase O
successfully O
. O
For O
now O
, O
that O
is O
the O
only O
way O
how O
cybercriminals O
can O
profit O
from O
Triada B-Malware
, O
but O
don O
’ O
t O
forget O
that O
it O
’ O
s O
a O
modular O
Trojan O
, O
so O
it O
can O
be O
turned O
into O
literally O
everything O
on O
one O
command O
from O
the O
C O
& O
C O
server O
. O
Fighting O
organized O
crime O
in O
your O
phone O
One O
of O
the O
main O
problems O
with O
Triada B-Malware
is O
that O
it O
can O
potentially O
hurt O
a O
LOT O
of O
people O
. O
As O
we O
’ O
ve O
mentioned O
earlier O
, O
Triada B-Malware
is O
downloaded O
by O
smaller O
Trojans O
that O
have O
leveraged O
the O
access O
privileges O
. O
And O
our O
researchers O
estimate O
that O
in O
every O
10 O
Android B-System
users O
1 O
was O
attacked O
by O
either O
one O
or O
several O
of O
those O
Trojans O
during O
the O
second O
half O
of O
2015 O
, O
so O
there O
are O
millions O
of O
devices O
with O
a O
huge O
possibility O
of O
being O
infected O
with O
Triada B-Malware
. O
So O
, O
what O
can O
you O
do O
to O
protect O
yourself O
from O
this O
stealthy O
beast O
? O
1 O
. O
Never O
forget O
to O
update O
your O
system O
. O
It O
turns O
out O
that O
those O
smaller O
Trojans O
face O
serious O
problems O
trying O
to O
get O
root O
access O
on O
Android B-System
4.4.4 I-System
and O
above O
, O
because O
a O
lot O
of O
vulnerabilities O
were O
patched O
in O
these O
versions O
. O
So O
if O
you O
have O
Android B-System
4.4.4 I-System
or O
some O
more O
recent O
version O
of O
this O
OS O
on O
your O
device O
, O
your O
chances O
of O
getting O
infected O
with O
Triada B-Malware
are O
significantly O
lower O
. O
Yet O
our O
statistics O
says O
that O
about O
60 O
% O
of O
Android B-System
users O
are O
still O
sitting O
with O
Android B-System
4.4.2 I-System
and I-System
below I-System
. O
Triada B-Malware
: O
organized O
crime O
on O
Android B-System
2 O
. O
Better O
not O
to O
take O
any O
chances O
at O
all O
, O
no O
matter O
which O
version O
of O
the O
OS O
you O
use O
. O
So O
we O
recommend O
installing O
an O
anti-virus O
solution O
on O
your O
Android O
device O
. O
Kaspersky B-System
Internet I-System
Security I-System
for O
Android B-System
detects O
all O
three O
of O
Triada B-Malware
’ O
s O
modules O
, O
so O
it O
can O
save O
your O
money O
from O
cybercriminals O
that O
are O
behind O
Triada B-Malware
. O
Just O
don O
’ O
t O
forget O
that O
the O
scan O
does O
not O
run O
automatically O
in O
the O
free O
version O
. O
But O
all O
in O
all O
Triada B-Malware
is O
yet O
another O
example O
of O
a O
really O
bad O
trend O
: O
malware O
developers O
are O
taking O
Android B-System
seriously O
, O
and O
the O
latest O
samples O
are O
almost O
as O
complex O
and O
hard O
to O
withstand O
, O
as O
their O
Windows-based B-System
kin O
. O
The O
only O
good O
way O
to O
fight O
all O
these O
threats O
is O
to O
be O
proactive O
, O
and O
so O
a O
good O
security O
solution O
is O
a O
must O
. O
TrickBot B-Malware
Pushing O
a O
2FA O
Bypass O
App O
to O
Bank O
Customers O
in O
Germany O
March O
24 O
, O
2020 O
IBM B-Organization
X-Force I-Organization
researchers O
analyzed O
an O
Android B-System
malware O
app O
that O
’ O
s O
likely O
being O
pushed O
to O
infected O
users O
by O
the O
TrickBot B-Malware
Trojan O
. O
This O
app O
, O
dubbed O
β€œ O
TrickMo B-Malware
” O
by O
our O
team O
, O
is O
designed O
to O
bypass O
second O
factor O
and O
strong O
authentication O
pushed O
to O
bank O
customers O
when O
they O
need O
to O
authorize O
a O
transaction O
. O
While O
it O
’ O
s O
not O
the O
first O
of O
its O
kind O
, O
this O
Android B-System
malware O
app O
is O
more O
sophisticated O
than O
similar O
apps O
and O
possesses O
interesting O
features O
that O
enable O
its O
operators O
to O
steal O
transaction O
authorization O
codes O
from O
victims O
who O
download O
the O
app O
. O
According O
to O
our O
research O
, O
TrickMo B-Malware
is O
still O
under O
active O
development O
as O
we O
expect O
to O
see O
frequent O
changes O
and O
updates O
. O
While O
it O
can O
be O
used O
anywhere O
and O
target O
any O
bank O
or O
region O
, O
at O
this O
time O
, O
we O
are O
seeing O
it O
deployed O
specifically O
in O
Germany O
. O
Germany O
is O
one O
of O
the O
first O
attack O
turfs O
TrickBot B-Malware
spread O
to O
when O
it O
first O
emerged O
in O
2016 O
. O
In O
2020 O
, O
it O
appears O
that O
TrickBot B-Malware
’ O
s O
vast O
bank O
fraud O
is O
an O
ongoing O
project O
that O
helps O
the O
gang O
monetize O
compromised O
accounts O
. O
First O
Signs O
in O
September O
2019 O
In O
September O
2019 O
, O
a O
tweet O
by O
CERT-Bund B-Organization
caught O
the O
attention O
of O
the O
IBM B-Organization
Trusteer I-Organization
Mobile I-Organization
Security I-Organization
Research I-Organization
team O
. O
The O
tweet O
stated O
that O
TrickBot B-Malware
, O
a O
well-known O
banking O
Trojan O
owned O
by O
an O
organized O
cybercrime O
gang O
, O
uses O
man-in-the-browser O
( O
MITB O
) O
web O
injects O
in O
online O
banking O
sessions O
to O
ask O
infected O
users O
for O
their O
mobile O
phone O
number O
and O
device O
type O
. O
Machine O
translation O
of O
this O
tweet O
reads O
: O
β€œ O
Watch O
out O
for O
online O
banking O
: O
Emotet B-Malware
reloads O
TrickBot B-Malware
. O
On O
infected O
PCs O
, O
TrickBot B-Malware
displays O
a O
query O
for O
the O
mobile O
phone O
number O
and O
the O
device O
type O
used O
for O
banking O
and O
then O
prompts O
users O
to O
install O
an O
alleged O
security O
app. O
” O
When O
banking O
Trojans O
ask O
for O
this O
type O
of O
information O
, O
it O
usually O
means O
the O
next O
step O
will O
be O
an O
attempt O
to O
infect O
the O
victim O
’ O
s O
mobile O
device O
. O
Our O
team O
went O
ahead O
and O
hunted O
for O
samples O
of O
the O
app O
and O
analyzed O
it O
in O
our O
labs O
. O
In O
this O
analysis O
, O
we O
get O
into O
the O
capabilities O
of O
the O
new O
variant O
and O
what O
we O
found O
to O
be O
a O
β€œ O
kill O
switch O
” O
that O
can O
eliminate O
the O
malware O
remotely O
from O
an O
infected O
device O
. O
Desktop O
Trojans O
and O
Their O
Mobile O
Component O
The O
process O
by O
which O
Trojans O
attempt O
to O
infect O
mobile O
devices O
is O
at O
least O
a O
decade O
old O
. O
Usually O
, O
when O
users O
are O
already O
infected O
with O
malware O
like O
TrickBot B-Malware
on O
their O
desktop O
, O
they O
will O
see O
a O
web O
injection O
asking O
for O
their O
mobile O
device O
operating O
system O
( O
OS O
) O
type O
and O
phone O
number O
. O
Next O
, O
if O
they O
indicate O
that O
they O
use O
an O
Android-based B-System
device O
, O
the O
Trojan O
, O
impersonating O
their O
bank O
with O
web O
injections O
, O
fools O
the O
victim O
into O
installing O
a O
fake O
security O
app O
. O
The O
supposed O
purpose O
of O
that O
app O
is O
to O
obtain O
and O
use O
a O
required O
β€œ O
security O
code O
” O
to O
log O
in O
to O
their O
online O
banking O
site O
. O
Our O
research O
team O
analyzed O
the O
malicious O
Android B-System
application O
that O
is O
most O
likely O
being O
spread O
by O
TrickBot B-Malware
and O
dubbed O
it O
β€œ O
TrickMo. B-Malware
” O
Targeting O
users O
in O
Germany O
at O
this O
time O
, O
TrickMo B-Malware
is O
the O
latest O
variation O
in O
the O
transaction O
authentication O
number O
( O
TAN O
) O
-stealing O
malware O
category O
. O
Its O
main O
capabilities O
include O
: O
Stealing O
personal O
device O
information O
Intercepting O
SMS O
messages O
Recording O
targeted O
applications O
for O
one-time O
password O
( O
TAN O
) O
Lockdown O
of O
the O
phone O
Stealing O
pictures O
from O
the O
device O
Self-destruction O
and O
removal O
As O
banks O
release O
more O
advanced O
security O
measures O
, O
banking O
malware O
evolves O
to O
keep O
up O
with O
the O
perpetual O
arms O
race O
. O
From O
our O
analysis O
of O
the O
TrickMo B-Malware
mobile O
malware O
, O
it O
is O
apparent O
that O
TrickMo B-Malware
is O
designed O
to O
break O
the O
newest O
methods O
of O
OTP O
and O
, O
specifically O
, O
TAN O
codes O
often O
used O
in O
Germany O
. O
Among O
the O
various O
features O
we O
discuss O
in O
this O
post O
, O
we O
believe O
that O
TrickMo B-Malware
’ O
s O
most O
significant O
novelty O
is O
an O
app O
recording O
feature O
, O
which O
gives O
it O
the O
ability O
to O
overcome O
the O
newer O
pushTAN O
app O
validations O
used O
by O
German O
banks O
. O
In O
the O
analysis O
that O
follows O
, O
we O
describe O
in O
detail O
the O
capabilities O
of O
this O
new O
variant O
and O
a O
β€œ O
kill O
switch O
” O
that O
can O
remotely O
eliminate O
the O
malware O
from O
a O
mobile O
device O
. O
Why O
Do O
Desktop O
Trojans O
Use O
a O
Mobile O
Component O
? O
About O
a O
decade O
ago O
, O
attackers O
wielding O
banking O
Trojans O
could O
simply O
use O
stolen O
credentials O
to O
access O
a O
victim O
’ O
s O
online O
banking O
account O
and O
perform O
money O
transfers O
. O
As O
a O
countermeasure O
, O
financial O
institutions O
introduced O
various O
second O
factor O
authentication O
( O
2FA O
) O
methods O
. O
One O
method O
, O
which O
was O
popular O
in O
Germany O
, O
is O
known O
as O
mobile O
TAN O
( O
mTAN O
) O
. O
It O
was O
implemented O
by O
sending O
an O
SMS O
message O
containing O
a O
one-time O
password O
( O
OTP O
) O
to O
the O
client O
’ O
s O
mobile O
device O
. O
The O
transaction O
would O
only O
be O
authorized O
after O
the O
client O
enters O
the O
TAN O
into O
the O
online O
banking O
website O
in O
their O
browser O
. O
Keep O
in O
mind O
that O
while O
this O
case O
is O
about O
TANs O
, O
it O
can O
be O
any O
OTP O
, O
depending O
on O
which O
bank O
is O
being O
targeted O
. O
Meanwhile O
, O
desktop O
banking O
Trojans O
developed O
the O
ability O
to O
execute O
various O
social O
engineering O
schemes O
by O
using O
web O
injections O
, O
a O
method O
that O
alters O
the O
content O
presented O
to O
the O
infected O
victim O
in O
their O
browser O
. O
In O
some O
cases O
, O
sophisticated O
web O
injects O
were O
used O
to O
trick O
victims O
into O
entering O
their O
2FA O
codes O
directly O
into O
the O
web O
forms O
controlled O
by O
the O
malware O
to O
eliminate O
the O
need O
for O
the O
mobile O
malware O
component O
. O
But O
attackers O
were O
still O
constantly O
looking O
for O
new O
methods O
to O
steal O
TANs O
. O
Around O
2011 O
, O
the O
infamous O
Zeus B-Malware
Trojan I-Malware
started O
using O
web O
injects O
that O
tricked O
users O
into O
downloading O
a O
mobile O
component O
called O
β€œ O
ZitMo B-Malware
” O
( O
Zeus B-Malware
in O
the O
Mobile O
) O
. O
This O
was O
used O
to O
bypass O
2FA O
methods O
by O
intercepting O
the O
SMS O
messages O
coming O
from O
the O
bank O
and O
stealing O
the O
mTANs O
without O
the O
victim O
’ O
s O
knowledge O
. O
Many O
other O
banking O
malware O
families O
followed O
suit O
and O
released O
their O
own O
Android O
malware O
components O
designed O
to O
steal O
those O
OTPs O
and O
TANs O
. O
From O
mTAN O
to O
pushTAN O
In O
the O
past O
few O
years O
, O
some O
banks O
in O
Europe O
, O
especially O
in O
Germany O
, O
stopped O
using O
SMS-based O
authentication O
and O
switched O
to O
dedicated O
pushTAN O
applications O
for O
2FA O
schemes O
. O
Instead O
of O
relying O
on O
SMS O
messages O
, O
which O
can O
be O
easily O
intercepted O
by O
third-party O
apps O
, O
these O
applications O
started O
using O
push O
notifications O
for O
users O
, O
containing O
the O
transaction O
details O
and O
the O
TAN O
. O
The O
pushTAN O
method O
has O
a O
clear O
advantage O
: O
It O
improves O
security O
by O
mitigating O
the O
risk O
of O
SIM O
swapping O
attacks O
and O
SMS O
stealers O
. O
TrickMo B-Malware
Calls O
pushTAN O
The O
pushTAN O
method O
is O
a O
hurdle O
for O
malware O
apps O
that O
may O
reside O
on O
the O
same O
device O
, O
and O
it O
’ O
s O
particularly O
challenging O
for O
mobile O
malware O
due O
to O
Android B-System
’ O
s O
application O
sandbox O
. O
This O
feature O
is O
designed O
to O
block O
one O
application O
from O
accessing O
the O
data O
of O
other O
applications O
without O
rooting O
the O
device O
. O
To O
get O
around O
this O
challenge O
, O
TrickMo B-Malware
’ O
s O
developers O
added O
some O
new O
features O
to O
steal O
TANs O
using O
screen O
video O
recording O
and O
screen O
data O
scraping O
. O
The O
Root O
of O
All O
( O
Android B-System
) O
Evil O
So O
how O
does O
TrickMo B-Malware
get O
around O
these O
security O
features O
? O
It O
abuses O
accessibility O
services O
. O
Android B-System
’ O
s O
accessibility O
services O
were O
originally O
developed O
by O
Google B-Organization
for O
the O
benefit O
of O
users O
with O
disabilities O
. O
Any O
app O
can O
ask O
for O
accessibility O
permissions O
and O
implement O
features O
such O
as O
screen O
reading O
, O
changing O
sizes O
and O
colors O
of O
objects O
, O
hearing O
enhancements O
, O
replacing O
touch O
with O
other O
forms O
of O
control O
and O
more O
. O
In O
recent O
years O
, O
some O
malicious O
Android B-System
applications O
abused O
these O
accessibility O
services O
in O
various O
attack O
scenarios O
. O
Once O
on O
the O
device O
, O
as O
installed O
by O
a O
duped O
user O
, O
the O
TrickMo B-Malware
component O
opens O
and O
sends O
an O
intent O
to O
start O
the O
accessibility O
settings O
activity O
, O
coercing O
the O
user O
to O
grant O
it O
with O
accessibility O
permissions O
. O
Then O
, O
it O
uses O
the O
accessibility O
service O
for O
its O
malicious O
operations O
, O
some O
of O
which O
include O
: O
Preventing O
the O
user O
from O
uninstalling O
the O
app O
Becoming O
the O
default O
SMS O
app O
by O
changing O
device O
settings O
Monitoring O
the O
currently O
running O
application O
( O
s O
) O
Scraping O
on-screen O
text O
Android B-System
operating O
systems O
include O
many O
dialog O
screens O
that O
require O
the O
denial O
, O
or O
approval O
, O
of O
app O
permissions O
and O
actions O
that O
have O
to O
receive O
input O
from O
the O
user O
by O
tapping O
a O
button O
on O
the O
screen O
. O
TrickMo B-Malware
uses O
accessibility O
services O
to O
identify O
and O
control O
some O
of O
these O
screens O
and O
make O
its O
own O
choices O
before O
giving O
the O
user O
a O
chance O
to O
react O
. O
In O
the O
image O
below O
, O
we O
see O
the O
malware O
function O
that O
detects O
such O
dialogs O
when O
they O
are O
presented O
to O
the O
user O
, O
asking O
them O
to O
tap O
an O
option O
based O
on O
predefined O
choices O
. O
TrickMo B-Malware
’ O
s O
Persistence O
Capabilities O
When O
it O
comes O
to O
Android-based B-System
devices O
, O
many O
applications O
must O
find O
a O
way O
to O
run O
on O
the O
device O
after O
a O
system O
reboot O
. O
The O
most O
common O
way O
to O
achieve O
this O
is O
by O
creating O
a O
broadcast O
receiver O
that O
is O
registered O
to O
the O
β€œ O
android.intent.action.BOOT_COMPLETED B-Indicator
” O
broadcast O
action O
and O
adding O
code O
that O
boots O
the O
application O
when O
the O
broadcast O
is O
fired O
. O
This O
instruction O
is O
especially O
important O
for O
malware O
that O
tries O
to O
avoid O
user O
interaction O
by O
running O
in O
the O
background O
as O
a O
service O
. O
But O
TrickMo B-Malware
does O
things O
differently O
. O
Instead O
of O
running O
its O
service O
only O
at O
boot O
time O
, O
it O
registers O
a O
receiver O
that O
listens O
to O
the O
β€œ O
android.intent.action.SCREEN_ON B-Indicator
” O
and O
β€œ O
android.provider.Telephony.SMS_DELIVER B-Indicator
” O
broadcast O
actions O
. O
It O
then O
uses O
the O
AlarmManager B-System
to O
set O
a O
pending O
intent O
that O
will O
run O
its O
own O
service O
after O
a O
predefined O
interval O
. O
In O
other O
words O
, O
TrickMo B-Malware
’ O
s O
service O
will O
start O
either O
after O
the O
device O
becomes O
interactive O
or O
after O
a O
new O
SMS O
message O
is O
received O
. O
Tricky O
Configurations O
TrickMo B-Malware
uses O
the O
shared O
preferences O
mechanism O
to O
store O
settings O
and O
data O
that O
the O
malware O
uses O
at O
runtime O
. O
Some O
of O
the O
settings O
are O
Boolean O
values O
that O
act O
as O
switches O
. O
They O
represent O
features O
and O
can O
be O
turned O
on O
and O
off O
from O
the O
command-and-control O
( O
C O
& O
C O
) O
server O
or O
by O
an O
SMS O
message O
, O
effectively O
instructing O
the O
malware O
to O
execute O
certain O
tasks O
. O
Some O
of O
the O
settings O
include O
: O
The O
URL O
of O
the O
C O
& O
C O
server O
Service O
wake-up O
intervals O
Important O
package O
names O
Accessibility O
permissions O
status O
Lockdown O
screen O
status O
Recording O
status O
SMS O
app O
status O
Kill O
switch O
status O
Stealth O
To O
keep O
its O
resources O
safer O
and O
make O
analysis O
more O
difficult O
for O
researchers O
, O
TrickMo B-Malware
uses O
an O
obfuscator O
to O
scramble O
the O
names O
of O
its O
functions O
, O
classes O
and O
variables O
. O
A O
TrickMo B-Malware
version O
from O
January O
2020 O
contained O
code O
that O
checks O
if O
the O
app O
is O
running O
on O
a O
rooted O
device O
or O
an O
emulator O
to O
prevent O
analysis O
. O
As O
an O
example O
, O
in O
the O
two O
images O
below O
, O
we O
can O
see O
the O
encrypted O
and O
decrypted O
shared O
preferences O
file O
, O
which O
is O
encrypted O
using O
the O
java O
β€œ O
PBEWithMD5AndDES O
” O
algorithm O
. O
C O
& O
C O
Communications O
Exfiltrating O
Device O
Data O
To O
communicate O
with O
its O
master O
, O
TrickMo B-Malware
’ O
s O
code O
contains O
a O
hardcoded O
URL O
of O
the O
C O
& O
C O
server O
. O
When O
it O
runs O
, O
it O
periodically O
connects O
to O
its O
designated O
server O
via O
an O
unencrypted O
HTTP O
request O
and O
sends O
over O
a O
JSON O
object O
that O
contains O
data O
gleaned O
from O
the O
victim O
’ O
s O
phone O
. O
The O
stolen O
parameters O
follow O
: O
ID O
IMSI O
IMEI O
Phone O
number O
Operator O
AID O
Model O
Brand O
Version O
Build O
Battery O
percentage O
Wi-Fi O
connection O
state O
Wake O
time O
Are O
logs O
enabled O
? O
Is O
the O
malware O
already O
set O
as O
the O
default O
SMS O
application O
? O
[ O
True/False O
] O
Signal O
strength O
Screen O
active O
[ O
True/False O
] O
Orientation O
Was O
accessibility O
permission O
granted O
? O
[ O
True/False O
] O
Screen O
size O
List O
of O
the O
installed O
applications O
SMS O
messages O
saved O
on O
the O
device O
It O
is O
not O
uncommon O
for O
banking O
malware O
to O
harvest O
extensive O
amounts O
of O
data O
from O
the O
victim O
’ O
s O
device O
. O
The O
collected O
data O
can O
then O
be O
used O
to O
generate O
a O
unique O
identifier O
of O
the O
bot O
or O
for O
monetization O
purposes O
. O
It O
can O
also O
be O
sold O
on O
the O
dark O
web O
and O
used O
in O
various O
spoofing O
attacks O
. O
For O
example O
, O
since O
some O
banks O
use O
anti-fraud O
solutions O
that O
only O
check O
device O
fingerprinting O
, O
fraudsters O
can O
use O
the O
collected O
information O
to O
perform O
fraudulent O
transactions O
from O
a O
device O
that O
mimics O
that O
same O
fingerprint O
. O
Stealing O
and O
Concealing O
SMS O
Messages O
As O
some O
banks O
still O
use O
SMS-based O
transaction O
authorization O
, O
TrickMo B-Malware
is O
configured O
to O
automatically O
steal O
all O
SMS O
messages O
that O
are O
stored O
on O
the O
device O
. O
Once O
in O
a O
while O
, O
it O
sends O
a O
packet O
to O
its O
C O
& O
C O
server O
containing O
the O
collected O
device O
data O
along O
with O
all O
the O
saved O
SMS O
messages O
. O
Since O
it O
can O
use O
the O
accessibility O
service O
to O
become O
the O
default O
SMS O
app O
, O
it O
can O
also O
delete O
the O
SMS O
messages O
so O
only O
the O
attackers O
can O
see O
them O
. O
In O
the O
image O
below O
, O
we O
can O
see O
a O
packet O
that O
was O
sent O
to O
the O
attacker O
’ O
s O
C O
& O
C O
containing O
collected O
information O
along O
with O
stolen O
SMS O
data O
. O
A O
Communication O
Channel O
via O
Stolen O
SMS O
In O
addition O
, O
TrickMo B-Malware
has O
an O
automatic O
mechanism O
to O
send O
SMS O
messages O
to O
its O
C O
& O
C O
server O
. O
In O
some O
cases O
, O
it O
uses O
this O
mechanism O
to O
send O
log O
data O
of O
important O
actions O
. O
It O
can O
save O
an O
SMS O
message O
on O
the O
device O
, O
marking O
with O
β€œ O
internal O
” O
in O
the O
phone O
number O
field O
. O
The O
SMS O
message O
will O
be O
instantly O
sent O
to O
the O
server O
, O
informing O
the O
malware O
operator O
of O
executed O
tasks O
. O
In O
the O
image O
below O
, O
we O
see O
a O
log O
TrickMo B-Malware
sent O
to O
the O
attacker O
upon O
becoming O
the O
default O
SMS O
app O
. O
If O
the O
malware O
successfully O
became O
the O
default O
SMS O
app O
, O
it O
sends O
the O
words O
β€œ O
the O
app O
has O
been O
replaced O
” O
in O
Russian O
. O
If O
the O
original O
SMS O
app O
has O
been O
restored O
, O
it O
will O
send O
β€œ O
the O
app O
returned O
to O
its O
original O
place. O
” O
Controlling O
TrickMo B-Malware
TrickMo B-Malware
’ O
s O
operators O
can O
control O
the O
malware O
via O
two O
channels O
: O
Through O
its O
C O
& O
C O
via O
a O
plaintext O
HTTP O
protocol O
using O
JSON O
objects O
Through O
encrypted O
SMS O
messages O
There O
are O
predefined O
commands O
to O
change O
the O
malware O
’ O
s O
configuration O
and O
make O
it O
execute O
certain O
tasks O
. O
Some O
of O
the O
more O
interesting O
commands O
include O
: O
SMS O
Control O
Update O
the O
address O
of O
the O
C O
& O
C O
server O
β€” O
SMS O
starting O
with O
β€œ O
http O
: O
// O
” O
Send O
AES-encrypted O
SMS O
message O
back O
to O
sender O
β€” O
SMS O
starting O
with O
β€œ O
sms O
: O
// O
” O
Update O
service O
wake-up O
interval O
β€” O
β€œ O
2 O
” O
Kill O
switch O
β€” O
β€œ O
4 O
” O
C O
& O
C O
Control O
Update O
the O
address O
of O
the O
C O
& O
C O
server O
β€” O
β€œ O
1 O
” O
Update O
service O
wake-up O
interval O
β€” O
β€œ O
2 O
” O
Lock O
the O
screen O
β€” O
β€œ O
5 O
” O
Display O
a O
picture O
in O
a O
WebView O
from O
an O
arbitrary O
URL O
β€” O
β€œ O
11 O
” O
Send O
an O
arbitrary O
SMS O
message O
β€” O
β€œ O
8 O
” O
Steal O
images O
saved O
on O
the O
device O
β€” O
β€œ O
12 O
” O
and O
β€œ O
13 O
” O
Use O
the O
accessibility O
service O
to O
become O
the O
default O
SMS O
app O
β€” O
β€œ O
6 O
” O
Enable O
recording O
of O
other O
apps O
β€” O
β€œ O
15 O
” O
Kill O
switch O
β€” O
β€œ O
4 O
” O
The O
Lockdown O
Screen O
Most O
thieves O
don O
’ O
t O
want O
to O
be O
caught O
red-handed O
as O
they O
steal O
β€” O
they O
want O
to O
buy O
some O
time O
to O
get O
away O
with O
the O
loot O
. O
The O
same O
is O
true O
for O
banking O
malware O
. O
Desktop O
banking O
malware O
often O
blocks O
the O
user O
’ O
s O
access O
to O
their O
banking O
website O
after O
a O
successful O
transaction O
by O
using O
web O
injects O
that O
show O
a O
variety O
of O
β€œ O
service O
unavailable O
” O
screens O
. O
TrickMo B-Malware
is O
no O
different O
; O
the O
goal O
is O
to O
complete O
the O
operation O
while O
raising O
minimal O
suspicion O
. O
After O
performing O
a O
fraudulent O
action O
, O
stealing O
the O
OTP/mTAN O
, O
TrickMo B-Malware
buys O
some O
time O
by O
activating O
the O
lock O
screen O
and O
preventing O
the O
user O
from O
accessing O
their O
device O
. O
This O
lockdown O
screen O
includes O
two O
parts O
: O
A O
WebView O
containing O
a O
background O
picture O
loaded O
from O
a O
predefined O
URL O
. O
This O
background O
image O
likely O
contains O
a O
fake O
β€œ O
software O
update O
” O
screen O
. O
A O
lockdown O
activity O
, O
which O
is O
a O
transparent O
window O
shown O
at O
the O
top O
of O
the O
screen O
that O
contains O
a O
β€œ O
loading O
” O
cursor O
. O
This O
screen O
persists O
on O
the O
screen O
and O
prevents O
the O
user O
from O
using O
the O
navigation O
buttons O
. O
Due O
to O
TrickMo B-Malware
’ O
s O
persistence O
implementation O
mentioned O
earlier O
, O
this O
lockdown O
screen O
persists O
after O
a O
restart O
and O
is O
re-initiated O
every O
time O
the O
device O
becomes O
interactive O
. O
In O
some O
cases O
, O
TrickMo B-Malware
may O
use O
this O
feature O
to O
intercept O
SMS O
messages O
without O
the O
knowledge O
of O
the O
user O
by O
activating O
the O
lockdown O
screen O
and O
intercepting O
SMS O
messages O
in O
the O
background O
. O
Application O
Recording O
β€” O
Stealing O
OTPs O
and O
TANs O
The O
feature O
that O
makes O
TrickMo B-Malware
different O
from O
standard O
SMS O
stealers O
is O
its O
unique O
ability O
to O
record O
the O
screen O
when O
targeted O
apps O
are O
running O
. O
This O
feature O
was O
enabled O
only O
in O
newer O
versions O
of O
TrickMo B-Malware
that O
were O
tailored O
specifically O
for O
German O
banks O
and O
use O
a O
special O
application O
for O
implementing O
TAN-based O
2FA O
. O
The O
application O
recording O
is O
implemented O
via O
two O
methods O
: O
Using O
the O
Android B-System
MediaRecorder O
class O
to O
capture O
a O
video O
of O
the O
screen O
when O
the O
targeted O
application O
is O
presented O
to O
the O
user O
Using O
the O
accessibility O
service O
to O
save O
a O
text O
file O
containing O
the O
data O
of O
all O
the O
objects O
on O
the O
screen O
Both O
files O
are O
later O
sent O
to O
the O
C O
& O
C O
server O
of O
the O
attacker O
. O
In O
the O
following O
image O
, O
we O
can O
see O
how O
the O
malware O
receives O
a O
JSON O
object O
from O
the O
C O
& O
C O
server O
containing O
the O
command O
to O
start O
recording O
, O
the O
targeted O
apps O
and O
the O
recorded O
video O
size O
ratio O
. O
In O
the O
image O
below O
, O
the O
function O
recursively O
collects O
all O
the O
text O
data O
from O
the O
child O
nodes O
of O
each O
accessibility O
node O
. O
In O
other O
words O
, O
it O
goes O
through O
every O
object O
on O
the O
screen O
and O
saves O
its O
text O
data O
. O
A O
TrickMo B-Malware
Kill O
Switch O
One O
of O
the O
most O
interesting O
features O
of O
the O
TrickMo B-Malware
malware I-Malware
is O
having O
its O
own O
kill O
switch O
. O
Kill O
switches O
are O
used O
by O
many O
malware O
authors O
to O
remove O
traces O
from O
a O
device O
after O
a O
successful O
operation O
. O
Since O
TrickMo O
’ O
s O
HTTP B-Indicator
traffic O
with O
its O
C O
& O
C O
server O
is O
not O
encrypted O
, O
it O
can O
easily O
be O
tampered O
with O
. O
In O
the O
following O
image O
, O
we O
can O
see O
the O
function O
that O
parses O
the O
commands O
from O
the O
C O
& O
C O
server O
. O
If O
the O
returned O
JSON O
object O
has O
the O
β€œ O
4 O
” O
key O
, O
it O
will O
turn O
on O
the O
kill O
switch O
and O
initiate O
its O
own O
removal O
by O
sending O
an O
intent O
and O
seamlessly O
confirming O
the O
uninstall O
using O
the O
accessibility O
service O
, O
all O
without O
the O
victim O
ever O
noticing O
anything O
. O
The O
kill O
switch O
can O
also O
be O
turned O
on O
by O
SMS O
. O
This O
is O
a O
bit O
more O
complicated O
since O
the O
SMS O
commands O
are O
encrypted O
and O
encoded O
with O
base64 O
. O
The O
encryption O
algorithm O
used O
is O
RSA O
, O
and O
interestingly O
, O
the O
authors O
chose O
to O
use O
the O
private O
key O
for O
decryption O
and O
leave O
it O
in O
the O
code O
as O
a O
hardcoded O
string O
. O
The O
image O
below O
shows O
the O
function O
that O
parses O
the O
SMS O
messages O
, O
decrypts O
them O
using O
the O
hardcoded O
RSA O
private O
key O
and O
executes O
the O
commands O
. O
Having O
analyzed O
a O
few O
variants O
of O
the O
malware O
, O
we O
noticed O
that O
the O
private O
key O
was O
exposed O
in O
the O
code O
and O
did O
not O
change O
. O
Therefore O
, O
our O
team O
managed O
to O
generate O
the O
public O
key O
and O
craft O
an O
SMS O
message O
that O
activated O
the O
kill O
switch O
. O
This O
means O
that O
the O
malware O
can O
be O
remotely O
eliminated O
by O
an O
SMS O
message O
. O
Our O
team O
was O
also O
able O
to O
test O
other O
commands O
in O
the O
lab O
either O
by O
tampering O
with O
the O
HTTP O
traffic O
from O
the O
C O
& O
C O
or O
by O
sending O
crafted O
SMS O
messages O
. O
Suspect O
You O
’ O
re O
Infected O
? O
The O
following O
SMS O
message O
can O
be O
used O
to O
kill O
the O
sample O
analyzed O
in O
this O
research O
and O
all O
other O
variants O
that O
use O
the O
same O
private O
key O
: O
HrLbpr3x/htAVnAgYepBuH2xmFDb68TYTt7FwGn0ddGlQJv/hqsctL57ocFU0Oz3L+uhLcOGG7GVBAfHKL1TBQ== O
Sending O
this O
SMS O
will O
trigger O
TrickMo B-Malware
’ O
s O
kill O
switch O
by O
sending O
the O
string O
β€œ O
4 O
” O
encrypted O
with O
the O
generated O
RSA O
public O
key O
and O
base64 O
encoded O
. O
Indicators O
of O
Compromise O
( O
IoCs O
) O
hxxp B-Indicator
: I-Indicator
//mcsoft365.com/c I-Indicator
hxxp I-Indicator
: I-Indicator
//pingconnect.net/c I-Indicator
Hashes O
MD5 O
: O
5c749c9fce8c41bf6bcc9bd8a691621b B-Indicator
SHA256 O
: O
284bd2d16092b4d13b6bc85d87950eb4c5e8cbba9af2a04d76d88da2f26c485c B-Indicator
MD5 O
: O
b264af5d2f3390e465052ab502b0726d B-Indicator
SHA256 O
: O
8ab1712ce9ca2d7952ab763d8a4872aa6a278c3f60dc13e0aebe59f50e6e30f6 B-Indicator
The O
TrickMo B-Malware
Factor O
The O
TrickBot B-Malware
Trojan I-Malware
was O
one O
of O
the O
most O
active O
banking O
malware O
strains O
in O
the O
cybercrime O
arena O
in O
2019 O
. O
From O
our O
analysis O
, O
it O
is O
apparent O
that O
TrickMo B-Malware
is O
designed O
to O
help O
TrickBot B-Malware
break O
the O
most O
recent O
methods O
of O
TAN-based O
authentication O
. O
One O
of O
the O
most O
significant O
features O
TrickMo B-Malware
possesses O
is O
the O
app O
recording O
feature O
, O
which O
is O
what O
gives O
TrickBot B-Malware
the O
ability O
to O
overcome O
the O
newer O
pushTAN O
app O
validations O
deployed O
by O
banks O
. O
SimBad B-Malware
: O
A O
Rogue O
Adware O
Campaign O
On O
Google B-System
Play I-System
March O
13 O
, O
2019 O
Check B-Organization
Point I-Organization
researchers O
from O
the O
Mobile O
Threat O
Team O
have O
discovered O
a O
new O
adware O
campaign O
on O
the O
Google B-System
Play I-System
Store I-System
. O
This O
particular O
strain O
of O
Adware O
was O
found O
in O
206 O
applications O
, O
and O
the O
combined O
download O
count O
has O
reached O
almost O
150 O
million O
. O
Google B-Organization
was O
swiftly O
notified O
and O
removed O
the O
infected O
applications O
from O
the O
Google B-System
Play I-System
Store O
. O
Inside O
the O
SDK O
The O
malware O
resides O
within O
the O
β€˜ O
RXDrioder O
’ O
Software O
Development O
Kit O
( O
SDK O
) O
, O
which O
is O
provided O
by O
β€˜ O
addroider B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
’ O
as O
an O
ad-related O
SDK O
. O
We O
believe O
the O
developers O
were O
scammed O
to O
use O
this O
malicious O
SDK O
, O
unaware O
of O
its O
content O
, O
leading O
to O
the O
fact O
that O
this O
campaign O
was O
not O
targeting O
a O
specific O
county O
or O
developed O
by O
the O
same O
developer O
. O
The O
malware O
has O
been O
dubbed O
β€˜ O
SimBad B-Malware
’ O
due O
to O
the O
fact O
that O
a O
large O
portion O
of O
the O
infected O
applications O
are O
simulator O
games O
. O
The O
Infection O
Chain O
Once O
the O
user O
downloads O
and O
installs O
one O
of O
the O
infected O
applications O
, O
β€˜ O
SimBad B-Malware
’ O
registers O
itself O
to O
the O
β€˜ O
BOOT_COMPLETE O
’ O
and O
β€˜ O
USER_PRESENT O
’ O
intents O
, O
which O
lets O
β€˜ O
SimBad B-Malware
’ O
to O
perform O
actions O
after O
the O
device O
has O
finished O
booting O
and O
while O
the O
user O
is O
using O
his O
device O
respectively O
. O
After O
installation O
, O
the O
malware O
connects O
to O
the O
designated O
Command O
and O
Control O
( O
C O
& O
C O
) O
server O
, O
and O
receives O
a O
command O
to O
perform O
. O
β€˜ O
SimBad B-Malware
’ O
comes O
with O
a O
respected O
list O
of O
capabilities O
on O
the O
user O
’ O
s O
device O
, O
such O
as O
removing O
the O
icon O
from O
the O
launcher O
, O
thus O
making O
it O
harder O
for O
the O
user O
to O
uninstall O
, O
start O
to O
display O
background O
ads O
and O
open O
a O
browser O
with O
a O
given O
URL O
. O
What O
Does O
SimBad B-Malware
Do O
? O
β€˜ O
SimBad B-Malware
’ O
has O
capabilities O
that O
can O
be O
divided O
into O
three O
groups O
– O
Show O
Ads O
, O
Phishing O
, O
and O
Exposure O
to O
other O
applications O
. O
With O
the O
capability O
to O
open O
a O
given O
URL O
in O
a O
browser O
, O
the O
actor O
behind O
β€˜ O
SimBad B-Malware
’ O
can O
generate O
phishing O
pages O
for O
multiple O
platforms O
and O
open O
them O
in O
a O
browser O
, O
thus O
performing O
spear-phishing O
attacks O
on O
the O
user O
. O
With O
the O
capability O
to O
open O
market O
applications O
, O
such O
as O
Google B-System
Play I-System
and O
9Apps B-System
, O
with O
a O
specific O
keyword O
search O
or O
even O
a O
single O
application O
’ O
s O
page O
, O
the O
actor O
can O
gain O
exposure O
for O
other O
threat O
actors O
and O
increase O
his O
profits O
. O
The O
actor O
can O
even O
take O
his O
malicious O
activities O
to O
the O
next O
level O
by O
installing O
a O
remote O
application O
from O
a O
designated O
server O
, O
thus O
allowing O
him O
to O
install O
new O
malware O
once O
it O
is O
required O
. O
The O
C O
& O
C O
server O
observed O
in O
this O
campaign O
is O
β€˜ O
www B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
addroider.com I-Indicator
’ O
. O
This O
server O
runs O
an O
instance O
of O
β€˜ O
Parse O
Server O
’ O
( O
source O
on O
GitHub B-Organization
) O
, O
an O
open O
source O
version O
of O
the O
Parse O
Backend O
infrastructure O
, O
which O
is O
a O
model O
for O
providing O
web O
app O
and O
mobile O
app O
developers O
with O
a O
way O
to O
link O
their O
applications O
to O
backend O
cloud O
storage O
and O
APIs O
exposed O
by O
back-end O
applications O
, O
while O
also O
providing O
features O
such O
as O
user O
management O
, O
push O
notifications O
and O
more O
. O
The O
domain O
β€˜ O
addroider B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
’ O
was O
registered O
via O
GoDaddy B-Organization
, O
and O
uses O
privacy O
protection O
service O
. O
While O
accessing O
the O
domain O
from O
a O
browser O
you O
get O
a O
login O
page O
very O
similar O
to O
other O
malware O
panels O
. O
The O
β€˜ O
Register O
’ O
and O
β€˜ O
Sign O
Up O
’ O
links O
are O
broken O
and O
β€˜ O
redirects O
’ O
the O
user O
back O
to O
the O
login O
page O
. O
According O
to O
RiskIQ B-System
’ O
s O
PassiveTotal O
, O
the O
domain O
expired O
7 O
months O
ago O
. O
As O
a O
result O
, O
it O
may O
be O
that O
are O
looking O
into O
a O
compromised O
, O
parked O
domain O
that O
was O
initially O
used O
legitimately O
, O
but O
is O
now O
participating O
in O
malicious O
activities O
. O
With O
the O
capabilities O
of O
showing O
out-of-scope O
ads O
, O
exposing O
the O
user O
to O
other O
applications O
, O
and O
opening O
a O
URL O
in O
a O
browser O
, O
β€˜ O
SimBad B-Malware
’ O
acts O
now O
as O
an O
Adware O
, O
but O
already O
has O
the O
infrastructure O
to O
evolve O
into O
a O
much O
larger O
threat O
. O