|
Riltok B-Malware |
|
mobile O |
|
Trojan O |
|
: O |
|
A O |
|
banker O |
|
with O |
|
global O |
|
reach O |
|
25 O |
|
JUN O |
|
2019 O |
|
Riltok B-Malware |
|
is O |
|
one O |
|
of O |
|
numerous O |
|
families O |
|
of O |
|
mobile O |
|
banking O |
|
Trojans O |
|
with O |
|
standard O |
|
( O |
|
for O |
|
such O |
|
malware O |
|
) O |
|
functions O |
|
and O |
|
distribution O |
|
methods O |
|
. O |
|
|
|
Originally O |
|
intended O |
|
to O |
|
target O |
|
the O |
|
Russian O |
|
audience O |
|
, O |
|
the O |
|
banker O |
|
was O |
|
later O |
|
adapted O |
|
, O |
|
with O |
|
minimal O |
|
modifications O |
|
, O |
|
for O |
|
the O |
|
European O |
|
β O |
|
market. O |
|
β O |
|
The O |
|
bulk O |
|
of O |
|
its O |
|
victims O |
|
( O |
|
more O |
|
than O |
|
90 O |
|
% O |
|
) O |
|
reside O |
|
in O |
|
Russia O |
|
, O |
|
with O |
|
France O |
|
in O |
|
second O |
|
place O |
|
( O |
|
4 O |
|
% O |
|
) O |
|
. O |
|
|
|
Third O |
|
place O |
|
is O |
|
shared O |
|
by O |
|
Italy O |
|
, O |
|
Ukraine O |
|
, O |
|
and O |
|
the O |
|
United O |
|
Kingdom O |
|
. O |
|
|
|
We O |
|
first O |
|
detected O |
|
members O |
|
of O |
|
this O |
|
family O |
|
back O |
|
in O |
|
March O |
|
2018 O |
|
. O |
|
|
|
Like O |
|
many O |
|
other O |
|
bankers O |
|
, O |
|
they O |
|
were O |
|
disguised O |
|
as O |
|
apps O |
|
for O |
|
popular O |
|
free O |
|
ad O |
|
services O |
|
in O |
|
Russia O |
|
. O |
|
|
|
The O |
|
malware O |
|
was O |
|
distributed O |
|
from O |
|
infected O |
|
devices O |
|
via O |
|
SMS O |
|
in O |
|
the O |
|
form O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
I O |
|
β O |
|
ll O |
|
buy O |
|
under O |
|
a O |
|
secure O |
|
transaction O |
|
. O |
|
|
|
youlabuy B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
ru/7 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
3 I-Indicator |
|
β O |
|
or O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
accept O |
|
25,000 O |
|
on O |
|
Youla O |
|
youla-protect B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
ru/4 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
7 I-Indicator |
|
β O |
|
, O |
|
containing O |
|
a O |
|
link O |
|
to O |
|
download O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
Other O |
|
samples O |
|
were O |
|
also O |
|
noticed O |
|
, O |
|
posing O |
|
as O |
|
a O |
|
client O |
|
of O |
|
a O |
|
ticket-finding O |
|
service O |
|
or O |
|
as O |
|
an O |
|
app O |
|
store O |
|
for O |
|
Android B-System |
|
. O |
|
|
|
It O |
|
was O |
|
late O |
|
2018 O |
|
when O |
|
Riltok B-Malware |
|
climbed O |
|
onto O |
|
the O |
|
international O |
|
stage O |
|
. O |
|
|
|
The O |
|
cybercriminals O |
|
behind O |
|
it O |
|
kept O |
|
the O |
|
same O |
|
masking O |
|
and O |
|
distribution O |
|
methods O |
|
, O |
|
using O |
|
names O |
|
and O |
|
icons O |
|
imitating O |
|
those O |
|
of O |
|
popular O |
|
free O |
|
ad O |
|
services O |
|
. O |
|
|
|
In O |
|
November O |
|
2018 O |
|
, O |
|
a O |
|
version O |
|
of O |
|
the O |
|
Trojan O |
|
for O |
|
the O |
|
English O |
|
market O |
|
appeared O |
|
in O |
|
the O |
|
shape O |
|
of O |
|
Gumtree.apk B-Indicator |
|
. O |
|
|
|
The O |
|
SMS O |
|
message O |
|
with O |
|
a O |
|
link O |
|
to O |
|
a O |
|
banker O |
|
looked O |
|
as O |
|
follows O |
|
: O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
i O |
|
send O |
|
you O |
|
prepayment O |
|
gumtree B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
cc/3 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
1 I-Indicator |
|
β O |
|
. O |
|
|
|
Italian O |
|
( O |
|
Subito.apk B-Indicator |
|
) O |
|
and O |
|
French O |
|
( O |
|
Leboncoin.apk B-Indicator |
|
) O |
|
versions O |
|
appeared O |
|
shortly O |
|
afterwards O |
|
in O |
|
January O |
|
2019 O |
|
. O |
|
|
|
The O |
|
messages O |
|
looked O |
|
as O |
|
follows O |
|
: O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
ti O |
|
ho O |
|
inviato O |
|
il O |
|
soldi O |
|
sul O |
|
subito O |
|
subito-a B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
pw/6 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
5 I-Indicator |
|
β O |
|
( O |
|
It O |
|
. O |
|
|
|
) O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
ti O |
|
ho O |
|
inviato O |
|
il O |
|
pagamento O |
|
subitop B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
pw/4 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
7 I-Indicator |
|
β O |
|
( O |
|
It O |
|
. O |
|
|
|
) O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
je O |
|
vous O |
|
ai O |
|
envoyΓ© O |
|
un O |
|
prepaiement O |
|
m-leboncoin B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
top/7 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
3 I-Indicator |
|
β O |
|
( O |
|
Fr O |
|
. O |
|
|
|
) O |
|
β O |
|
% O |
|
USERNAME O |
|
% O |
|
, O |
|
j O |
|
β O |
|
ai O |
|
fait O |
|
l O |
|
β O |
|
avance O |
|
( O |
|
suivi O |
|
d O |
|
β O |
|
un O |
|
lien O |
|
) O |
|
: O |
|
leboncoin-le B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/8 I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
* I-Indicator |
|
9 I-Indicator |
|
β O |
|
( O |
|
Fr O |
|
. O |
|
|
|
) O |
|
Let O |
|
β O |
|
s O |
|
take O |
|
a O |
|
more O |
|
detailed O |
|
look O |
|
at O |
|
how O |
|
this O |
|
banking O |
|
Trojan O |
|
works O |
|
. O |
|
|
|
Infection O |
|
The O |
|
user O |
|
receives O |
|
an O |
|
SMS O |
|
with O |
|
a O |
|
malicious O |
|
link O |
|
pointing O |
|
to O |
|
a O |
|
fake O |
|
website O |
|
simulating O |
|
a O |
|
popular O |
|
free O |
|
ad O |
|
service O |
|
. O |
|
|
|
There O |
|
, O |
|
they O |
|
are O |
|
prompted O |
|
to O |
|
download O |
|
a O |
|
new O |
|
version O |
|
of O |
|
the O |
|
mobile O |
|
app O |
|
, O |
|
under O |
|
which O |
|
guise O |
|
the O |
|
Trojan O |
|
is O |
|
hidden O |
|
. O |
|
|
|
To O |
|
be O |
|
installed O |
|
, O |
|
it O |
|
needs O |
|
the O |
|
victim O |
|
to O |
|
allow O |
|
installation O |
|
of O |
|
apps O |
|
from O |
|
unknown O |
|
sources O |
|
in O |
|
the O |
|
device O |
|
settings O |
|
. O |
|
|
|
During O |
|
installation O |
|
, O |
|
Riltok B-Malware |
|
asks O |
|
the O |
|
user O |
|
for O |
|
permission O |
|
to O |
|
use O |
|
special O |
|
features O |
|
in O |
|
AccessibilityService O |
|
by O |
|
displaying O |
|
a O |
|
fake O |
|
warning O |
|
: O |
|
If O |
|
the O |
|
user O |
|
ignores O |
|
or O |
|
declines O |
|
the O |
|
request O |
|
, O |
|
the O |
|
window O |
|
keeps O |
|
opening O |
|
ad O |
|
infinitum O |
|
. O |
|
|
|
After O |
|
obtaining O |
|
the O |
|
desired O |
|
rights O |
|
, O |
|
the O |
|
Trojan O |
|
sets O |
|
itself O |
|
as O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
( O |
|
by O |
|
independently O |
|
clicking O |
|
Yes O |
|
in O |
|
AccessibilityService O |
|
) O |
|
, O |
|
before O |
|
vanishing O |
|
from O |
|
the O |
|
device O |
|
screen O |
|
. O |
|
|
|
After O |
|
enabling O |
|
AccessibilityService O |
|
, O |
|
the O |
|
malware O |
|
sets O |
|
itself O |
|
as O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
Now O |
|
installed O |
|
and O |
|
having O |
|
obtained O |
|
the O |
|
necessary O |
|
permissions O |
|
from O |
|
the O |
|
user O |
|
, O |
|
Riltok B-Malware |
|
contacts O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
In O |
|
later O |
|
versions O |
|
, O |
|
when O |
|
it O |
|
starts O |
|
, O |
|
the O |
|
Trojan O |
|
additionally O |
|
opens O |
|
a O |
|
phishing O |
|
site O |
|
in O |
|
the O |
|
browser O |
|
that O |
|
simulates O |
|
a O |
|
free O |
|
ad O |
|
service O |
|
so O |
|
as O |
|
to O |
|
dupe O |
|
the O |
|
user O |
|
into O |
|
entering O |
|
their O |
|
login O |
|
credentials O |
|
and O |
|
bank O |
|
card O |
|
details O |
|
. O |
|
|
|
The O |
|
entered O |
|
data O |
|
is O |
|
forwarded O |
|
to O |
|
the O |
|
cybercriminals O |
|
. O |
|
|
|
Phishing O |
|
page O |
|
from O |
|
the O |
|
French O |
|
version O |
|
of O |
|
the O |
|
Trojan O |
|
Communication O |
|
with O |
|
C O |
|
& O |
|
C O |
|
Riltok B-Malware |
|
actively O |
|
communicates O |
|
with O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
First O |
|
off O |
|
, O |
|
it O |
|
registers O |
|
the O |
|
infected O |
|
device O |
|
in O |
|
the O |
|
administrative O |
|
panel O |
|
by O |
|
sending O |
|
a O |
|
GET O |
|
request O |
|
to O |
|
the O |
|
relative O |
|
address O |
|
gate.php B-Indicator |
|
( O |
|
in O |
|
later O |
|
versions O |
|
gating.php B-Indicator |
|
) O |
|
with O |
|
the O |
|
ID O |
|
( O |
|
device O |
|
identifier O |
|
generated O |
|
by O |
|
the O |
|
setPsuedoID O |
|
function O |
|
in O |
|
a O |
|
pseudo-random O |
|
way O |
|
based O |
|
on O |
|
the O |
|
device O |
|
IMEI O |
|
) O |
|
and O |
|
screen O |
|
( O |
|
shows O |
|
if O |
|
the O |
|
device O |
|
is O |
|
active O |
|
, O |
|
possible O |
|
values O |
|
are O |
|
β O |
|
on O |
|
β O |
|
, O |
|
β O |
|
off O |
|
β O |
|
, O |
|
β O |
|
none O |
|
β O |
|
) O |
|
parameters O |
|
. O |
|
|
|
Then O |
|
, O |
|
using O |
|
POST O |
|
requests O |
|
to O |
|
the O |
|
relative O |
|
address O |
|
report.php B-Indicator |
|
, O |
|
it O |
|
sends O |
|
data O |
|
about O |
|
the O |
|
device O |
|
( O |
|
IMEI O |
|
, O |
|
phone O |
|
number O |
|
, O |
|
country O |
|
, O |
|
mobile O |
|
operator O |
|
, O |
|
phone O |
|
model O |
|
, O |
|
availability O |
|
of O |
|
root O |
|
rights O |
|
, O |
|
OS O |
|
version O |
|
) O |
|
, O |
|
list O |
|
of O |
|
contacts O |
|
, O |
|
list O |
|
of O |
|
installed O |
|
apps O |
|
, O |
|
incoming O |
|
SMS O |
|
, O |
|
and O |
|
other O |
|
information O |
|
. O |
|
|
|
From O |
|
the O |
|
server O |
|
, O |
|
the O |
|
Trojan O |
|
receives O |
|
commands O |
|
( O |
|
for O |
|
example O |
|
, O |
|
to O |
|
send O |
|
SMS O |
|
) O |
|
and O |
|
changes O |
|
in O |
|
the O |
|
configuration O |
|
. O |
|
|
|
Trojan O |
|
anatomy O |
|
The O |
|
family O |
|
was O |
|
named O |
|
Riltok B-Malware |
|
after O |
|
the O |
|
librealtalk-jni.so B-Indicator |
|
library O |
|
contained O |
|
in O |
|
the O |
|
APK O |
|
file O |
|
of O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
The O |
|
library O |
|
includes O |
|
such O |
|
operations O |
|
as O |
|
: O |
|
Get O |
|
address O |
|
of O |
|
cybercriminal O |
|
C O |
|
& O |
|
C O |
|
server O |
|
Get O |
|
configuration O |
|
file O |
|
with O |
|
web O |
|
injects O |
|
from O |
|
C O |
|
& O |
|
C O |
|
, O |
|
as O |
|
well O |
|
as O |
|
default O |
|
list O |
|
of O |
|
injects O |
|
Scan O |
|
for O |
|
app O |
|
package O |
|
names O |
|
that O |
|
generated O |
|
AccessibilityEvent O |
|
events O |
|
in O |
|
the O |
|
list O |
|
of O |
|
known O |
|
banking/antivirus/other O |
|
popular O |
|
apps O |
|
Set O |
|
malware O |
|
as O |
|
default O |
|
SMS O |
|
app O |
|
Get O |
|
address O |
|
of O |
|
the O |
|
phishing O |
|
page O |
|
that O |
|
opens O |
|
when O |
|
the O |
|
app O |
|
runs O |
|
, O |
|
and O |
|
others O |
|
getStartWebUrl O |
|
function O |
|
β O |
|
get O |
|
address O |
|
of O |
|
phishing O |
|
page O |
|
The O |
|
configuration O |
|
file O |
|
contains O |
|
a O |
|
list O |
|
of O |
|
injects O |
|
for O |
|
mobile O |
|
banking O |
|
apps O |
|
β O |
|
links O |
|
to O |
|
phishing O |
|
pages O |
|
matching O |
|
the O |
|
mobile O |
|
|
|
banking O |
|
app O |
|
used O |
|
by O |
|
the O |
|
user O |
|
. O |
|
|
|
In O |
|
most O |
|
so-called O |
|
Western O |
|
versions O |
|
of O |
|
the O |
|
Trojan O |
|
, O |
|
the O |
|
package O |
|
names O |
|
in O |
|
the O |
|
default O |
|
configuration O |
|
file O |
|
are O |
|
erased O |
|
. O |
|
|
|
Sample O |
|
configuration O |
|
file O |
|
of O |
|
the O |
|
Trojan O |
|
Through O |
|
AccessibilityService O |
|
, O |
|
the O |
|
malware O |
|
monitors O |
|
AccessibilityEvent O |
|
events O |
|
. O |
|
|
|
Depending O |
|
on O |
|
which O |
|
app O |
|
( O |
|
package O |
|
name O |
|
) O |
|
generated O |
|
the O |
|
event O |
|
, O |
|
Riltok B-Malware |
|
can O |
|
: O |
|
Open O |
|
a O |
|
fake O |
|
Google B-System |
|
Play I-System |
|
screen O |
|
requesting O |
|
bank O |
|
card O |
|
details O |
|
Open O |
|
a O |
|
fake O |
|
screen O |
|
or O |
|
phishing O |
|
page O |
|
in O |
|
a O |
|
browser O |
|
( O |
|
inject O |
|
) O |
|
mimicking O |
|
the O |
|
screen O |
|
of O |
|
the O |
|
relevant O |
|
mobile O |
|
banking O |
|
app O |
|
and O |
|
requesting O |
|
user/bank O |
|
card O |
|
details O |
|
Minimize O |
|
the O |
|
app O |
|
( O |
|
for O |
|
example O |
|
, O |
|
antivirus O |
|
applications O |
|
or O |
|
device O |
|
security O |
|
settings O |
|
) O |
|
Additionally O |
|
, O |
|
the O |
|
Trojan O |
|
can O |
|
hide O |
|
notifications O |
|
from O |
|
certain O |
|
banking O |
|
apps O |
|
. O |
|
|
|
List O |
|
of O |
|
package O |
|
names O |
|
of O |
|
apps O |
|
on O |
|
events O |
|
from O |
|
which O |
|
the O |
|
Trojan O |
|
opens O |
|
a O |
|
fake O |
|
Google B-System |
|
Play I-System |
|
window O |
|
( O |
|
for O |
|
the O |
|
Russian O |
|
version O |
|
of O |
|
the O |
|
Trojan O |
|
) O |
|
Example O |
|
of O |
|
Trojan O |
|
screen O |
|
overlapping O |
|
other O |
|
apps O |
|
When O |
|
bank O |
|
card O |
|
details O |
|
are O |
|
entered O |
|
in O |
|
the O |
|
fake O |
|
window O |
|
, O |
|
Riltok O |
|
performs O |
|
basic O |
|
validation O |
|
checks O |
|
: O |
|
card O |
|
validity O |
|
period O |
|
, O |
|
number O |
|
checksum O |
|
, O |
|
CVC O |
|
length O |
|
, O |
|
whether O |
|
the O |
|
number O |
|
is O |
|
in O |
|
the O |
|
denylist O |
|
sewn O |
|
into O |
|
the O |
|
Trojan O |
|
code O |
|
: O |
|
Examples O |
|
of O |
|
phishing O |
|
pages O |
|
imitating O |
|
mobile O |
|
banks O |
|
At O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
, O |
|
the O |
|
functionality O |
|
of O |
|
most O |
|
of O |
|
the O |
|
Western O |
|
versions O |
|
of O |
|
Riltok O |
|
|
|
was O |
|
somewhat O |
|
pared O |
|
down O |
|
compared O |
|
to O |
|
the O |
|
Russian O |
|
one O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
the O |
|
default O |
|
configuration O |
|
file O |
|
with O |
|
injects O |
|
is O |
|
non-operational O |
|
, O |
|
and O |
|
the O |
|
malware O |
|
contains O |
|
no O |
|
fake O |
|
built-in O |
|
windows O |
|
requesting O |
|
bank O |
|
card O |
|
details O |
|
. O |
|
|
|
Conclusion O |
|
Threats O |
|
are O |
|
better O |
|
prevented O |
|
than O |
|
cured O |
|
, O |
|
so O |
|
do O |
|
not O |
|
follow O |
|
suspicious O |
|
links O |
|
in O |
|
SMS O |
|
, O |
|
and O |
|
be O |
|
sure O |
|
to O |
|
install O |
|
apps O |
|
only O |
|
from O |
|
official O |
|
sources O |
|
and O |
|
check O |
|
what O |
|
permissions O |
|
you O |
|
are O |
|
granting O |
|
during O |
|
installation O |
|
. O |
|
|
|
As O |
|
Riltok B-Malware |
|
shows O |
|
, O |
|
cybercriminals O |
|
can O |
|
apply O |
|
the O |
|
same O |
|
methods O |
|
of O |
|
infection O |
|
to O |
|
victims O |
|
in O |
|
different O |
|
countries O |
|
with O |
|
more O |
|
or O |
|
less O |
|
the O |
|
same O |
|
success O |
|
. O |
|
|
|
Kaspersky B-Organization |
|
products O |
|
detect O |
|
the O |
|
above-described O |
|
threat O |
|
with O |
|
the O |
|
verdict O |
|
Trojan-Banker.AndroidOS.Riltok B-Indicator |
|
. O |
|
|
|
IoCs O |
|
C O |
|
& O |
|
C O |
|
100.51.100.00 B-Indicator |
|
108.62.118.131 B-Indicator |
|
172.81.134.165 B-Indicator |
|
172.86.120.207 B-Indicator |
|
185.212.128.152 B-Indicator |
|
185.212.128.192 B-Indicator |
|
185.61.000.108 B-Indicator |
|
185.61.138.108 B-Indicator |
|
185.61.138.37 B-Indicator |
|
188.209.52.101 B-Indicator |
|
5.206.225.57 B-Indicator |
|
alr992.date B-Indicator |
|
avito-app.pw B-Indicator |
|
backfround2.pw B-Indicator |
|
background1.xyz B-Indicator |
|
blacksolider93.com B-Indicator |
|
blass9g087.com B-Indicator |
|
brekelter2.com B-Indicator |
|
broplar3hf.xyz B-Indicator |
|
buy-youla.ru B-Indicator |
|
|
|
cd78cg210xy0.com B-Indicator |
|
copsoiteess.com B-Indicator |
|
farmatefc93.org B-Indicator |
|
firstclinsop.com B-Indicator |
|
holebrhuhh3.com B-Indicator |
|
holebrhuhh45.com B-Indicator |
|
karambga3j.net B-Indicator |
|
le22999a.pw B-Indicator |
|
leboncoin-bk.top B-Indicator |
|
leboncoin-buy.pw B-Indicator |
|
leboncoin-cz.info B-Indicator |
|
leboncoin-f.pw B-Indicator |
|
leboncoin-jp.info B-Indicator |
|
leboncoin-kp.top B-Indicator |
|
leboncoin-ny.info B-Indicator |
|
leboncoin-ql.top B-Indicator |
|
leboncoin-tr.info B-Indicator |
|
|
|
myyoula.ru B-Indicator |
|
sell-avito.ru B-Indicator |
|
sell-youla.ru B-Indicator |
|
sentel8ju67.com B-Indicator |
|
subito-li.pw B-Indicator |
|
subitop.pw B-Indicator |
|
web-gumtree.com B-Indicator |
|
whitehousejosh.com B-Indicator |
|
whitekalgoy3.com B-Indicator |
|
youlaprotect.ru B-Indicator |
|
Examples O |
|
of O |
|
malware O |
|
0497b6000a7a23e9e9b97472bc2d3799caf49cbbea1627ad4d87ae6e0b7e2a98 B-Indicator |
|
417fc112cd0610cc8c402742b0baab0a086b5c4164230009e11d34fdeee7d3fa B-Indicator |
|
|
|
54594edbe9055517da2836199600f682dee07e6b405c6fe4b476627e8d184bfe B-Indicator |
|
6e995d68c724f121d43ec2ff59bc4e536192360afa3beaec5646f01094f0b745 B-Indicator |
|
bbc268ca63eeb27e424fec1b3976bab550da304de18e29faff94d9057b1fa25a B-Indicator |
|
dc3dd9d75120934333496d0a4100252b419ee8fcdab5d74cf343bcb0306c9811 B-Indicator |
|
|
|
e3f77ff093f322e139940b33994c5a57ae010b66668668dc4945142a81bcc049 B-Indicator |
|
ebd0a8043434edac261cb25b94f417188a5c0d62b5dd4033f156b890d150a4c5 B-Indicator |
|
f51a27163cb0ddd08caa29d865b9f238848118ba2589626af711330481b352df B-Indicator |
|
Tracking O |
|
down O |
|
the O |
|
developer O |
|
of O |
|
Android B-System |
|
adware O |
|
affecting O |
|
|
|
millions O |
|
of O |
|
users O |
|
24 O |
|
Oct O |
|
2019 O |
|
- O |
|
11:30AM O |
|
We O |
|
detected O |
|
a O |
|
large O |
|
adware O |
|
campaign O |
|
running O |
|
for O |
|
about O |
|
a O |
|
year O |
|
, O |
|
with O |
|
the O |
|
involved O |
|
apps O |
|
installed O |
|
eight O |
|
million O |
|
times O |
|
from O |
|
Google B-System |
|
Play I-System |
|
alone O |
|
. O |
|
|
|
We O |
|
identified O |
|
42 O |
|
apps O |
|
on O |
|
Google B-System |
|
Play I-System |
|
as O |
|
belonging O |
|
to O |
|
the O |
|
campaign O |
|
, O |
|
which O |
|
had O |
|
been O |
|
running O |
|
since O |
|
July O |
|
2018 O |
|
. O |
|
|
|
Of O |
|
those O |
|
, O |
|
21 O |
|
were O |
|
still O |
|
available O |
|
at O |
|
the O |
|
time O |
|
of O |
|
discovery O |
|
. O |
|
|
|
We O |
|
reported O |
|
the O |
|
apps O |
|
to O |
|
the O |
|
Google O |
|
security O |
|
team O |
|
and O |
|
they O |
|
were O |
|
swiftly O |
|
removed O |
|
. O |
|
|
|
However O |
|
, O |
|
the O |
|
apps O |
|
are O |
|
still O |
|
available O |
|
in O |
|
third-party O |
|
app O |
|
stores O |
|
. O |
|
|
|
ESET B-Organization |
|
detects O |
|
this O |
|
adware O |
|
, O |
|
collectively O |
|
, O |
|
as O |
|
Android/AdDisplay.Ashas B-Malware |
|
. O |
|
|
|
Figure O |
|
1 O |
|
. O |
|
|
|
Apps O |
|
of O |
|
the O |
|
Android/AdDisplay.Ashas B-Malware |
|
family O |
|
reported O |
|
to O |
|
Google O |
|
by O |
|
ESET B-Organization |
|
Figure O |
|
2 O |
|
. O |
|
|
|
The O |
|
most O |
|
popular O |
|
member O |
|
of O |
|
the O |
|
Android/AdDisplay.Ashas B-Malware |
|
family I-Malware |
|
on O |
|
Google B-System |
|
Play I-System |
|
was O |
|
β O |
|
Video O |
|
downloader O |
|
master O |
|
β O |
|
with O |
|
over O |
|
five O |
|
million O |
|
downloads O |
|
Ashas B-Malware |
|
functionality O |
|
All O |
|
the O |
|
apps O |
|
provide O |
|
the O |
|
functionality O |
|
they O |
|
promise O |
|
, O |
|
besides O |
|
working O |
|
as O |
|
adware O |
|
. O |
|
|
|
The O |
|
adware O |
|
functionality O |
|
is O |
|
the O |
|
same O |
|
in O |
|
all O |
|
the O |
|
apps O |
|
we O |
|
analyzed O |
|
. O |
|
|
|
[ O |
|
Note O |
|
: O |
|
The O |
|
analysis O |
|
of O |
|
the O |
|
functionality O |
|
below O |
|
describes O |
|
a O |
|
single O |
|
app O |
|
, O |
|
but O |
|
applies O |
|
to O |
|
all O |
|
apps O |
|
of O |
|
the O |
|
Android/AdDisplay.Ashas B-Malware |
|
family I-Malware |
|
. O |
|
|
|
] O |
|
Once O |
|
launched O |
|
, O |
|
the O |
|
app O |
|
starts O |
|
to O |
|
communicate O |
|
with O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
( O |
|
whose O |
|
IP O |
|
address O |
|
is O |
|
base64-encoded O |
|
in O |
|
the O |
|
app O |
|
) O |
|
. O |
|
|
|
It O |
|
sends O |
|
β O |
|
home O |
|
β O |
|
key O |
|
data O |
|
about O |
|
the O |
|
affected O |
|
device O |
|
: O |
|
device O |
|
type O |
|
, O |
|
OS O |
|
version O |
|
, O |
|
language O |
|
, O |
|
number O |
|
of O |
|
installed O |
|
apps O |
|
, O |
|
free O |
|
storage O |
|
space O |
|
, O |
|
battery O |
|
status O |
|
, O |
|
whether O |
|
the O |
|
device O |
|
is O |
|
rooted O |
|
and O |
|
Developer O |
|
mode O |
|
enabled O |
|
, O |
|
and O |
|
whether O |
|
Facebook B-Organization |
|
and O |
|
FB O |
|
Messenger B-System |
|
are O |
|
installed O |
|
. O |
|
|
|
Figure O |
|
3 O |
|
. O |
|
|
|
Sending O |
|
information O |
|
about O |
|
the O |
|
affected O |
|
device O |
|
The O |
|
app O |
|
receives O |
|
configuration O |
|
data O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
, O |
|
needed O |
|
for O |
|
displaying O |
|
ads O |
|
, O |
|
and O |
|
for O |
|
stealth O |
|
and O |
|
resilience O |
|
. O |
|
|
|
Figure O |
|
4 O |
|
. O |
|
|
|
Configuration O |
|
file O |
|
received O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
As O |
|
for O |
|
stealth O |
|
and O |
|
resilience O |
|
, O |
|
the O |
|
attacker O |
|
uses O |
|
a O |
|
number O |
|
of O |
|
tricks O |
|
. O |
|
|
|
First O |
|
, O |
|
the O |
|
malicious O |
|
app O |
|
tries O |
|
to O |
|
determine O |
|
whether O |
|
it O |
|
is O |
|
being O |
|
tested O |
|
by O |
|
the O |
|
Google B-System |
|
Play I-System |
|
security O |
|
mechanism O |
|
. O |
|
|
|
For O |
|
this O |
|
purpose O |
|
, O |
|
the O |
|
app O |
|
receives O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
the O |
|
isGoogleIp O |
|
flag O |
|
, O |
|
which O |
|
indicates O |
|
whether O |
|
the O |
|
IP O |
|
address O |
|
of O |
|
the O |
|
affected O |
|
device O |
|
falls O |
|
within O |
|
the O |
|
range O |
|
of O |
|
known O |
|
IP O |
|
addresses O |
|
for O |
|
Google O |
|
servers O |
|
. O |
|
|
|
If O |
|
the O |
|
server O |
|
returns O |
|
this O |
|
flag O |
|
as O |
|
positive O |
|
, O |
|
the O |
|
app O |
|
will O |
|
not O |
|
trigger O |
|
the O |
|
adware O |
|
payload O |
|
. O |
|
|
|
Second O |
|
, O |
|
the O |
|
app O |
|
can O |
|
set O |
|
a O |
|
custom O |
|
delay O |
|
between O |
|
displaying O |
|
ads O |
|
. O |
|
|
|
The O |
|
samples O |
|
we O |
|
have O |
|
seen O |
|
had O |
|
their O |
|
configuration O |
|
set O |
|
to O |
|
delay O |
|
displaying O |
|
the O |
|
first O |
|
ad O |
|
by O |
|
24 O |
|
minutes O |
|
after O |
|
the O |
|
device O |
|
unlocks O |
|
. O |
|
|
|
This O |
|
delay O |
|
means O |
|
that O |
|
a O |
|
typical O |
|
testing O |
|
procedure O |
|
, O |
|
which O |
|
takes O |
|
less O |
|
than O |
|
10 O |
|
minutes O |
|
, O |
|
will O |
|
not O |
|
detect O |
|
any O |
|
unwanted O |
|
behavior O |
|
. O |
|
|
|
Also O |
|
, O |
|
the O |
|
longer O |
|
the O |
|
delay O |
|
, O |
|
the O |
|
lower O |
|
the O |
|
risk O |
|
of O |
|
the O |
|
user O |
|
associating O |
|
the O |
|
unwanted O |
|
ads O |
|
with O |
|
a O |
|
particular O |
|
app O |
|
. O |
|
|
|
Third O |
|
, O |
|
based O |
|
on O |
|
the O |
|
server O |
|
response O |
|
, O |
|
the O |
|
app O |
|
can O |
|
also O |
|
hide O |
|
its O |
|
icon O |
|
and O |
|
create O |
|
a O |
|
shortcut O |
|
instead O |
|
. O |
|
|
|
If O |
|
a O |
|
typical O |
|
user O |
|
tries O |
|
to O |
|
get O |
|
rid O |
|
of O |
|
the O |
|
malicious O |
|
app O |
|
, O |
|
chances O |
|
are O |
|
that O |
|
only O |
|
the O |
|
shortcut O |
|
ends O |
|
up O |
|
getting O |
|
removed O |
|
. O |
|
|
|
The O |
|
app O |
|
then O |
|
continues O |
|
to O |
|
run O |
|
in O |
|
the O |
|
background O |
|
without O |
|
the O |
|
user O |
|
β O |
|
s O |
|
knowledge O |
|
. O |
|
|
|
This O |
|
stealth O |
|
technique O |
|
has O |
|
been O |
|
gaining O |
|
popularity O |
|
among O |
|
adware-related O |
|
threats O |
|
distributed O |
|
via O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
Figure O |
|
5 O |
|
. O |
|
|
|
Time O |
|
delay O |
|
to O |
|
postpone O |
|
displaying O |
|
ads O |
|
implemented O |
|
by O |
|
the O |
|
adware O |
|
Once O |
|
the O |
|
malicious O |
|
app O |
|
receives O |
|
its O |
|
configuration O |
|
data O |
|
, O |
|
the O |
|
affected O |
|
device O |
|
is O |
|
ready O |
|
to O |
|
display O |
|
ads O |
|
as O |
|
per O |
|
the O |
|
attacker O |
|
β O |
|
s O |
|
choice O |
|
; O |
|
each O |
|
ad O |
|
is O |
|
displayed O |
|
as O |
|
a O |
|
full O |
|
screen O |
|
activity O |
|
. O |
|
|
|
If O |
|
the O |
|
user O |
|
wants O |
|
to O |
|
check O |
|
which O |
|
app O |
|
is O |
|
responsible O |
|
for O |
|
the O |
|
ad O |
|
being O |
|
displayed O |
|
, O |
|
by O |
|
hitting O |
|
the O |
|
β O |
|
Recent O |
|
apps O |
|
β O |
|
button O |
|
, O |
|
another O |
|
trick O |
|
is O |
|
used O |
|
: O |
|
the O |
|
app O |
|
displays O |
|
a O |
|
Facebook B-Organization |
|
or O |
|
Google B-Organization |
|
icon O |
|
, O |
|
as O |
|
seen O |
|
in O |
|
Figure O |
|
6 O |
|
. O |
|
|
|
The O |
|
adware O |
|
mimics O |
|
these O |
|
two O |
|
apps O |
|
to O |
|
look O |
|
legitimate O |
|
and O |
|
avoid O |
|
suspicion O |
|
β O |
|
and O |
|
thus O |
|
stay O |
|
on O |
|
the O |
|
affected O |
|
device O |
|
for O |
|
as O |
|
long O |
|
as O |
|
possible O |
|
. O |
|
|
|
Figure O |
|
6 O |
|
. O |
|
|
|
The O |
|
adware O |
|
activity O |
|
impersonates O |
|
Facebook B-Organization |
|
( O |
|
left O |
|
) O |
|
. O |
|
|
|
If O |
|
the O |
|
user O |
|
long-presses O |
|
the O |
|
icon O |
|
, O |
|
the O |
|
name O |
|
of O |
|
the O |
|
app O |
|
responsible O |
|
for O |
|
the O |
|
activity O |
|
is O |
|
revealed O |
|
( O |
|
right O |
|
) O |
|
. O |
|
|
|
Finally O |
|
, O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
family O |
|
has O |
|
its O |
|
code O |
|
hidden O |
|
under O |
|
the O |
|
com.google.xxx O |
|
package O |
|
name O |
|
. O |
|
|
|
This O |
|
trick O |
|
β O |
|
posing O |
|
as O |
|
a O |
|
part O |
|
of O |
|
a O |
|
legitimate O |
|
Google B-Organization |
|
service O |
|
β O |
|
may O |
|
help O |
|
avoid O |
|
scrutiny O |
|
. O |
|
|
|
Some O |
|
detection O |
|
mechanisms O |
|
and O |
|
sandboxes O |
|
may O |
|
whitelist O |
|
such O |
|
package O |
|
names O |
|
, O |
|
in O |
|
an O |
|
effort O |
|
to O |
|
prevent O |
|
wasting O |
|
resources O |
|
. O |
|
|
|
Figure O |
|
7 O |
|
. O |
|
|
|
Malicious O |
|
code O |
|
hidden O |
|
in O |
|
a O |
|
package O |
|
named O |
|
β O |
|
com.google O |
|
β O |
|
Hunting O |
|
down O |
|
the O |
|
developer O |
|
Using O |
|
open-source O |
|
information O |
|
, O |
|
we O |
|
tracked O |
|
down O |
|
the O |
|
developer O |
|
of O |
|
the O |
|
adware O |
|
, O |
|
who O |
|
we O |
|
also O |
|
identified O |
|
as O |
|
the O |
|
campaign O |
|
β O |
|
s O |
|
operator O |
|
and O |
|
owner O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
In O |
|
the O |
|
following O |
|
paragraphs O |
|
, O |
|
we O |
|
outline O |
|
our O |
|
efforts O |
|
to O |
|
discover O |
|
other O |
|
applications O |
|
from O |
|
the O |
|
same O |
|
developer O |
|
and O |
|
protect O |
|
our O |
|
users O |
|
from O |
|
it O |
|
. O |
|
|
|
First O |
|
, O |
|
based O |
|
on O |
|
information O |
|
that O |
|
is O |
|
associated O |
|
with O |
|
the O |
|
registered O |
|
C O |
|
& O |
|
C O |
|
domain O |
|
, O |
|
we O |
|
identified O |
|
the O |
|
name O |
|
of O |
|
the O |
|
registrant O |
|
, O |
|
along O |
|
with O |
|
further O |
|
data O |
|
like O |
|
country O |
|
and O |
|
email O |
|
address O |
|
, O |
|
as O |
|
seen O |
|
in O |
|
Figure O |
|
8 O |
|
. O |
|
|
|
Figure O |
|
8 O |
|
. O |
|
|
|
Information O |
|
about O |
|
the O |
|
C O |
|
& O |
|
C O |
|
domain O |
|
used O |
|
by O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
Knowing O |
|
that O |
|
the O |
|
information O |
|
provided O |
|
to O |
|
a O |
|
domain O |
|
registrar O |
|
might O |
|
be O |
|
fake O |
|
, O |
|
we O |
|
continued O |
|
our O |
|
search O |
|
. O |
|
|
|
The O |
|
email O |
|
address O |
|
and O |
|
country O |
|
information O |
|
drove O |
|
us O |
|
to O |
|
a O |
|
list O |
|
of O |
|
students O |
|
attending O |
|
a O |
|
class O |
|
at O |
|
a O |
|
Vietnamese O |
|
university O |
|
β O |
|
corroborating O |
|
the O |
|
existence O |
|
of O |
|
the O |
|
person O |
|
under O |
|
whose O |
|
name O |
|
the O |
|
domain O |
|
was O |
|
registered O |
|
. O |
|
|
|
Figure O |
|
9 O |
|
. O |
|
|
|
A O |
|
university O |
|
class O |
|
student O |
|
list O |
|
including O |
|
the O |
|
C O |
|
& O |
|
C O |
|
domain O |
|
registrant O |
|
Due O |
|
to O |
|
poor O |
|
privacy O |
|
practices O |
|
on O |
|
the O |
|
part O |
|
of O |
|
our O |
|
culprit O |
|
β O |
|
s O |
|
university O |
|
, O |
|
we O |
|
now O |
|
know O |
|
his O |
|
date O |
|
of O |
|
birth O |
|
( O |
|
probably O |
|
: O |
|
he O |
|
seemingly O |
|
used O |
|
his O |
|
birth O |
|
year O |
|
as O |
|
part O |
|
of O |
|
his O |
|
Gmail B-System |
|
address O |
|
, O |
|
as O |
|
further O |
|
partial O |
|
confirmation O |
|
) O |
|
, O |
|
we O |
|
know O |
|
that O |
|
he O |
|
was O |
|
a O |
|
student O |
|
and O |
|
what O |
|
university O |
|
he O |
|
attended O |
|
. O |
|
|
|
We O |
|
were O |
|
also O |
|
able O |
|
to O |
|
confirm O |
|
that O |
|
the O |
|
phone O |
|
number O |
|
he O |
|
provided O |
|
to O |
|
the O |
|
domain O |
|
registrar O |
|
was O |
|
genuine O |
|
. O |
|
|
|
Moreover O |
|
, O |
|
we O |
|
retrieved O |
|
his O |
|
University O |
|
ID O |
|
; O |
|
a O |
|
quick O |
|
googling O |
|
showed O |
|
some O |
|
of O |
|
his O |
|
exam O |
|
grades O |
|
. O |
|
|
|
However O |
|
, O |
|
his O |
|
study O |
|
results O |
|
are O |
|
out O |
|
of O |
|
the O |
|
scope O |
|
of O |
|
our O |
|
research O |
|
. O |
|
|
|
Based O |
|
on O |
|
our O |
|
culprit O |
|
β O |
|
s O |
|
email O |
|
address O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
find O |
|
his O |
|
GitHub B-Organization |
|
repository O |
|
. O |
|
|
|
His O |
|
repository O |
|
proves O |
|
that O |
|
he O |
|
is O |
|
indeed O |
|
an O |
|
Android B-System |
|
developer O |
|
, O |
|
but O |
|
it O |
|
contained O |
|
no O |
|
publicly O |
|
available O |
|
code O |
|
of O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
at O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
of O |
|
this O |
|
blogpost O |
|
. O |
|
|
|
However O |
|
, O |
|
a O |
|
simple O |
|
Google B-Organization |
|
search O |
|
for O |
|
the O |
|
adware O |
|
package O |
|
name O |
|
returned O |
|
a O |
|
β O |
|
TestDelete O |
|
β O |
|
project O |
|
that O |
|
had O |
|
been O |
|
available O |
|
in O |
|
his O |
|
repository O |
|
at O |
|
some O |
|
point O |
|
The O |
|
malicious O |
|
developer O |
|
also O |
|
has O |
|
apps O |
|
in O |
|
Apple B-Organization |
|
β O |
|
s O |
|
App B-System |
|
Store I-System |
|
. O |
|
|
|
Some O |
|
of O |
|
them O |
|
are O |
|
iOS B-System |
|
versions O |
|
of O |
|
the O |
|
ones O |
|
removed O |
|
from O |
|
Google B-System |
|
Play I-System |
|
, O |
|
but O |
|
none O |
|
contain O |
|
adware O |
|
functionality O |
|
. O |
|
|
|
Figure O |
|
10 O |
|
. O |
|
|
|
The O |
|
malicious O |
|
developer O |
|
β O |
|
s O |
|
apps O |
|
published O |
|
on O |
|
the O |
|
App O |
|
Store O |
|
which O |
|
don O |
|
β O |
|
t O |
|
contain O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
Searching O |
|
further O |
|
for O |
|
the O |
|
malicious O |
|
developer O |
|
β O |
|
s O |
|
activities O |
|
, O |
|
we O |
|
also O |
|
discovered O |
|
his O |
|
Youtube B-System |
|
channel O |
|
propagating O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
and O |
|
his O |
|
other O |
|
projects O |
|
. O |
|
|
|
As O |
|
for O |
|
the O |
|
Ashas B-Malware |
|
family O |
|
, O |
|
one O |
|
of O |
|
the O |
|
associated O |
|
promotional O |
|
videos O |
|
, O |
|
β O |
|
Head O |
|
Soccer O |
|
World O |
|
Champion O |
|
2018 O |
|
β O |
|
Android B-System |
|
, O |
|
ios B-System |
|
β O |
|
was O |
|
viewed O |
|
almost O |
|
three O |
|
million O |
|
times O |
|
and O |
|
two O |
|
others O |
|
reached O |
|
hundreds O |
|
of O |
|
thousands O |
|
of O |
|
views O |
|
, O |
|
as O |
|
seen O |
|
in O |
|
Figure O |
|
11 O |
|
. O |
|
|
|
Figure O |
|
11 O |
|
. O |
|
|
|
YouTube B-System |
|
channel O |
|
of O |
|
the O |
|
malicious O |
|
developer O |
|
His O |
|
YouTube B-System |
|
channel O |
|
provided O |
|
us O |
|
with O |
|
another O |
|
valuable O |
|
piece O |
|
of O |
|
information O |
|
: O |
|
he O |
|
himself O |
|
features O |
|
in O |
|
a O |
|
video O |
|
tutorial O |
|
for O |
|
one O |
|
of O |
|
his O |
|
other O |
|
projects O |
|
. O |
|
|
|
Thanks O |
|
to O |
|
that O |
|
project O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
extract O |
|
his O |
|
Facebook B-Organization |
|
profile O |
|
β O |
|
which O |
|
lists O |
|
his O |
|
studies O |
|
at O |
|
the O |
|
aforementioned O |
|
university O |
|
. O |
|
|
|
Figure O |
|
12 O |
|
. O |
|
|
|
Facebook B-Organization |
|
profile O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
domain O |
|
registrar O |
|
( O |
|
cover O |
|
picture O |
|
and O |
|
profile O |
|
picture O |
|
edited O |
|
out O |
|
) O |
|
Linked O |
|
on O |
|
the O |
|
malicious O |
|
developer O |
|
β O |
|
s O |
|
Facebook B-Organization |
|
profile O |
|
, O |
|
we O |
|
discovered O |
|
a O |
|
Facebook B-Organization |
|
page O |
|
, O |
|
Minigameshouse B-Indicator |
|
, O |
|
and O |
|
an O |
|
associated O |
|
domain O |
|
, O |
|
minigameshouse B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
. O |
|
|
|
This O |
|
domain O |
|
is O |
|
similar O |
|
to O |
|
the O |
|
one O |
|
the O |
|
malware O |
|
author O |
|
used O |
|
for O |
|
his O |
|
adware O |
|
C O |
|
& O |
|
C O |
|
communication O |
|
, O |
|
minigameshouse B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
us I-Indicator |
|
. O |
|
|
|
Checking O |
|
this O |
|
Minigameshouse B-Indicator |
|
page O |
|
further O |
|
indicates O |
|
that O |
|
this O |
|
person O |
|
is O |
|
indeed O |
|
the O |
|
owner O |
|
of O |
|
the O |
|
minigameshouse B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
us I-Indicator |
|
domain I-Indicator |
|
: O |
|
the O |
|
phone O |
|
number O |
|
registered O |
|
with O |
|
this O |
|
domain O |
|
is O |
|
the O |
|
same O |
|
as O |
|
the O |
|
phone O |
|
number O |
|
appearing O |
|
on O |
|
the O |
|
Facebook B-Organization |
|
page O |
|
. O |
|
|
|
Figure O |
|
13 O |
|
. O |
|
|
|
Facebook B-Organization |
|
page O |
|
managed O |
|
by O |
|
the O |
|
C O |
|
& O |
|
C O |
|
domain O |
|
registrant O |
|
uses O |
|
the O |
|
same O |
|
base O |
|
domain O |
|
name O |
|
( O |
|
minigameshouse O |
|
) O |
|
and O |
|
phone O |
|
number O |
|
as O |
|
the O |
|
registered O |
|
malicious O |
|
C O |
|
& O |
|
C O |
|
used O |
|
by O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
Of O |
|
interest O |
|
is O |
|
that O |
|
on O |
|
the O |
|
Minigameshouse O |
|
Facebook B-Organization |
|
page O |
|
, O |
|
the O |
|
malicious O |
|
developer O |
|
promotes O |
|
a O |
|
slew O |
|
of O |
|
games O |
|
beyond O |
|
the O |
|
Ashas B-Malware |
|
family O |
|
for O |
|
download O |
|
on O |
|
both O |
|
Google B-System |
|
Play I-System |
|
and O |
|
the O |
|
App B-System |
|
Store I-System |
|
. O |
|
|
|
However O |
|
, O |
|
all O |
|
of O |
|
those O |
|
have O |
|
been O |
|
removed O |
|
from O |
|
Google B-System |
|
Play I-System |
|
β O |
|
despite O |
|
the O |
|
fact O |
|
that O |
|
some O |
|
of O |
|
them O |
|
didn O |
|
β O |
|
t O |
|
contain O |
|
any O |
|
adware O |
|
functionality O |
|
. O |
|
|
|
On O |
|
top O |
|
of O |
|
all O |
|
this O |
|
, O |
|
one O |
|
of O |
|
the O |
|
malicious O |
|
developer O |
|
β O |
|
s O |
|
YouTube B-System |
|
videos O |
|
β O |
|
a O |
|
tutorial O |
|
on O |
|
developing O |
|
an O |
|
β O |
|
Instant O |
|
Game O |
|
β O |
|
for O |
|
Facebook B-Organization |
|
β O |
|
serves O |
|
as O |
|
an O |
|
example O |
|
of O |
|
operational O |
|
security O |
|
completely O |
|
ignored O |
|
. O |
|
|
|
We O |
|
were O |
|
able O |
|
to O |
|
see O |
|
that O |
|
his O |
|
recently O |
|
visited O |
|
web O |
|
sites O |
|
were O |
|
Google B-System |
|
Play I-System |
|
pages O |
|
belonging O |
|
to O |
|
apps O |
|
containing O |
|
the O |
|
Ashas B-Malware |
|
adware I-Malware |
|
. O |
|
|
|
He O |
|
also O |
|
used O |
|
his O |
|
email O |
|
account O |
|
to O |
|
log O |
|
into O |
|
various O |
|
services O |
|
in O |
|
the O |
|
video O |
|
, O |
|
which O |
|
identifies O |
|
him O |
|
as O |
|
the O |
|
adware O |
|
domain O |
|
owner O |
|
, O |
|
beyond O |
|
any O |
|
doubt O |
|
. O |
|
|
|
Thanks O |
|
to O |
|
the O |
|
video O |
|
, O |
|
we O |
|
were O |
|
even O |
|
able O |
|
to O |
|
identify O |
|
three O |
|
further O |
|
apps O |
|
that O |
|
contained O |
|
adware O |
|
functionality O |
|
and O |
|
were O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
Figure O |
|
14 O |
|
. O |
|
|
|
Screenshots O |
|
from O |
|
this O |
|
developer O |
|
β O |
|
s O |
|
YouTube B-System |
|
video O |
|
shows O |
|
history O |
|
of O |
|
checking O |
|
Ashas B-Malware |
|
adware O |
|
on O |
|
Google B-System |
|
Play I-System |
|
ESET B-Organization |
|
telemetry O |
|
Figure O |
|
15 O |
|
. O |
|
|
|
ESET B-Organization |
|
detections O |
|
of O |
|
Android/AdDisplay.Ashas B-Malware |
|
on O |
|
Android O |
|
devices O |
|
by O |
|
country O |
|
Is O |
|
adware O |
|
harmful O |
|
? O |
|
|
|
Because O |
|
the O |
|
real O |
|
nature O |
|
of O |
|
apps O |
|
containing O |
|
adware O |
|
is O |
|
usually O |
|
hidden O |
|
to O |
|
the O |
|
user O |
|
, O |
|
these O |
|
apps O |
|
and O |
|
their O |
|
developers O |
|
should O |
|
be O |
|
considered O |
|
untrustworthy O |
|
. O |
|
|
|
When O |
|
installed O |
|
on O |
|
a O |
|
device O |
|
, O |
|
apps O |
|
containing O |
|
adware O |
|
may O |
|
, O |
|
among O |
|
other O |
|
things O |
|
: O |
|
Annoy O |
|
users O |
|
with O |
|
intrusive O |
|
advertisements O |
|
, O |
|
including O |
|
scam O |
|
ads O |
|
Waste O |
|
the O |
|
device O |
|
β O |
|
s O |
|
battery O |
|
resources O |
|
Generate O |
|
increased O |
|
network O |
|
traffic O |
|
Gather O |
|
users O |
|
β O |
|
personal O |
|
information O |
|
Hide O |
|
their O |
|
presence O |
|
on O |
|
the O |
|
affected O |
|
device O |
|
to O |
|
achieve O |
|
persistence O |
|
Generate O |
|
revenue O |
|
for O |
|
their O |
|
operator O |
|
without O |
|
any O |
|
user O |
|
interaction O |
|
Conclusion O |
|
Based O |
|
solely O |
|
on O |
|
open O |
|
source O |
|
intelligence O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
trace O |
|
the O |
|
developer O |
|
of O |
|
the O |
|
Ashas B-Malware |
|
adware O |
|
and O |
|
establish O |
|
his O |
|
identity O |
|
and O |
|
discover O |
|
additional O |
|
related O |
|
adware-infected O |
|
apps O |
|
. O |
|
|
|
Seeing O |
|
that O |
|
the O |
|
developer O |
|
did O |
|
not O |
|
take O |
|
any O |
|
measures O |
|
to O |
|
protect O |
|
his O |
|
identity O |
|
, O |
|
it O |
|
seems O |
|
likely O |
|
that O |
|
his O |
|
intentions O |
|
weren O |
|
β O |
|
t O |
|
dishonest O |
|
at O |
|
first O |
|
β O |
|
and O |
|
this O |
|
is O |
|
also O |
|
supported O |
|
by O |
|
the O |
|
fact O |
|
that O |
|
not O |
|
all O |
|
his O |
|
published O |
|
apps O |
|
contained O |
|
unwanted O |
|
ads O |
|
. O |
|
|
|
At O |
|
some O |
|
point O |
|
in O |
|
his O |
|
Google B-System |
|
Play I-System |
|
β O |
|
career O |
|
β O |
|
, O |
|
he O |
|
apparently O |
|
decided O |
|
to O |
|
increase O |
|
his O |
|
ad O |
|
revenue O |
|
by O |
|
implementing O |
|
adware O |
|
functionality O |
|
in O |
|
his O |
|
apps O |
|
β O |
|
code O |
|
. O |
|
|
|
The O |
|
various O |
|
stealth O |
|
and O |
|
resilience O |
|
techniques O |
|
implemented O |
|
in O |
|
the O |
|
adware O |
|
show O |
|
us O |
|
that O |
|
the O |
|
culprit O |
|
was O |
|
aware O |
|
of O |
|
the O |
|
malicious O |
|
nature O |
|
of O |
|
the O |
|
added O |
|
functionality O |
|
and O |
|
attempted O |
|
to O |
|
keep O |
|
it O |
|
hidden O |
|
. O |
|
|
|
Sneaking O |
|
unwanted O |
|
or O |
|
harmful O |
|
functionality O |
|
into O |
|
popular O |
|
, O |
|
benign O |
|
apps O |
|
is O |
|
a O |
|
common O |
|
practice O |
|
among O |
|
β O |
|
bad O |
|
β O |
|
developers O |
|
, O |
|
and O |
|
we O |
|
are O |
|
committed O |
|
to O |
|
tracking O |
|
down O |
|
such O |
|
apps O |
|
. O |
|
|
|
We O |
|
report O |
|
them O |
|
to O |
|
Google B-Organization |
|
and O |
|
take O |
|
other O |
|
steps O |
|
to O |
|
disrupt O |
|
malicious O |
|
campaigns O |
|
we O |
|
discover O |
|
. O |
|
|
|
Last O |
|
but O |
|
not O |
|
least O |
|
, O |
|
we O |
|
publish O |
|
our O |
|
findings O |
|
to O |
|
help O |
|
Android B-System |
|
users O |
|
protect O |
|
themselves O |
|
. O |
|
|
|
MITRE B-Organization |
|
ATT O |
|
& O |
|
CK O |
|
techniques O |
|
Tactic O |
|
ID O |
|
Name O |
|
Description O |
|
Initial O |
|
Access O |
|
T1475 O |
|
Deliver O |
|
Malicious O |
|
App O |
|
via O |
|
Authorized O |
|
App O |
|
Store O |
|
The O |
|
malware O |
|
impersonates O |
|
legitimate O |
|
services O |
|
on O |
|
Google B-System |
|
Play I-System |
|
Persistence O |
|
T1402 O |
|
App O |
|
Auto-Start O |
|
at O |
|
Device O |
|
Boot O |
|
An O |
|
Android O |
|
application O |
|
can O |
|
listen O |
|
for O |
|
the O |
|
BOOT_COMPLETED O |
|
broadcast O |
|
, O |
|
ensuring O |
|
that O |
|
the O |
|
app O |
|
's O |
|
functionality O |
|
will O |
|
be O |
|
activated O |
|
every O |
|
time O |
|
the O |
|
device O |
|
starts O |
|
Impact O |
|
T1472 O |
|
Generate O |
|
Fraudulent O |
|
Advertising O |
|
Revenue O |
|
Generates O |
|
revenue O |
|
by O |
|
automatically O |
|
displaying O |
|
ads O |
|
The O |
|
Rotexy B-Malware |
|
mobile O |
|
Trojan O |
|
β O |
|
banker O |
|
and O |
|
ransomware O |
|
22 O |
|
NOV O |
|
2018 O |
|
On O |
|
|
|
the O |
|
back O |
|
of O |
|
a O |
|
surge O |
|
in O |
|
Trojan O |
|
activity O |
|
, O |
|
we O |
|
decided O |
|
to O |
|
carry O |
|
out O |
|
an O |
|
in-depth O |
|
analysis O |
|
and O |
|
track O |
|
the O |
|
evolution O |
|
of O |
|
some O |
|
other O |
|
popular O |
|
malware O |
|
families O |
|
besides O |
|
Asacub B-Malware |
|
. O |
|
|
|
One O |
|
of O |
|
the O |
|
most O |
|
interesting O |
|
and O |
|
active O |
|
specimens O |
|
to O |
|
date O |
|
was O |
|
a O |
|
mobile O |
|
Trojan O |
|
from O |
|
the O |
|
Rotexy B-Malware |
|
family O |
|
. O |
|
|
|
In O |
|
a O |
|
three-month O |
|
period O |
|
from O |
|
August O |
|
to O |
|
October O |
|
2018 O |
|
, O |
|
it O |
|
launched O |
|
over O |
|
70,000 O |
|
attacks O |
|
against O |
|
users O |
|
located O |
|
primarily O |
|
in O |
|
Russia O |
|
. O |
|
|
|
An O |
|
interesting O |
|
feature O |
|
of O |
|
this O |
|
family O |
|
of O |
|
banking O |
|
Trojans O |
|
is O |
|
the O |
|
simultaneous O |
|
use O |
|
of O |
|
three O |
|
command O |
|
sources O |
|
: O |
|
Google O |
|
Cloud O |
|
Messaging O |
|
( O |
|
GCM O |
|
) O |
|
service O |
|
β O |
|
used O |
|
to O |
|
send O |
|
small O |
|
messages O |
|
in O |
|
JSON O |
|
format O |
|
to O |
|
a O |
|
mobile O |
|
device O |
|
via O |
|
Google O |
|
servers O |
|
; O |
|
malicious O |
|
C O |
|
& O |
|
C O |
|
server O |
|
; O |
|
incoming O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
This O |
|
β O |
|
versatility O |
|
β O |
|
was O |
|
present O |
|
in O |
|
the O |
|
first O |
|
version O |
|
of O |
|
Rotexy B-Malware |
|
and O |
|
has O |
|
been O |
|
a O |
|
feature O |
|
of O |
|
all O |
|
the O |
|
family O |
|
β O |
|
s O |
|
subsequent O |
|
representatives O |
|
. O |
|
|
|
During O |
|
our O |
|
research O |
|
we O |
|
also O |
|
arrived O |
|
at O |
|
the O |
|
conclusion O |
|
that O |
|
this O |
|
Trojan O |
|
evolved O |
|
from O |
|
an O |
|
SMS O |
|
spyware O |
|
Trojan O |
|
that O |
|
was O |
|
first O |
|
spotted O |
|
in O |
|
October O |
|
2014 O |
|
. O |
|
|
|
Back O |
|
then O |
|
it O |
|
was O |
|
detected O |
|
as O |
|
Trojan-Spy.AndroidOS.SmsThief B-Malware |
|
, O |
|
but O |
|
later O |
|
versions O |
|
were O |
|
assigned O |
|
to O |
|
another O |
|
family O |
|
β O |
|
Trojan-Banker.AndroidOS.Rotexy B-Malware |
|
. O |
|
|
|
The O |
|
modern O |
|
version O |
|
of O |
|
Rotexy B-Malware |
|
combines O |
|
the O |
|
functions O |
|
of O |
|
a O |
|
banking O |
|
Trojan O |
|
and O |
|
ransomware O |
|
. O |
|
|
|
It O |
|
spreads O |
|
under O |
|
the O |
|
name O |
|
AvitoPay.apk B-Indicator |
|
( O |
|
or O |
|
similar O |
|
) O |
|
and O |
|
downloads O |
|
from O |
|
websites O |
|
with O |
|
names O |
|
like O |
|
youla9d6h.tk B-Indicator |
|
, O |
|
prodam8n9.tk B-Indicator |
|
, O |
|
prodamfkz.ml B-Indicator |
|
, O |
|
avitoe0ys.tk B-Indicator |
|
, O |
|
etc O |
|
. O |
|
|
|
These O |
|
website O |
|
names O |
|
are O |
|
generated O |
|
according O |
|
to O |
|
a O |
|
clear O |
|
algorithm O |
|
: O |
|
the O |
|
first O |
|
few O |
|
letters O |
|
are O |
|
suggestive O |
|
of O |
|
popular O |
|
classified O |
|
ad O |
|
services O |
|
, O |
|
followed O |
|
by O |
|
a O |
|
random O |
|
string O |
|
of O |
|
characters O |
|
, O |
|
followed O |
|
by O |
|
a O |
|
two-letter O |
|
top-level O |
|
domain O |
|
. O |
|
|
|
But O |
|
before O |
|
we O |
|
go O |
|
into O |
|
the O |
|
details O |
|
of O |
|
what O |
|
the O |
|
latest O |
|
version O |
|
of O |
|
Rotexy B-Malware |
|
can O |
|
do O |
|
and O |
|
why O |
|
it O |
|
β O |
|
s O |
|
distinctive O |
|
, O |
|
we O |
|
would O |
|
like O |
|
to O |
|
give O |
|
a O |
|
summary O |
|
of O |
|
the O |
|
path O |
|
the O |
|
Trojan O |
|
has O |
|
taken O |
|
since O |
|
2014 O |
|
up O |
|
to O |
|
the O |
|
present O |
|
day O |
|
. O |
|
|
|
Evolution O |
|
of O |
|
Rotexy B-Malware |
|
2014β2015 O |
|
Since O |
|
the O |
|
malicious O |
|
program O |
|
was O |
|
detected O |
|
in O |
|
2014 O |
|
, O |
|
its O |
|
main O |
|
functions O |
|
and O |
|
propagation O |
|
method O |
|
have O |
|
not O |
|
changed O |
|
: O |
|
Rotexy B-Malware |
|
spreads O |
|
via O |
|
links O |
|
sent O |
|
in O |
|
phishing O |
|
SMSs O |
|
that O |
|
prompt O |
|
the O |
|
user O |
|
to O |
|
install O |
|
an O |
|
app O |
|
. O |
|
|
|
As O |
|
it O |
|
launches O |
|
, O |
|
it O |
|
requests O |
|
device O |
|
administrator O |
|
rights O |
|
, O |
|
and O |
|
then O |
|
starts O |
|
communicating O |
|
with O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
Until O |
|
mid-2015 O |
|
, O |
|
Rotexy B-Malware |
|
used O |
|
a O |
|
plain-text O |
|
JSON O |
|
format O |
|
to O |
|
communicate O |
|
with O |
|
its O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
The O |
|
C O |
|
& O |
|
C O |
|
address O |
|
was O |
|
specified O |
|
in O |
|
the O |
|
code O |
|
and O |
|
was O |
|
also O |
|
unencrypted O |
|
: O |
|
In O |
|
some O |
|
versions O |
|
, O |
|
a O |
|
dynamically O |
|
generated O |
|
low-level O |
|
domain O |
|
was O |
|
used O |
|
as O |
|
an O |
|
address O |
|
: O |
|
In O |
|
its O |
|
first O |
|
communication O |
|
, O |
|
the O |
|
Trojan O |
|
sent O |
|
the O |
|
infected O |
|
device O |
|
β O |
|
s O |
|
IMEI O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
, O |
|
and O |
|
in O |
|
return O |
|
it O |
|
received O |
|
a O |
|
set O |
|
of O |
|
rules O |
|
for O |
|
processing O |
|
incoming O |
|
SMSs O |
|
( O |
|
phone O |
|
numbers O |
|
, O |
|
keywords O |
|
and O |
|
regular O |
|
expressions O |
|
) O |
|
β O |
|
these O |
|
applied O |
|
mainly O |
|
to O |
|
messages O |
|
from O |
|
banks O |
|
, O |
|
payment O |
|
systems O |
|
and O |
|
mobile O |
|
network O |
|
operators O |
|
. O |
|
|
|
For O |
|
instance O |
|
, O |
|
the O |
|
Trojan O |
|
could O |
|
automatically O |
|
reply O |
|
to O |
|
an O |
|
SMS O |
|
and O |
|
immediately O |
|
delete O |
|
it O |
|
. O |
|
|
|
Rotexy B-Malware |
|
then O |
|
sent O |
|
information O |
|
about O |
|
the O |
|
smartphone O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
, O |
|
including O |
|
the O |
|
phone O |
|
model O |
|
, O |
|
number O |
|
, O |
|
name O |
|
of O |
|
the O |
|
mobile O |
|
network O |
|
operator O |
|
, O |
|
versions O |
|
of O |
|
the O |
|
operating O |
|
system O |
|
and O |
|
IMEI O |
|
. O |
|
|
|
With O |
|
each O |
|
subsequent O |
|
request O |
|
, O |
|
a O |
|
new O |
|
subdomain O |
|
was O |
|
generated O |
|
. O |
|
|
|
The O |
|
algorithm O |
|
for O |
|
generating O |
|
the O |
|
lowest-level O |
|
domain O |
|
name O |
|
was O |
|
hardwired O |
|
in O |
|
the O |
|
Trojan O |
|
β O |
|
s O |
|
code O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
also O |
|
registered O |
|
in O |
|
Google B-System |
|
Cloud I-System |
|
Messaging I-System |
|
( I-System |
|
GCM I-System |
|
) I-System |
|
, O |
|
meaning O |
|
it O |
|
could O |
|
then O |
|
receive O |
|
commands O |
|
via O |
|
that O |
|
service O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
β O |
|
s O |
|
list O |
|
of O |
|
possible O |
|
commands O |
|
has O |
|
remained O |
|
practically O |
|
unchanged O |
|
throughout O |
|
its O |
|
life O |
|
, O |
|
and O |
|
will O |
|
be O |
|
described O |
|
below O |
|
in O |
|
detail O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
β O |
|
s O |
|
assets O |
|
folder O |
|
contained O |
|
the O |
|
file O |
|
data.db B-Indicator |
|
with O |
|
a O |
|
list O |
|
of O |
|
possible O |
|
values O |
|
for O |
|
the O |
|
User-Agent O |
|
field O |
|
for O |
|
the O |
|
PAGE O |
|
command O |
|
( O |
|
which O |
|
downloads O |
|
the O |
|
specified O |
|
webpage O |
|
) O |
|
. O |
|
|
|
If O |
|
the O |
|
value O |
|
of O |
|
this O |
|
field O |
|
failed O |
|
to O |
|
arrive O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
, O |
|
it O |
|
was O |
|
selected O |
|
from O |
|
the O |
|
file O |
|
data.db B-Indicator |
|
using O |
|
a O |
|
pseudo-random O |
|
algorithm O |
|
. O |
|
|
|
2015β2016 O |
|
Starting O |
|
from O |
|
mid-2015 O |
|
, O |
|
the O |
|
Trojan O |
|
began O |
|
using O |
|
the O |
|
AES O |
|
algorithm O |
|
to O |
|
encrypt O |
|
data O |
|
communicated O |
|
between O |
|
the O |
|
infected O |
|
device O |
|
and O |
|
the O |
|
C O |
|
& O |
|
C O |
|
: O |
|
Also O |
|
starting O |
|
with O |
|
the O |
|
same O |
|
version O |
|
, O |
|
data O |
|
is O |
|
sent O |
|
in O |
|
a O |
|
POST O |
|
request O |
|
to O |
|
the O |
|
relative O |
|
address O |
|
with O |
|
the O |
|
format O |
|
β O |
|
/ O |
|
[ O |
|
number O |
|
] O |
|
β O |
|
( O |
|
a O |
|
pseudo-randomly O |
|
generated O |
|
number O |
|
in O |
|
the O |
|
range O |
|
0β9999 O |
|
) O |
|
. O |
|
|
|
In O |
|
some O |
|
samples O |
|
, O |
|
starting O |
|
from O |
|
January O |
|
2016 O |
|
, O |
|
an O |
|
algorithm O |
|
has O |
|
been O |
|
implemented O |
|
for O |
|
unpacking O |
|
the O |
|
encrypted O |
|
executable O |
|
DEX O |
|
file O |
|
from O |
|
the O |
|
assets O |
|
folder O |
|
. O |
|
|
|
In O |
|
this O |
|
version O |
|
of O |
|
Rotexy B-Malware |
|
, O |
|
dynamic O |
|
generation O |
|
of O |
|
lowest-level O |
|
domains O |
|
was O |
|
not O |
|
used O |
|
. O |
|
|
|
2016 O |
|
From O |
|
mid-2016 O |
|
on O |
|
, O |
|
the O |
|
cybercriminals O |
|
returned O |
|
to O |
|
dynamic O |
|
generation O |
|
of O |
|
lowest-level O |
|
domains O |
|
. O |
|
|
|
No O |
|
other O |
|
significant O |
|
changes O |
|
were O |
|
observed O |
|
in O |
|
the O |
|
Trojan O |
|
β O |
|
s O |
|
network O |
|
behavior O |
|
. O |
|
|
|
In O |
|
late O |
|
2016 O |
|
, O |
|
versions O |
|
of O |
|
the O |
|
Trojan O |
|
emerged O |
|
that O |
|
contained O |
|
the O |
|
card.html B-Indicator |
|
phishing O |
|
page O |
|
in O |
|
the O |
|
assets/www B-Indicator |
|
folder O |
|
. O |
|
|
|
The O |
|
page O |
|
was O |
|
designed O |
|
to O |
|
steal O |
|
users O |
|
β O |
|
bank O |
|
card O |
|
details O |
|
: O |
|
2017β2018 O |
|
From O |
|
early O |
|
2017 O |
|
, O |
|
the O |
|
HTML O |
|
phishing O |
|
pages O |
|
bank.html B-Indicator |
|
, O |
|
update.html B-Indicator |
|
and O |
|
extortionist.html B-Indicator |
|
started O |
|
appearing O |
|
in O |
|
the O |
|
assets O |
|
folder O |
|
. O |
|
|
|
Also O |
|
, O |
|
in O |
|
some O |
|
versions O |
|
of O |
|
the O |
|
Trojan O |
|
the O |
|
file O |
|
names O |
|
were O |
|
random O |
|
strings O |
|
of O |
|
characters O |
|
. O |
|
|
|
In O |
|
2018 O |
|
, O |
|
versions O |
|
of O |
|
Rotexy B-Malware |
|
emerged O |
|
that O |
|
contacted O |
|
the O |
|
C O |
|
& O |
|
C O |
|
using O |
|
its O |
|
IP O |
|
address O |
|
. O |
|
|
|
β O |
|
One-time O |
|
β O |
|
domains O |
|
also O |
|
appeared O |
|
with O |
|
names O |
|
made O |
|
up O |
|
of O |
|
random O |
|
strings O |
|
of O |
|
characters O |
|
and O |
|
numbers O |
|
, O |
|
combined O |
|
with O |
|
the O |
|
top-level O |
|
domains O |
|
.cf O |
|
, O |
|
.ga O |
|
, O |
|
.gq O |
|
, O |
|
.ml O |
|
, O |
|
or O |
|
.tk O |
|
. O |
|
|
|
At O |
|
this O |
|
time O |
|
, O |
|
the O |
|
Trojan O |
|
also O |
|
began O |
|
actively O |
|
using O |
|
different O |
|
methods O |
|
of O |
|
obfuscation O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
the O |
|
DEX O |
|
file O |
|
is O |
|
packed O |
|
with O |
|
garbage O |
|
strings O |
|
and/or O |
|
operations O |
|
, O |
|
and O |
|
contains O |
|
a O |
|
key O |
|
to O |
|
decipher O |
|
the O |
|
main O |
|
executable O |
|
file O |
|
from O |
|
the O |
|
APK O |
|
. O |
|
|
|
Latest O |
|
version O |
|
( O |
|
2018 O |
|
) O |
|
Let O |
|
β O |
|
s O |
|
now O |
|
return O |
|
to O |
|
the O |
|
present O |
|
day O |
|
and O |
|
a O |
|
detailed O |
|
description O |
|
of O |
|
the O |
|
functionality O |
|
of O |
|
a O |
|
current O |
|
representative O |
|
of O |
|
the O |
|
Rotexy B-Malware |
|
family O |
|
( O |
|
SHA256 O |
|
: O |
|
ba4beb97f5d4ba33162f769f43ec8e7d1ae501acdade792a4a577cd6449e1a84 B-Indicator |
|
) O |
|
. O |
|
|
|
Application O |
|
launch O |
|
When O |
|
launching O |
|
for O |
|
the O |
|
first O |
|
time O |
|
, O |
|
the O |
|
Trojan O |
|
checks O |
|
if O |
|
it O |
|
is O |
|
being O |
|
launched O |
|
in O |
|
an O |
|
emulation O |
|
environment O |
|
, O |
|
and O |
|
in O |
|
which O |
|
country O |
|
it O |
|
is O |
|
being O |
|
launched O |
|
. O |
|
|
|
If O |
|
the O |
|
device O |
|
is O |
|
located O |
|
outside O |
|
Russia O |
|
or O |
|
is O |
|
an O |
|
emulator O |
|
, O |
|
the O |
|
application O |
|
displays O |
|
a O |
|
stub O |
|
page O |
|
: O |
|
In O |
|
this O |
|
case O |
|
, O |
|
the O |
|
Trojan O |
|
β O |
|
s O |
|
logs O |
|
contain O |
|
records O |
|
in O |
|
Russian O |
|
with O |
|
grammatical O |
|
errors O |
|
and O |
|
spelling O |
|
mistakes O |
|
: O |
|
If O |
|
the O |
|
check O |
|
is O |
|
successful O |
|
, O |
|
Rotexy B-Malware |
|
registers O |
|
with O |
|
GCM B-System |
|
and O |
|
launches O |
|
SuperService O |
|
which O |
|
tracks O |
|
if O |
|
the O |
|
Trojan O |
|
has O |
|
device O |
|
administrator O |
|
privileges O |
|
. O |
|
|
|
SuperService O |
|
also O |
|
tracks O |
|
its O |
|
own O |
|
status O |
|
and O |
|
relaunches O |
|
if O |
|
stopped O |
|
. O |
|
|
|
It O |
|
performs O |
|
a O |
|
privilege O |
|
check O |
|
once O |
|
every O |
|
second O |
|
; O |
|
if O |
|
unavailable O |
|
, O |
|
the O |
|
Trojan O |
|
starts O |
|
requesting O |
|
them O |
|
from O |
|
the O |
|
user O |
|
in O |
|
an O |
|
infinite O |
|
loop O |
|
: O |
|
If O |
|
the O |
|
user O |
|
agrees O |
|
and O |
|
gives O |
|
the O |
|
application O |
|
the O |
|
requested O |
|
privileges O |
|
, O |
|
another O |
|
stub O |
|
page O |
|
is O |
|
displayed O |
|
, O |
|
and O |
|
the O |
|
app O |
|
hides O |
|
its O |
|
icon O |
|
: O |
|
If O |
|
the O |
|
Trojan O |
|
detects O |
|
an O |
|
attempt O |
|
to O |
|
revoke O |
|
its O |
|
administrator O |
|
privileges O |
|
, O |
|
it O |
|
starts O |
|
periodically O |
|
switching O |
|
off O |
|
the O |
|
phone O |
|
screen O |
|
, O |
|
trying O |
|
to O |
|
stop O |
|
the O |
|
user O |
|
actions O |
|
. O |
|
|
|
If O |
|
the O |
|
privileges O |
|
are O |
|
revoked O |
|
successfully O |
|
, O |
|
the O |
|
Trojan O |
|
relaunches O |
|
the O |
|
cycle O |
|
of O |
|
requesting O |
|
administrator O |
|
privileges O |
|
. O |
|
|
|
If O |
|
, O |
|
for O |
|
some O |
|
reason O |
|
, O |
|
SuperService O |
|
does O |
|
not O |
|
switch O |
|
off O |
|
the O |
|
screen O |
|
when O |
|
there O |
|
is O |
|
an O |
|
attempt O |
|
to O |
|
revoke O |
|
the O |
|
device O |
|
administrator O |
|
privileges O |
|
, O |
|
the O |
|
Trojan O |
|
tries O |
|
to O |
|
intimidate O |
|
the O |
|
user O |
|
: O |
|
While O |
|
running O |
|
, O |
|
Rotexy B-Malware |
|
tracks O |
|
the O |
|
following O |
|
: O |
|
switching O |
|
on O |
|
and O |
|
rebooting O |
|
of O |
|
the O |
|
phone O |
|
; O |
|
termination O |
|
of O |
|
its O |
|
operation O |
|
β O |
|
in O |
|
this O |
|
case O |
|
, O |
|
it O |
|
relaunches O |
|
; O |
|
sending O |
|
of O |
|
an O |
|
SMS O |
|
by O |
|
the O |
|
app O |
|
β O |
|
in O |
|
this O |
|
case O |
|
, O |
|
the O |
|
phone O |
|
is O |
|
switched O |
|
to O |
|
silent O |
|
mode O |
|
. O |
|
|
|
C O |
|
& O |
|
C O |
|
communications O |
|
The O |
|
default O |
|
C O |
|
& O |
|
C O |
|
address O |
|
is O |
|
hardwired O |
|
in O |
|
the O |
|
Rotexy B-Malware |
|
code O |
|
: O |
|
The O |
|
relative O |
|
address O |
|
to O |
|
which O |
|
the O |
|
Trojan O |
|
will O |
|
send O |
|
information O |
|
from O |
|
the O |
|
device O |
|
is O |
|
generated O |
|
in O |
|
a O |
|
pseudo-random O |
|
manner O |
|
. O |
|
|
|
Depending O |
|
on O |
|
the O |
|
Trojan O |
|
version O |
|
, O |
|
dynamically O |
|
generated O |
|
subdomains O |
|
can O |
|
also O |
|
be O |
|
used O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
stores O |
|
information O |
|
about O |
|
C O |
|
& O |
|
C O |
|
servers O |
|
and O |
|
the O |
|
data O |
|
harvested O |
|
from O |
|
the O |
|
infected O |
|
device O |
|
in O |
|
a O |
|
local O |
|
SQLite O |
|
database O |
|
. O |
|
|
|
First O |
|
off O |
|
, O |
|
the O |
|
Trojan O |
|
registers O |
|
in O |
|
the O |
|
administration O |
|
panel O |
|
and O |
|
receives O |
|
the O |
|
information O |
|
it O |
|
needs O |
|
to O |
|
operate O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
( O |
|
the O |
|
SMS O |
|
interception O |
|
templates O |
|
and O |
|
the O |
|
text O |
|
that O |
|
will O |
|
be O |
|
displayed O |
|
on O |
|
HTML O |
|
pages O |
|
) O |
|
: O |
|
Rotexy B-Malware |
|
intercepts O |
|
all O |
|
incoming O |
|
SMSs O |
|
and O |
|
processes O |
|
them O |
|
according O |
|
to O |
|
the O |
|
templates O |
|
it O |
|
received O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
Also O |
|
, O |
|
when O |
|
an O |
|
SMS O |
|
arrives O |
|
, O |
|
the O |
|
Trojan O |
|
puts O |
|
the O |
|
phone O |
|
into O |
|
silent O |
|
mode O |
|
and O |
|
switches O |
|
off O |
|
the O |
|
screen O |
|
so O |
|
the O |
|
user O |
|
doesn O |
|
β O |
|
t O |
|
notice O |
|
that O |
|
a O |
|
new O |
|
SMS O |
|
has O |
|
arrived O |
|
. O |
|
|
|
When O |
|
required O |
|
, O |
|
the O |
|
Trojan O |
|
sends O |
|
an O |
|
SMS O |
|
to O |
|
the O |
|
specified O |
|
phone O |
|
number O |
|
with O |
|
the O |
|
information O |
|
it O |
|
has O |
|
received O |
|
from O |
|
the O |
|
intercepted O |
|
message O |
|
. O |
|
|
|
( O |
|
It O |
|
is O |
|
specified O |
|
in O |
|
the O |
|
interception O |
|
template O |
|
whether O |
|
a O |
|
reply O |
|
must O |
|
be O |
|
sent O |
|
, O |
|
and O |
|
which O |
|
text O |
|
should O |
|
be O |
|
sent O |
|
to O |
|
which O |
|
address O |
|
. O |
|
|
|
) O |
|
If O |
|
the O |
|
application O |
|
hasn O |
|
β O |
|
t O |
|
received O |
|
instructions O |
|
about O |
|
the O |
|
rules O |
|
for O |
|
processing O |
|
incoming O |
|
SMSs O |
|
, O |
|
it O |
|
simply O |
|
saves O |
|
all O |
|
SMSs O |
|
to O |
|
a O |
|
local O |
|
database O |
|
and O |
|
uploads O |
|
them O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
Apart O |
|
from O |
|
general O |
|
information O |
|
about O |
|
the O |
|
device O |
|
, O |
|
the O |
|
Trojan O |
|
sends O |
|
a O |
|
list O |
|
of O |
|
all O |
|
the O |
|
running O |
|
processes O |
|
and O |
|
installed O |
|
applications O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
It O |
|
β O |
|
s O |
|
possible O |
|
the O |
|
threat O |
|
actors O |
|
use O |
|
this O |
|
list O |
|
to O |
|
find O |
|
running O |
|
antivirus O |
|
or O |
|
banking O |
|
applications O |
|
. O |
|
|
|
Rotexy B-Malware |
|
will O |
|
perform O |
|
further O |
|
actions O |
|
after O |
|
it O |
|
receives O |
|
the O |
|
corresponding O |
|
commands O |
|
: O |
|
START O |
|
, O |
|
STOP O |
|
, O |
|
RESTART O |
|
β O |
|
start O |
|
, O |
|
stop O |
|
, O |
|
restart O |
|
SuperService O |
|
. O |
|
|
|
URL O |
|
β O |
|
update O |
|
C O |
|
& O |
|
C O |
|
address O |
|
. O |
|
|
|
MESSAGE O |
|
β O |
|
send O |
|
SMS O |
|
containing O |
|
specified O |
|
text O |
|
to O |
|
a O |
|
specified O |
|
number O |
|
. O |
|
|
|
UPDATE_PATTERNS O |
|
β O |
|
reregister O |
|
in O |
|
the O |
|
administration O |
|
panel O |
|
. O |
|
|
|
UNBLOCK O |
|
β O |
|
unblock O |
|
the O |
|
telephone O |
|
( O |
|
revoke O |
|
device O |
|
administrator O |
|
privileges O |
|
from O |
|
the O |
|
app O |
|
) O |
|
. O |
|
|
|
UPDATE O |
|
β O |
|
download O |
|
APK O |
|
file O |
|
from O |
|
C O |
|
& O |
|
C O |
|
and O |
|
install O |
|
it O |
|
. O |
|
|
|
This O |
|
command O |
|
can O |
|
be O |
|
used O |
|
not O |
|
just O |
|
to O |
|
update O |
|
the O |
|
app O |
|
but O |
|
to O |
|
install O |
|
any O |
|
other O |
|
software O |
|
on O |
|
the O |
|
infected O |
|
device O |
|
. O |
|
|
|
CONTACTS O |
|
β O |
|
send O |
|
text O |
|
received O |
|
from O |
|
C O |
|
& O |
|
C O |
|
to O |
|
all O |
|
user O |
|
contacts O |
|
. O |
|
|
|
This O |
|
is O |
|
most O |
|
probably O |
|
how O |
|
the O |
|
application O |
|
spreads O |
|
. O |
|
|
|
CONTACTS_PRO O |
|
β O |
|
request O |
|
unique O |
|
message O |
|
text O |
|
for O |
|
contacts O |
|
from O |
|
the O |
|
address O |
|
book O |
|
. O |
|
|
|
PAGE O |
|
β O |
|
contact O |
|
URL O |
|
received O |
|
from O |
|
C O |
|
& O |
|
C O |
|
using O |
|
User-Agent O |
|
value O |
|
that O |
|
was O |
|
also O |
|
received O |
|
from O |
|
C O |
|
& O |
|
C O |
|
or O |
|
local O |
|
database O |
|
. O |
|
|
|
ALLMSG O |
|
β O |
|
send O |
|
C O |
|
& O |
|
C O |
|
all O |
|
SMSs O |
|
received O |
|
and O |
|
sent O |
|
by O |
|
user O |
|
, O |
|
as O |
|
stored O |
|
in O |
|
phone O |
|
memory O |
|
. O |
|
|
|
ALLCONTACTS O |
|
β O |
|
send O |
|
all O |
|
contacts O |
|
from O |
|
phone O |
|
memory O |
|
to O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
ONLINE O |
|
β O |
|
send O |
|
information O |
|
about O |
|
Trojan O |
|
β O |
|
s O |
|
current O |
|
status O |
|
to O |
|
C O |
|
& O |
|
C O |
|
: O |
|
whether O |
|
it O |
|
has O |
|
device O |
|
administrator O |
|
privileges O |
|
, O |
|
which O |
|
HTML O |
|
page O |
|
is O |
|
currently O |
|
displayed O |
|
, O |
|
whether O |
|
screen O |
|
is O |
|
on O |
|
or O |
|
off O |
|
, O |
|
etc O |
|
. O |
|
|
|
NEWMSG O |
|
β O |
|
write O |
|
an O |
|
SMS O |
|
to O |
|
the O |
|
device O |
|
memory O |
|
containing O |
|
the O |
|
text O |
|
and O |
|
sender O |
|
number O |
|
sent O |
|
from O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
CHANGE_GCM_ID O |
|
β O |
|
change O |
|
GCM O |
|
ID O |
|
. O |
|
|
|
BLOCKER_BANKING_START O |
|
β O |
|
display O |
|
phishing O |
|
HTML O |
|
page O |
|
for O |
|
entry O |
|
of O |
|
bank O |
|
card O |
|
details O |
|
. O |
|
|
|
BLOCKER_EXTORTIONIST_START O |
|
β O |
|
display O |
|
HTML O |
|
page O |
|
of O |
|
the O |
|
ransomware O |
|
. O |
|
|
|
BLOCKER_UPDATE_START O |
|
β O |
|
display O |
|
fake O |
|
HTML O |
|
page O |
|
for O |
|
update O |
|
. O |
|
|
|
BLOCKER_STOP O |
|
β O |
|
block O |
|
display O |
|
of O |
|
all O |
|
HTML O |
|
pages O |
|
. O |
|
|
|
The O |
|
C O |
|
& O |
|
C O |
|
role O |
|
for O |
|
Rotexy B-Malware |
|
can O |
|
be O |
|
filled O |
|
not O |
|
only O |
|
by O |
|
a O |
|
web O |
|
server O |
|
but O |
|
also O |
|
by O |
|
any O |
|
device O |
|
that O |
|
can O |
|
send O |
|
SMSs O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
intercepts O |
|
incoming O |
|
SMSs O |
|
and O |
|
can O |
|
receive O |
|
the O |
|
following O |
|
commands O |
|
from O |
|
them O |
|
: O |
|
β O |
|
3458 O |
|
β O |
|
β O |
|
revoke O |
|
device O |
|
administrator O |
|
privileges O |
|
from O |
|
the O |
|
app O |
|
; O |
|
β O |
|
hi O |
|
β O |
|
, O |
|
β O |
|
ask O |
|
β O |
|
β O |
|
enable O |
|
and O |
|
disable O |
|
mobile O |
|
internet O |
|
; O |
|
β O |
|
privet O |
|
β O |
|
, O |
|
β O |
|
ru O |
|
β O |
|
β O |
|
enable O |
|
and O |
|
disable O |
|
Wi-Fi O |
|
; O |
|
β O |
|
check O |
|
β O |
|
β O |
|
send O |
|
text O |
|
β O |
|
install O |
|
: O |
|
[ O |
|
device O |
|
IMEI O |
|
] O |
|
β O |
|
to O |
|
phone O |
|
number O |
|
from O |
|
which O |
|
SMS O |
|
was O |
|
sent O |
|
; O |
|
β O |
|
stop_blocker O |
|
β O |
|
β O |
|
stop O |
|
displaying O |
|
all O |
|
blocking O |
|
HTML O |
|
pages O |
|
; O |
|
β O |
|
393838 O |
|
β O |
|
β O |
|
change O |
|
C O |
|
& O |
|
C O |
|
address O |
|
to O |
|
that O |
|
specified O |
|
in O |
|
the O |
|
|
|
SMS O |
|
. O |
|
|
|
Information O |
|
about O |
|
all O |
|
actions O |
|
performed O |
|
by O |
|
Rotexy B-Malware |
|
is O |
|
logged O |
|
in O |
|
the O |
|
local O |
|
database O |
|
and O |
|
sent O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
The O |
|
server O |
|
then O |
|
sends O |
|
a O |
|
reply O |
|
that O |
|
contains O |
|
instructions O |
|
on O |
|
further O |
|
actions O |
|
to O |
|
be O |
|
taken O |
|
. O |
|
|
|
Displaying O |
|
HTML O |
|
pages O |
|
We O |
|
β O |
|
ll O |
|
now O |
|
look O |
|
at O |
|
the O |
|
HTML O |
|
pages O |
|
that O |
|
Rotexy B-Malware |
|
displays O |
|
and O |
|
the O |
|
actions O |
|
performed O |
|
with O |
|
them O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
displays O |
|
a O |
|
fake O |
|
HTML O |
|
update O |
|
page O |
|
( O |
|
update.html B-Indicator |
|
) O |
|
that O |
|
blocks O |
|
the O |
|
device O |
|
β O |
|
s O |
|
screen O |
|
for O |
|
a O |
|
long O |
|
period O |
|
of O |
|
time O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
displays O |
|
the O |
|
extortion O |
|
page O |
|
( O |
|
extortionist.html B-Indicator |
|
) O |
|
that O |
|
blocks O |
|
the O |
|
device O |
|
and O |
|
demands O |
|
a O |
|
ransom O |
|
for O |
|
unblocking O |
|
it O |
|
. O |
|
|
|
The O |
|
sexually O |
|
explicit O |
|
images O |
|
in O |
|
this O |
|
screenshot O |
|
have O |
|
been O |
|
covered O |
|
with O |
|
a O |
|
black O |
|
box O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
displays O |
|
a O |
|
phishing O |
|
page O |
|
( O |
|
bank.html B-Indicator |
|
) O |
|
prompting O |
|
the O |
|
user O |
|
to O |
|
enter O |
|
their O |
|
bank O |
|
card O |
|
details O |
|
. O |
|
|
|
This O |
|
page O |
|
mimics O |
|
a O |
|
legitimate O |
|
bank O |
|
form O |
|
and O |
|
blocks O |
|
the O |
|
device O |
|
screen O |
|
until O |
|
the O |
|
user O |
|
enters O |
|
all O |
|
the O |
|
information O |
|
. O |
|
|
|
It O |
|
even O |
|
has O |
|
its O |
|
own O |
|
virtual O |
|
keyboard O |
|
that O |
|
supposedly O |
|
protects O |
|
the O |
|
victim O |
|
from O |
|
keyloggers O |
|
. O |
|
|
|
In O |
|
the O |
|
areas O |
|
marked O |
|
β O |
|
{ O |
|
text O |
|
} O |
|
β O |
|
Rotexy B-Malware |
|
displays O |
|
the O |
|
text O |
|
it O |
|
receives O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
Typically O |
|
, O |
|
it O |
|
is O |
|
a O |
|
message O |
|
saying O |
|
that O |
|
the O |
|
user O |
|
has O |
|
received O |
|
a O |
|
money O |
|
transfer O |
|
, O |
|
and O |
|
that O |
|
they O |
|
must O |
|
enter O |
|
their O |
|
bank O |
|
card O |
|
details O |
|
so O |
|
the O |
|
money O |
|
can O |
|
be O |
|
transferred O |
|
to O |
|
their O |
|
account O |
|
. O |
|
|
|
The O |
|
entered O |
|
data O |
|
is O |
|
then O |
|
checked O |
|
and O |
|
the O |
|
last O |
|
four O |
|
digits O |
|
of O |
|
the O |
|
bank O |
|
card O |
|
number O |
|
are O |
|
also O |
|
checked O |
|
against O |
|
the O |
|
data O |
|
sent O |
|
in O |
|
the O |
|
C O |
|
& O |
|
C O |
|
command O |
|
. O |
|
|
|
The O |
|
following O |
|
scenario O |
|
may O |
|
play O |
|
out O |
|
: O |
|
according O |
|
to O |
|
the O |
|
templates O |
|
for O |
|
processing O |
|
incoming O |
|
SMSs O |
|
, O |
|
Rotexy B-Malware |
|
intercepts O |
|
a O |
|
message O |
|
from O |
|
the O |
|
bank O |
|
that O |
|
contains O |
|
the O |
|
last O |
|
four O |
|
digits O |
|
of O |
|
the O |
|
bank O |
|
card O |
|
connected O |
|
to O |
|
the O |
|
phone O |
|
number O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
sends O |
|
these O |
|
digits O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
, O |
|
which O |
|
in O |
|
turn O |
|
sends O |
|
a O |
|
command O |
|
to O |
|
display O |
|
a O |
|
fake O |
|
data O |
|
entry O |
|
window O |
|
to O |
|
check O |
|
the O |
|
four O |
|
digits O |
|
. O |
|
|
|
If O |
|
the O |
|
user O |
|
has O |
|
provided O |
|
the O |
|
details O |
|
of O |
|
another O |
|
card O |
|
, O |
|
then O |
|
the O |
|
following O |
|
window O |
|
is O |
|
displayed O |
|
: O |
|
The O |
|
application O |
|
leaves O |
|
the O |
|
user O |
|
with O |
|
almost O |
|
no O |
|
option O |
|
but O |
|
to O |
|
enter O |
|
the O |
|
correct O |
|
card O |
|
number O |
|
, O |
|
as O |
|
it O |
|
checks O |
|
the O |
|
entered O |
|
number O |
|
against O |
|
the O |
|
bank O |
|
card O |
|
details O |
|
the O |
|
cybercriminals O |
|
received O |
|
earlier O |
|
. O |
|
|
|
When O |
|
all O |
|
the O |
|
necessary O |
|
card O |
|
details O |
|
are O |
|
entered O |
|
and O |
|
have O |
|
been O |
|
checked O |
|
, O |
|
all O |
|
the O |
|
information O |
|
is O |
|
uploaded O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
How O |
|
to O |
|
unblock O |
|
the O |
|
phone O |
|
Now O |
|
for O |
|
some O |
|
good O |
|
news O |
|
: O |
|
Rotexy B-Malware |
|
doesn O |
|
β O |
|
t O |
|
have O |
|
a O |
|
very O |
|
well-designed O |
|
module O |
|
for O |
|
processing O |
|
commands O |
|
that O |
|
arrive O |
|
in O |
|
SMSs O |
|
. O |
|
|
|
It O |
|
means O |
|
the O |
|
phone O |
|
can O |
|
be O |
|
unblocked O |
|
in O |
|
some O |
|
cases O |
|
when O |
|
it O |
|
has O |
|
been O |
|
blocked O |
|
by O |
|
one O |
|
of O |
|
the O |
|
above O |
|
HTML O |
|
pages O |
|
. O |
|
|
|
This O |
|
is O |
|
done O |
|
by O |
|
sending O |
|
β O |
|
3458 O |
|
β O |
|
in O |
|
an O |
|
SMS O |
|
to O |
|
the O |
|
blocked O |
|
device O |
|
β O |
|
this O |
|
will O |
|
revoke O |
|
the O |
|
administrator O |
|
privileges O |
|
from O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
After O |
|
that O |
|
it O |
|
β O |
|
s O |
|
necessary O |
|
to O |
|
send O |
|
β O |
|
stop_blocker O |
|
β O |
|
to O |
|
the O |
|
same O |
|
number O |
|
β O |
|
this O |
|
will O |
|
disable O |
|
the O |
|
display O |
|
of O |
|
HTML O |
|
pages O |
|
that O |
|
extort O |
|
money O |
|
and O |
|
block O |
|
the O |
|
screen O |
|
. O |
|
|
|
Rotexy B-Malware |
|
may O |
|
start O |
|
requesting O |
|
device O |
|
administrator O |
|
privileges O |
|
again O |
|
in O |
|
an O |
|
infinite O |
|
loop O |
|
; O |
|
in O |
|
that O |
|
case O |
|
, O |
|
restart O |
|
the O |
|
device O |
|
in O |
|
safe O |
|
mode O |
|
and O |
|
remove O |
|
the O |
|
malicious O |
|
program O |
|
. O |
|
|
|
However O |
|
, O |
|
this O |
|
method O |
|
may O |
|
not O |
|
work O |
|
if O |
|
the O |
|
threat O |
|
actors O |
|
react O |
|
quickly O |
|
to O |
|
an O |
|
attempt O |
|
to O |
|
remove O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
In O |
|
that O |
|
case O |
|
, O |
|
you O |
|
first O |
|
need O |
|
to O |
|
send O |
|
the O |
|
text O |
|
β O |
|
393838 O |
|
β O |
|
in O |
|
an O |
|
SMS O |
|
to O |
|
the O |
|
infected O |
|
device O |
|
and O |
|
then O |
|
repeat O |
|
all O |
|
the O |
|
actions O |
|
described O |
|
above O |
|
; O |
|
that O |
|
text O |
|
message O |
|
will O |
|
change O |
|
the O |
|
C O |
|
& O |
|
C O |
|
address O |
|
to O |
|
β O |
|
: O |
|
// O |
|
β O |
|
, O |
|
so O |
|
the O |
|
phone O |
|
will O |
|
no O |
|
longer O |
|
receive O |
|
commands O |
|
from O |
|
the O |
|
real O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
Please O |
|
note O |
|
that O |
|
these O |
|
unblocking O |
|
instructions O |
|
are O |
|
based O |
|
on O |
|
an O |
|
analysis O |
|
of O |
|
the O |
|
current O |
|
version O |
|
of O |
|
Rotexy B-Malware |
|
and O |
|
have O |
|
been O |
|
tested O |
|
on O |
|
it O |
|
. O |
|
|
|
However O |
|
, O |
|
it O |
|
β O |
|
s O |
|
possible O |
|
the O |
|
set O |
|
of O |
|
commands O |
|
may O |
|
change O |
|
in O |
|
future O |
|
versions O |
|
of O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
Geography O |
|
of O |
|
Rotexy B-Malware |
|
attacks O |
|
According O |
|
to O |
|
our O |
|
data O |
|
, O |
|
98 O |
|
% O |
|
of O |
|
all O |
|
Rotexy B-Malware |
|
attacks O |
|
target O |
|
users O |
|
in O |
|
Russia O |
|
. O |
|
|
|
Indeed O |
|
, O |
|
the O |
|
Trojan O |
|
explicitly O |
|
targets O |
|
Russian-speaking O |
|
users O |
|
. O |
|
|
|
There O |
|
have O |
|
also O |
|
been O |
|
cases O |
|
of O |
|
users O |
|
in O |
|
Ukraine O |
|
, O |
|
Germany O |
|
, O |
|
Turkey O |
|
and O |
|
several O |
|
other O |
|
countries O |
|
being O |
|
affected O |
|
. O |
|
|
|
Kaspersky B-System |
|
Internet I-System |
|
Security I-System |
|
for O |
|
Android B-System |
|
and O |
|
the O |
|
Sberbank B-System |
|
Online I-System |
|
app I-System |
|
securely O |
|
protect O |
|
users O |
|
against O |
|
attacks O |
|
by O |
|
this O |
|
Trojan O |
|
. O |
|
|
|
IOCs O |
|
SHA256 O |
|
0ca09d4fde9e00c0987de44ae2ad51a01b3c4c2c11606fe8308a083805760ee7 B-Indicator |
|
4378f3680ff070a1316663880f47eba54510beaeb2d897e7bbb8d6b45de63f96 B-Indicator |
|
76c9d8226ce558c87c81236a9b95112b83c7b546863e29b88fec4dba5c720c0b B-Indicator |
|
7cc2d8d43093c3767c7c73dc2b4daeb96f70a7c455299e0c7824b4210edd6386 B-Indicator |
|
|
|
9b2fd7189395b2f34781b499f5cae10ec86aa7ab373fbdc2a14ec4597d4799ba B-Indicator |
|
ac216d502233ca0fe51ac2bb64cfaf553d906dc19b7da4c023fec39b000bc0d7 B-Indicator |
|
b1ccb5618925c8f0dda8d13efe4a1e1a93d1ceed9e26ec4a388229a28d1f8d5b B-Indicator |
|
ba4beb97f5d4ba33162f769f43ec8e7d1ae501acdade792a4a577cd6449e1a84 B-Indicator |
|
|
|
ba9f4d3f4eba3fa7dce726150fe402e37359a7f36c07f3932a92bd711436f88c B-Indicator |
|
e194268bf682d81fc7dc1e437c53c952ffae55a9d15a1fc020f0219527b7c2ec B-Indicator |
|
Π‘ O |
|
& O |
|
C O |
|
2014β2015 O |
|
: O |
|
secondby.ru B-Indicator |
|
darkclub.net B-Indicator |
|
holerole.org B-Indicator |
|
googleapis.link B-Indicator |
|
2015β2016 O |
|
: O |
|
test2016.ru B-Indicator |
|
blackstar.pro B-Indicator |
|
synchronize.pw B-Indicator |
|
lineout.pw B-Indicator |
|
sync-weather.pw B-Indicator |
|
|
|
2016 O |
|
freedns.website O |
|
streamout.space B-Indicator |
|
2017β2018 O |
|
: O |
|
streamout.space B-Indicator |
|
sky-sync.pw B-Indicator |
|
gms-service.info B-Indicator |
|
EventBot B-Malware |
|
: O |
|
A O |
|
New O |
|
Mobile O |
|
Banking O |
|
Trojan O |
|
is O |
|
Born O |
|
April O |
|
30 O |
|
, O |
|
2020 O |
|
KEY O |
|
FINDINGS O |
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
is O |
|
investigating O |
|
EventBot B-Malware |
|
, O |
|
a O |
|
new O |
|
type O |
|
of O |
|
Android B-System |
|
mobile O |
|
malware O |
|
that O |
|
emerged O |
|
around O |
|
March O |
|
2020 O |
|
. O |
|
|
|
EventBot B-Malware |
|
is O |
|
a O |
|
mobile O |
|
banking O |
|
trojan O |
|
and O |
|
infostealer O |
|
that O |
|
abuses O |
|
Android B-System |
|
β O |
|
s O |
|
accessibility O |
|
features O |
|
to O |
|
steal O |
|
user O |
|
data O |
|
from O |
|
financial O |
|
applications O |
|
, O |
|
read O |
|
user O |
|
SMS O |
|
messages O |
|
, O |
|
and O |
|
steal O |
|
SMS O |
|
messages O |
|
to O |
|
allow O |
|
the O |
|
malware O |
|
to O |
|
bypass O |
|
two-factor O |
|
authentication O |
|
. O |
|
|
|
EventBot B-Malware |
|
targets O |
|
users O |
|
of O |
|
over O |
|
200 O |
|
different O |
|
financial O |
|
applications O |
|
, O |
|
including O |
|
banking O |
|
, O |
|
money O |
|
transfer O |
|
services O |
|
, O |
|
and O |
|
crypto-currency O |
|
wallets O |
|
. O |
|
|
|
Those O |
|
targeted O |
|
include O |
|
applications O |
|
like O |
|
Paypal B-System |
|
Business I-System |
|
, O |
|
Revolut B-System |
|
, O |
|
Barclays B-System |
|
, O |
|
UniCredit B-System |
|
, O |
|
CapitalOne B-System |
|
UK I-System |
|
, O |
|
HSBC B-System |
|
UK I-System |
|
, O |
|
Santander B-System |
|
UK I-System |
|
, O |
|
TransferWise B-System |
|
, O |
|
Coinbase B-System |
|
, O |
|
paysafecard B-System |
|
, O |
|
and O |
|
many O |
|
more O |
|
. O |
|
|
|
It O |
|
specifically O |
|
targets O |
|
financial O |
|
banking O |
|
applications O |
|
across O |
|
the O |
|
United O |
|
States O |
|
and O |
|
Europe O |
|
, O |
|
including O |
|
Italy O |
|
, O |
|
the O |
|
UK O |
|
, O |
|
Spain O |
|
, O |
|
Switzerland O |
|
, O |
|
France O |
|
, O |
|
and O |
|
Germany O |
|
. O |
|
|
|
The O |
|
full O |
|
list O |
|
of O |
|
banking O |
|
applications O |
|
targeted O |
|
is O |
|
included O |
|
in O |
|
the O |
|
appendix O |
|
. O |
|
|
|
EventBot B-Organization |
|
is O |
|
particularly O |
|
interesting O |
|
because O |
|
it O |
|
is O |
|
in O |
|
such O |
|
early O |
|
stages O |
|
. O |
|
|
|
This O |
|
brand O |
|
new O |
|
malware O |
|
has O |
|
real O |
|
potential O |
|
to O |
|
become O |
|
the O |
|
next O |
|
big O |
|
mobile O |
|
malware O |
|
, O |
|
as O |
|
it O |
|
is O |
|
under O |
|
constant O |
|
iterative O |
|
improvements O |
|
, O |
|
abuses O |
|
a O |
|
critical O |
|
operating O |
|
system O |
|
feature O |
|
, O |
|
and O |
|
targets O |
|
financial O |
|
applications O |
|
. O |
|
|
|
This O |
|
research O |
|
gives O |
|
a O |
|
rare O |
|
look O |
|
into O |
|
the O |
|
process O |
|
improvements O |
|
malware O |
|
authors O |
|
make O |
|
when O |
|
optimizing O |
|
before O |
|
launch O |
|
. O |
|
|
|
By O |
|
going O |
|
on O |
|
the O |
|
offensive O |
|
and O |
|
hunting O |
|
the O |
|
attackers O |
|
, O |
|
our O |
|
team O |
|
was O |
|
able O |
|
to O |
|
unearth O |
|
the O |
|
early O |
|
stages O |
|
of O |
|
what O |
|
may O |
|
be O |
|
a O |
|
very O |
|
dangerous O |
|
mobile O |
|
malware O |
|
. O |
|
|
|
TABLE O |
|
OF O |
|
CONTENTS O |
|
Security O |
|
Recommendations O |
|
Introduction O |
|
Threat O |
|
Analysis O |
|
Common O |
|
Features O |
|
Unique O |
|
Features O |
|
by O |
|
Version O |
|
Malware O |
|
Under O |
|
Active O |
|
Development O |
|
Suspected O |
|
Detection O |
|
Tests O |
|
by O |
|
the O |
|
Threat O |
|
Actor O |
|
EventBot B-Malware |
|
Infrastructure O |
|
Cybereason O |
|
Mobile O |
|
Conclusion O |
|
Indicators O |
|
of O |
|
Compromise O |
|
MITRE B-Organization |
|
ATT O |
|
& O |
|
CK O |
|
for O |
|
Mobile O |
|
Breakdown O |
|
SECURITY O |
|
RECOMMENDATIONS O |
|
Keep O |
|
your O |
|
mobile O |
|
device O |
|
up-to-date O |
|
with O |
|
the O |
|
latest O |
|
software O |
|
updates O |
|
from O |
|
legitimate O |
|
sources O |
|
. O |
|
|
|
Keep O |
|
Google B-System |
|
Play I-System |
|
Protect I-System |
|
on O |
|
. O |
|
|
|
Do O |
|
not O |
|
download O |
|
mobile O |
|
apps O |
|
from O |
|
unofficial O |
|
or O |
|
unauthorized O |
|
sources O |
|
. O |
|
|
|
Most O |
|
legitimate O |
|
Android B-System |
|
apps O |
|
are O |
|
available O |
|
on O |
|
the O |
|
Google B-System |
|
Play I-System |
|
Store I-System |
|
. O |
|
|
|
Always O |
|
apply O |
|
critical O |
|
thinking O |
|
and O |
|
consider O |
|
whether O |
|
you O |
|
should O |
|
give O |
|
a O |
|
certain O |
|
app O |
|
the O |
|
permissions O |
|
it O |
|
requests O |
|
. O |
|
|
|
When O |
|
in O |
|
doubt O |
|
, O |
|
check O |
|
the O |
|
APK O |
|
signature O |
|
and O |
|
hash O |
|
in O |
|
sources O |
|
like O |
|
VirusTotal B-Organization |
|
before O |
|
installing O |
|
it O |
|
on O |
|
your O |
|
device O |
|
. O |
|
|
|
Use O |
|
mobile O |
|
threat O |
|
detection O |
|
solutions O |
|
for O |
|
enhanced O |
|
security O |
|
. O |
|
|
|
INTRODUCTION O |
|
For O |
|
the O |
|
past O |
|
few O |
|
weeks O |
|
, O |
|
the O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
has O |
|
been O |
|
investigating O |
|
a O |
|
new O |
|
type O |
|
of O |
|
Android B-System |
|
malware O |
|
dubbed O |
|
EventBot B-Malware |
|
, O |
|
which O |
|
was O |
|
first O |
|
identified O |
|
in O |
|
March O |
|
2020 O |
|
. O |
|
|
|
This O |
|
malware O |
|
appears O |
|
to O |
|
be O |
|
newly O |
|
developed O |
|
with O |
|
code O |
|
that O |
|
differs O |
|
significantly O |
|
from O |
|
previously O |
|
known O |
|
Android B-System |
|
malware O |
|
. O |
|
|
|
EventBot B-Malware |
|
is O |
|
under O |
|
active O |
|
development O |
|
and O |
|
is O |
|
evolving O |
|
rapidly O |
|
; O |
|
new O |
|
versions O |
|
are O |
|
released O |
|
every O |
|
few O |
|
days O |
|
with O |
|
improvements O |
|
and O |
|
new O |
|
capabilities O |
|
. O |
|
|
|
EventBot B-Malware |
|
abuses O |
|
Android B-System |
|
β O |
|
s O |
|
accessibility O |
|
feature O |
|
to O |
|
access O |
|
valuable O |
|
user O |
|
information O |
|
, O |
|
system O |
|
information O |
|
, O |
|
and O |
|
data O |
|
stored O |
|
in O |
|
other O |
|
applications O |
|
. O |
|
|
|
In O |
|
particular O |
|
, O |
|
EventBot B-Malware |
|
can O |
|
intercept O |
|
SMS O |
|
messages O |
|
and O |
|
bypass O |
|
two-factor O |
|
authentication O |
|
mechanisms O |
|
. O |
|
|
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
has O |
|
concluded O |
|
that O |
|
EventBot B-Malware |
|
is O |
|
designed O |
|
to O |
|
target O |
|
over O |
|
200 O |
|
different O |
|
banking O |
|
and O |
|
finance O |
|
applications O |
|
, O |
|
the O |
|
majority O |
|
of O |
|
which O |
|
are O |
|
European O |
|
bank O |
|
and O |
|
crypto-currency O |
|
exchange O |
|
applications O |
|
. O |
|
|
|
By O |
|
accessing O |
|
and O |
|
stealing O |
|
this O |
|
data O |
|
, O |
|
Eventbot B-Malware |
|
has O |
|
the O |
|
potential O |
|
to O |
|
access O |
|
key O |
|
business O |
|
data O |
|
, O |
|
including O |
|
financial O |
|
data O |
|
. O |
|
|
|
60 O |
|
% O |
|
of O |
|
devices O |
|
containing O |
|
or O |
|
accessing O |
|
enterprise O |
|
data O |
|
are O |
|
mobile O |
|
, O |
|
and O |
|
mobile O |
|
devices O |
|
tend O |
|
to O |
|
include O |
|
a O |
|
significant O |
|
amount O |
|
of O |
|
personal O |
|
and O |
|
business O |
|
data O |
|
, O |
|
assuming O |
|
the O |
|
organization O |
|
has O |
|
a O |
|
bring-your-own-device O |
|
policy O |
|
in O |
|
place O |
|
. O |
|
|
|
Mobile O |
|
malware O |
|
is O |
|
a O |
|
significant O |
|
risk O |
|
for O |
|
organizations O |
|
and O |
|
consumers O |
|
alike O |
|
, O |
|
and O |
|
must O |
|
be O |
|
considered O |
|
when O |
|
protecting O |
|
personal O |
|
and O |
|
business O |
|
data O |
|
. O |
|
|
|
EventBot B-Malware |
|
mobile O |
|
banking O |
|
applications O |
|
targetedApplications O |
|
targeted O |
|
by O |
|
EventBot B-Malware |
|
. O |
|
|
|
Cybereason B-Organization |
|
Mobile I-Organization |
|
Detecting O |
|
EventBotCybereason O |
|
Mobile O |
|
detecting O |
|
EventBot B-Malware |
|
. O |
|
|
|
THREAT O |
|
ANALYSIS O |
|
Initial O |
|
Access O |
|
Though O |
|
EventBot B-Malware |
|
is O |
|
not O |
|
currently O |
|
on O |
|
the O |
|
Google B-System |
|
Play I-System |
|
Store O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
find O |
|
several O |
|
icons O |
|
EventBot B-Malware |
|
is O |
|
using O |
|
to O |
|
masquerade O |
|
as O |
|
a O |
|
legitimate O |
|
application O |
|
. O |
|
|
|
We O |
|
believe O |
|
that O |
|
, O |
|
when O |
|
it O |
|
is O |
|
officially O |
|
released O |
|
, O |
|
it O |
|
will O |
|
most O |
|
likely O |
|
be O |
|
uploaded O |
|
to O |
|
rogue O |
|
APK O |
|
stores O |
|
and O |
|
other O |
|
shady O |
|
websites O |
|
, O |
|
while O |
|
masquerading O |
|
as O |
|
real O |
|
applications O |
|
. O |
|
|
|
Icons O |
|
used O |
|
for O |
|
EventBot B-Malware |
|
masqueraded O |
|
as O |
|
legitimate O |
|
with O |
|
these O |
|
icons.application O |
|
. O |
|
|
|
Malware O |
|
Capabilities O |
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
has O |
|
been O |
|
following O |
|
EventBot B-Malware |
|
since O |
|
the O |
|
beginning O |
|
of O |
|
March O |
|
2020 O |
|
. O |
|
|
|
The O |
|
team O |
|
has O |
|
encountered O |
|
different O |
|
versions O |
|
of O |
|
the O |
|
malware O |
|
over O |
|
time O |
|
as O |
|
it O |
|
has O |
|
rapidly O |
|
evolved O |
|
. O |
|
|
|
At O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
this O |
|
research O |
|
, O |
|
four O |
|
versions O |
|
of O |
|
the O |
|
EventBot B-Malware |
|
malware O |
|
were O |
|
observed O |
|
: O |
|
Version O |
|
0.0.0.1 O |
|
, O |
|
0.0.0.2 O |
|
, O |
|
and O |
|
0.3.0.1 O |
|
and O |
|
0.4.0.1 O |
|
. O |
|
|
|
Each O |
|
version O |
|
expands O |
|
the O |
|
bot O |
|
β O |
|
s O |
|
functionality O |
|
and O |
|
works O |
|
to O |
|
obfuscate O |
|
the O |
|
malware O |
|
against O |
|
analysis O |
|
. O |
|
|
|
In O |
|
this O |
|
research O |
|
, O |
|
we O |
|
review O |
|
common O |
|
features O |
|
of O |
|
the O |
|
malware O |
|
and O |
|
examine O |
|
the O |
|
improvements O |
|
the O |
|
threat O |
|
actor O |
|
made O |
|
in O |
|
each O |
|
version O |
|
. O |
|
|
|
COMMON O |
|
FEATURES O |
|
Permissions O |
|
When O |
|
installed O |
|
, O |
|
EventBot B-Malware |
|
requests O |
|
the O |
|
following O |
|
permissions O |
|
on O |
|
the O |
|
device O |
|
: O |
|
SYSTEM_ALERT_WINDOW O |
|
- O |
|
allow O |
|
the O |
|
app O |
|
to O |
|
create O |
|
windows O |
|
that O |
|
are O |
|
shown O |
|
on O |
|
top O |
|
of O |
|
other O |
|
apps O |
|
. O |
|
|
|
READ_EXTERNAL_STORAGE O |
|
- O |
|
read O |
|
from O |
|
external O |
|
storage O |
|
. O |
|
|
|
REQUEST_INSTALL_PACKAGES O |
|
- O |
|
make O |
|
a O |
|
request O |
|
to O |
|
install O |
|
packages O |
|
. O |
|
|
|
INTERNET O |
|
- O |
|
open O |
|
network O |
|
sockets O |
|
. O |
|
|
|
REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O |
|
- O |
|
whitelist O |
|
the O |
|
app O |
|
to O |
|
allow O |
|
it O |
|
to O |
|
ignore O |
|
battery O |
|
optimizations O |
|
. O |
|
|
|
WAKE_LOCK O |
|
- O |
|
prevent O |
|
the O |
|
processor O |
|
from O |
|
sleeping O |
|
and O |
|
dimming O |
|
the O |
|
screen O |
|
. O |
|
|
|
ACCESS_NETWORK_STATE O |
|
- O |
|
allow O |
|
the O |
|
app O |
|
to O |
|
access O |
|
information O |
|
about O |
|
networks O |
|
. O |
|
|
|
REQUEST_COMPANION_RUN_IN_BACKGROUND O |
|
- O |
|
let O |
|
the O |
|
app O |
|
run O |
|
in O |
|
the O |
|
background O |
|
. O |
|
|
|
REQUEST_COMPANION_USE_DATA_IN_BACKGROUND O |
|
- O |
|
let O |
|
the O |
|
app O |
|
use O |
|
data O |
|
in O |
|
the O |
|
background O |
|
. O |
|
|
|
RECEIVE_BOOT_COMPLETED O |
|
- O |
|
allow O |
|
the O |
|
application O |
|
to O |
|
launch O |
|
itself O |
|
after O |
|
system O |
|
boot O |
|
. O |
|
|
|
EventBot B-Malware |
|
uses O |
|
this O |
|
permission O |
|
in O |
|
order O |
|
to O |
|
achieve O |
|
persistence O |
|
and O |
|
run O |
|
in O |
|
the O |
|
background O |
|
as O |
|
a O |
|
service O |
|
. O |
|
|
|
RECEIVE_SMS O |
|
- O |
|
allow O |
|
the O |
|
application O |
|
to O |
|
receive O |
|
text O |
|
messages O |
|
. O |
|
|
|
READ_SMS O |
|
- O |
|
allow O |
|
the O |
|
application O |
|
to O |
|
read O |
|
text O |
|
messages O |
|
. O |
|
|
|
EventBot B-Malware |
|
permissions O |
|
EventBot B-Malware |
|
β O |
|
s O |
|
permissions O |
|
as O |
|
seen O |
|
in O |
|
the O |
|
manifest O |
|
file O |
|
. O |
|
|
|
THE O |
|
INITIAL O |
|
INSTALLATION O |
|
PROCESS O |
|
Once O |
|
installed O |
|
, O |
|
EventBot B-Malware |
|
prompts O |
|
the O |
|
user O |
|
to O |
|
give O |
|
it O |
|
access O |
|
to O |
|
accessibility O |
|
services O |
|
. O |
|
|
|
Initial O |
|
request O |
|
by O |
|
EventBot B-Malware |
|
Initial O |
|
request O |
|
by O |
|
EventBot B-Malware |
|
to O |
|
run O |
|
as O |
|
a O |
|
service O |
|
. O |
|
|
|
Once O |
|
the O |
|
malware O |
|
can O |
|
use O |
|
accessibility O |
|
services O |
|
, O |
|
it O |
|
has O |
|
the O |
|
ability O |
|
to O |
|
operate O |
|
as O |
|
a O |
|
keylogger O |
|
and O |
|
can O |
|
retrieve O |
|
notifications O |
|
about O |
|
other O |
|
installed O |
|
applications O |
|
and O |
|
content O |
|
of O |
|
open O |
|
windows O |
|
. O |
|
|
|
EventBot O |
|
β O |
|
s O |
|
request O |
|
to O |
|
use O |
|
accessibility O |
|
services O |
|
. O |
|
|
|
In O |
|
more O |
|
up-to-date O |
|
versions O |
|
of O |
|
Android B-System |
|
, O |
|
EventBot B-Malware |
|
will O |
|
ask O |
|
for O |
|
permissions O |
|
to O |
|
run O |
|
in O |
|
the O |
|
background O |
|
before O |
|
deleting O |
|
itself O |
|
from O |
|
the O |
|
launcher O |
|
. O |
|
|
|
EventBot B-Malware |
|
requests O |
|
permissions O |
|
to O |
|
always O |
|
run O |
|
in O |
|
the O |
|
background O |
|
. O |
|
|
|
DOWNLOAD O |
|
AND O |
|
UPDATE O |
|
THE O |
|
TARGET O |
|
CONFIGURATION O |
|
FILE O |
|
By O |
|
analyzing O |
|
and O |
|
decoding O |
|
the O |
|
HTTP O |
|
packets O |
|
in O |
|
EventBot B-Malware |
|
Version O |
|
0.0.0.1 O |
|
, O |
|
we O |
|
can O |
|
see O |
|
that O |
|
EventBot B-Malware |
|
downloads O |
|
and O |
|
updates O |
|
a O |
|
configuration O |
|
file O |
|
with O |
|
almost O |
|
200 O |
|
different O |
|
financial O |
|
application O |
|
targets O |
|
. O |
|
|
|
Following O |
|
is O |
|
the O |
|
HTTP O |
|
response O |
|
from O |
|
the O |
|
C2 O |
|
server O |
|
, O |
|
containing O |
|
the O |
|
encrypted O |
|
configuration O |
|
: O |
|
EventBot B-Malware |
|
Encrypted O |
|
HTTP O |
|
response O |
|
returned O |
|
from O |
|
the O |
|
C2 O |
|
Encrypted O |
|
HTTP O |
|
response O |
|
returned O |
|
from O |
|
the O |
|
C2 O |
|
. O |
|
|
|
In O |
|
Version O |
|
0.0.0.1 O |
|
, O |
|
the O |
|
communication O |
|
with O |
|
the O |
|
C2 O |
|
is O |
|
encrypted O |
|
using O |
|
Base64 O |
|
and O |
|
RC4 O |
|
. O |
|
|
|
The O |
|
RC4 O |
|
key O |
|
is O |
|
hardcoded O |
|
in O |
|
EventBot B-Malware |
|
. O |
|
|
|
Upon O |
|
decryption O |
|
, O |
|
we O |
|
can O |
|
see O |
|
that O |
|
the O |
|
response O |
|
from O |
|
the O |
|
server O |
|
is O |
|
a O |
|
JSON O |
|
object O |
|
of O |
|
EventBot B-Malware |
|
β O |
|
s O |
|
configuration O |
|
, O |
|
which O |
|
contains O |
|
C2 O |
|
URLs O |
|
and O |
|
a O |
|
targeted O |
|
applications O |
|
list O |
|
. O |
|
|
|
Decrypted O |
|
EventBot B-Malware |
|
configuration O |
|
Decrypted O |
|
EventBot B-Malware |
|
configuration O |
|
returned O |
|
from O |
|
the O |
|
C2 O |
|
. O |
|
|
|
The O |
|
configuration O |
|
file O |
|
contains O |
|
a O |
|
list O |
|
of O |
|
financial O |
|
applications O |
|
that O |
|
can O |
|
be O |
|
targeted O |
|
by O |
|
EventBot B-Malware |
|
. O |
|
|
|
This O |
|
version O |
|
includes O |
|
185 O |
|
different O |
|
applications O |
|
, O |
|
including O |
|
official O |
|
applications O |
|
of O |
|
worldwide O |
|
banks O |
|
. O |
|
|
|
26 O |
|
of O |
|
the O |
|
targeted O |
|
applications O |
|
are O |
|
from O |
|
Italy O |
|
, O |
|
25 O |
|
are O |
|
from O |
|
the O |
|
UK O |
|
, O |
|
6 O |
|
are O |
|
from O |
|
Germany O |
|
, O |
|
5 O |
|
are O |
|
from O |
|
France O |
|
, O |
|
and O |
|
3 O |
|
are O |
|
from O |
|
Spain O |
|
. O |
|
|
|
However O |
|
, O |
|
it O |
|
also O |
|
targets O |
|
applications O |
|
from O |
|
Romania O |
|
, O |
|
Ireland O |
|
, O |
|
India O |
|
, O |
|
Austria O |
|
, O |
|
Switzerland O |
|
, O |
|
Australia O |
|
, O |
|
Poland O |
|
and O |
|
the O |
|
USA O |
|
. O |
|
|
|
In O |
|
addition O |
|
to O |
|
official O |
|
banking O |
|
applications O |
|
, O |
|
the O |
|
target O |
|
list O |
|
includes O |
|
111 O |
|
other O |
|
global O |
|
financial O |
|
applications O |
|
for O |
|
banking O |
|
and O |
|
credit O |
|
card O |
|
management O |
|
, O |
|
money O |
|
transfers O |
|
, O |
|
and O |
|
cryptocurrency O |
|
wallets O |
|
and O |
|
exchanges O |
|
. O |
|
|
|
Those O |
|
targeted O |
|
include O |
|
Paypal B-System |
|
Business I-System |
|
, O |
|
Revolut B-System |
|
, O |
|
Barclays B-System |
|
, O |
|
UniCredit B-System |
|
, O |
|
CapitalOne B-System |
|
UK I-System |
|
, O |
|
HSBC B-System |
|
UK I-System |
|
, O |
|
Santander B-System |
|
UK I-System |
|
, O |
|
TransferWise B-System |
|
, O |
|
Coinbase B-System |
|
, O |
|
paysafecard B-System |
|
, O |
|
and O |
|
many O |
|
more O |
|
. O |
|
|
|
The O |
|
full O |
|
list O |
|
of O |
|
banking O |
|
applications O |
|
targeted O |
|
is O |
|
included O |
|
in O |
|
the O |
|
appendix O |
|
. O |
|
|
|
ABUSE O |
|
OF O |
|
ACCESSIBILITY O |
|
SERVICES O |
|
EventBot B-Malware |
|
abuses O |
|
the O |
|
accessibility O |
|
services O |
|
of O |
|
Android B-System |
|
devices O |
|
for O |
|
the O |
|
majority O |
|
of O |
|
its O |
|
activity O |
|
. O |
|
|
|
Accessibility O |
|
features O |
|
are O |
|
typically O |
|
used O |
|
to O |
|
help O |
|
users O |
|
with O |
|
disabilities O |
|
by O |
|
giving O |
|
the O |
|
device O |
|
the O |
|
ability O |
|
to O |
|
write O |
|
into O |
|
input O |
|
fields O |
|
, O |
|
auto-generate O |
|
permissions O |
|
, O |
|
perform O |
|
gestures O |
|
for O |
|
the O |
|
user O |
|
, O |
|
etc O |
|
. O |
|
|
|
However O |
|
, O |
|
when O |
|
used O |
|
maliciously O |
|
, O |
|
accessibility O |
|
features O |
|
can O |
|
be O |
|
used O |
|
to O |
|
exploit O |
|
legitimate O |
|
services O |
|
for O |
|
malicious O |
|
purposes O |
|
, O |
|
like O |
|
with O |
|
EventBot B-Malware |
|
. O |
|
|
|
EventBot B-Malware |
|
uses O |
|
multiple O |
|
methods O |
|
to O |
|
exploit O |
|
accessibility O |
|
events O |
|
for O |
|
webinjects O |
|
and O |
|
other O |
|
information O |
|
stealing O |
|
purposes O |
|
. O |
|
|
|
DATA O |
|
GATHERING O |
|
Getting O |
|
a O |
|
list O |
|
of O |
|
all O |
|
installed O |
|
applications O |
|
: O |
|
Once O |
|
EventBot B-Malware |
|
is O |
|
installed O |
|
on O |
|
the O |
|
target O |
|
machine O |
|
, O |
|
it O |
|
lists O |
|
all O |
|
the O |
|
applications O |
|
on O |
|
the O |
|
target O |
|
machine O |
|
and O |
|
sends O |
|
them O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
Device O |
|
information O |
|
: O |
|
EventBot B-Malware |
|
queries O |
|
for O |
|
device O |
|
information O |
|
like O |
|
OS O |
|
, O |
|
model O |
|
, O |
|
etc O |
|
, O |
|
and O |
|
also O |
|
sends O |
|
that O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
EventBot B-Malware |
|
infected O |
|
device O |
|
to O |
|
be O |
|
sent O |
|
to O |
|
the O |
|
C O |
|
Information O |
|
gathered O |
|
about O |
|
the O |
|
infected O |
|
device O |
|
to O |
|
be O |
|
sent O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
Data O |
|
encryption O |
|
: O |
|
In O |
|
the O |
|
initial O |
|
version O |
|
of O |
|
EventBot B-Malware |
|
, O |
|
the O |
|
data O |
|
being O |
|
exfiltrated O |
|
is O |
|
encrypted O |
|
using O |
|
Base64 O |
|
and O |
|
RC4 O |
|
. O |
|
|
|
In O |
|
later O |
|
versions O |
|
, O |
|
another O |
|
encryption O |
|
layer O |
|
is O |
|
added O |
|
using O |
|
Curve25519 O |
|
encryption O |
|
. O |
|
|
|
All O |
|
of O |
|
the O |
|
most O |
|
recent O |
|
versions O |
|
of O |
|
EventBot B-Malware |
|
contain O |
|
a O |
|
ChaCha20 B-System |
|
library O |
|
that O |
|
can O |
|
improve O |
|
performance O |
|
when O |
|
compared O |
|
to O |
|
other O |
|
algorithms O |
|
like O |
|
RC4 O |
|
and O |
|
AES O |
|
. O |
|
|
|
This O |
|
implies O |
|
that O |
|
the O |
|
authors O |
|
are O |
|
actively O |
|
working O |
|
to O |
|
optimize O |
|
EventBot B-Malware |
|
over O |
|
time O |
|
. O |
|
|
|
SMS O |
|
grabbing O |
|
: O |
|
EventBot B-Malware |
|
has O |
|
the O |
|
ability O |
|
to O |
|
parse O |
|
SMS O |
|
messages O |
|
by O |
|
using O |
|
the O |
|
targeted O |
|
device O |
|
β O |
|
s O |
|
SDK O |
|
version O |
|
to O |
|
parse O |
|
them O |
|
correctly O |
|
. O |
|
|
|
EventBot B-Malware |
|
parsing O |
|
of O |
|
grabbed O |
|
SMS O |
|
messages O |
|
Parsing O |
|
of O |
|
grabbed O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
Webinjects O |
|
: O |
|
According O |
|
to O |
|
the O |
|
bot O |
|
β O |
|
s O |
|
configuration O |
|
, O |
|
if O |
|
a O |
|
webinject O |
|
is O |
|
set O |
|
for O |
|
a O |
|
given O |
|
application O |
|
, O |
|
it O |
|
will O |
|
be O |
|
executed O |
|
. O |
|
|
|
EventBot B-Malware |
|
web O |
|
injects O |
|
execution O |
|
method O |
|
Web O |
|
injects O |
|
execution O |
|
method O |
|
by O |
|
a O |
|
pre-established O |
|
configuration O |
|
. O |
|
|
|
BOT O |
|
UPDATES O |
|
EventBot B-Malware |
|
has O |
|
a O |
|
long O |
|
method O |
|
called O |
|
parseCommand O |
|
that O |
|
can O |
|
update O |
|
EventBot B-Malware |
|
β O |
|
s O |
|
configuration O |
|
XML O |
|
files O |
|
, O |
|
located O |
|
in O |
|
the O |
|
shared O |
|
preferences O |
|
folder O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
EventBot B-Malware |
|
Dropped O |
|
XML O |
|
configuration O |
|
files O |
|
Dropped O |
|
XML O |
|
configuration O |
|
files O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
EventBot B-Malware |
|
uses O |
|
this O |
|
function O |
|
to O |
|
update O |
|
its O |
|
C2s O |
|
, O |
|
the O |
|
configuration O |
|
of O |
|
webinjects O |
|
, O |
|
etc O |
|
. O |
|
|
|
The O |
|
following O |
|
code O |
|
shows O |
|
EventBot B-Malware |
|
parsing O |
|
instructions O |
|
sent O |
|
from O |
|
the O |
|
C2 O |
|
. O |
|
|
|
Parsing O |
|
of O |
|
instructions O |
|
by O |
|
EventBot B-Malware |
|
Parsing O |
|
of O |
|
instructions O |
|
by O |
|
the O |
|
bot O |
|
from O |
|
the O |
|
C2 O |
|
. O |
|
|
|
UNIQUE O |
|
FEATURES O |
|
BY O |
|
VERSION O |
|
EventBot B-Malware |
|
Version O |
|
0.0.0.1 O |
|
RC4 O |
|
and O |
|
Base64 O |
|
Packet O |
|
Encryption O |
|
EventBot B-Malware |
|
RC4 O |
|
and O |
|
Base64 O |
|
data O |
|
decryption O |
|
from O |
|
the O |
|
C2 O |
|
RC4 O |
|
and O |
|
Base64 O |
|
data O |
|
decryption O |
|
from O |
|
the O |
|
C2 O |
|
. O |
|
|
|
As O |
|
mentioned O |
|
above O |
|
, O |
|
EventBot B-Malware |
|
Version O |
|
0.0.0.1 O |
|
sends O |
|
a O |
|
JSON O |
|
object O |
|
containing O |
|
the O |
|
Android B-System |
|
package O |
|
names O |
|
of O |
|
all O |
|
the O |
|
apps O |
|
installed O |
|
on O |
|
the O |
|
victim O |
|
β O |
|
s O |
|
device O |
|
alongside O |
|
additional O |
|
metadata O |
|
, O |
|
including O |
|
the O |
|
bot O |
|
version O |
|
, O |
|
botnetID O |
|
, O |
|
and O |
|
the O |
|
reason O |
|
this O |
|
package O |
|
is O |
|
sent O |
|
. O |
|
|
|
For O |
|
this O |
|
particular O |
|
packet O |
|
, O |
|
the O |
|
reason O |
|
is O |
|
registration O |
|
of O |
|
the O |
|
bot O |
|
. O |
|
|
|
If O |
|
the O |
|
connection O |
|
to O |
|
the O |
|
C2 O |
|
fails O |
|
, O |
|
it O |
|
will O |
|
continue O |
|
to O |
|
retry O |
|
until O |
|
it O |
|
is O |
|
successful O |
|
. O |
|
|
|
EventBot B-Malware |
|
Logcat O |
|
from O |
|
the O |
|
infected O |
|
device O |
|
Logcat O |
|
from O |
|
the O |
|
infected O |
|
device O |
|
. O |
|
|
|
EVENTBOT B-Malware |
|
VERSION O |
|
0.0.0.2 O |
|
Dynamic O |
|
Library O |
|
Loading O |
|
As O |
|
of O |
|
Version O |
|
0.0.0.2 O |
|
, O |
|
EventBot B-Malware |
|
attempts O |
|
to O |
|
hide O |
|
its O |
|
main O |
|
functionality O |
|
from O |
|
static O |
|
analysis O |
|
. O |
|
|
|
With O |
|
Version O |
|
0.0.0.1 O |
|
, O |
|
there O |
|
is O |
|
a O |
|
dedicated O |
|
functions O |
|
class O |
|
where O |
|
all O |
|
main O |
|
malicious O |
|
activity O |
|
happens O |
|
and O |
|
can O |
|
be O |
|
observed O |
|
. O |
|
|
|
Instead O |
|
, O |
|
in O |
|
Version O |
|
0.0.0.2 O |
|
, O |
|
EventBot B-Malware |
|
dynamically O |
|
loads O |
|
its O |
|
main O |
|
module O |
|
. O |
|
|
|
EventBot B-Malware |
|
loaded O |
|
library O |
|
Loaded O |
|
library O |
|
as O |
|
seen O |
|
in O |
|
Logcat O |
|
. O |
|
|
|
By O |
|
browsing O |
|
EventBot B-Malware |
|
β O |
|
s O |
|
installation O |
|
path O |
|
on O |
|
the O |
|
device O |
|
, O |
|
we O |
|
can O |
|
see O |
|
the O |
|
library O |
|
dropped O |
|
in O |
|
the O |
|
app_dex O |
|
folder O |
|
. O |
|
|
|
EventBot B-Malware |
|
loaded O |
|
library O |
|
The O |
|
loaded O |
|
library O |
|
dropped O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
The O |
|
code O |
|
to O |
|
load O |
|
the O |
|
main O |
|
module O |
|
dynamically O |
|
can O |
|
also O |
|
be O |
|
seen O |
|
statically O |
|
. O |
|
|
|
The O |
|
malicious O |
|
library O |
|
is O |
|
loaded O |
|
from O |
|
Eventbot B-Malware |
|
β O |
|
s O |
|
assets O |
|
that O |
|
contain O |
|
a O |
|
font O |
|
file O |
|
called O |
|
default.ttf B-Indicator |
|
which O |
|
is O |
|
actually O |
|
the O |
|
hidden O |
|
library O |
|
and O |
|
then O |
|
decoded O |
|
using O |
|
RC4 O |
|
. O |
|
|
|
EventBot O |
|
method O |
|
responsible O |
|
for O |
|
the O |
|
library O |
|
loading O |
|
The O |
|
method O |
|
responsible O |
|
for O |
|
the O |
|
library O |
|
loading O |
|
. O |
|
|
|
EventBot B-Malware |
|
has O |
|
the O |
|
ability O |
|
to O |
|
update O |
|
its O |
|
library O |
|
or O |
|
potentially O |
|
even O |
|
download O |
|
a O |
|
second O |
|
library O |
|
when O |
|
given O |
|
a O |
|
command O |
|
from O |
|
the O |
|
C2 O |
|
. O |
|
|
|
An O |
|
updated O |
|
library O |
|
name O |
|
is O |
|
generated O |
|
by O |
|
calculating O |
|
the O |
|
md5sum O |
|
of O |
|
several O |
|
device O |
|
properties O |
|
, O |
|
while O |
|
concatenating O |
|
the O |
|
build O |
|
model O |
|
twice O |
|
in O |
|
case O |
|
of O |
|
an O |
|
update O |
|
to O |
|
the O |
|
library O |
|
. O |
|
|
|
EventBot O |
|
Updated O |
|
library O |
|
naming O |
|
convention O |
|
EventBot B-Malware |
|
New O |
|
library O |
|
naming O |
|
convention O |
|
. O |
|
|
|
Data O |
|
Encryption O |
|
The O |
|
Curve25519 O |
|
encryption O |
|
algorithm O |
|
was O |
|
implemented O |
|
as O |
|
of O |
|
EventBot B-Malware |
|
Version O |
|
0.0.0.2 O |
|
. O |
|
|
|
This O |
|
encryption O |
|
algorithm O |
|
is O |
|
an O |
|
extra O |
|
security O |
|
layer O |
|
for O |
|
communicating O |
|
with O |
|
the O |
|
C2 O |
|
, O |
|
an O |
|
improvement O |
|
over O |
|
the O |
|
previous O |
|
version O |
|
of O |
|
a O |
|
plain O |
|
RC4 O |
|
encryption O |
|
. O |
|
|
|
When O |
|
reviewing O |
|
the O |
|
decrypted O |
|
packet O |
|
, O |
|
it O |
|
β O |
|
s O |
|
clear O |
|
it O |
|
has O |
|
the O |
|
same O |
|
content O |
|
as O |
|
previous O |
|
versions O |
|
. O |
|
|
|
EventBot B-Malware |
|
decryption O |
|
of O |
|
packets O |
|
from O |
|
the O |
|
C2 O |
|
Decryption O |
|
of O |
|
packets O |
|
from O |
|
the O |
|
C2 O |
|
using O |
|
Curve25519 O |
|
. O |
|
|
|
EVENTBOT O |
|
VERSION O |
|
0.3.0.1 O |
|
Additional O |
|
Assets O |
|
Based O |
|
on O |
|
Country O |
|
/ O |
|
Region O |
|
EventBot-23aEventBot O |
|
Spanish O |
|
and O |
|
Italian O |
|
Images O |
|
in O |
|
Spanish O |
|
and O |
|
Italian O |
|
added O |
|
in O |
|
version O |
|
0.3.0.1 O |
|
. O |
|
|
|
Version O |
|
0.3.0.1 O |
|
includes O |
|
Italian O |
|
and O |
|
Spanish O |
|
language O |
|
compatibility O |
|
within O |
|
the O |
|
resources O |
|
section O |
|
. O |
|
|
|
Presumably O |
|
, O |
|
this O |
|
was O |
|
done O |
|
to O |
|
make O |
|
the O |
|
app O |
|
seem O |
|
more O |
|
credible O |
|
to O |
|
targeted O |
|
users O |
|
in O |
|
different O |
|
countries O |
|
. O |
|
|
|
Grabbing O |
|
the O |
|
Screen O |
|
PIN O |
|
with O |
|
Support O |
|
for O |
|
Samsung B-Organization |
|
Devices O |
|
Version O |
|
0.3.0.1 O |
|
added O |
|
an O |
|
~800 O |
|
line O |
|
long O |
|
method O |
|
called O |
|
grabScreenPin O |
|
, O |
|
which O |
|
uses O |
|
accessibility O |
|
features O |
|
to O |
|
track O |
|
pin O |
|
code O |
|
changes O |
|
in O |
|
the O |
|
device O |
|
β O |
|
s O |
|
settings O |
|
. O |
|
|
|
It O |
|
listens O |
|
to O |
|
events O |
|
like O |
|
TYPE_VIEW_TEXT_CHANGED O |
|
. O |
|
|
|
We O |
|
suspect O |
|
the O |
|
updated O |
|
PIN O |
|
is O |
|
sent O |
|
to O |
|
the O |
|
C2 O |
|
, O |
|
most O |
|
likely O |
|
to O |
|
give O |
|
the O |
|
malware O |
|
the O |
|
option O |
|
to O |
|
perform O |
|
privileged O |
|
activities O |
|
on O |
|
the O |
|
infected O |
|
device O |
|
related O |
|
to O |
|
payments O |
|
, O |
|
system O |
|
configuration O |
|
options O |
|
, O |
|
etc O |
|
. O |
|
|
|
EventBot B-Malware |
|
Listening O |
|
to O |
|
TYPE_VIEW_TEXT_CHANGED O |
|
accessibility O |
|
event O |
|
Listening O |
|
to O |
|
TYPE_VIEW_TEXT_CHANGED O |
|
accessibility O |
|
event O |
|
. O |
|
|
|
After O |
|
collecting O |
|
the O |
|
changed O |
|
PIN O |
|
code O |
|
, O |
|
it O |
|
is O |
|
sent O |
|
back O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
EventBot B-Malware |
|
Sending O |
|
the O |
|
pin O |
|
code O |
|
back O |
|
to O |
|
the O |
|
C2 O |
|
Sending O |
|
the O |
|
pin O |
|
code O |
|
back O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
Eventually O |
|
, O |
|
the O |
|
screen O |
|
PIN O |
|
preferences O |
|
will O |
|
be O |
|
saved O |
|
to O |
|
an O |
|
additional O |
|
XML O |
|
file O |
|
in O |
|
the O |
|
shared O |
|
preferences O |
|
folder O |
|
. O |
|
|
|
EventBot O |
|
screenPinPrefs.xml B-Indicator |
|
The O |
|
content O |
|
of O |
|
screenPinPrefs.xml B-Indicator |
|
. O |
|
|
|
The O |
|
grabScreenPin O |
|
method O |
|
has O |
|
separate O |
|
conditioning O |
|
to O |
|
handle O |
|
screen O |
|
lock O |
|
events O |
|
in O |
|
Samsung B-Organization |
|
devices O |
|
. O |
|
|
|
EventBot B-Malware |
|
screen O |
|
lock O |
|
with O |
|
support O |
|
for O |
|
Samsung B-Organization |
|
devices O |
|
A O |
|
new O |
|
method O |
|
to O |
|
handle O |
|
screen O |
|
lock O |
|
with O |
|
support O |
|
for O |
|
Samsung B-Organization |
|
devices O |
|
. O |
|
|
|
EVENTBOT O |
|
VERSION O |
|
0.4.0.1 O |
|
Package O |
|
Name O |
|
Randomization O |
|
In O |
|
this O |
|
version O |
|
, O |
|
the O |
|
package O |
|
name O |
|
is O |
|
no O |
|
longer O |
|
named O |
|
β O |
|
com.example.eventbot B-Indicator |
|
β O |
|
, O |
|
which O |
|
makes O |
|
it O |
|
more O |
|
difficult O |
|
to O |
|
track O |
|
down O |
|
. O |
|
|
|
EventBot B-Malware |
|
Randomized O |
|
package O |
|
name O |
|
Randomized O |
|
package O |
|
name O |
|
instead O |
|
of O |
|
com.example.eventbot B-Indicator |
|
. O |
|
|
|
ProGuard B-System |
|
Obfuscation O |
|
As O |
|
with O |
|
many O |
|
other O |
|
Android B-System |
|
applications O |
|
, O |
|
EventBot B-Malware |
|
is O |
|
now O |
|
using O |
|
obfuscation O |
|
. O |
|
|
|
Both O |
|
the O |
|
loader O |
|
and O |
|
dropped O |
|
class O |
|
are O |
|
obfuscated O |
|
using O |
|
ProGuard B-Indicator |
|
, O |
|
which O |
|
obfuscates O |
|
names O |
|
using O |
|
alphabet O |
|
letters O |
|
. O |
|
|
|
The O |
|
code O |
|
itself O |
|
is O |
|
not O |
|
modified O |
|
by O |
|
this O |
|
type O |
|
of O |
|
obfuscation O |
|
though O |
|
, O |
|
making O |
|
the O |
|
analysis O |
|
easier O |
|
. O |
|
|
|
EventBot B-Malware |
|
Obfuscated O |
|
class O |
|
names O |
|
Obfuscated O |
|
class O |
|
names O |
|
using O |
|
letters O |
|
of O |
|
the O |
|
alphabet O |
|
. O |
|
|
|
Hidden O |
|
Configuration O |
|
Data O |
|
As O |
|
mentioned O |
|
above O |
|
, O |
|
EventBot B-Malware |
|
begins O |
|
using O |
|
obfuscation O |
|
. O |
|
|
|
Due O |
|
to O |
|
this O |
|
obfuscation O |
|
, O |
|
a O |
|
part O |
|
of O |
|
the O |
|
previously O |
|
mentioned O |
|
cfg O |
|
class O |
|
is O |
|
now O |
|
mapped O |
|
to O |
|
c/b/a/a/a O |
|
or O |
|
c/a/a/a/a O |
|
. O |
|
|
|
EventBot O |
|
C2 O |
|
URLs O |
|
C2 O |
|
URLs O |
|
and O |
|
other O |
|
settings O |
|
in O |
|
a O |
|
nested O |
|
class O |
|
. O |
|
|
|
Other O |
|
configuration O |
|
data O |
|
is O |
|
located O |
|
elsewhere O |
|
, O |
|
and O |
|
some O |
|
of O |
|
it O |
|
can O |
|
been O |
|
seen O |
|
here O |
|
: O |
|
The O |
|
encrypted O |
|
library O |
|
path O |
|
The O |
|
output O |
|
folder O |
|
on O |
|
the O |
|
device O |
|
for O |
|
the O |
|
dropped O |
|
library O |
|
The O |
|
name O |
|
of O |
|
the O |
|
library O |
|
after O |
|
it O |
|
is O |
|
loaded O |
|
eventBot O |
|
name O |
|
string O |
|
Version O |
|
number O |
|
A O |
|
string O |
|
used O |
|
as O |
|
an O |
|
RC4 O |
|
key O |
|
, O |
|
both O |
|
for O |
|
decrypting O |
|
the O |
|
library O |
|
and O |
|
as O |
|
a O |
|
part O |
|
of O |
|
the O |
|
network O |
|
data O |
|
encryption O |
|
( O |
|
hasn O |
|
β O |
|
t O |
|
changed O |
|
from O |
|
the O |
|
previous O |
|
version O |
|
) O |
|
The O |
|
C2 O |
|
URLs O |
|
A O |
|
randomized O |
|
class O |
|
name O |
|
using O |
|
the O |
|
device O |
|
β O |
|
s O |
|
accessibility O |
|
services O |
|
EventBot B-Malware |
|
extracted O |
|
configuration O |
|
Part O |
|
of O |
|
the O |
|
extracted O |
|
configuration O |
|
of O |
|
the O |
|
new O |
|
version O |
|
|
|
. O |
|
|
|
MALWARE O |
|
UNDER O |
|
ACTIVE O |
|
DEVELOPMENT O |
|
EventBot B-Malware |
|
β O |
|
cfg O |
|
β O |
|
class O |
|
EventBot B-Malware |
|
β O |
|
cfg O |
|
β O |
|
class O |
|
. O |
|
|
|
EventBot B-Malware |
|
is O |
|
in O |
|
constant O |
|
development O |
|
, O |
|
as O |
|
seen O |
|
with O |
|
the O |
|
botnetID O |
|
string O |
|
above O |
|
, O |
|
which O |
|
shows O |
|
consecutive O |
|
numbering O |
|
across O |
|
versions O |
|
. O |
|
|
|
This O |
|
example O |
|
is O |
|
from O |
|
a O |
|
later O |
|
version O |
|
of O |
|
EventBot B-Malware |
|
, O |
|
and O |
|
in O |
|
other O |
|
versions O |
|
the O |
|
naming O |
|
convention O |
|
is O |
|
very O |
|
similar O |
|
, O |
|
with O |
|
bot O |
|
IDs O |
|
such O |
|
as O |
|
word100 O |
|
, O |
|
word101 O |
|
, O |
|
word102 O |
|
, O |
|
and O |
|
test2005 O |
|
, O |
|
test2006 O |
|
etc O |
|
. O |
|
|
|
In O |
|
the O |
|
latest O |
|
version O |
|
, O |
|
a O |
|
layer O |
|
of O |
|
obfuscation O |
|
was O |
|
added O |
|
, O |
|
perhaps O |
|
taking O |
|
the O |
|
malware O |
|
one O |
|
step O |
|
closer O |
|
to O |
|
being O |
|
fully O |
|
operational O |
|
. O |
|
|
|
SUSPECTED O |
|
DETECTION O |
|
TESTS O |
|
BY O |
|
THE O |
|
THREAT O |
|
ACTOR O |
|
In O |
|
searching O |
|
for O |
|
EventBot B-Malware |
|
, O |
|
we O |
|
β O |
|
ve O |
|
identified O |
|
multiple O |
|
submissions O |
|
from O |
|
the O |
|
same O |
|
submitter O |
|
hash O |
|
, O |
|
22b3c7b0 B-Indicator |
|
: O |
|
EventBot B-Malware |
|
22b3c7b0 B-Indicator |
|
submitter O |
|
hash O |
|
The O |
|
22b3c7b0 B-Indicator |
|
submitter O |
|
hash O |
|
that O |
|
submitted O |
|
most O |
|
of O |
|
the O |
|
EventBot B-Malware |
|
samples O |
|
to O |
|
VirusTotal O |
|
. O |
|
|
|
This O |
|
submitter O |
|
has O |
|
thousands O |
|
of O |
|
other O |
|
submissions O |
|
in O |
|
VirusTotal O |
|
, O |
|
however O |
|
, O |
|
it O |
|
is O |
|
the O |
|
only O |
|
one O |
|
that O |
|
continues O |
|
to O |
|
submit O |
|
EventBot B-Malware |
|
samples O |
|
via O |
|
the O |
|
VirusTotal O |
|
API O |
|
. O |
|
|
|
Also O |
|
, O |
|
the O |
|
botnet O |
|
IDs O |
|
increment O |
|
over O |
|
time O |
|
as O |
|
they O |
|
are O |
|
submitted O |
|
. O |
|
|
|
Given O |
|
this O |
|
, O |
|
and O |
|
the O |
|
naming O |
|
convention O |
|
of O |
|
the O |
|
submissions O |
|
( O |
|
.virus O |
|
) O |
|
, O |
|
the O |
|
submitter O |
|
hash O |
|
most O |
|
likely O |
|
belongs O |
|
to O |
|
an O |
|
AV O |
|
vendor O |
|
or O |
|
sandboxing O |
|
environment O |
|
that O |
|
automatically O |
|
submits O |
|
samples O |
|
to O |
|
online O |
|
malware O |
|
databases O |
|
. O |
|
|
|
It O |
|
may O |
|
be O |
|
that O |
|
these O |
|
submissions O |
|
are O |
|
made O |
|
from O |
|
the O |
|
author O |
|
β O |
|
s O |
|
machine O |
|
, O |
|
or O |
|
that O |
|
they O |
|
submit O |
|
it O |
|
to O |
|
a O |
|
detection O |
|
service O |
|
that O |
|
in O |
|
turn O |
|
submits O |
|
to O |
|
online O |
|
malware O |
|
databases O |
|
. O |
|
|
|
EVENTBOT B-Malware |
|
THREAT O |
|
ACTORS O |
|
As O |
|
a O |
|
part O |
|
of O |
|
this O |
|
investigation O |
|
, O |
|
the O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
has O |
|
attempted O |
|
to O |
|
identify O |
|
the O |
|
threat O |
|
actors O |
|
behind O |
|
the O |
|
development O |
|
of O |
|
EventBot B-Malware |
|
. O |
|
|
|
The O |
|
evidence O |
|
above O |
|
suggests O |
|
that O |
|
EventBot B-Malware |
|
is O |
|
still O |
|
in O |
|
the O |
|
development O |
|
stage O |
|
, O |
|
and O |
|
as O |
|
such O |
|
, O |
|
is O |
|
not O |
|
likely O |
|
to O |
|
have O |
|
been O |
|
used O |
|
for O |
|
large O |
|
attack O |
|
campaigns O |
|
thus O |
|
far O |
|
. O |
|
|
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
is O |
|
monitoring O |
|
multiple O |
|
underground O |
|
platforms O |
|
in O |
|
an O |
|
attempt O |
|
to O |
|
identify O |
|
chatter O |
|
relating O |
|
to O |
|
EventBot B-Malware |
|
. O |
|
|
|
New O |
|
malware O |
|
is O |
|
often O |
|
introduced O |
|
to O |
|
underground O |
|
communities O |
|
by O |
|
being O |
|
promoted O |
|
and O |
|
sold O |
|
or O |
|
offered O |
|
as O |
|
a O |
|
giveaway O |
|
. O |
|
|
|
However O |
|
, O |
|
at O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
, O |
|
we O |
|
were O |
|
unable O |
|
to O |
|
identify O |
|
relevant O |
|
conversations O |
|
about O |
|
the O |
|
EventBot B-Malware |
|
malware O |
|
. O |
|
|
|
This O |
|
strengthens O |
|
our O |
|
suspicion O |
|
that O |
|
this O |
|
malware O |
|
is O |
|
still O |
|
undergoing O |
|
development O |
|
and O |
|
has O |
|
not O |
|
been O |
|
officially O |
|
marketed O |
|
or O |
|
released O |
|
yet O |
|
. O |
|
|
|
EVENTBOT B-Malware |
|
INFRASTRUCTURE O |
|
By O |
|
mapping O |
|
the O |
|
C2 O |
|
servers O |
|
, O |
|
a O |
|
clear O |
|
, O |
|
repeated O |
|
pattern O |
|
emerges O |
|
based O |
|
on O |
|
the O |
|
specific O |
|
URL O |
|
gate_cb8a5aea1ab302f0_c O |
|
. O |
|
|
|
As O |
|
of O |
|
this O |
|
writing O |
|
, O |
|
all O |
|
the O |
|
domains O |
|
were O |
|
registered O |
|
recently O |
|
and O |
|
some O |
|
are O |
|
already O |
|
offline O |
|
. O |
|
|
|
URL O |
|
Status O |
|
IP O |
|
Domain O |
|
registration O |
|
date O |
|
http B-Indicator |
|
: I-Indicator |
|
//ora.studiolegalebasili I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/gate_cb8a5aea1ab302f0_c I-Indicator |
|
offline O |
|
31.214.157 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
6 I-Indicator |
|
2020-02-29 O |
|
http B-Indicator |
|
: I-Indicator |
|
//themoil I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
site/gate_cb8a5aea1ab302f0_c I-Indicator |
|
online O |
|
208.91.197 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
91 I-Indicator |
|
2020-03-04 O |
|
http B-Indicator |
|
: I-Indicator |
|
//ora.carlaarrabitoarchitetto I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/gate_cb8a5aea1ab302f0_c I-Indicator |
|
offline O |
|
31.214.157 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
6 I-Indicator |
|
2020-03-26 O |
|
http B-Indicator |
|
: I-Indicator |
|
//rxc.rxcoordinator I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/gate_cb8a5aea1ab302f0_c I-Indicator |
|
online O |
|
185.158.248 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
102 I-Indicator |
|
2020-03-29 O |
|
http B-Indicator |
|
: I-Indicator |
|
//ora.blindsidefantasy I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/gate_cb8a5aea1ab302f0_c I-Indicator |
|
online O |
|
185.158.248 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
102 I-Indicator |
|
2020-04-02 O |
|
http B-Indicator |
|
: I-Indicator |
|
//marta.martatovaglieri I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
it/gate_cb8a5aea1ab302f0_c I-Indicator |
|
online O |
|
185.158.248 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
102 I-Indicator |
|
2020-04-14 O |
|
http B-Indicator |
|
: I-Indicator |
|
//pub.douglasshome I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/gate_cb8a5aea1ab302f0_c I-Indicator |
|
online O |
|
185.158.249 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
141 I-Indicator |
|
2020-04-26 O |
|
In O |
|
the O |
|
course O |
|
of O |
|
the O |
|
investigation O |
|
, O |
|
the O |
|
team O |
|
discovered O |
|
a O |
|
potential O |
|
link O |
|
to O |
|
an O |
|
additional O |
|
Android B-Malware |
|
infostealer I-Malware |
|
. O |
|
|
|
The O |
|
IP O |
|
address O |
|
of O |
|
both O |
|
ora.carlaarrabitoarchitetto B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
and O |
|
ora.studiolegalebasili B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
, O |
|
31.214.157 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
6 I-Indicator |
|
, O |
|
was O |
|
previously O |
|
hosting O |
|
the O |
|
domain B-Indicator |
|
next.nextuptravel I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
. O |
|
|
|
This O |
|
was O |
|
the O |
|
C2 O |
|
for O |
|
an O |
|
Android B-Malware |
|
infostealer I-Malware |
|
responsible O |
|
for O |
|
several O |
|
attacks O |
|
in O |
|
Italy O |
|
back O |
|
in O |
|
late O |
|
2019 O |
|
. O |
|
|
|
EventBot B-Malware |
|
VirusTotal O |
|
search O |
|
for O |
|
the O |
|
malicious O |
|
IP O |
|
address O |
|
VirusTotal O |
|
search O |
|
for O |
|
the O |
|
malicious O |
|
IP O |
|
address O |
|
. O |
|
|
|
IMPACT O |
|
EventBot B-Malware |
|
is O |
|
a O |
|
mobile O |
|
malware O |
|
banking O |
|
trojan O |
|
that O |
|
steals O |
|
financial O |
|
information O |
|
, O |
|
is O |
|
able O |
|
to O |
|
hijack O |
|
transactions O |
|
. O |
|
|
|
Once O |
|
this O |
|
malware O |
|
has O |
|
successfully O |
|
installed O |
|
, O |
|
it O |
|
will O |
|
collect O |
|
personal O |
|
data O |
|
, O |
|
passwords O |
|
, O |
|
keystrokes O |
|
, O |
|
banking O |
|
information O |
|
, O |
|
and O |
|
more O |
|
. O |
|
|
|
This O |
|
information O |
|
can O |
|
give O |
|
the O |
|
attacker O |
|
access O |
|
to O |
|
personal O |
|
and O |
|
business O |
|
bank O |
|
accounts O |
|
, O |
|
personal O |
|
and O |
|
business O |
|
data O |
|
, O |
|
and O |
|
more O |
|
. O |
|
|
|
Letting O |
|
an O |
|
attacker O |
|
get O |
|
access O |
|
to O |
|
this O |
|
kind O |
|
of O |
|
data O |
|
can O |
|
have O |
|
severe O |
|
consequences O |
|
. O |
|
|
|
60 O |
|
% O |
|
of O |
|
devices O |
|
containing O |
|
or O |
|
accessing O |
|
enterprise O |
|
data O |
|
are O |
|
mobile O |
|
. O |
|
|
|
Giving O |
|
an O |
|
attacker O |
|
access O |
|
to O |
|
a O |
|
mobile O |
|
device O |
|
can O |
|
have O |
|
severe O |
|
business O |
|
consequences O |
|
, O |
|
especially O |
|
if O |
|
the O |
|
end O |
|
user O |
|
is O |
|
using O |
|
their O |
|
mobile O |
|
device O |
|
to O |
|
discuss O |
|
sensitive O |
|
business O |
|
topics O |
|
or O |
|
access O |
|
enterprise O |
|
financial O |
|
information O |
|
. O |
|
|
|
This O |
|
can O |
|
result O |
|
in O |
|
brand O |
|
degradation O |
|
, O |
|
loss O |
|
of O |
|
individual O |
|
reputation O |
|
, O |
|
or O |
|
loss O |
|
of O |
|
consumer O |
|
trust O |
|
. O |
|
|
|
Much O |
|
like O |
|
we O |
|
have O |
|
seen O |
|
in O |
|
recent O |
|
months O |
|
, O |
|
anyone O |
|
can O |
|
be O |
|
impacted O |
|
by O |
|
a O |
|
mobile O |
|
device O |
|
attack O |
|
. O |
|
|
|
These O |
|
attacks O |
|
are O |
|
only O |
|
becoming O |
|
more O |
|
common O |
|
, O |
|
with O |
|
one O |
|
third O |
|
of O |
|
all O |
|
malware O |
|
now O |
|
targeting O |
|
mobile O |
|
endpoints O |
|
. O |
|
|
|
Care O |
|
and O |
|
concern O |
|
both O |
|
for O |
|
using O |
|
a O |
|
mobile O |
|
device O |
|
and O |
|
for O |
|
securing O |
|
a O |
|
mobile O |
|
device O |
|
is O |
|
critical O |
|
, O |
|
especially O |
|
for O |
|
those O |
|
organizations O |
|
that O |
|
allow O |
|
bring-your-own-devices O |
|
. O |
|
|
|
CYBEREASON B-System |
|
MOBILE I-System |
|
Cybereason B-System |
|
Mobile I-System |
|
detects I-System |
|
EventBot B-Malware |
|
and O |
|
immediately O |
|
takes O |
|
remediation O |
|
actions O |
|
to O |
|
protect O |
|
the O |
|
end O |
|
user O |
|
. O |
|
|
|
With O |
|
Cybereason B-System |
|
Mobile I-System |
|
, O |
|
analysts O |
|
can O |
|
address O |
|
mobile O |
|
threats O |
|
in O |
|
the O |
|
same O |
|
platform O |
|
as O |
|
traditional O |
|
endpoint O |
|
threats O |
|
, O |
|
all O |
|
as O |
|
part O |
|
of O |
|
one O |
|
incident O |
|
. O |
|
|
|
Without O |
|
mobile O |
|
threat O |
|
detection O |
|
, O |
|
this O |
|
attack O |
|
would O |
|
not O |
|
be O |
|
detected O |
|
, O |
|
leaving O |
|
end O |
|
users O |
|
and O |
|
organizations O |
|
at O |
|
risk O |
|
. O |
|
|
|
Cybereason B-System |
|
Mobile I-System |
|
detects O |
|
EventBot B-Malware |
|
and O |
|
provides O |
|
the O |
|
user O |
|
with O |
|
immediate O |
|
actions O |
|
. O |
|
|
|
CONCLUSION O |
|
In O |
|
this O |
|
research O |
|
, O |
|
the O |
|
Nocturnus B-Organization |
|
team O |
|
has O |
|
dissected O |
|
a O |
|
rapidly O |
|
evolving O |
|
Android B-Malware |
|
malware O |
|
in O |
|
the O |
|
making O |
|
. O |
|
|
|
This O |
|
malware O |
|
abuses O |
|
the O |
|
Android B-System |
|
accessibility O |
|
feature O |
|
to O |
|
steal O |
|
user O |
|
information O |
|
and O |
|
is O |
|
able O |
|
to O |
|
update O |
|
its O |
|
code O |
|
and O |
|
release O |
|
new O |
|
features O |
|
every O |
|
few O |
|
days O |
|
. O |
|
|
|
With O |
|
each O |
|
new O |
|
version O |
|
, O |
|
the O |
|
malware O |
|
adds O |
|
new O |
|
features O |
|
like O |
|
dynamic O |
|
library O |
|
loading O |
|
, O |
|
encryption O |
|
, O |
|
and O |
|
adjustments O |
|
to O |
|
different O |
|
locales O |
|
and O |
|
manufacturers O |
|
. O |
|
|
|
EventBot B-Malware |
|
appears O |
|
to O |
|
be O |
|
a O |
|
completely O |
|
new O |
|
malware O |
|
in O |
|
the O |
|
early O |
|
stages O |
|
of O |
|
development O |
|
, O |
|
giving O |
|
us O |
|
an O |
|
interesting O |
|
view O |
|
into O |
|
how O |
|
attackers O |
|
create O |
|
and O |
|
test O |
|
their O |
|
malware O |
|
. O |
|
|
|
Cybereason B-Organization |
|
classifies O |
|
EventBot B-Malware |
|
as O |
|
a O |
|
mobile O |
|
banking O |
|
trojan O |
|
and O |
|
infostealer O |
|
based O |
|
on O |
|
the O |
|
stealing O |
|
features O |
|
discussed O |
|
in O |
|
this O |
|
research O |
|
. O |
|
|
|
It O |
|
leverages O |
|
webinjects O |
|
and O |
|
SMS O |
|
reading O |
|
capabilities O |
|
to O |
|
bypass O |
|
two-factor O |
|
authentication O |
|
, O |
|
and O |
|
is O |
|
clearly O |
|
targeting O |
|
financial O |
|
applications O |
|
. O |
|
|
|
Although O |
|
the O |
|
threat O |
|
actor O |
|
responsible O |
|
for O |
|
the O |
|
development O |
|
of O |
|
EventBot B-Malware |
|
is O |
|
still O |
|
unknown O |
|
and O |
|
the O |
|
malware O |
|
does O |
|
not O |
|
appear O |
|
to O |
|
be O |
|
involved O |
|
in O |
|
major O |
|
attacks O |
|
, O |
|
it O |
|
is O |
|
interesting O |
|
to O |
|
follow O |
|
the O |
|
early O |
|
stages O |
|
of O |
|
mobile O |
|
malware O |
|
development O |
|
. O |
|
|
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
will O |
|
continue O |
|
to O |
|
monitor O |
|
EventBot B-Malware |
|
β O |
|
s O |
|
development O |
|
. O |
|
|
|
In O |
|
recent O |
|
years O |
|
, O |
|
online O |
|
activity O |
|
has O |
|
gradually O |
|
been O |
|
shifting O |
|
from O |
|
personal O |
|
computers O |
|
to O |
|
mobile O |
|
devices O |
|
. O |
|
|
|
Naturally O |
|
, O |
|
this O |
|
resulted O |
|
in O |
|
the O |
|
introduction O |
|
of O |
|
malware O |
|
for O |
|
mobile O |
|
platforms O |
|
, O |
|
especially O |
|
Android B-System |
|
devices O |
|
, O |
|
including O |
|
Cerberus B-Malware |
|
, O |
|
Xhelper B-Malware |
|
and O |
|
the O |
|
Anubis B-Malware |
|
Banking O |
|
Trojan O |
|
. O |
|
|
|
As O |
|
many O |
|
people O |
|
use O |
|
their O |
|
mobile O |
|
devices O |
|
for O |
|
online O |
|
shopping O |
|
and O |
|
even O |
|
to O |
|
manage O |
|
their O |
|
bank O |
|
accounts O |
|
, O |
|
the O |
|
mobile O |
|
arena O |
|
became O |
|
increasingly O |
|
profitable O |
|
for O |
|
cyber O |
|
criminals O |
|
. O |
|
|
|
This O |
|
is O |
|
why O |
|
we O |
|
recently O |
|
released O |
|
Cybereason B-System |
|
Mobile I-System |
|
, O |
|
a O |
|
new O |
|
offering O |
|
that O |
|
strengthens O |
|
the O |
|
Cybereason B-System |
|
Defense I-System |
|
Platform I-System |
|
by O |
|
bringing O |
|
prevention O |
|
, O |
|
detection O |
|
, O |
|
and O |
|
response O |
|
capabilities O |
|
to O |
|
mobile O |
|
devices O |
|
. O |
|
|
|
With O |
|
Cybereason B-System |
|
Mobile I-System |
|
, O |
|
our O |
|
customers O |
|
can O |
|
protect O |
|
against O |
|
modern O |
|
threats O |
|
across O |
|
traditional O |
|
and O |
|
mobile O |
|
endpoints O |
|
, O |
|
all O |
|
within O |
|
a O |
|
single O |
|
console O |
|
. O |
|
|
|
Check B-Organization |
|
Point I-Organization |
|
Mobile B-System |
|
Threat I-System |
|
Prevention I-System |
|
has O |
|
detected O |
|
two O |
|
instances O |
|
of O |
|
a O |
|
mobile O |
|
malware O |
|
variant O |
|
infecting O |
|
multiple O |
|
devices O |
|
within O |
|
the O |
|
Check B-Organization |
|
Point I-Organization |
|
customer O |
|
base O |
|
. O |
|
|
|
The O |
|
malware O |
|
, O |
|
packaged O |
|
within O |
|
an O |
|
Android B-System |
|
game O |
|
app O |
|
called O |
|
BrainTest B-Malware |
|
, O |
|
had O |
|
been O |
|
published O |
|
to O |
|
Google B-System |
|
Play I-System |
|
twice O |
|
. O |
|
|
|
Each O |
|
instance O |
|
had O |
|
between O |
|
100,000 O |
|
and O |
|
500,000 O |
|
downloads O |
|
according O |
|
to O |
|
Google B-System |
|
Play I-System |
|
statistics O |
|
, O |
|
reaching O |
|
an O |
|
aggregated O |
|
infection O |
|
rate O |
|
of O |
|
between O |
|
200,000 O |
|
and O |
|
1 O |
|
million O |
|
users O |
|
. O |
|
|
|
Check B-Organization |
|
Point I-Organization |
|
reached O |
|
out O |
|
to O |
|
Google B-Organization |
|
on O |
|
September O |
|
10 O |
|
, O |
|
2015 O |
|
, O |
|
and O |
|
the O |
|
app O |
|
containing O |
|
the O |
|
malware O |
|
was O |
|
removed O |
|
from O |
|
Google B-System |
|
Play I-System |
|
on O |
|
September O |
|
15 O |
|
, O |
|
2015 O |
|
. O |
|
|
|
Overview O |
|
The O |
|
malware O |
|
was O |
|
first O |
|
detected O |
|
on O |
|
a O |
|
Nexus B-System |
|
5 I-System |
|
smartphone O |
|
, O |
|
and O |
|
although O |
|
the O |
|
user O |
|
attempted O |
|
to O |
|
remove O |
|
the O |
|
infected O |
|
app O |
|
, O |
|
the O |
|
malware O |
|
reappeared O |
|
on O |
|
the O |
|
same O |
|
device O |
|
shortly O |
|
thereafter O |
|
. O |
|
|
|
Our O |
|
analysis O |
|
of O |
|
the O |
|
malware O |
|
shows O |
|
it O |
|
uses O |
|
multiple O |
|
, O |
|
advanced O |
|
techniques O |
|
to O |
|
avoid O |
|
Google B-System |
|
Play I-System |
|
malware O |
|
detection O |
|
and O |
|
to O |
|
maintain O |
|
persistency O |
|
on O |
|
target O |
|
devices O |
|
. O |
|
|
|
Once O |
|
this O |
|
malware O |
|
was O |
|
detected O |
|
on O |
|
a O |
|
device O |
|
, O |
|
Mobile B-System |
|
Threat I-System |
|
Prevention I-System |
|
adjusted O |
|
security O |
|
policies O |
|
on O |
|
the O |
|
Mobile O |
|
Device O |
|
Management O |
|
solution O |
|
( O |
|
MobileIron O |
|
) O |
|
managing O |
|
the O |
|
affected O |
|
devices O |
|
automatically O |
|
, O |
|
thereby O |
|
blocking O |
|
enterprise O |
|
access O |
|
from O |
|
the O |
|
infected O |
|
devices O |
|
. O |
|
|
|
While O |
|
the O |
|
malware O |
|
is O |
|
capable O |
|
of O |
|
facilitating O |
|
various O |
|
cyber-criminal O |
|
goals O |
|
, O |
|
our O |
|
team O |
|
confirmed O |
|
it O |
|
β O |
|
s O |
|
currently O |
|
installing O |
|
additional O |
|
apps O |
|
on O |
|
infected O |
|
devices O |
|
. O |
|
|
|
Disturbingly O |
|
, O |
|
the O |
|
malware O |
|
establishes O |
|
a O |
|
rootkit O |
|
on O |
|
the O |
|
device O |
|
, O |
|
allowing O |
|
it O |
|
to O |
|
download O |
|
and O |
|
execute O |
|
any O |
|
code O |
|
a O |
|
cybercriminal O |
|
would O |
|
want O |
|
to O |
|
run O |
|
on O |
|
a O |
|
device O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
it O |
|
could O |
|
be O |
|
used O |
|
to O |
|
display O |
|
unwanted O |
|
and O |
|
annoying O |
|
advertisements O |
|
on O |
|
a O |
|
device O |
|
, O |
|
or O |
|
potentially O |
|
, O |
|
to O |
|
download O |
|
and O |
|
deploy O |
|
a O |
|
payload O |
|
that O |
|
steals O |
|
credentials O |
|
from O |
|
an O |
|
infected O |
|
device O |
|
. O |
|
|
|
Highlights O |
|
Samples O |
|
of O |
|
the O |
|
malicious O |
|
code O |
|
found O |
|
in O |
|
BrainTest B-Malware |
|
have O |
|
been O |
|
found O |
|
on O |
|
Google B-System |
|
Play I-System |
|
, O |
|
and O |
|
its O |
|
creator O |
|
has O |
|
used O |
|
multiple O |
|
methods O |
|
to O |
|
evade O |
|
detection O |
|
by O |
|
Google B-Organization |
|
including O |
|
Bypassing O |
|
Google B-System |
|
Bouncer I-System |
|
by O |
|
detecting O |
|
if O |
|
the O |
|
malware O |
|
is O |
|
being O |
|
run O |
|
from O |
|
an O |
|
IP O |
|
or O |
|
domain O |
|
mapped O |
|
to O |
|
Google B-System |
|
Bouncer I-System |
|
and O |
|
, O |
|
if O |
|
so O |
|
, O |
|
it O |
|
will O |
|
not O |
|
perform O |
|
its O |
|
intended O |
|
malicious O |
|
activities O |
|
. O |
|
|
|
Combining O |
|
timebombs O |
|
, O |
|
dynamic O |
|
code O |
|
loading O |
|
, O |
|
and O |
|
use O |
|
of O |
|
reflection O |
|
to O |
|
complicate O |
|
reverse O |
|
engineering O |
|
of O |
|
the O |
|
malware O |
|
. O |
|
|
|
Using O |
|
off-the-shelf O |
|
obfuscation O |
|
( O |
|
packer O |
|
) O |
|
from O |
|
Baidu B-Organization |
|
to O |
|
re-introduce O |
|
the O |
|
malware O |
|
to O |
|
Google B-System |
|
Play I-System |
|
after O |
|
the O |
|
first O |
|
instance O |
|
was O |
|
removed O |
|
on O |
|
Aug O |
|
24th O |
|
. O |
|
|
|
BrainTest B-Malware |
|
uses O |
|
four O |
|
privilege B-Vulnerability |
|
escalation I-Vulnerability |
|
exploits I-Vulnerability |
|
to O |
|
gain O |
|
root O |
|
access O |
|
on O |
|
a O |
|
device O |
|
and O |
|
to O |
|
install O |
|
a O |
|
persistent O |
|
malware O |
|
as O |
|
a O |
|
system O |
|
application O |
|
. O |
|
|
|
BrainTest B-Malware |
|
leverages O |
|
an O |
|
anti-uninstall B-Vulnerability |
|
watchdog I-Vulnerability |
|
that O |
|
uses O |
|
two O |
|
system O |
|
applications O |
|
to O |
|
monitor O |
|
the O |
|
removal O |
|
of O |
|
one O |
|
of O |
|
the O |
|
components O |
|
and O |
|
reinstall O |
|
the O |
|
component O |
|
. O |
|
|
|
After O |
|
the O |
|
the O |
|
first O |
|
instance O |
|
of O |
|
BrainTest B-Malware |
|
was O |
|
detected O |
|
, O |
|
Google B-Organization |
|
removed O |
|
the O |
|
app O |
|
from O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
Within O |
|
days O |
|
, O |
|
the O |
|
Check B-Organization |
|
Point I-Organization |
|
research O |
|
team O |
|
detected O |
|
another O |
|
instance O |
|
with O |
|
a O |
|
different O |
|
package O |
|
name O |
|
but O |
|
which O |
|
uses O |
|
the O |
|
same O |
|
code O |
|
. O |
|
|
|
The O |
|
malware O |
|
β O |
|
s O |
|
creators O |
|
had O |
|
used O |
|
obfuscation O |
|
to O |
|
upload O |
|
the O |
|
new O |
|
piece O |
|
of O |
|
malware O |
|
to O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
Technical O |
|
Analysis O |
|
The O |
|
malware O |
|
consists O |
|
of O |
|
2 O |
|
applications O |
|
: O |
|
The O |
|
Dropper O |
|
: O |
|
Brain O |
|
Test O |
|
( O |
|
Unpacked O |
|
β O |
|
com.mile.brain B-Indicator |
|
, O |
|
Packed O |
|
β O |
|
com.zmhitlte.brain B-Indicator |
|
) O |
|
This O |
|
is O |
|
installed O |
|
from O |
|
Google B-System |
|
Play I-System |
|
and O |
|
downloads O |
|
an O |
|
exploit O |
|
pack O |
|
from O |
|
the O |
|
server O |
|
to O |
|
obtain O |
|
root O |
|
access O |
|
on O |
|
a O |
|
device O |
|
. O |
|
|
|
If O |
|
root O |
|
access O |
|
is O |
|
obtained O |
|
, O |
|
the O |
|
application O |
|
downloads O |
|
a O |
|
malicious O |
|
.apk O |
|
file O |
|
( O |
|
The O |
|
Backdoor O |
|
) O |
|
from O |
|
the O |
|
server O |
|
and O |
|
installs O |
|
it O |
|
as O |
|
system O |
|
application O |
|
. O |
|
|
|
The O |
|
Backdoor O |
|
: O |
|
System O |
|
malware O |
|
( O |
|
mcpef.apk B-Indicator |
|
and O |
|
brother.apk B-Indicator |
|
) O |
|
This O |
|
tries O |
|
a O |
|
few O |
|
persistence O |
|
methods O |
|
by O |
|
using O |
|
few O |
|
anti-uninstall O |
|
techniques O |
|
( O |
|
described O |
|
below O |
|
) O |
|
and O |
|
downloads O |
|
and O |
|
executes O |
|
code O |
|
from O |
|
server O |
|
without O |
|
user O |
|
consent O |
|
. O |
|
|
|
Detailed O |
|
Malware O |
|
Structure O |
|
Malware O |
|
Strucutre O |
|
com.mile.brain B-Indicator |
|
( O |
|
SHA256 O |
|
: O |
|
135d6acff3ca27e6e7997429e5f8051f88215d12351e4103f8344cd66611e0f3 B-Indicator |
|
) O |
|
: O |
|
This O |
|
is O |
|
the O |
|
main O |
|
application O |
|
found O |
|
on O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
It O |
|
contains O |
|
encrypted O |
|
java O |
|
archive O |
|
β O |
|
start.ogg B-Indicator |
|
β O |
|
in O |
|
the O |
|
assets O |
|
directory O |
|
and O |
|
dynamically O |
|
loads O |
|
code O |
|
with O |
|
dalvik.system.DexClassLoader B-Indicator |
|
. O |
|
|
|
do.jar B-Indicator |
|
( O |
|
SHA256 O |
|
: O |
|
a711e620246d9954510d3f1c8d5c784bacc78069a5c57b9ec09c3e234bc33a8b B-Indicator |
|
) O |
|
: O |
|
The O |
|
decrypted O |
|
file O |
|
that O |
|
was O |
|
created O |
|
by O |
|
β O |
|
start.ogg. B-Indicator |
|
β O |
|
It O |
|
sends O |
|
a O |
|
request O |
|
to O |
|
the O |
|
server O |
|
with O |
|
the O |
|
device O |
|
β O |
|
s O |
|
configuration O |
|
. O |
|
|
|
The O |
|
server O |
|
β O |
|
s O |
|
response O |
|
is O |
|
a O |
|
json O |
|
, O |
|
containing O |
|
a O |
|
link O |
|
to O |
|
a O |
|
.jar O |
|
file O |
|
, O |
|
class O |
|
name O |
|
and O |
|
method O |
|
name O |
|
to O |
|
be O |
|
executed O |
|
with O |
|
reflection O |
|
API O |
|
. O |
|
|
|
The O |
|
application O |
|
downloads O |
|
the O |
|
file O |
|
and O |
|
dynamically O |
|
loads O |
|
it O |
|
using O |
|
dalvik.system.DexClassLoader O |
|
and O |
|
invokes O |
|
class O |
|
and O |
|
method O |
|
specified O |
|
in O |
|
json B-Indicator |
|
. I-Indicator |
|
|
|
jhfrte.jar I-Indicator |
|
: O |
|
This O |
|
is O |
|
a O |
|
java O |
|
archive O |
|
file O |
|
downloaded O |
|
from O |
|
server O |
|
. O |
|
|
|
If O |
|
a O |
|
device O |
|
isn O |
|
β O |
|
t O |
|
rooted O |
|
, O |
|
it O |
|
downloads O |
|
from O |
|
the O |
|
server O |
|
an O |
|
exploit O |
|
pack O |
|
and O |
|
executes O |
|
it O |
|
to O |
|
obtain O |
|
root O |
|
on O |
|
device O |
|
. O |
|
|
|
Once O |
|
root O |
|
is O |
|
obtained O |
|
, O |
|
it O |
|
downloads O |
|
an O |
|
additional O |
|
APK O |
|
file O |
|
from O |
|
the O |
|
server O |
|
( O |
|
mcpef.apk B-Indicator |
|
) O |
|
and O |
|
installs O |
|
it O |
|
as O |
|
system O |
|
application O |
|
( O |
|
/system O |
|
directory O |
|
) O |
|
. O |
|
|
|
r1-r4 O |
|
: O |
|
This O |
|
is O |
|
a O |
|
local O |
|
privilege O |
|
escalation O |
|
( O |
|
root O |
|
) O |
|
exploit O |
|
, O |
|
which O |
|
includes O |
|
: O |
|
CVE-2013-6282 B-Vulnerability |
|
, O |
|
camerageroot O |
|
( O |
|
http B-Indicator |
|
: I-Indicator |
|
//www.77169.org/exploits/2013/20130414031700 I-Indicator |
|
) I-Indicator |
|
, O |
|
a O |
|
rooting O |
|
tool O |
|
for O |
|
mtk6592 O |
|
and O |
|
addtional O |
|
exploit O |
|
. O |
|
|
|
nis O |
|
: O |
|
The O |
|
su O |
|
application O |
|
used O |
|
to O |
|
execute O |
|
shell O |
|
commands O |
|
with O |
|
root O |
|
privileges O |
|
. O |
|
|
|
mcpef.apk B-Indicator |
|
( O |
|
SHA256 O |
|
: O |
|
a8e7dfac00adf661d371ac52bddc03b543bd6b7aa41314b255e53d810931ceac B-Indicator |
|
) O |
|
: O |
|
The O |
|
malicious O |
|
system O |
|
application O |
|
downloaded O |
|
from O |
|
server O |
|
( O |
|
package O |
|
name O |
|
β O |
|
com.android.music.helper B-Indicator |
|
) O |
|
. O |
|
|
|
This O |
|
installs O |
|
additional O |
|
application O |
|
from O |
|
assets O |
|
directory O |
|
( O |
|
brother.apk B-System |
|
) O |
|
and O |
|
listens O |
|
for O |
|
PACKAGE_REMOVED O |
|
events O |
|
. O |
|
|
|
If O |
|
brother.apk B-System |
|
application O |
|
is O |
|
removed O |
|
, O |
|
mcpef.apk B-System |
|
reinstalls O |
|
brother.apk B-System |
|
from O |
|
assets O |
|
. O |
|
|
|
brother.apk B-System |
|
( O |
|
SHA256 O |
|
: O |
|
422fec2e201600bb2ea3140951563f8c6fbd4f8279a04a164aca5e8e753c40e8 B-Indicator |
|
) O |
|
: O |
|
The O |
|
package O |
|
name O |
|
β O |
|
com.android.system.certificate B-Indicator |
|
. O |
|
|
|
System O |
|
application O |
|
installed O |
|
by O |
|
mcpef.apk B-Indicator |
|
. O |
|
|
|
This O |
|
has O |
|
the O |
|
same O |
|
functionality O |
|
as O |
|
mcpef.apk B-Indicator |
|
. O |
|
|
|
In O |
|
addition O |
|
, O |
|
it O |
|
monitors O |
|
to O |
|
verify O |
|
if O |
|
com.android.music.helper B-Indicator |
|
package O |
|
is O |
|
removed O |
|
. O |
|
|
|
If O |
|
mcpef.apk B-Indicator |
|
is O |
|
removed O |
|
, O |
|
brother.apk B-Indicator |
|
reinstalls O |
|
it O |
|
from O |
|
a O |
|
META-INF/brother O |
|
file O |
|
boy O |
|
, O |
|
post.sh B-Indicator |
|
: O |
|
The O |
|
shell O |
|
scripts O |
|
u O |
|
sed O |
|
for O |
|
application O |
|
persistency O |
|
. O |
|
|
|
Application O |
|
lifecycle O |
|
Application O |
|
Lifecycle O |
|
Google B-System |
|
Bouncer I-System |
|
Bypass O |
|
On O |
|
start O |
|
, O |
|
the O |
|
application O |
|
checks O |
|
if O |
|
it O |
|
is O |
|
executed O |
|
on O |
|
one O |
|
of O |
|
the O |
|
Google O |
|
servers O |
|
: O |
|
IP O |
|
ranges O |
|
209.85.128.0-209.85.255.255 B-Indicator |
|
, O |
|
216.58.192.0-216.58.223.255 B-Indicator |
|
, O |
|
173.194.0.0-173.194.255.255 B-Indicator |
|
, O |
|
74.125.0.0-74.125.255.255 B-Indicator |
|
or O |
|
if O |
|
it O |
|
is O |
|
executed O |
|
on O |
|
IP O |
|
hosted O |
|
domain O |
|
that O |
|
contains O |
|
the O |
|
following O |
|
strings O |
|
: O |
|
β O |
|
google O |
|
β O |
|
, O |
|
β O |
|
android B-System |
|
β O |
|
, O |
|
β O |
|
1e100 O |
|
β O |
|
. O |
|
|
|
If O |
|
any O |
|
of O |
|
these O |
|
conditions O |
|
is O |
|
true O |
|
, O |
|
the O |
|
application O |
|
does O |
|
not O |
|
continue O |
|
to O |
|
execute O |
|
the O |
|
malicious O |
|
flow O |
|
. O |
|
|
|
This O |
|
method O |
|
is O |
|
design O |
|
to O |
|
bypass O |
|
the O |
|
automatic O |
|
Google B-System |
|
Play I-System |
|
protection O |
|
mechanism O |
|
called O |
|
Bouncer B-System |
|
. O |
|
|
|
Timebombs O |
|
, O |
|
Dynamic O |
|
Code O |
|
Loading O |
|
and O |
|
Reflection O |
|
If O |
|
Google B-System |
|
Bouncer I-System |
|
was O |
|
not O |
|
detected O |
|
, O |
|
the O |
|
application O |
|
starts O |
|
a O |
|
time O |
|
bomb O |
|
which O |
|
initiates O |
|
the O |
|
malicious O |
|
flow O |
|
only O |
|
after O |
|
20 O |
|
seconds O |
|
and O |
|
will O |
|
run O |
|
every O |
|
2 O |
|
hours O |
|
. O |
|
|
|
The O |
|
time O |
|
bomb O |
|
triggers O |
|
unpacker O |
|
thread O |
|
. O |
|
|
|
Unpacker O |
|
thread O |
|
decrypt O |
|
java O |
|
archive O |
|
from O |
|
assets O |
|
directory O |
|
β O |
|
start.ogg B-Indicator |
|
β O |
|
, O |
|
and O |
|
dynamically O |
|
loads O |
|
it O |
|
and O |
|
calls O |
|
the O |
|
method O |
|
β O |
|
a.a.a.b O |
|
β O |
|
from O |
|
this O |
|
archive O |
|
. O |
|
|
|
This O |
|
method O |
|
checks O |
|
if O |
|
eight O |
|
hours O |
|
have O |
|
passed O |
|
from O |
|
the O |
|
first O |
|
run O |
|
of O |
|
application O |
|
, O |
|
and O |
|
if O |
|
so O |
|
, O |
|
request O |
|
containing O |
|
the O |
|
device O |
|
β O |
|
s O |
|
data O |
|
to O |
|
the O |
|
server O |
|
. O |
|
|
|
The O |
|
server O |
|
sends O |
|
back O |
|
encoded O |
|
json O |
|
containing O |
|
URL O |
|
, O |
|
class O |
|
name O |
|
and O |
|
method O |
|
name O |
|
. O |
|
|
|
Then O |
|
the O |
|
application O |
|
downloads O |
|
java O |
|
archive O |
|
from O |
|
the O |
|
URL O |
|
specified O |
|
in O |
|
json O |
|
, O |
|
dynamically O |
|
loads O |
|
it O |
|
with O |
|
class O |
|
loader O |
|
API O |
|
. O |
|
|
|
Once O |
|
archive O |
|
is O |
|
loaded O |
|
, O |
|
the O |
|
application O |
|
uses O |
|
reflection O |
|
api O |
|
to O |
|
call O |
|
methods O |
|
from O |
|
the O |
|
class O |
|
names O |
|
specified O |
|
in O |
|
the O |
|
json O |
|
. O |
|
|
|
Rooting O |
|
and O |
|
Ad O |
|
Network O |
|
Presentation O |
|
The O |
|
reflection O |
|
loaded O |
|
methods O |
|
check O |
|
if O |
|
the O |
|
device O |
|
is O |
|
rooted O |
|
. O |
|
|
|
If O |
|
not O |
|
, O |
|
the O |
|
application O |
|
downloads O |
|
a O |
|
pack O |
|
of O |
|
exploits O |
|
from O |
|
the O |
|
server O |
|
and O |
|
runs O |
|
them O |
|
one-by-one O |
|
up O |
|
until O |
|
root O |
|
is O |
|
achieved O |
|
. O |
|
|
|
As O |
|
root O |
|
, O |
|
the O |
|
application O |
|
copies O |
|
su O |
|
binary O |
|
to O |
|
/system/bin O |
|
directory O |
|
and O |
|
silently O |
|
downloads O |
|
apk O |
|
file O |
|
from O |
|
the O |
|
server O |
|
. O |
|
|
|
Then O |
|
, O |
|
the O |
|
APK O |
|
is O |
|
installed O |
|
as O |
|
system O |
|
application O |
|
and O |
|
registers O |
|
listener O |
|
on O |
|
USER_PRESENT O |
|
event O |
|
. O |
|
|
|
This O |
|
event O |
|
triggers O |
|
archive O |
|
downloading O |
|
thread O |
|
. O |
|
|
|
Once O |
|
the O |
|
event O |
|
is O |
|
triggered O |
|
, O |
|
it O |
|
registers O |
|
a O |
|
timer O |
|
. O |
|
|
|
The O |
|
timer O |
|
triggers O |
|
additional O |
|
thread O |
|
which O |
|
makes O |
|
a O |
|
request O |
|
to O |
|
the O |
|
server O |
|
. O |
|
|
|
It O |
|
expects O |
|
a O |
|
json O |
|
with O |
|
url O |
|
, O |
|
class O |
|
and O |
|
method O |
|
name O |
|
. O |
|
|
|
It O |
|
downloads O |
|
one O |
|
more O |
|
archive O |
|
and O |
|
dynamically O |
|
loads O |
|
code O |
|
from O |
|
it O |
|
. O |
|
|
|
The O |
|
final O |
|
APK O |
|
is O |
|
downloaded O |
|
from O |
|
a O |
|
different O |
|
URL O |
|
that O |
|
is O |
|
currently O |
|
down O |
|
, O |
|
we O |
|
assume O |
|
that O |
|
the O |
|
apk O |
|
purpose O |
|
is O |
|
overlaying O |
|
ads O |
|
on O |
|
the O |
|
screen O |
|
, O |
|
we O |
|
assume O |
|
this O |
|
based O |
|
on O |
|
the O |
|
research O |
|
we O |
|
have O |
|
done O |
|
on O |
|
the O |
|
API O |
|
we O |
|
found O |
|
which O |
|
returns O |
|
URL O |
|
of O |
|
random O |
|
APK O |
|
file O |
|
containing O |
|
different O |
|
advertising O |
|
networks O |
|
. O |
|
|
|
Persistency O |
|
Watch-Dog O |
|
The O |
|
application O |
|
contains O |
|
protection O |
|
against O |
|
its O |
|
own O |
|
removal O |
|
. O |
|
|
|
As O |
|
outlined O |
|
in O |
|
the O |
|
diagram O |
|
above O |
|
, O |
|
It O |
|
installs O |
|
an O |
|
additional O |
|
application O |
|
with O |
|
the O |
|
same O |
|
functionality O |
|
and O |
|
these O |
|
two O |
|
applications O |
|
monitor O |
|
the O |
|
removal O |
|
of O |
|
each O |
|
other O |
|
. O |
|
|
|
If O |
|
one O |
|
of O |
|
the O |
|
applications O |
|
is O |
|
deleted O |
|
, O |
|
the O |
|
second O |
|
application O |
|
downloads O |
|
and O |
|
re-installs O |
|
the O |
|
removed O |
|
one O |
|
. O |
|
|
|
Network O |
|
activity O |
|
BrainTest O |
|
communicates O |
|
with O |
|
five O |
|
servers O |
|
: O |
|
APK O |
|
files O |
|
provider O |
|
( O |
|
http B-Indicator |
|
: I-Indicator |
|
//psserviceonline I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/ I-Indicator |
|
) I-Indicator |
|
: O |
|
This O |
|
server O |
|
provides O |
|
APK O |
|
files O |
|
with O |
|
advertising O |
|
network O |
|
. O |
|
|
|
We O |
|
found O |
|
two O |
|
functions O |
|
: O |
|
The O |
|
first O |
|
function O |
|
is O |
|
http B-Indicator |
|
: I-Indicator |
|
//s.psserviceonline I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/api/s2s/tracks/ I-Indicator |
|
and O |
|
is O |
|
used O |
|
for O |
|
activation O |
|
. O |
|
|
|
The O |
|
second O |
|
function O |
|
is O |
|
http B-Indicator |
|
: I-Indicator |
|
//s.psserviceonline I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com/api/ads/ I-Indicator |
|
which O |
|
is O |
|
used O |
|
for O |
|
obtaining O |
|
a O |
|
link O |
|
to O |
|
APK O |
|
file O |
|
. O |
|
|
|
Regardless O |
|
of O |
|
the O |
|
parameters O |
|
, O |
|
it O |
|
returns O |
|
a O |
|
json O |
|
containing O |
|
a O |
|
link O |
|
for O |
|
APK O |
|
file O |
|
. O |
|
|
|
File O |
|
Server O |
|
( O |
|
http B-Indicator |
|
: I-Indicator |
|
//www.psservicedl I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
) O |
|
: O |
|
Contains O |
|
android B-System |
|
packages O |
|
, O |
|
java O |
|
archives O |
|
and O |
|
zip O |
|
archives O |
|
with O |
|
exploits O |
|
Archive O |
|
Link O |
|
domains O |
|
: O |
|
Three O |
|
domains O |
|
with O |
|
the O |
|
same O |
|
functionality O |
|
, O |
|
but O |
|
the O |
|
application O |
|
chooses O |
|
one O |
|
of O |
|
them O |
|
to O |
|
send O |
|
request O |
|
for O |
|
archive O |
|
link O |
|
. O |
|
|
|
http B-Indicator |
|
: I-Indicator |
|
//www.himobilephone I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//www.adsuperiorstore I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//www.i4vip I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
Counter O |
|
Measures O |
|
Use O |
|
an O |
|
up O |
|
to O |
|
date O |
|
anti-malware O |
|
software O |
|
that O |
|
is O |
|
capable O |
|
of O |
|
identifying O |
|
this O |
|
threat O |
|
. O |
|
|
|
If O |
|
the O |
|
threat O |
|
reappears O |
|
on O |
|
the O |
|
device O |
|
after O |
|
the O |
|
first O |
|
installation O |
|
, O |
|
it O |
|
means O |
|
that O |
|
the O |
|
malware O |
|
managed O |
|
to O |
|
install O |
|
the O |
|
persistency O |
|
module O |
|
in O |
|
the O |
|
System O |
|
directory O |
|
. O |
|
|
|
In O |
|
this O |
|
case O |
|
, O |
|
the O |
|
device O |
|
should O |
|
be O |
|
re-flashed O |
|
with O |
|
an O |
|
official O |
|
ROM O |
|
. O |
|
|
|
Lookout B-Organization |
|
Discovers O |
|
Phishing O |
|
Sites O |
|
Distributing O |
|
New O |
|
IOS B-System |
|
And O |
|
Android B-System |
|
Surveillanceware B-Malware |
|
April O |
|
8 O |
|
, O |
|
2019 O |
|
For O |
|
the O |
|
past O |
|
year O |
|
, O |
|
Lookout B-Organization |
|
researchers O |
|
have O |
|
been O |
|
tracking O |
|
Android B-System |
|
and O |
|
iOS B-System |
|
surveillanceware B-Malware |
|
, O |
|
that O |
|
can O |
|
exfiltrate O |
|
contacts O |
|
, O |
|
audio O |
|
recordings O |
|
, O |
|
photos O |
|
, O |
|
location O |
|
, O |
|
and O |
|
more O |
|
from O |
|
devices O |
|
. O |
|
|
|
As O |
|
has O |
|
been O |
|
previously O |
|
reported O |
|
, O |
|
some O |
|
versions O |
|
of O |
|
the O |
|
Android B-System |
|
malware O |
|
were O |
|
present O |
|
in O |
|
the O |
|
Google B-System |
|
Play I-System |
|
Store I-System |
|
. O |
|
|
|
The O |
|
iOS B-System |
|
versions O |
|
were O |
|
available O |
|
outside O |
|
the O |
|
app B-System |
|
store I-System |
|
, O |
|
through O |
|
phishing O |
|
sites O |
|
, O |
|
and O |
|
abused O |
|
the O |
|
Apple B-Organization |
|
Developer I-Organization |
|
Enterprise I-Organization |
|
program O |
|
. O |
|
|
|
Background O |
|
: O |
|
Android B-System |
|
surveillanceware O |
|
Early O |
|
last O |
|
year O |
|
, O |
|
Lookout B-Organization |
|
discovered O |
|
a O |
|
sophisticated O |
|
Android B-System |
|
surveillanceware O |
|
agent O |
|
that O |
|
appears O |
|
to O |
|
have O |
|
been O |
|
created O |
|
for O |
|
the O |
|
lawful O |
|
intercept O |
|
market O |
|
. O |
|
|
|
The O |
|
agent O |
|
appears O |
|
to O |
|
have O |
|
been O |
|
under O |
|
development O |
|
for O |
|
at O |
|
least O |
|
five O |
|
years O |
|
and O |
|
consists O |
|
of O |
|
three O |
|
stages O |
|
. O |
|
|
|
First O |
|
, O |
|
there O |
|
is O |
|
a O |
|
small O |
|
dropper O |
|
, O |
|
then O |
|
a O |
|
large O |
|
second O |
|
stage O |
|
payload O |
|
that O |
|
contains O |
|
multiple O |
|
binaries O |
|
( O |
|
where O |
|
most O |
|
of O |
|
the O |
|
surveillance O |
|
functionality O |
|
is O |
|
implemented O |
|
) O |
|
, O |
|
and O |
|
finally O |
|
a O |
|
third O |
|
stage O |
|
which O |
|
typically O |
|
uses O |
|
the O |
|
DirtyCOW B-Vulnerability |
|
exploit I-Vulnerability |
|
( O |
|
CVE-2016-5195 B-Vulnerability |
|
) O |
|
to O |
|
obtain O |
|
root O |
|
. O |
|
|
|
Security B-Organization |
|
Without I-Organization |
|
Borders I-Organization |
|
has O |
|
recently O |
|
published O |
|
an O |
|
analysis O |
|
of O |
|
this O |
|
family O |
|
, O |
|
independently O |
|
, O |
|
through O |
|
their O |
|
blog O |
|
. O |
|
|
|
Several O |
|
technical O |
|
details O |
|
indicated O |
|
that O |
|
the O |
|
software O |
|
was O |
|
likely O |
|
the O |
|
product O |
|
of O |
|
a O |
|
well-funded O |
|
development O |
|
effort O |
|
and O |
|
aimed O |
|
at O |
|
the O |
|
lawful O |
|
intercept O |
|
market O |
|
. O |
|
|
|
These O |
|
included O |
|
the O |
|
use O |
|
of O |
|
certificate O |
|
pinning O |
|
and O |
|
public O |
|
key O |
|
encryption O |
|
for O |
|
C2 O |
|
communications O |
|
, O |
|
geo-restrictions O |
|
imposed O |
|
by O |
|
the O |
|
C2 O |
|
when O |
|
delivering O |
|
the O |
|
second O |
|
stage O |
|
, O |
|
and O |
|
the O |
|
comprehensive O |
|
and O |
|
well O |
|
implemented O |
|
suite O |
|
of O |
|
surveillance O |
|
features O |
|
. O |
|
|
|
Early O |
|
versions O |
|
of O |
|
the O |
|
Android B-System |
|
application O |
|
used O |
|
infrastructure O |
|
which O |
|
belonged O |
|
to O |
|
a O |
|
company O |
|
named O |
|
Connexxa B-Organization |
|
S.R.L I-Organization |
|
. I-Organization |
|
|
|
and O |
|
were O |
|
signed O |
|
using O |
|
the O |
|
name O |
|
of O |
|
an O |
|
engineer O |
|
who O |
|
appears O |
|
to O |
|
hold O |
|
equity O |
|
in O |
|
Connexxa B-Organization |
|
. O |
|
|
|
This O |
|
engineer O |
|
β O |
|
s O |
|
name O |
|
is O |
|
also O |
|
associated O |
|
with O |
|
a O |
|
company O |
|
called O |
|
eSurv B-Organization |
|
S.R.L I-Organization |
|
. I-Organization |
|
|
|
eSurv B-Organization |
|
β O |
|
s O |
|
public O |
|
marketing O |
|
is O |
|
centered O |
|
around O |
|
video O |
|
surveillance O |
|
software O |
|
and O |
|
image O |
|
recognition O |
|
systems O |
|
, O |
|
but O |
|
there O |
|
are O |
|
a O |
|
number O |
|
of O |
|
individuals O |
|
claiming O |
|
to O |
|
be O |
|
mobile O |
|
security O |
|
researchers O |
|
working O |
|
at O |
|
the O |
|
company O |
|
, O |
|
including O |
|
one O |
|
who O |
|
has O |
|
publically O |
|
made O |
|
claims O |
|
to O |
|
be O |
|
developing O |
|
a O |
|
mobile O |
|
surveillance O |
|
agent O |
|
. O |
|
|
|
Moreover O |
|
, O |
|
eSurv B-Organization |
|
was O |
|
a O |
|
business O |
|
unit O |
|
of O |
|
Connexxa B-Organization |
|
and O |
|
was O |
|
leased O |
|
to O |
|
eSurv B-Organization |
|
S.R.L I-Organization |
|
in O |
|
2014 O |
|
. O |
|
|
|
This O |
|
business O |
|
unit O |
|
and O |
|
the O |
|
eSurv B-Organization |
|
software O |
|
and O |
|
brand O |
|
was O |
|
sold O |
|
from O |
|
Connexxa B-Organization |
|
S.R.L I-Organization |
|
. I-Organization |
|
|
|
to O |
|
eSurv B-Organization |
|
S.R.L I-Organization |
|
. I-Organization |
|
|
|
on O |
|
Feb O |
|
28 O |
|
, O |
|
2016 O |
|
. O |
|
|
|
Lookout B-Organization |
|
notified O |
|
Google B-Organization |
|
of O |
|
the O |
|
potential O |
|
threat O |
|
shortly O |
|
after O |
|
it O |
|
was O |
|
discovered O |
|
. O |
|
|
|
Together O |
|
, O |
|
during O |
|
the O |
|
latter O |
|
half O |
|
of O |
|
2018 O |
|
, O |
|
we O |
|
worked O |
|
to O |
|
remove O |
|
the O |
|
apps O |
|
from O |
|
the O |
|
Play B-System |
|
store I-System |
|
while O |
|
it O |
|
was O |
|
being O |
|
deployed O |
|
in O |
|
the O |
|
wild O |
|
. O |
|
|
|
iOS B-System |
|
development O |
|
Analysis O |
|
of O |
|
these O |
|
Android B-System |
|
samples O |
|
led O |
|
to O |
|
the O |
|
discovery O |
|
of O |
|
infrastructure O |
|
that O |
|
contained O |
|
several O |
|
samples O |
|
of O |
|
an O |
|
iOS B-System |
|
port O |
|
. O |
|
|
|
So O |
|
far O |
|
, O |
|
this O |
|
software O |
|
( O |
|
along O |
|
with O |
|
the O |
|
Android B-System |
|
version O |
|
) O |
|
has O |
|
been O |
|
made O |
|
available O |
|
through O |
|
phishing O |
|
sites O |
|
that O |
|
imitated O |
|
Italian O |
|
and O |
|
Turkmenistani O |
|
mobile O |
|
carriers O |
|
. O |
|
|
|
Wind B-Organization |
|
Tre I-Organization |
|
SpA I-Organization |
|
- O |
|
an O |
|
Italian O |
|
telecom O |
|
operator O |
|
TMCell B-Organization |
|
- O |
|
the O |
|
state O |
|
owned O |
|
mobile O |
|
operator O |
|
in O |
|
Turkmenistan O |
|
Deployment O |
|
to O |
|
users O |
|
outside O |
|
Apple B-Organization |
|
β O |
|
s O |
|
app O |
|
store O |
|
was O |
|
made O |
|
possible O |
|
through O |
|
abuse O |
|
of O |
|
Apple B-Organization |
|
β O |
|
s O |
|
enterprise O |
|
provisioning O |
|
system O |
|
. O |
|
|
|
The O |
|
Apple B-Organization |
|
Developer I-Organization |
|
Enterprise I-Organization |
|
program O |
|
is O |
|
intended O |
|
to O |
|
allow O |
|
organizations O |
|
to O |
|
distribute O |
|
proprietary O |
|
, O |
|
in-house O |
|
apps O |
|
to O |
|
their O |
|
employees O |
|
without O |
|
needing O |
|
to O |
|
use O |
|
the O |
|
iOS B-System |
|
App B-System |
|
Store I-System |
|
. O |
|
|
|
A O |
|
business O |
|
can O |
|
obtain O |
|
access O |
|
to O |
|
this O |
|
program O |
|
only O |
|
provided O |
|
they O |
|
meet O |
|
requirements O |
|
set O |
|
out O |
|
by O |
|
Apple B-Organization |
|
. O |
|
|
|
It O |
|
is O |
|
not O |
|
common O |
|
to O |
|
use O |
|
this O |
|
program O |
|
to O |
|
distribute O |
|
malware O |
|
, O |
|
although O |
|
there O |
|
have O |
|
been O |
|
past O |
|
cases O |
|
where O |
|
malware O |
|
authors O |
|
have O |
|
done O |
|
so O |
|
. O |
|
|
|
Each O |
|
of O |
|
the O |
|
phishing O |
|
sites O |
|
contained O |
|
links O |
|
to O |
|
a O |
|
distribution O |
|
manifest O |
|
, O |
|
which O |
|
contained O |
|
metadata O |
|
such O |
|
as O |
|
the O |
|
application O |
|
name O |
|
, O |
|
version O |
|
, O |
|
icon O |
|
, O |
|
and O |
|
a O |
|
URL O |
|
for O |
|
the O |
|
IPA O |
|
file O |
|
. O |
|
|
|
To O |
|
be O |
|
distributed O |
|
outside O |
|
the O |
|
app O |
|
store O |
|
, O |
|
an O |
|
IPA O |
|
package O |
|
must O |
|
contain O |
|
a O |
|
mobile O |
|
provisioning O |
|
profile O |
|
with O |
|
an O |
|
enterprise O |
|
β O |
|
s O |
|
certificate O |
|
. O |
|
|
|
All O |
|
these O |
|
packages O |
|
used O |
|
provisioning O |
|
profiles O |
|
with O |
|
distribution O |
|
certificates O |
|
associated O |
|
with O |
|
the O |
|
company O |
|
Connexxa B-Organization |
|
S.R.L I-Organization |
|
. I-Organization |
|
|
|
Certificate O |
|
Used O |
|
The O |
|
apps O |
|
themselves O |
|
pretended O |
|
to O |
|
be O |
|
carrier O |
|
assistance O |
|
apps O |
|
which O |
|
instructed O |
|
the O |
|
user O |
|
to O |
|
β O |
|
keep O |
|
the O |
|
app O |
|
installed O |
|
on O |
|
your O |
|
device O |
|
and O |
|
stay O |
|
under O |
|
Wi-Fi O |
|
coverage O |
|
to O |
|
be O |
|
contacted O |
|
by O |
|
one O |
|
of O |
|
our O |
|
operators O |
|
β O |
|
. O |
|
|
|
One O |
|
of O |
|
the O |
|
packages O |
|
after O |
|
initial O |
|
launch O |
|
The O |
|
iOS B-System |
|
variant O |
|
is O |
|
not O |
|
as O |
|
sophisticated O |
|
as O |
|
the O |
|
Android B-System |
|
version O |
|
, O |
|
and O |
|
contained O |
|
a O |
|
subset O |
|
of O |
|
the O |
|
functionality O |
|
the O |
|
Android B-System |
|
releases O |
|
offered O |
|
. O |
|
|
|
In O |
|
particular O |
|
, O |
|
these O |
|
packages O |
|
have O |
|
not O |
|
been O |
|
observed O |
|
to O |
|
contain O |
|
or O |
|
to O |
|
download O |
|
exploits O |
|
which O |
|
would O |
|
be O |
|
required O |
|
to O |
|
perform O |
|
certain O |
|
types O |
|
of O |
|
activities O |
|
on O |
|
iOS B-System |
|
devices O |
|
. O |
|
|
|
Even O |
|
without O |
|
capabilities O |
|
to O |
|
exploit O |
|
a O |
|
device O |
|
, O |
|
the O |
|
packages O |
|
were O |
|
able O |
|
to O |
|
exfiltrate O |
|
the O |
|
following O |
|
types O |
|
of O |
|
data O |
|
using O |
|
documented O |
|
APIs O |
|
: O |
|
Contacts O |
|
Audio O |
|
recordings O |
|
Photos O |
|
Videos O |
|
GPS B-System |
|
location O |
|
Device O |
|
information O |
|
In O |
|
addition O |
|
, O |
|
the O |
|
packages O |
|
offered O |
|
a O |
|
feature O |
|
to O |
|
perform O |
|
remote O |
|
audio O |
|
recording O |
|
. O |
|
|
|
Though O |
|
different O |
|
versions O |
|
of O |
|
the O |
|
app O |
|
vary O |
|
in O |
|
structure O |
|
, O |
|
malicious O |
|
code O |
|
was O |
|
initialized O |
|
at O |
|
application O |
|
launch O |
|
without O |
|
the O |
|
user O |
|
β O |
|
s O |
|
knowledge O |
|
, O |
|
and O |
|
a O |
|
number O |
|
of O |
|
timers O |
|
were O |
|
setup O |
|
to O |
|
gather O |
|
and O |
|
upload O |
|
data O |
|
periodically O |
|
. O |
|
|
|
Upload O |
|
data O |
|
was O |
|
queued O |
|
and O |
|
transmitted O |
|
via O |
|
HTTP B-Indicator |
|
PUT O |
|
requests O |
|
to O |
|
an O |
|
endpoint O |
|
on O |
|
the O |
|
C2 O |
|
. O |
|
|
|
The O |
|
iOS B-System |
|
apps O |
|
leverage O |
|
the O |
|
same O |
|
C2 O |
|
infrastructure O |
|
as O |
|
the O |
|
Android B-System |
|
version O |
|
and O |
|
use O |
|
similar O |
|
communications O |
|
protocols O |
|
. O |
|
|
|
Push O |
|
notifications O |
|
were O |
|
also O |
|
used O |
|
to O |
|
control O |
|
audio O |
|
recording O |
|
. O |
|
|
|
Lookout B-Organization |
|
has O |
|
shared O |
|
information O |
|
about O |
|
this O |
|
family O |
|
with O |
|
Apple B-Organization |
|
, O |
|
and O |
|
they O |
|
have O |
|
revoked O |
|
the O |
|
affected O |
|
certificates O |
|
. O |
|
|
|
As O |
|
a O |
|
result O |
|
, O |
|
no O |
|
new O |
|
instances O |
|
of O |
|
this O |
|
app O |
|
can O |
|
be O |
|
installed O |
|
on O |
|
iOS B-System |
|
devices O |
|
and O |
|
existing O |
|
installations O |
|
can O |
|
no O |
|
longer O |
|
be O |
|
run O |
|
. O |
|
|
|
Lookout B-Organization |
|
customers O |
|
are O |
|
also O |
|
protected O |
|
from O |
|
this O |
|
threat O |
|
on O |
|
both O |
|
Android B-System |
|
and O |
|
iOS B-System |
|
. O |
|
|
|
Android B-System |
|
Trojan O |
|
Found O |
|
in O |
|
Targeted O |
|
Attack O |
|
26 O |
|
MAR O |
|
2013 O |
|
In O |
|
the O |
|
past O |
|
, O |
|
we O |
|
β O |
|
ve O |
|
seen O |
|
targeted O |
|
attacks O |
|
against O |
|
Tibetan O |
|
and O |
|
Uyghur O |
|
activists O |
|
on O |
|
Windows B-System |
|
and O |
|
Mac B-System |
|
OS I-System |
|
X I-System |
|
platforms O |
|
. O |
|
|
|
We O |
|
β O |
|
ve O |
|
documented O |
|
several O |
|
interesting O |
|
attacks O |
|
( O |
|
A O |
|
Gift O |
|
for O |
|
Dalai O |
|
Lamas O |
|
Birthday O |
|
and O |
|
Cyber O |
|
Attacks O |
|
Against O |
|
Uyghur O |
|
Mac B-System |
|
OS I-System |
|
X I-System |
|
Users O |
|
Intensify O |
|
) O |
|
which O |
|
used O |
|
ZIP O |
|
files O |
|
as O |
|
well O |
|
as O |
|
DOC O |
|
, O |
|
XLS O |
|
and O |
|
PDF O |
|
documents O |
|
rigged O |
|
with O |
|
exploits O |
|
. O |
|
|
|
Several O |
|
days O |
|
ago O |
|
, O |
|
the O |
|
e-mail O |
|
account O |
|
of O |
|
a O |
|
high-profile O |
|
Tibetan O |
|
activist O |
|
was O |
|
hacked O |
|
and O |
|
used O |
|
to O |
|
send O |
|
targeted O |
|
attacks O |
|
to O |
|
other O |
|
activists O |
|
and O |
|
human O |
|
rights O |
|
advocates O |
|
. O |
|
|
|
Perhaps O |
|
the O |
|
most O |
|
interesting O |
|
part O |
|
is O |
|
that O |
|
the O |
|
attack O |
|
e-mails O |
|
had O |
|
an O |
|
APK O |
|
attachment O |
|
β O |
|
a O |
|
malicious O |
|
program O |
|
for O |
|
Android B-System |
|
. O |
|
|
|
The O |
|
attack O |
|
On O |
|
March O |
|
24th O |
|
, O |
|
2013 O |
|
, O |
|
the O |
|
e-mail O |
|
account O |
|
of O |
|
a O |
|
high-profile O |
|
Tibetan O |
|
activist O |
|
was O |
|
hacked O |
|
and O |
|
used O |
|
to O |
|
send O |
|
spear O |
|
phishing O |
|
e-mails O |
|
to O |
|
their O |
|
contact O |
|
list O |
|
. O |
|
|
|
This O |
|
is O |
|
what O |
|
the O |
|
spear O |
|
phishing O |
|
e-mail O |
|
looked O |
|
like O |
|
: O |
|
In O |
|
regards O |
|
to O |
|
the O |
|
message O |
|
text O |
|
above O |
|
, O |
|
multiple O |
|
activist O |
|
groups O |
|
have O |
|
recently O |
|
organized O |
|
a O |
|
human O |
|
rights O |
|
conference O |
|
event O |
|
in O |
|
Geneva O |
|
. O |
|
|
|
We O |
|
β O |
|
ve O |
|
noticed O |
|
an O |
|
increase O |
|
in O |
|
the O |
|
number O |
|
of O |
|
attacks O |
|
using O |
|
this O |
|
event O |
|
as O |
|
a O |
|
lure O |
|
. O |
|
|
|
Here O |
|
β O |
|
s O |
|
another O |
|
example O |
|
of O |
|
such O |
|
an O |
|
attack O |
|
hitting O |
|
Windows B-System |
|
users O |
|
: O |
|
Going O |
|
back O |
|
to O |
|
the O |
|
Android B-System |
|
Package I-System |
|
( O |
|
APK O |
|
) O |
|
file O |
|
was O |
|
attached O |
|
to O |
|
the O |
|
e-mail O |
|
, O |
|
this O |
|
is O |
|
pushing O |
|
an O |
|
Android O |
|
application O |
|
named O |
|
β O |
|
WUC B-Malware |
|
β I-Malware |
|
s I-Malware |
|
Conference.apk I-Malware |
|
β O |
|
. O |
|
|
|
This O |
|
malicious O |
|
APK O |
|
is O |
|
334326 O |
|
bytes O |
|
file O |
|
, O |
|
MD5 O |
|
: O |
|
0b8806b38b52bebfe39ff585639e2ea2 B-Indicator |
|
and O |
|
is O |
|
detected O |
|
by O |
|
Kaspersky B-Organization |
|
Lab I-Organization |
|
products O |
|
as O |
|
β O |
|
Backdoor.AndroidOS.Chuli.a B-Indicator |
|
β O |
|
. O |
|
|
|
After O |
|
the O |
|
installation O |
|
, O |
|
an O |
|
application O |
|
named O |
|
β O |
|
Conference O |
|
β O |
|
appears O |
|
on O |
|
the O |
|
desktop O |
|
: O |
|
If O |
|
the O |
|
victim O |
|
launches O |
|
this O |
|
app O |
|
, O |
|
he O |
|
will O |
|
see O |
|
text O |
|
which O |
|
β O |
|
enlightens O |
|
β O |
|
the O |
|
information O |
|
about O |
|
the O |
|
upcoming O |
|
event O |
|
: O |
|
The O |
|
full O |
|
text O |
|
reads O |
|
follows O |
|
. O |
|
|
|
Notice O |
|
notice O |
|
the O |
|
use O |
|
of O |
|
the O |
|
mistaken O |
|
β O |
|
Word O |
|
β O |
|
instead O |
|
of O |
|
β O |
|
World O |
|
β O |
|
: O |
|
β O |
|
On O |
|
behalf O |
|
of O |
|
all O |
|
at O |
|
the O |
|
Word B-Organization |
|
Uyghur I-Organization |
|
Congress I-Organization |
|
( I-Organization |
|
WUC I-Organization |
|
) I-Organization |
|
, O |
|
the O |
|
Unrepresented B-Organization |
|
Nations I-Organization |
|
and I-Organization |
|
Peoples I-Organization |
|
Organization I-Organization |
|
( I-Organization |
|
UNPO I-Organization |
|
) I-Organization |
|
and O |
|
the O |
|
Society B-Organization |
|
for I-Organization |
|
Threatened I-Organization |
|
Peoples I-Organization |
|
( I-Organization |
|
STP I-Organization |
|
) I-Organization |
|
, O |
|
Human O |
|
Rights O |
|
in O |
|
China O |
|
: O |
|
Implications O |
|
for O |
|
East O |
|
Turkestan O |
|
, O |
|
Tibet O |
|
and O |
|
Southern O |
|
Mongolia O |
|
In O |
|
what O |
|
was O |
|
an O |
|
unprecedented O |
|
coming-together O |
|
of O |
|
leading O |
|
Uyghur O |
|
, O |
|
Mongolian O |
|
, O |
|
Tibetan O |
|
and O |
|
Chinese O |
|
activists O |
|
, O |
|
as O |
|
well O |
|
as O |
|
other O |
|
leading O |
|
international O |
|
experts O |
|
, O |
|
we O |
|
were O |
|
greatly O |
|
humbled O |
|
|
|
by O |
|
the O |
|
great O |
|
enthusiasm O |
|
, O |
|
contribution O |
|
and O |
|
desire O |
|
from O |
|
all O |
|
in O |
|
attendance O |
|
to O |
|
make O |
|
this O |
|
occasion O |
|
something O |
|
meaningful O |
|
, O |
|
the O |
|
outcome O |
|
of O |
|
which O |
|
produced O |
|
some O |
|
concrete O |
|
, O |
|
action-orientated O |
|
solutions O |
|
to O |
|
our O |
|
shared O |
|
grievances O |
|
. O |
|
|
|
We O |
|
are O |
|
especially O |
|
delighted O |
|
about O |
|
the O |
|
platform O |
|
and O |
|
programme O |
|
of O |
|
work O |
|
established O |
|
in O |
|
the O |
|
declaration O |
|
of O |
|
the O |
|
conference O |
|
, O |
|
upon O |
|
which O |
|
we O |
|
sincerely O |
|
hope O |
|
will O |
|
be O |
|
built O |
|
a O |
|
strong O |
|
and O |
|
resolute O |
|
working O |
|
relationship O |
|
on O |
|
our O |
|
shared O |
|
goals O |
|
for O |
|
the O |
|
future O |
|
. O |
|
|
|
With O |
|
this O |
|
in O |
|
mind O |
|
, O |
|
we O |
|
thoroughly O |
|
look O |
|
forward O |
|
to O |
|
working O |
|
with O |
|
you O |
|
on O |
|
these O |
|
matters O |
|
. O |
|
|
|
Dolkun O |
|
lsa O |
|
Chairman O |
|
of O |
|
the O |
|
Executive B-Organization |
|
Committee I-Organization |
|
Word I-Organization |
|
Uyghur I-Organization |
|
Congress I-Organization |
|
β O |
|
While O |
|
the O |
|
victim O |
|
reads O |
|
this O |
|
fake O |
|
message O |
|
, O |
|
the O |
|
malware O |
|
secretly O |
|
reports O |
|
the O |
|
infection O |
|
to O |
|
a O |
|
command-and-control O |
|
server O |
|
. O |
|
|
|
After O |
|
that O |
|
, O |
|
it O |
|
begins O |
|
to O |
|
harvest O |
|
information O |
|
stored O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
The O |
|
stolen O |
|
data O |
|
includes O |
|
: O |
|
Contacts O |
|
( O |
|
stored O |
|
both O |
|
on O |
|
the O |
|
phone O |
|
and O |
|
the O |
|
SIM O |
|
card O |
|
) O |
|
. O |
|
|
|
Call O |
|
logs O |
|
. O |
|
|
|
SMS O |
|
messages O |
|
. O |
|
|
|
Geo-location O |
|
. O |
|
|
|
Phone O |
|
data O |
|
( O |
|
phone O |
|
number O |
|
, O |
|
OS O |
|
version O |
|
, O |
|
phone O |
|
model O |
|
, O |
|
SDK O |
|
version O |
|
) O |
|
. O |
|
|
|
It O |
|
is O |
|
important O |
|
to O |
|
note O |
|
that O |
|
the O |
|
data O |
|
won O |
|
β O |
|
t O |
|
be O |
|
uploaded O |
|
to O |
|
C O |
|
& O |
|
C O |
|
server O |
|
automatically O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
waits O |
|
for O |
|
incoming O |
|
SMS O |
|
messages O |
|
( O |
|
the O |
|
β O |
|
alarmReceiver.class B-Indicator |
|
β O |
|
) O |
|
and O |
|
checks O |
|
whether O |
|
these O |
|
messages O |
|
contain O |
|
one O |
|
of O |
|
the O |
|
following O |
|
commands O |
|
: O |
|
β O |
|
sms O |
|
β O |
|
, O |
|
β O |
|
contact O |
|
β O |
|
, O |
|
β O |
|
location O |
|
β O |
|
, O |
|
β O |
|
other O |
|
β O |
|
. O |
|
|
|
If O |
|
one O |
|
these O |
|
commands O |
|
is O |
|
found O |
|
, O |
|
then O |
|
the O |
|
malware O |
|
will O |
|
encode O |
|
the O |
|
stolen O |
|
data O |
|
with O |
|
Base64 O |
|
and O |
|
upload O |
|
it O |
|
to O |
|
the O |
|
command O |
|
and O |
|
control O |
|
server O |
|
. O |
|
|
|
The O |
|
C2 O |
|
URL O |
|
is O |
|
: O |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//64.78.161.133/ I-Indicator |
|
* I-Indicator |
|
victims I-Indicator |
|
β I-Indicator |
|
s_cell_phone_number I-Indicator |
|
* I-Indicator |
|
/process.php I-Indicator |
|
In O |
|
addition O |
|
to O |
|
this O |
|
, O |
|
the O |
|
malware O |
|
also O |
|
reports O |
|
to O |
|
another O |
|
script O |
|
, O |
|
β O |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//64.78.161.33/android.php I-Indicator |
|
β O |
|
. O |
|
|
|
First O |
|
, O |
|
it O |
|
will O |
|
get O |
|
the O |
|
β O |
|
nativenumber O |
|
β O |
|
variable O |
|
from O |
|
the O |
|
β O |
|
telmark O |
|
β O |
|
value O |
|
of O |
|
β O |
|
AndroidManifest.xml B-System |
|
β O |
|
. O |
|
|
|
This O |
|
is O |
|
hardcoded O |
|
and O |
|
equals O |
|
β O |
|
phone O |
|
β O |
|
. O |
|
|
|
Then O |
|
, O |
|
it O |
|
will O |
|
add O |
|
the O |
|
result O |
|
of O |
|
the O |
|
public O |
|
method O |
|
localDate.getTime O |
|
( O |
|
) O |
|
, O |
|
which O |
|
simply O |
|
gets O |
|
the O |
|
current O |
|
date O |
|
. O |
|
|
|
An O |
|
example O |
|
of O |
|
the O |
|
string O |
|
which O |
|
is O |
|
sent O |
|
to O |
|
the O |
|
command-and-control O |
|
would O |
|
be O |
|
β O |
|
phone O |
|
26.03.2013 O |
|
β O |
|
. O |
|
|
|
It O |
|
is O |
|
interesting O |
|
that O |
|
the O |
|
attackers O |
|
used O |
|
Java O |
|
Base64 O |
|
library O |
|
developed O |
|
by O |
|
Sauron B-Organization |
|
Software I-Organization |
|
. O |
|
|
|
This O |
|
software O |
|
is O |
|
free O |
|
and O |
|
distributed O |
|
under O |
|
LGPL O |
|
license O |
|
. O |
|
|
|
Also O |
|
, O |
|
command O |
|
communications O |
|
with O |
|
the O |
|
malware O |
|
are O |
|
parsed O |
|
with O |
|
a O |
|
function O |
|
named O |
|
β O |
|
chuli O |
|
( O |
|
) O |
|
β O |
|
prior O |
|
to O |
|
POSTing O |
|
stolen O |
|
data O |
|
to O |
|
the O |
|
command-and-control O |
|
server O |
|
. O |
|
|
|
It O |
|
appears O |
|
that O |
|
the O |
|
attackers O |
|
are O |
|
somewhat O |
|
familiar O |
|
with O |
|
the O |
|
language O |
|
and O |
|
mountain-trekking O |
|
culture O |
|
of O |
|
the O |
|
targets O |
|
β O |
|
the O |
|
meaning O |
|
of O |
|
β O |
|
chuli O |
|
β O |
|
is O |
|
β O |
|
summit O |
|
β O |
|
: O |
|
The O |
|
command-and-control O |
|
server O |
|
and O |
|
parameters O |
|
can O |
|
be O |
|
easily O |
|
seen O |
|
in O |
|
the O |
|
decompiled O |
|
source O |
|
code O |
|
: O |
|
Command O |
|
and O |
|
control O |
|
server O |
|
interaction O |
|
code O |
|
Throughout O |
|
the O |
|
code O |
|
, O |
|
the O |
|
attackers O |
|
log O |
|
all O |
|
important O |
|
actions O |
|
, O |
|
which O |
|
include O |
|
various O |
|
messages O |
|
in O |
|
Chinese O |
|
. O |
|
|
|
This O |
|
was O |
|
probably O |
|
done O |
|
for O |
|
debugging O |
|
purposes O |
|
, O |
|
indicating O |
|
the O |
|
malware O |
|
may O |
|
be O |
|
an O |
|
early O |
|
prototype O |
|
version O |
|
. O |
|
|
|
Some O |
|
actions O |
|
include O |
|
( O |
|
with O |
|
rough O |
|
translations O |
|
) O |
|
: O |
|
The O |
|
command-and-control O |
|
server O |
|
The O |
|
command-and-control O |
|
server O |
|
is O |
|
located O |
|
at O |
|
IP O |
|
64.78.161.133 B-Indicator |
|
. O |
|
|
|
This O |
|
IP O |
|
is O |
|
located O |
|
in O |
|
Los O |
|
Angeles O |
|
, O |
|
U.S.A. O |
|
, O |
|
at O |
|
a O |
|
hosting O |
|
company O |
|
named O |
|
β O |
|
Emagine B-Organization |
|
Concept I-Organization |
|
Inc I-Organization |
|
β O |
|
. O |
|
|
|
Interestingly O |
|
, O |
|
there O |
|
is O |
|
a O |
|
domain O |
|
which O |
|
used O |
|
to O |
|
point O |
|
there O |
|
, O |
|
β O |
|
DlmDocumentsExchange.com B-Indicator |
|
β O |
|
. O |
|
|
|
The O |
|
domain O |
|
was O |
|
registered O |
|
on O |
|
March O |
|
8th O |
|
, O |
|
2013 O |
|
: O |
|
Registration O |
|
Service O |
|
Provided O |
|
By O |
|
: O |
|
SHANGHAI B-Organization |
|
MEICHENG I-Organization |
|
TECHNOLOGY I-Organization |
|
INFORMATION I-Organization |
|
DEVELOPMENT I-Organization |
|
CO. I-Organization |
|
, I-Organization |
|
LTD. I-Organization |
|
Domain O |
|
Name O |
|
: O |
|
DLMDOCUMENTSEXCHANGE.COM B-Indicator |
|
Registration O |
|
Date O |
|
: O |
|
08-Mar-2013 O |
|
Expiration O |
|
Date O |
|
: O |
|
08-Mar-2014 O |
|
Status O |
|
: O |
|
LOCKED O |
|
The O |
|
domain O |
|
registration O |
|
data O |
|
indicates O |
|
the O |
|
following O |
|
owner O |
|
: O |
|
Registrant O |
|
Contact O |
|
Details O |
|
: O |
|
peng O |
|
jia O |
|
peng O |
|
jia O |
|
( O |
|
bdoufwke123010 B-Indicator |
|
@ I-Indicator |
|
gmail.com I-Indicator |
|
) O |
|
beijingshiahiidienquc.d B-Indicator |
|
beijingshi O |
|
beijing,100000 O |
|
|
|
CN O |
|
Tel O |
|
. O |
|
|
|
+86.01078456689 O |
|
Fax O |
|
. O |
|
|
|
+86.01078456689 O |
|
The O |
|
command-and-control O |
|
server O |
|
is O |
|
hosting O |
|
an O |
|
index O |
|
page O |
|
which O |
|
also O |
|
serves O |
|
an O |
|
APK O |
|
file O |
|
: O |
|
The O |
|
referenced O |
|
β O |
|
Document.apk B-Indicator |
|
β O |
|
is O |
|
333583 O |
|
bytes O |
|
in O |
|
size O |
|
, O |
|
MD5 O |
|
: O |
|
c4c4077e9449147d754afd972e247efc B-Indicator |
|
. O |
|
|
|
It O |
|
has O |
|
the O |
|
same O |
|
functionality O |
|
as O |
|
the O |
|
one O |
|
described O |
|
above O |
|
but O |
|
contains O |
|
different O |
|
text O |
|
. O |
|
|
|
The O |
|
new O |
|
text O |
|
( O |
|
in O |
|
Chinese O |
|
, O |
|
about O |
|
relations O |
|
between O |
|
China O |
|
, O |
|
Japan O |
|
and O |
|
the O |
|
disputed O |
|
β O |
|
Senkaku O |
|
Islands O |
|
/ O |
|
Diaoyudao O |
|
Islands O |
|
/ O |
|
Diaoyutai O |
|
Islands O |
|
β O |
|
) O |
|
is O |
|
shown O |
|
to O |
|
the O |
|
victims O |
|
and O |
|
reads O |
|
as O |
|
following O |
|
: O |
|
When O |
|
opened O |
|
in O |
|
a O |
|
browser O |
|
, O |
|
this O |
|
is O |
|
what O |
|
the O |
|
command-and-control O |
|
index O |
|
page O |
|
looks O |
|
like O |
|
: O |
|
The O |
|
text O |
|
on O |
|
the O |
|
top O |
|
means O |
|
β O |
|
Title O |
|
Title O |
|
Title O |
|
β O |
|
in O |
|
Chinese O |
|
, O |
|
while O |
|
the O |
|
other O |
|
strings O |
|
appear O |
|
to O |
|
be O |
|
random O |
|
characters O |
|
typed O |
|
from O |
|
the O |
|
keyboard O |
|
. O |
|
|
|
Interestingly O |
|
, O |
|
the O |
|
command O |
|
and O |
|
control O |
|
server O |
|
includes O |
|
a O |
|
publicly O |
|
accessible O |
|
interface O |
|
to O |
|
work O |
|
with O |
|
the O |
|
victims O |
|
: O |
|
Some O |
|
of O |
|
the O |
|
commands O |
|
with O |
|
rough O |
|
translations O |
|
: O |
|
The O |
|
command-and-control O |
|
server O |
|
is O |
|
running O |
|
Windows B-System |
|
Server I-System |
|
2003 O |
|
and O |
|
has O |
|
been O |
|
configured O |
|
for O |
|
Chinese O |
|
language O |
|
: O |
|
This O |
|
, O |
|
together O |
|
with O |
|
the O |
|
logs O |
|
, O |
|
is O |
|
a O |
|
strong O |
|
indicator O |
|
that O |
|
the O |
|
attackers O |
|
are O |
|
Chinese-speaking O |
|
. O |
|
|
|
Conclusions O |
|
Every O |
|
day O |
|
, O |
|
there O |
|
are O |
|
hundreds O |
|
if O |
|
not O |
|
thousands O |
|
of O |
|
targeted O |
|
attacks O |
|
against O |
|
Tibetan O |
|
and O |
|
Uyghur O |
|
supporters O |
|
. O |
|
|
|
The O |
|
vast O |
|
majority O |
|
of O |
|
these O |
|
target O |
|
Windows B-System |
|
machines O |
|
through O |
|
Word B-System |
|
documents O |
|
exploiting O |
|
known O |
|
vulnerabilities O |
|
such O |
|
as O |
|
CVE-2012-0158 B-Vulnerability |
|
, O |
|
CVE-2010-3333 B-Vulnerability |
|
and O |
|
CVE-2009-3129 B-Vulnerability |
|
. O |
|
|
|
In O |
|
this O |
|
case O |
|
, O |
|
the O |
|
attackers O |
|
hacked O |
|
a O |
|
Tibetan O |
|
activist O |
|
β O |
|
s O |
|
account O |
|
and O |
|
used O |
|
it O |
|
to O |
|
attack O |
|
Uyghur O |
|
activists O |
|
. O |
|
|
|
It O |
|
indicates O |
|
perhaps O |
|
an O |
|
interesting O |
|
trend O |
|
which O |
|
is O |
|
exploiting O |
|
the O |
|
trust O |
|
relationships O |
|
between O |
|
the O |
|
two O |
|
communities O |
|
. O |
|
|
|
This O |
|
technique O |
|
reminds O |
|
us O |
|
of O |
|
a O |
|
combination O |
|
between O |
|
ages O |
|
old O |
|
war O |
|
strategies O |
|
β O |
|
Divide O |
|
et O |
|
impera O |
|
β O |
|
and O |
|
β O |
|
By O |
|
way O |
|
of O |
|
deception O |
|
β O |
|
. O |
|
|
|
Until O |
|
now O |
|
, O |
|
we O |
|
haven O |
|
β O |
|
t O |
|
seen O |
|
targeted O |
|
attacks O |
|
against O |
|
mobile O |
|
phones O |
|
, O |
|
although O |
|
we O |
|
β O |
|
ve O |
|
seen O |
|
indications O |
|
that O |
|
these O |
|
were O |
|
in O |
|
development O |
|
. O |
|
|
|
The O |
|
current O |
|
attack O |
|
took O |
|
advantage O |
|
of O |
|
the O |
|
compromise O |
|
of O |
|
a O |
|
high-profile O |
|
Tibetan O |
|
activist O |
|
. O |
|
|
|
It O |
|
is O |
|
perhaps O |
|
the O |
|
first O |
|
in O |
|
a O |
|
new O |
|
wave O |
|
of O |
|
targeted O |
|
attacks O |
|
aimed O |
|
at O |
|
Android B-System |
|
users O |
|
. O |
|
|
|
So O |
|
far O |
|
, O |
|
the O |
|
attackers O |
|
relied O |
|
entirely O |
|
on O |
|
social O |
|
engineering O |
|
to O |
|
infect O |
|
the O |
|
targets O |
|
. O |
|
|
|
History O |
|
has O |
|
shown O |
|
us O |
|
that O |
|
, O |
|
in O |
|
time O |
|
, O |
|
these O |
|
attacks O |
|
will O |
|
use O |
|
zero-day B-Vulnerability |
|
vulnerabilities I-Vulnerability |
|
, O |
|
exploits O |
|
or O |
|
a O |
|
combination O |
|
of O |
|
techniques O |
|
. O |
|
|
|
For O |
|
now O |
|
, O |
|
the O |
|
best O |
|
protection O |
|
is O |
|
to O |
|
avoid O |
|
any O |
|
APK O |
|
attachments O |
|
that O |
|
arrive O |
|
on O |
|
mobile O |
|
phones O |
|
via O |
|
e-mail O |
|
. O |
|
|
|
We O |
|
detect O |
|
the O |
|
malware O |
|
used O |
|
in O |
|
this O |
|
attack O |
|
as O |
|
β O |
|
Backdoor.AndroidOS.Chuli.a B-Malware |
|
β O |
|
. O |
|
|
|
MD5s O |
|
: O |
|
c4c4077e9449147d754afd972e247efc B-Indicator |
|
Document.apk B-Indicator |
|
0b8806b38b52bebfe39ff585639e2ea2 B-Indicator |
|
WUC O |
|
β O |
|
s O |
|
Conference.apk B-Indicator |
|
Triada B-Malware |
|
: O |
|
organized O |
|
crime O |
|
on O |
|
Android B-System |
|
Triada B-Malware |
|
is O |
|
a O |
|
modular O |
|
mobile O |
|
Trojan O |
|
that O |
|
actively O |
|
uses O |
|
root O |
|
privileges O |
|
to O |
|
substitute O |
|
system O |
|
files O |
|
and O |
|
uses O |
|
several O |
|
clever O |
|
methods O |
|
to O |
|
become O |
|
almost O |
|
invisible O |
|
March O |
|
3 O |
|
, O |
|
2016 O |
|
You O |
|
know O |
|
how O |
|
armies O |
|
typically O |
|
move O |
|
: O |
|
first O |
|
come O |
|
the O |
|
scouts O |
|
to O |
|
make O |
|
sure O |
|
everything O |
|
is O |
|
ok. O |
|
Then O |
|
the O |
|
heavy O |
|
troops O |
|
|
|
arrive O |
|
; O |
|
at O |
|
least O |
|
that O |
|
was O |
|
how O |
|
it O |
|
used O |
|
to O |
|
be O |
|
before O |
|
the O |
|
age O |
|
of O |
|
cyber O |
|
wars O |
|
. O |
|
|
|
It O |
|
turns O |
|
out O |
|
, O |
|
that O |
|
Trojans O |
|
behave O |
|
quite O |
|
the O |
|
same O |
|
way O |
|
. O |
|
|
|
There O |
|
are O |
|
a O |
|
lot O |
|
of O |
|
small O |
|
Trojans O |
|
for O |
|
Android B-System |
|
capable O |
|
of O |
|
leveraging O |
|
access O |
|
privileges O |
|
, O |
|
in O |
|
other O |
|
words O |
|
β O |
|
gaining O |
|
root O |
|
access O |
|
. O |
|
|
|
Our O |
|
malware O |
|
analysts O |
|
Nikita O |
|
Buchka O |
|
and O |
|
Mikhail O |
|
Kuzin O |
|
can O |
|
easily O |
|
name O |
|
11 O |
|
families O |
|
of O |
|
such O |
|
Trojans O |
|
. O |
|
|
|
Most O |
|
of O |
|
them O |
|
are O |
|
almost O |
|
harmless O |
|
β O |
|
all O |
|
they O |
|
did O |
|
until O |
|
recently O |
|
was O |
|
injecting O |
|
tons O |
|
of O |
|
ads O |
|
and O |
|
downloading O |
|
others O |
|
of O |
|
their O |
|
kind O |
|
. O |
|
|
|
If O |
|
you O |
|
want O |
|
to O |
|
know O |
|
more O |
|
about O |
|
them O |
|
β O |
|
our O |
|
researchers O |
|
have O |
|
an O |
|
article O |
|
about O |
|
them O |
|
on O |
|
Securelist B-Organization |
|
. O |
|
|
|
If O |
|
you O |
|
follow O |
|
the O |
|
military O |
|
analogy O |
|
β O |
|
those O |
|
are O |
|
the O |
|
scouts O |
|
. O |
|
|
|
As O |
|
you O |
|
probably O |
|
have O |
|
noticed O |
|
, O |
|
gaining O |
|
root O |
|
access O |
|
gives O |
|
them O |
|
the O |
|
capability O |
|
to O |
|
download O |
|
and O |
|
install O |
|
applications O |
|
β O |
|
that O |
|
β O |
|
s O |
|
the O |
|
reason O |
|
why O |
|
once O |
|
one O |
|
of O |
|
them O |
|
get O |
|
into O |
|
the O |
|
system O |
|
, O |
|
in O |
|
a O |
|
few O |
|
minutes O |
|
there O |
|
are O |
|
all O |
|
the O |
|
others O |
|
. O |
|
|
|
But O |
|
our O |
|
researchers O |
|
have O |
|
predicted O |
|
that O |
|
these O |
|
small O |
|
Trojans O |
|
would O |
|
certainly O |
|
be O |
|
used O |
|
to O |
|
download O |
|
some O |
|
really O |
|
bad O |
|
malware O |
|
that O |
|
can O |
|
actually O |
|
harm O |
|
the O |
|
owners O |
|
of O |
|
the O |
|
infected O |
|
devices O |
|
. O |
|
|
|
And O |
|
that O |
|
β O |
|
s O |
|
exactly O |
|
what O |
|
has O |
|
happened O |
|
recently O |
|
. O |
|
|
|
Small O |
|
Trojans O |
|
like O |
|
Leech B-Malware |
|
, O |
|
Ztorg B-Malware |
|
and O |
|
Gopro B-Malware |
|
now O |
|
download O |
|
one O |
|
of O |
|
the O |
|
most O |
|
advanced O |
|
mobile O |
|
Trojans O |
|
our O |
|
malware O |
|
analysts O |
|
have O |
|
ever O |
|
encountered O |
|
β O |
|
we O |
|
call O |
|
it O |
|
Triada B-Malware |
|
. O |
|
|
|
Triada B-Malware |
|
is O |
|
a O |
|
modular O |
|
mobile O |
|
Trojan O |
|
that O |
|
actively O |
|
uses O |
|
root O |
|
privileges O |
|
to O |
|
substitute O |
|
system O |
|
files O |
|
and O |
|
exists O |
|
mostly O |
|
in O |
|
the O |
|
device O |
|
β O |
|
s O |
|
RAM O |
|
, O |
|
which O |
|
makes O |
|
it O |
|
extremely O |
|
hard O |
|
to O |
|
detect O |
|
. O |
|
|
|
The O |
|
dark O |
|
ways O |
|
of O |
|
the O |
|
Triada B-Malware |
|
Once O |
|
downloaded O |
|
and O |
|
installed O |
|
, O |
|
the O |
|
Triada B-Malware |
|
Trojan O |
|
first O |
|
tries O |
|
to O |
|
collect O |
|
some O |
|
information O |
|
about O |
|
the O |
|
system O |
|
β O |
|
like O |
|
the O |
|
device O |
|
model O |
|
, O |
|
the O |
|
OS O |
|
version O |
|
, O |
|
the O |
|
amount O |
|
of O |
|
the O |
|
SD O |
|
card O |
|
space O |
|
, O |
|
the O |
|
list O |
|
of O |
|
the O |
|
installed O |
|
applications O |
|
and O |
|
other O |
|
things O |
|
. O |
|
|
|
Then O |
|
it O |
|
sends O |
|
all O |
|
that O |
|
information O |
|
to O |
|
the O |
|
Command O |
|
& O |
|
Control O |
|
server O |
|
. O |
|
|
|
We O |
|
have O |
|
detected O |
|
a O |
|
total O |
|
of O |
|
17 O |
|
C O |
|
& O |
|
C O |
|
servers O |
|
on O |
|
4 O |
|
different O |
|
domains O |
|
, O |
|
which O |
|
probably O |
|
means O |
|
the O |
|
bad O |
|
guys O |
|
are O |
|
quite O |
|
familiar O |
|
with O |
|
what O |
|
redundancy O |
|
is O |
|
. O |
|
|
|
The O |
|
C O |
|
& O |
|
C O |
|
server O |
|
then O |
|
responds O |
|
with O |
|
a O |
|
configuration O |
|
file O |
|
, O |
|
containing O |
|
the O |
|
personal O |
|
identification O |
|
number O |
|
for O |
|
the O |
|
device O |
|
and O |
|
some O |
|
settings O |
|
β O |
|
the O |
|
time O |
|
interval O |
|
between O |
|
contacting O |
|
the O |
|
server O |
|
, O |
|
the O |
|
list O |
|
of O |
|
modules O |
|
to O |
|
be O |
|
installed O |
|
and O |
|
so O |
|
on O |
|
. O |
|
|
|
After O |
|
the O |
|
modules O |
|
are O |
|
installed O |
|
they O |
|
are O |
|
deployed O |
|
to O |
|
the O |
|
short O |
|
term O |
|
memory O |
|
and O |
|
deleted O |
|
from O |
|
the O |
|
device O |
|
storage O |
|
, O |
|
which O |
|
makes O |
|
the O |
|
Trojan O |
|
a O |
|
lot O |
|
harder O |
|
to O |
|
catch O |
|
. O |
|
|
|
There O |
|
are O |
|
two O |
|
more O |
|
reasons O |
|
why O |
|
Triada B-Malware |
|
is O |
|
so O |
|
hard O |
|
to O |
|
detect O |
|
and O |
|
why O |
|
it O |
|
had O |
|
impressed O |
|
our O |
|
researchers O |
|
so O |
|
much O |
|
. O |
|
|
|
First O |
|
, O |
|
it O |
|
modifies O |
|
the O |
|
Zygote B-System |
|
process O |
|
. O |
|
|
|
Zygote B-System |
|
is O |
|
the O |
|
core O |
|
process O |
|
in O |
|
the O |
|
Android B-System |
|
OS O |
|
that O |
|
is O |
|
used O |
|
as O |
|
a O |
|
template O |
|
for O |
|
every O |
|
application O |
|
, O |
|
which O |
|
means O |
|
that O |
|
once O |
|
the O |
|
Trojan O |
|
gets O |
|
into O |
|
Zygote B-System |
|
, O |
|
it O |
|
becomes O |
|
a O |
|
part O |
|
of O |
|
literally O |
|
every O |
|
app O |
|
that O |
|
is O |
|
launched O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
Triada B-Malware |
|
: O |
|
organized O |
|
crime O |
|
on O |
|
Android B-System |
|
Second O |
|
, O |
|
it O |
|
substitutes O |
|
the O |
|
system O |
|
functions O |
|
and O |
|
conceals O |
|
its O |
|
modules O |
|
from O |
|
the O |
|
list O |
|
of O |
|
the O |
|
running O |
|
processes O |
|
and O |
|
installed O |
|
apps O |
|
. O |
|
|
|
So O |
|
the O |
|
system O |
|
doesn O |
|
β O |
|
t O |
|
see O |
|
any O |
|
strange O |
|
processes O |
|
running O |
|
and O |
|
thus O |
|
does O |
|
not O |
|
cry O |
|
the O |
|
alarm O |
|
. O |
|
|
|
Those O |
|
are O |
|
not O |
|
the O |
|
only O |
|
system O |
|
functions O |
|
Triada B-Malware |
|
modifies O |
|
. O |
|
|
|
As O |
|
our O |
|
researchers O |
|
discovered O |
|
, O |
|
it O |
|
also O |
|
lays O |
|
its O |
|
hands O |
|
on O |
|
the O |
|
outgoing O |
|
SMS O |
|
and O |
|
filters O |
|
the O |
|
incoming O |
|
ones O |
|
. O |
|
|
|
That O |
|
is O |
|
actually O |
|
how O |
|
the O |
|
bad O |
|
guys O |
|
decided O |
|
to O |
|
monetize O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
Some O |
|
applications O |
|
rely O |
|
on O |
|
SMS O |
|
when O |
|
it O |
|
comes O |
|
to O |
|
in-app O |
|
purchases O |
|
β O |
|
the O |
|
transaction O |
|
data O |
|
is O |
|
transferred O |
|
via O |
|
a O |
|
short O |
|
text O |
|
message O |
|
. O |
|
|
|
The O |
|
main O |
|
reason O |
|
for O |
|
developers O |
|
to O |
|
choose O |
|
SMS O |
|
over O |
|
traditional O |
|
payments O |
|
via O |
|
Internet O |
|
is O |
|
that O |
|
in O |
|
the O |
|
case O |
|
with O |
|
SMS O |
|
no O |
|
Internet O |
|
connection O |
|
is O |
|
required O |
|
. O |
|
|
|
Users O |
|
do O |
|
not O |
|
see O |
|
those O |
|
SMS O |
|
because O |
|
they O |
|
are O |
|
processed O |
|
not O |
|
by O |
|
the O |
|
SMS O |
|
app O |
|
, O |
|
but O |
|
by O |
|
the O |
|
app O |
|
that O |
|
has O |
|
initiated O |
|
the O |
|
transaction O |
|
β O |
|
e.g O |
|
a O |
|
free-to-play O |
|
game O |
|
. O |
|
|
|
Triada B-Malware |
|
β O |
|
s O |
|
functionality O |
|
allows O |
|
it O |
|
to O |
|
modify O |
|
those O |
|
messages O |
|
, O |
|
so O |
|
the O |
|
money O |
|
is O |
|
sent O |
|
not O |
|
to O |
|
some O |
|
app O |
|
developer O |
|
, O |
|
but O |
|
to O |
|
the O |
|
malware O |
|
operators O |
|
. O |
|
|
|
Triada B-Malware |
|
steals O |
|
the O |
|
money O |
|
either O |
|
from O |
|
the O |
|
users O |
|
β O |
|
if O |
|
they O |
|
haven O |
|
β O |
|
t O |
|
succeeded O |
|
in O |
|
purchasing O |
|
whatever O |
|
they O |
|
wanted O |
|
, O |
|
or O |
|
from O |
|
the O |
|
app O |
|
developers O |
|
, O |
|
in O |
|
case O |
|
the O |
|
user O |
|
has O |
|
completed O |
|
the O |
|
purchase O |
|
successfully O |
|
. O |
|
|
|
For O |
|
now O |
|
, O |
|
that O |
|
is O |
|
the O |
|
only O |
|
way O |
|
how O |
|
cybercriminals O |
|
can O |
|
profit O |
|
from O |
|
Triada B-Malware |
|
, O |
|
but O |
|
don O |
|
β O |
|
t O |
|
forget O |
|
that O |
|
it O |
|
β O |
|
s O |
|
a O |
|
modular O |
|
Trojan O |
|
, O |
|
so O |
|
it O |
|
can O |
|
be O |
|
turned O |
|
into O |
|
literally O |
|
everything O |
|
on O |
|
one O |
|
command O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
Fighting O |
|
organized O |
|
crime O |
|
in O |
|
your O |
|
phone O |
|
One O |
|
of O |
|
the O |
|
main O |
|
problems O |
|
with O |
|
Triada B-Malware |
|
is O |
|
that O |
|
it O |
|
can O |
|
potentially O |
|
hurt O |
|
a O |
|
LOT O |
|
of O |
|
people O |
|
. O |
|
|
|
As O |
|
we O |
|
β O |
|
ve O |
|
mentioned O |
|
earlier O |
|
, O |
|
Triada B-Malware |
|
is O |
|
downloaded O |
|
by O |
|
smaller O |
|
Trojans O |
|
that O |
|
have O |
|
leveraged O |
|
the O |
|
access O |
|
privileges O |
|
. O |
|
|
|
And O |
|
our O |
|
researchers O |
|
estimate O |
|
that O |
|
in O |
|
every O |
|
10 O |
|
Android B-System |
|
users O |
|
1 O |
|
was O |
|
attacked O |
|
by O |
|
either O |
|
one O |
|
or O |
|
several O |
|
of O |
|
those O |
|
Trojans O |
|
during O |
|
the O |
|
second O |
|
half O |
|
of O |
|
2015 O |
|
, O |
|
so O |
|
there O |
|
are O |
|
millions O |
|
of O |
|
devices O |
|
with O |
|
a O |
|
huge O |
|
possibility O |
|
of O |
|
being O |
|
infected O |
|
with O |
|
Triada B-Malware |
|
. O |
|
|
|
So O |
|
, O |
|
what O |
|
can O |
|
you O |
|
do O |
|
to O |
|
protect O |
|
yourself O |
|
from O |
|
this O |
|
stealthy O |
|
beast O |
|
? O |
|
|
|
1 O |
|
. O |
|
|
|
Never O |
|
forget O |
|
to O |
|
update O |
|
your O |
|
system O |
|
. O |
|
|
|
It O |
|
turns O |
|
out O |
|
that O |
|
those O |
|
smaller O |
|
Trojans O |
|
face O |
|
serious O |
|
problems O |
|
trying O |
|
to O |
|
get O |
|
root O |
|
access O |
|
on O |
|
Android B-System |
|
4.4.4 I-System |
|
and O |
|
above O |
|
, O |
|
because O |
|
a O |
|
lot O |
|
of O |
|
vulnerabilities O |
|
were O |
|
patched O |
|
in O |
|
these O |
|
versions O |
|
. O |
|
|
|
So O |
|
if O |
|
you O |
|
have O |
|
Android B-System |
|
4.4.4 I-System |
|
or O |
|
some O |
|
more O |
|
recent O |
|
version O |
|
of O |
|
this O |
|
OS O |
|
on O |
|
your O |
|
device O |
|
, O |
|
your O |
|
chances O |
|
of O |
|
getting O |
|
infected O |
|
with O |
|
Triada B-Malware |
|
are O |
|
significantly O |
|
lower O |
|
. O |
|
|
|
Yet O |
|
our O |
|
statistics O |
|
says O |
|
that O |
|
about O |
|
60 O |
|
% O |
|
of O |
|
Android B-System |
|
users O |
|
are O |
|
still O |
|
sitting O |
|
with O |
|
Android B-System |
|
4.4.2 I-System |
|
and I-System |
|
below I-System |
|
. O |
|
|
|
Triada B-Malware |
|
: O |
|
organized O |
|
crime O |
|
on O |
|
Android B-System |
|
2 O |
|
. O |
|
|
|
Better O |
|
not O |
|
to O |
|
take O |
|
any O |
|
chances O |
|
at O |
|
all O |
|
, O |
|
no O |
|
matter O |
|
which O |
|
version O |
|
of O |
|
the O |
|
OS O |
|
you O |
|
use O |
|
. O |
|
|
|
So O |
|
we O |
|
recommend O |
|
installing O |
|
an O |
|
anti-virus O |
|
solution O |
|
on O |
|
your O |
|
Android O |
|
device O |
|
. O |
|
|
|
Kaspersky B-System |
|
Internet I-System |
|
Security I-System |
|
for O |
|
Android B-System |
|
detects O |
|
all O |
|
three O |
|
of O |
|
Triada B-Malware |
|
β O |
|
s O |
|
modules O |
|
, O |
|
so O |
|
it O |
|
can O |
|
save O |
|
your O |
|
money O |
|
from O |
|
cybercriminals O |
|
that O |
|
are O |
|
behind O |
|
Triada B-Malware |
|
. O |
|
|
|
Just O |
|
don O |
|
β O |
|
t O |
|
forget O |
|
that O |
|
the O |
|
scan O |
|
does O |
|
not O |
|
run O |
|
automatically O |
|
in O |
|
the O |
|
free O |
|
version O |
|
. O |
|
|
|
But O |
|
all O |
|
in O |
|
all O |
|
Triada B-Malware |
|
is O |
|
yet O |
|
another O |
|
example O |
|
of O |
|
a O |
|
really O |
|
bad O |
|
trend O |
|
: O |
|
malware O |
|
developers O |
|
are O |
|
taking O |
|
Android B-System |
|
seriously O |
|
, O |
|
and O |
|
the O |
|
latest O |
|
samples O |
|
are O |
|
almost O |
|
as O |
|
complex O |
|
and O |
|
hard O |
|
to O |
|
withstand O |
|
, O |
|
as O |
|
their O |
|
Windows-based B-System |
|
kin O |
|
. O |
|
|
|
The O |
|
only O |
|
good O |
|
way O |
|
to O |
|
fight O |
|
all O |
|
these O |
|
threats O |
|
is O |
|
to O |
|
be O |
|
proactive O |
|
, O |
|
and O |
|
so O |
|
a O |
|
good O |
|
security O |
|
solution O |
|
is O |
|
a O |
|
must O |
|
. O |
|
|
|
TrickBot B-Malware |
|
Pushing O |
|
a O |
|
2FA O |
|
Bypass O |
|
App O |
|
to O |
|
Bank O |
|
Customers O |
|
in O |
|
Germany O |
|
March O |
|
24 O |
|
, O |
|
2020 O |
|
IBM B-Organization |
|
X-Force I-Organization |
|
researchers O |
|
analyzed O |
|
an O |
|
Android B-System |
|
malware O |
|
app O |
|
that O |
|
β O |
|
s O |
|
likely O |
|
being O |
|
pushed O |
|
to O |
|
infected O |
|
users O |
|
by O |
|
the O |
|
TrickBot B-Malware |
|
Trojan O |
|
. O |
|
|
|
This O |
|
app O |
|
, O |
|
dubbed O |
|
β O |
|
TrickMo B-Malware |
|
β O |
|
by O |
|
our O |
|
team O |
|
, O |
|
is O |
|
designed O |
|
to O |
|
bypass O |
|
second O |
|
factor O |
|
and O |
|
strong O |
|
authentication O |
|
pushed O |
|
to O |
|
bank O |
|
customers O |
|
when O |
|
they O |
|
need O |
|
to O |
|
authorize O |
|
a O |
|
transaction O |
|
. O |
|
|
|
While O |
|
it O |
|
β O |
|
s O |
|
not O |
|
the O |
|
first O |
|
of O |
|
its O |
|
kind O |
|
, O |
|
this O |
|
Android B-System |
|
malware O |
|
app O |
|
is O |
|
more O |
|
sophisticated O |
|
than O |
|
similar O |
|
apps O |
|
and O |
|
possesses O |
|
interesting O |
|
features O |
|
that O |
|
enable O |
|
its O |
|
operators O |
|
to O |
|
steal O |
|
transaction O |
|
authorization O |
|
codes O |
|
from O |
|
victims O |
|
who O |
|
download O |
|
the O |
|
app O |
|
. O |
|
|
|
According O |
|
to O |
|
our O |
|
research O |
|
, O |
|
TrickMo B-Malware |
|
is O |
|
still O |
|
under O |
|
active O |
|
development O |
|
as O |
|
we O |
|
expect O |
|
to O |
|
see O |
|
frequent O |
|
changes O |
|
and O |
|
updates O |
|
. O |
|
|
|
While O |
|
it O |
|
can O |
|
be O |
|
used O |
|
anywhere O |
|
and O |
|
target O |
|
any O |
|
bank O |
|
or O |
|
region O |
|
, O |
|
at O |
|
this O |
|
time O |
|
, O |
|
we O |
|
are O |
|
seeing O |
|
it O |
|
deployed O |
|
specifically O |
|
in O |
|
Germany O |
|
. O |
|
|
|
Germany O |
|
is O |
|
one O |
|
of O |
|
the O |
|
first O |
|
attack O |
|
turfs O |
|
TrickBot B-Malware |
|
spread O |
|
to O |
|
when O |
|
it O |
|
first O |
|
emerged O |
|
in O |
|
2016 O |
|
. O |
|
|
|
In O |
|
2020 O |
|
, O |
|
it O |
|
appears O |
|
that O |
|
TrickBot B-Malware |
|
β O |
|
s O |
|
vast O |
|
bank O |
|
fraud O |
|
is O |
|
an O |
|
ongoing O |
|
project O |
|
that O |
|
helps O |
|
the O |
|
gang O |
|
monetize O |
|
compromised O |
|
accounts O |
|
. O |
|
|
|
First O |
|
Signs O |
|
in O |
|
September O |
|
2019 O |
|
In O |
|
September O |
|
2019 O |
|
, O |
|
a O |
|
tweet O |
|
by O |
|
CERT-Bund B-Organization |
|
caught O |
|
the O |
|
attention O |
|
of O |
|
the O |
|
IBM B-Organization |
|
Trusteer I-Organization |
|
Mobile I-Organization |
|
Security I-Organization |
|
Research I-Organization |
|
team O |
|
. O |
|
|
|
The O |
|
tweet O |
|
stated O |
|
that O |
|
TrickBot B-Malware |
|
, O |
|
a O |
|
well-known O |
|
banking O |
|
Trojan O |
|
owned O |
|
by O |
|
an O |
|
organized O |
|
cybercrime O |
|
gang O |
|
, O |
|
uses O |
|
man-in-the-browser O |
|
( O |
|
MITB O |
|
) O |
|
web O |
|
injects O |
|
in O |
|
online O |
|
banking O |
|
sessions O |
|
to O |
|
ask O |
|
infected O |
|
users O |
|
for O |
|
their O |
|
mobile O |
|
phone O |
|
number O |
|
and O |
|
device O |
|
type O |
|
. O |
|
|
|
Machine O |
|
translation O |
|
of O |
|
this O |
|
tweet O |
|
reads O |
|
: O |
|
β O |
|
Watch O |
|
out O |
|
for O |
|
online O |
|
banking O |
|
: O |
|
Emotet B-Malware |
|
reloads O |
|
TrickBot B-Malware |
|
. O |
|
|
|
On O |
|
infected O |
|
PCs O |
|
, O |
|
TrickBot B-Malware |
|
displays O |
|
a O |
|
query O |
|
for O |
|
the O |
|
mobile O |
|
phone O |
|
number O |
|
and O |
|
the O |
|
device O |
|
type O |
|
used O |
|
for O |
|
banking O |
|
and O |
|
then O |
|
prompts O |
|
users O |
|
to O |
|
install O |
|
an O |
|
alleged O |
|
security O |
|
app. O |
|
β O |
|
When O |
|
banking O |
|
Trojans O |
|
ask O |
|
for O |
|
this O |
|
type O |
|
of O |
|
information O |
|
, O |
|
it O |
|
usually O |
|
means O |
|
the O |
|
next O |
|
step O |
|
will O |
|
be O |
|
an O |
|
attempt O |
|
to O |
|
infect O |
|
the O |
|
victim O |
|
β O |
|
s O |
|
mobile O |
|
device O |
|
. O |
|
|
|
Our O |
|
team O |
|
went O |
|
ahead O |
|
and O |
|
hunted O |
|
for O |
|
samples O |
|
of O |
|
the O |
|
app O |
|
and O |
|
analyzed O |
|
it O |
|
in O |
|
our O |
|
labs O |
|
. O |
|
|
|
In O |
|
this O |
|
analysis O |
|
, O |
|
we O |
|
get O |
|
into O |
|
the O |
|
capabilities O |
|
of O |
|
the O |
|
new O |
|
variant O |
|
and O |
|
what O |
|
we O |
|
found O |
|
to O |
|
be O |
|
a O |
|
β O |
|
kill O |
|
switch O |
|
β O |
|
that O |
|
can O |
|
eliminate O |
|
the O |
|
malware O |
|
remotely O |
|
from O |
|
an O |
|
infected O |
|
device O |
|
. O |
|
|
|
Desktop O |
|
Trojans O |
|
and O |
|
Their O |
|
Mobile O |
|
Component O |
|
The O |
|
process O |
|
by O |
|
which O |
|
Trojans O |
|
attempt O |
|
to O |
|
infect O |
|
mobile O |
|
devices O |
|
is O |
|
at O |
|
least O |
|
a O |
|
decade O |
|
old O |
|
. O |
|
|
|
Usually O |
|
, O |
|
when O |
|
users O |
|
are O |
|
already O |
|
infected O |
|
with O |
|
malware O |
|
like O |
|
TrickBot B-Malware |
|
on O |
|
their O |
|
desktop O |
|
, O |
|
they O |
|
will O |
|
see O |
|
a O |
|
web O |
|
injection O |
|
asking O |
|
for O |
|
their O |
|
mobile O |
|
device O |
|
operating O |
|
system O |
|
( O |
|
OS O |
|
) O |
|
type O |
|
and O |
|
phone O |
|
number O |
|
. O |
|
|
|
Next O |
|
, O |
|
if O |
|
they O |
|
indicate O |
|
that O |
|
they O |
|
use O |
|
an O |
|
Android-based B-System |
|
device O |
|
, O |
|
the O |
|
Trojan O |
|
, O |
|
impersonating O |
|
their O |
|
bank O |
|
with O |
|
web O |
|
injections O |
|
, O |
|
fools O |
|
the O |
|
victim O |
|
into O |
|
installing O |
|
a O |
|
fake O |
|
security O |
|
app O |
|
. O |
|
|
|
The O |
|
supposed O |
|
purpose O |
|
of O |
|
that O |
|
app O |
|
is O |
|
to O |
|
obtain O |
|
and O |
|
use O |
|
a O |
|
required O |
|
β O |
|
security O |
|
code O |
|
β O |
|
to O |
|
log O |
|
in O |
|
to O |
|
their O |
|
online O |
|
banking O |
|
site O |
|
. O |
|
|
|
Our O |
|
research O |
|
team O |
|
analyzed O |
|
the O |
|
malicious O |
|
Android B-System |
|
application O |
|
that O |
|
is O |
|
most O |
|
likely O |
|
being O |
|
spread O |
|
by O |
|
TrickBot B-Malware |
|
and O |
|
dubbed O |
|
it O |
|
β O |
|
TrickMo. B-Malware |
|
β O |
|
Targeting O |
|
users O |
|
in O |
|
Germany O |
|
at O |
|
this O |
|
time O |
|
, O |
|
TrickMo B-Malware |
|
is O |
|
the O |
|
latest O |
|
variation O |
|
in O |
|
the O |
|
transaction O |
|
authentication O |
|
number O |
|
( O |
|
TAN O |
|
) O |
|
-stealing O |
|
malware O |
|
category O |
|
. O |
|
|
|
Its O |
|
main O |
|
capabilities O |
|
include O |
|
: O |
|
Stealing O |
|
personal O |
|
device O |
|
information O |
|
Intercepting O |
|
SMS O |
|
messages O |
|
Recording O |
|
targeted O |
|
applications O |
|
for O |
|
one-time O |
|
password O |
|
( O |
|
TAN O |
|
) O |
|
Lockdown O |
|
of O |
|
the O |
|
phone O |
|
Stealing O |
|
pictures O |
|
from O |
|
the O |
|
device O |
|
Self-destruction O |
|
and O |
|
removal O |
|
As O |
|
banks O |
|
release O |
|
more O |
|
advanced O |
|
security O |
|
measures O |
|
, O |
|
banking O |
|
malware O |
|
evolves O |
|
to O |
|
keep O |
|
up O |
|
with O |
|
the O |
|
perpetual O |
|
arms O |
|
race O |
|
. O |
|
|
|
From O |
|
our O |
|
analysis O |
|
of O |
|
the O |
|
TrickMo B-Malware |
|
mobile O |
|
malware O |
|
, O |
|
it O |
|
is O |
|
apparent O |
|
that O |
|
TrickMo B-Malware |
|
is O |
|
designed O |
|
to O |
|
break O |
|
the O |
|
newest O |
|
methods O |
|
of O |
|
OTP O |
|
and O |
|
, O |
|
specifically O |
|
, O |
|
TAN O |
|
codes O |
|
often O |
|
used O |
|
in O |
|
Germany O |
|
. O |
|
|
|
Among O |
|
the O |
|
various O |
|
features O |
|
we O |
|
discuss O |
|
in O |
|
this O |
|
post O |
|
, O |
|
we O |
|
believe O |
|
that O |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
most O |
|
significant O |
|
novelty O |
|
is O |
|
an O |
|
app O |
|
recording O |
|
feature O |
|
, O |
|
which O |
|
gives O |
|
it O |
|
the O |
|
ability O |
|
to O |
|
overcome O |
|
the O |
|
newer O |
|
pushTAN O |
|
app O |
|
validations O |
|
used O |
|
by O |
|
German O |
|
banks O |
|
. O |
|
|
|
In O |
|
the O |
|
analysis O |
|
that O |
|
follows O |
|
, O |
|
we O |
|
describe O |
|
in O |
|
detail O |
|
the O |
|
capabilities O |
|
of O |
|
this O |
|
new O |
|
variant O |
|
and O |
|
a O |
|
β O |
|
kill O |
|
switch O |
|
β O |
|
that O |
|
can O |
|
remotely O |
|
eliminate O |
|
the O |
|
malware O |
|
from O |
|
a O |
|
mobile O |
|
device O |
|
. O |
|
|
|
Why O |
|
Do O |
|
Desktop O |
|
Trojans O |
|
Use O |
|
a O |
|
Mobile O |
|
Component O |
|
? O |
|
|
|
About O |
|
a O |
|
decade O |
|
ago O |
|
, O |
|
attackers O |
|
wielding O |
|
banking O |
|
Trojans O |
|
could O |
|
simply O |
|
use O |
|
stolen O |
|
credentials O |
|
to O |
|
access O |
|
a O |
|
victim O |
|
β O |
|
s O |
|
online O |
|
banking O |
|
account O |
|
and O |
|
perform O |
|
money O |
|
transfers O |
|
. O |
|
|
|
As O |
|
a O |
|
countermeasure O |
|
, O |
|
financial O |
|
institutions O |
|
introduced O |
|
various O |
|
second O |
|
factor O |
|
authentication O |
|
( O |
|
2FA O |
|
) O |
|
methods O |
|
. O |
|
|
|
One O |
|
method O |
|
, O |
|
which O |
|
was O |
|
popular O |
|
in O |
|
Germany O |
|
, O |
|
is O |
|
known O |
|
as O |
|
mobile O |
|
TAN O |
|
( O |
|
mTAN O |
|
) O |
|
. O |
|
|
|
It O |
|
was O |
|
implemented O |
|
by O |
|
sending O |
|
an O |
|
SMS O |
|
message O |
|
containing O |
|
a O |
|
one-time O |
|
password O |
|
( O |
|
OTP O |
|
) O |
|
to O |
|
the O |
|
client O |
|
β O |
|
s O |
|
mobile O |
|
device O |
|
. O |
|
|
|
The O |
|
transaction O |
|
would O |
|
only O |
|
be O |
|
authorized O |
|
after O |
|
the O |
|
client O |
|
enters O |
|
the O |
|
TAN O |
|
into O |
|
the O |
|
online O |
|
banking O |
|
website O |
|
in O |
|
their O |
|
browser O |
|
. O |
|
|
|
Keep O |
|
in O |
|
mind O |
|
that O |
|
while O |
|
this O |
|
case O |
|
is O |
|
about O |
|
TANs O |
|
, O |
|
it O |
|
can O |
|
be O |
|
any O |
|
OTP O |
|
, O |
|
depending O |
|
on O |
|
which O |
|
bank O |
|
is O |
|
being O |
|
targeted O |
|
. O |
|
|
|
Meanwhile O |
|
, O |
|
desktop O |
|
banking O |
|
Trojans O |
|
developed O |
|
the O |
|
ability O |
|
to O |
|
execute O |
|
various O |
|
social O |
|
engineering O |
|
schemes O |
|
by O |
|
using O |
|
web O |
|
injections O |
|
, O |
|
a O |
|
method O |
|
that O |
|
alters O |
|
the O |
|
content O |
|
presented O |
|
to O |
|
the O |
|
infected O |
|
victim O |
|
in O |
|
their O |
|
browser O |
|
. O |
|
|
|
In O |
|
some O |
|
cases O |
|
, O |
|
sophisticated O |
|
web O |
|
injects O |
|
were O |
|
used O |
|
to O |
|
trick O |
|
victims O |
|
into O |
|
entering O |
|
their O |
|
2FA O |
|
codes O |
|
directly O |
|
into O |
|
the O |
|
web O |
|
forms O |
|
controlled O |
|
by O |
|
the O |
|
malware O |
|
to O |
|
eliminate O |
|
the O |
|
need O |
|
for O |
|
the O |
|
mobile O |
|
malware O |
|
component O |
|
. O |
|
|
|
But O |
|
attackers O |
|
were O |
|
still O |
|
constantly O |
|
looking O |
|
for O |
|
new O |
|
methods O |
|
to O |
|
steal O |
|
TANs O |
|
. O |
|
|
|
Around O |
|
2011 O |
|
, O |
|
the O |
|
infamous O |
|
Zeus B-Malware |
|
Trojan I-Malware |
|
started O |
|
using O |
|
web O |
|
injects O |
|
that O |
|
tricked O |
|
users O |
|
into O |
|
downloading O |
|
a O |
|
mobile O |
|
component O |
|
called O |
|
β O |
|
ZitMo B-Malware |
|
β O |
|
( O |
|
Zeus B-Malware |
|
in O |
|
the O |
|
Mobile O |
|
) O |
|
. O |
|
|
|
This O |
|
was O |
|
used O |
|
to O |
|
bypass O |
|
2FA O |
|
methods O |
|
by O |
|
intercepting O |
|
the O |
|
SMS O |
|
messages O |
|
coming O |
|
from O |
|
the O |
|
bank O |
|
and O |
|
stealing O |
|
the O |
|
mTANs O |
|
without O |
|
the O |
|
victim O |
|
β O |
|
s O |
|
knowledge O |
|
. O |
|
|
|
Many O |
|
other O |
|
banking O |
|
malware O |
|
families O |
|
followed O |
|
suit O |
|
and O |
|
released O |
|
their O |
|
own O |
|
Android O |
|
malware O |
|
components O |
|
designed O |
|
to O |
|
steal O |
|
those O |
|
OTPs O |
|
and O |
|
TANs O |
|
. O |
|
|
|
From O |
|
mTAN O |
|
to O |
|
pushTAN O |
|
In O |
|
the O |
|
past O |
|
few O |
|
years O |
|
, O |
|
some O |
|
banks O |
|
in O |
|
Europe O |
|
, O |
|
especially O |
|
in O |
|
Germany O |
|
, O |
|
stopped O |
|
using O |
|
SMS-based O |
|
authentication O |
|
and O |
|
switched O |
|
to O |
|
dedicated O |
|
pushTAN O |
|
applications O |
|
for O |
|
2FA O |
|
schemes O |
|
. O |
|
|
|
Instead O |
|
of O |
|
relying O |
|
on O |
|
SMS O |
|
messages O |
|
, O |
|
which O |
|
can O |
|
be O |
|
easily O |
|
intercepted O |
|
by O |
|
third-party O |
|
apps O |
|
, O |
|
these O |
|
applications O |
|
started O |
|
using O |
|
push O |
|
notifications O |
|
for O |
|
users O |
|
, O |
|
containing O |
|
the O |
|
transaction O |
|
details O |
|
and O |
|
the O |
|
TAN O |
|
. O |
|
|
|
The O |
|
pushTAN O |
|
method O |
|
has O |
|
a O |
|
clear O |
|
advantage O |
|
: O |
|
It O |
|
improves O |
|
security O |
|
by O |
|
mitigating O |
|
the O |
|
risk O |
|
of O |
|
SIM O |
|
swapping O |
|
attacks O |
|
and O |
|
SMS O |
|
stealers O |
|
. O |
|
|
|
TrickMo B-Malware |
|
Calls O |
|
pushTAN O |
|
The O |
|
pushTAN O |
|
method O |
|
is O |
|
a O |
|
hurdle O |
|
for O |
|
malware O |
|
apps O |
|
that O |
|
may O |
|
reside O |
|
on O |
|
the O |
|
same O |
|
device O |
|
, O |
|
and O |
|
it O |
|
β O |
|
s O |
|
particularly O |
|
challenging O |
|
for O |
|
mobile O |
|
malware O |
|
due O |
|
to O |
|
Android B-System |
|
β O |
|
s O |
|
application O |
|
sandbox O |
|
. O |
|
|
|
This O |
|
feature O |
|
is O |
|
designed O |
|
to O |
|
block O |
|
one O |
|
application O |
|
from O |
|
accessing O |
|
the O |
|
data O |
|
of O |
|
other O |
|
applications O |
|
without O |
|
rooting O |
|
the O |
|
device O |
|
. O |
|
|
|
To O |
|
get O |
|
around O |
|
this O |
|
challenge O |
|
, O |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
developers O |
|
added O |
|
some O |
|
new O |
|
features O |
|
to O |
|
steal O |
|
TANs O |
|
using O |
|
screen O |
|
video O |
|
recording O |
|
and O |
|
screen O |
|
data O |
|
scraping O |
|
. O |
|
|
|
The O |
|
Root O |
|
of O |
|
All O |
|
( O |
|
Android B-System |
|
) O |
|
Evil O |
|
So O |
|
how O |
|
does O |
|
TrickMo B-Malware |
|
get O |
|
around O |
|
these O |
|
security O |
|
features O |
|
? O |
|
|
|
It O |
|
abuses O |
|
accessibility O |
|
services O |
|
. O |
|
|
|
Android B-System |
|
β O |
|
s O |
|
accessibility O |
|
services O |
|
were O |
|
originally O |
|
developed O |
|
by O |
|
Google B-Organization |
|
for O |
|
the O |
|
benefit O |
|
of O |
|
users O |
|
with O |
|
disabilities O |
|
. O |
|
|
|
Any O |
|
app O |
|
can O |
|
ask O |
|
for O |
|
accessibility O |
|
permissions O |
|
and O |
|
implement O |
|
features O |
|
such O |
|
as O |
|
screen O |
|
reading O |
|
, O |
|
changing O |
|
sizes O |
|
and O |
|
colors O |
|
of O |
|
objects O |
|
, O |
|
hearing O |
|
enhancements O |
|
, O |
|
replacing O |
|
touch O |
|
with O |
|
other O |
|
forms O |
|
of O |
|
control O |
|
and O |
|
more O |
|
. O |
|
|
|
In O |
|
recent O |
|
years O |
|
, O |
|
some O |
|
malicious O |
|
Android B-System |
|
applications O |
|
abused O |
|
these O |
|
accessibility O |
|
services O |
|
in O |
|
various O |
|
attack O |
|
scenarios O |
|
. O |
|
|
|
Once O |
|
on O |
|
the O |
|
device O |
|
, O |
|
as O |
|
installed O |
|
by O |
|
a O |
|
duped O |
|
user O |
|
, O |
|
the O |
|
TrickMo B-Malware |
|
component O |
|
opens O |
|
and O |
|
sends O |
|
an O |
|
intent O |
|
to O |
|
start O |
|
the O |
|
accessibility O |
|
settings O |
|
activity O |
|
, O |
|
coercing O |
|
the O |
|
user O |
|
to O |
|
grant O |
|
it O |
|
with O |
|
accessibility O |
|
permissions O |
|
. O |
|
|
|
Then O |
|
, O |
|
it O |
|
uses O |
|
the O |
|
accessibility O |
|
service O |
|
for O |
|
its O |
|
malicious O |
|
operations O |
|
, O |
|
some O |
|
of O |
|
which O |
|
include O |
|
: O |
|
Preventing O |
|
the O |
|
user O |
|
from O |
|
uninstalling O |
|
the O |
|
app O |
|
Becoming O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
by O |
|
changing O |
|
device O |
|
settings O |
|
Monitoring O |
|
the O |
|
currently O |
|
running O |
|
application O |
|
( O |
|
s O |
|
) O |
|
Scraping O |
|
on-screen O |
|
text O |
|
Android B-System |
|
operating O |
|
systems O |
|
include O |
|
many O |
|
dialog O |
|
screens O |
|
that O |
|
require O |
|
the O |
|
denial O |
|
, O |
|
or O |
|
approval O |
|
, O |
|
of O |
|
app O |
|
permissions O |
|
and O |
|
actions O |
|
that O |
|
have O |
|
to O |
|
receive O |
|
input O |
|
from O |
|
the O |
|
user O |
|
by O |
|
tapping O |
|
a O |
|
button O |
|
on O |
|
the O |
|
screen O |
|
. O |
|
|
|
TrickMo B-Malware |
|
uses O |
|
accessibility O |
|
services O |
|
to O |
|
identify O |
|
and O |
|
control O |
|
some O |
|
of O |
|
these O |
|
screens O |
|
and O |
|
make O |
|
its O |
|
own O |
|
choices O |
|
before O |
|
giving O |
|
the O |
|
user O |
|
a O |
|
chance O |
|
to O |
|
react O |
|
. O |
|
|
|
In O |
|
the O |
|
image O |
|
below O |
|
, O |
|
we O |
|
see O |
|
the O |
|
malware O |
|
function O |
|
that O |
|
detects O |
|
such O |
|
dialogs O |
|
when O |
|
they O |
|
are O |
|
presented O |
|
to O |
|
the O |
|
user O |
|
, O |
|
asking O |
|
them O |
|
to O |
|
tap O |
|
an O |
|
option O |
|
based O |
|
on O |
|
predefined O |
|
choices O |
|
. O |
|
|
|
TrickMo B-Malware |
|
β O |
|
s O |
|
Persistence O |
|
Capabilities O |
|
When O |
|
it O |
|
comes O |
|
to O |
|
Android-based B-System |
|
devices O |
|
, O |
|
many O |
|
applications O |
|
must O |
|
find O |
|
a O |
|
way O |
|
to O |
|
run O |
|
on O |
|
the O |
|
device O |
|
after O |
|
a O |
|
system O |
|
reboot O |
|
. O |
|
|
|
The O |
|
most O |
|
common O |
|
way O |
|
to O |
|
achieve O |
|
this O |
|
is O |
|
by O |
|
creating O |
|
a O |
|
broadcast O |
|
receiver O |
|
that O |
|
is O |
|
registered O |
|
to O |
|
the O |
|
β O |
|
android.intent.action.BOOT_COMPLETED B-Indicator |
|
β O |
|
broadcast O |
|
action O |
|
and O |
|
adding O |
|
code O |
|
that O |
|
boots O |
|
the O |
|
application O |
|
when O |
|
the O |
|
broadcast O |
|
is O |
|
fired O |
|
. O |
|
|
|
This O |
|
instruction O |
|
is O |
|
especially O |
|
important O |
|
for O |
|
malware O |
|
that O |
|
tries O |
|
to O |
|
avoid O |
|
user O |
|
interaction O |
|
by O |
|
running O |
|
in O |
|
the O |
|
background O |
|
as O |
|
a O |
|
service O |
|
. O |
|
|
|
But O |
|
TrickMo B-Malware |
|
does O |
|
things O |
|
differently O |
|
. O |
|
|
|
Instead O |
|
of O |
|
running O |
|
its O |
|
service O |
|
only O |
|
at O |
|
boot O |
|
time O |
|
, O |
|
it O |
|
registers O |
|
a O |
|
receiver O |
|
that O |
|
listens O |
|
to O |
|
the O |
|
β O |
|
android.intent.action.SCREEN_ON B-Indicator |
|
β O |
|
and O |
|
β O |
|
android.provider.Telephony.SMS_DELIVER B-Indicator |
|
β O |
|
broadcast O |
|
actions O |
|
. O |
|
|
|
It O |
|
then O |
|
uses O |
|
the O |
|
AlarmManager B-System |
|
to O |
|
set O |
|
a O |
|
pending O |
|
intent O |
|
that O |
|
will O |
|
run O |
|
its O |
|
own O |
|
service O |
|
after O |
|
a O |
|
predefined O |
|
interval O |
|
. O |
|
|
|
In O |
|
other O |
|
words O |
|
, O |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
service O |
|
will O |
|
start O |
|
either O |
|
after O |
|
the O |
|
device O |
|
becomes O |
|
interactive O |
|
or O |
|
after O |
|
a O |
|
new O |
|
SMS O |
|
message O |
|
is O |
|
received O |
|
. O |
|
|
|
Tricky O |
|
Configurations O |
|
TrickMo B-Malware |
|
uses O |
|
the O |
|
shared O |
|
preferences O |
|
mechanism O |
|
to O |
|
store O |
|
settings O |
|
and O |
|
data O |
|
that O |
|
the O |
|
malware O |
|
uses O |
|
at O |
|
runtime O |
|
. O |
|
|
|
Some O |
|
of O |
|
the O |
|
settings O |
|
are O |
|
Boolean O |
|
values O |
|
that O |
|
act O |
|
as O |
|
switches O |
|
. O |
|
|
|
They O |
|
represent O |
|
features O |
|
and O |
|
can O |
|
be O |
|
turned O |
|
on O |
|
and O |
|
off O |
|
from O |
|
the O |
|
command-and-control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
server O |
|
or O |
|
by O |
|
an O |
|
SMS O |
|
message O |
|
, O |
|
effectively O |
|
instructing O |
|
the O |
|
malware O |
|
to O |
|
execute O |
|
certain O |
|
tasks O |
|
. O |
|
|
|
Some O |
|
of O |
|
the O |
|
settings O |
|
include O |
|
: O |
|
The O |
|
URL O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
Service O |
|
wake-up O |
|
intervals O |
|
Important O |
|
package O |
|
names O |
|
Accessibility O |
|
permissions O |
|
status O |
|
Lockdown O |
|
screen O |
|
status O |
|
Recording O |
|
status O |
|
SMS O |
|
app O |
|
status O |
|
Kill O |
|
switch O |
|
status O |
|
Stealth O |
|
To O |
|
keep O |
|
its O |
|
resources O |
|
safer O |
|
and O |
|
make O |
|
analysis O |
|
more O |
|
difficult O |
|
for O |
|
researchers O |
|
, O |
|
TrickMo B-Malware |
|
uses O |
|
an O |
|
obfuscator O |
|
to O |
|
scramble O |
|
the O |
|
names O |
|
of O |
|
its O |
|
functions O |
|
, O |
|
classes O |
|
and O |
|
variables O |
|
. O |
|
|
|
A O |
|
TrickMo B-Malware |
|
version O |
|
from O |
|
January O |
|
2020 O |
|
contained O |
|
code O |
|
that O |
|
checks O |
|
if O |
|
the O |
|
app O |
|
is O |
|
running O |
|
on O |
|
a O |
|
rooted O |
|
device O |
|
or O |
|
an O |
|
emulator O |
|
to O |
|
prevent O |
|
analysis O |
|
. O |
|
|
|
As O |
|
an O |
|
example O |
|
, O |
|
in O |
|
the O |
|
two O |
|
images O |
|
below O |
|
, O |
|
we O |
|
can O |
|
see O |
|
the O |
|
encrypted O |
|
and O |
|
decrypted O |
|
shared O |
|
preferences O |
|
file O |
|
, O |
|
which O |
|
is O |
|
encrypted O |
|
using O |
|
the O |
|
java O |
|
β O |
|
PBEWithMD5AndDES O |
|
β O |
|
algorithm O |
|
. O |
|
|
|
C O |
|
& O |
|
C O |
|
Communications O |
|
Exfiltrating O |
|
Device O |
|
Data O |
|
To O |
|
communicate O |
|
with O |
|
its O |
|
master O |
|
, O |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
code O |
|
contains O |
|
a O |
|
hardcoded O |
|
URL O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
When O |
|
it O |
|
runs O |
|
, O |
|
it O |
|
periodically O |
|
connects O |
|
to O |
|
its O |
|
designated O |
|
server O |
|
via O |
|
an O |
|
unencrypted O |
|
HTTP O |
|
request O |
|
and O |
|
sends O |
|
over O |
|
a O |
|
JSON O |
|
object O |
|
that O |
|
contains O |
|
data O |
|
gleaned O |
|
from O |
|
the O |
|
victim O |
|
β O |
|
s O |
|
phone O |
|
. O |
|
|
|
The O |
|
stolen O |
|
parameters O |
|
follow O |
|
: O |
|
ID O |
|
IMSI O |
|
IMEI O |
|
Phone O |
|
number O |
|
Operator O |
|
AID O |
|
Model O |
|
Brand O |
|
Version O |
|
Build O |
|
Battery O |
|
percentage O |
|
Wi-Fi O |
|
connection O |
|
state O |
|
Wake O |
|
time O |
|
Are O |
|
logs O |
|
enabled O |
|
? O |
|
|
|
Is O |
|
the O |
|
malware O |
|
already O |
|
set O |
|
as O |
|
the O |
|
default O |
|
SMS O |
|
application O |
|
? O |
|
|
|
[ O |
|
True/False O |
|
] O |
|
Signal O |
|
strength O |
|
Screen O |
|
active O |
|
[ O |
|
True/False O |
|
] O |
|
Orientation O |
|
Was O |
|
accessibility O |
|
permission O |
|
granted O |
|
? O |
|
|
|
[ O |
|
True/False O |
|
] O |
|
Screen O |
|
size O |
|
List O |
|
of O |
|
the O |
|
installed O |
|
applications O |
|
SMS O |
|
messages O |
|
saved O |
|
on O |
|
the O |
|
device O |
|
It O |
|
is O |
|
not O |
|
uncommon O |
|
for O |
|
banking O |
|
malware O |
|
to O |
|
harvest O |
|
extensive O |
|
amounts O |
|
of O |
|
data O |
|
from O |
|
the O |
|
victim O |
|
β O |
|
s O |
|
device O |
|
. O |
|
|
|
The O |
|
collected O |
|
data O |
|
can O |
|
then O |
|
be O |
|
used O |
|
to O |
|
generate O |
|
a O |
|
unique O |
|
identifier O |
|
of O |
|
the O |
|
bot O |
|
or O |
|
for O |
|
monetization O |
|
purposes O |
|
. O |
|
|
|
It O |
|
can O |
|
also O |
|
be O |
|
sold O |
|
on O |
|
the O |
|
dark O |
|
web O |
|
and O |
|
used O |
|
in O |
|
various O |
|
spoofing O |
|
attacks O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
since O |
|
some O |
|
banks O |
|
use O |
|
anti-fraud O |
|
solutions O |
|
that O |
|
only O |
|
check O |
|
device O |
|
fingerprinting O |
|
, O |
|
fraudsters O |
|
can O |
|
use O |
|
the O |
|
collected O |
|
information O |
|
to O |
|
perform O |
|
fraudulent O |
|
transactions O |
|
from O |
|
a O |
|
device O |
|
that O |
|
mimics O |
|
that O |
|
same O |
|
fingerprint O |
|
. O |
|
|
|
Stealing O |
|
and O |
|
Concealing O |
|
SMS O |
|
Messages O |
|
As O |
|
some O |
|
banks O |
|
still O |
|
use O |
|
SMS-based O |
|
transaction O |
|
authorization O |
|
, O |
|
TrickMo B-Malware |
|
is O |
|
configured O |
|
to O |
|
automatically O |
|
steal O |
|
all O |
|
SMS O |
|
messages O |
|
that O |
|
are O |
|
stored O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
Once O |
|
in O |
|
a O |
|
while O |
|
, O |
|
it O |
|
sends O |
|
a O |
|
packet O |
|
to O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
containing O |
|
the O |
|
collected O |
|
device O |
|
data O |
|
along O |
|
with O |
|
all O |
|
the O |
|
saved O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
Since O |
|
it O |
|
can O |
|
use O |
|
the O |
|
accessibility O |
|
service O |
|
to O |
|
become O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
, O |
|
it O |
|
can O |
|
also O |
|
delete O |
|
the O |
|
SMS O |
|
messages O |
|
so O |
|
only O |
|
the O |
|
attackers O |
|
can O |
|
see O |
|
them O |
|
. O |
|
|
|
In O |
|
the O |
|
image O |
|
below O |
|
, O |
|
we O |
|
can O |
|
see O |
|
a O |
|
packet O |
|
that O |
|
was O |
|
sent O |
|
to O |
|
the O |
|
attacker O |
|
β O |
|
s O |
|
C O |
|
& O |
|
C O |
|
containing O |
|
collected O |
|
information O |
|
along O |
|
with O |
|
stolen O |
|
SMS O |
|
data O |
|
. O |
|
|
|
A O |
|
Communication O |
|
Channel O |
|
via O |
|
Stolen O |
|
SMS O |
|
In O |
|
addition O |
|
, O |
|
TrickMo B-Malware |
|
has O |
|
an O |
|
automatic O |
|
mechanism O |
|
to O |
|
send O |
|
SMS O |
|
messages O |
|
to O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
In O |
|
some O |
|
cases O |
|
, O |
|
it O |
|
uses O |
|
this O |
|
mechanism O |
|
to O |
|
send O |
|
log O |
|
data O |
|
of O |
|
important O |
|
actions O |
|
. O |
|
|
|
It O |
|
can O |
|
save O |
|
an O |
|
SMS O |
|
message O |
|
on O |
|
the O |
|
device O |
|
, O |
|
marking O |
|
with O |
|
β O |
|
internal O |
|
β O |
|
in O |
|
the O |
|
phone O |
|
number O |
|
field O |
|
. O |
|
|
|
The O |
|
SMS O |
|
message O |
|
will O |
|
be O |
|
instantly O |
|
sent O |
|
to O |
|
the O |
|
server O |
|
, O |
|
informing O |
|
the O |
|
malware O |
|
operator O |
|
of O |
|
executed O |
|
tasks O |
|
. O |
|
|
|
In O |
|
the O |
|
image O |
|
below O |
|
, O |
|
we O |
|
see O |
|
a O |
|
log O |
|
TrickMo B-Malware |
|
sent O |
|
to O |
|
the O |
|
attacker O |
|
upon O |
|
becoming O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
. O |
|
|
|
If O |
|
the O |
|
malware O |
|
successfully O |
|
became O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
, O |
|
it O |
|
sends O |
|
the O |
|
words O |
|
β O |
|
the O |
|
app O |
|
has O |
|
been O |
|
replaced O |
|
β O |
|
in O |
|
Russian O |
|
. O |
|
|
|
If O |
|
the O |
|
original O |
|
SMS O |
|
app O |
|
has O |
|
been O |
|
restored O |
|
, O |
|
it O |
|
will O |
|
send O |
|
β O |
|
the O |
|
app O |
|
returned O |
|
to O |
|
its O |
|
original O |
|
place. O |
|
β O |
|
Controlling O |
|
TrickMo B-Malware |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
operators O |
|
can O |
|
control O |
|
the O |
|
malware O |
|
via O |
|
two O |
|
channels O |
|
: O |
|
Through O |
|
its O |
|
C O |
|
& O |
|
C O |
|
via O |
|
a O |
|
plaintext O |
|
HTTP O |
|
protocol O |
|
using O |
|
JSON O |
|
objects O |
|
Through O |
|
encrypted O |
|
SMS O |
|
messages O |
|
There O |
|
are O |
|
predefined O |
|
commands O |
|
to O |
|
change O |
|
the O |
|
malware O |
|
β O |
|
s O |
|
configuration O |
|
and O |
|
make O |
|
it O |
|
execute O |
|
certain O |
|
tasks O |
|
. O |
|
|
|
Some O |
|
of O |
|
the O |
|
more O |
|
interesting O |
|
commands O |
|
include O |
|
: O |
|
SMS O |
|
Control O |
|
Update O |
|
the O |
|
address O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
β O |
|
SMS O |
|
starting O |
|
with O |
|
β O |
|
http O |
|
: O |
|
// O |
|
β O |
|
Send O |
|
AES-encrypted O |
|
SMS O |
|
message O |
|
back O |
|
to O |
|
sender O |
|
β O |
|
SMS O |
|
starting O |
|
with O |
|
β O |
|
sms O |
|
: O |
|
// O |
|
β O |
|
Update O |
|
service O |
|
wake-up O |
|
interval O |
|
β O |
|
β O |
|
2 O |
|
β O |
|
Kill O |
|
switch O |
|
β O |
|
β O |
|
4 O |
|
β O |
|
C O |
|
& O |
|
C O |
|
Control O |
|
Update O |
|
the O |
|
address O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
β O |
|
β O |
|
1 O |
|
β O |
|
Update O |
|
service O |
|
wake-up O |
|
interval O |
|
β O |
|
β O |
|
2 O |
|
β O |
|
Lock O |
|
the O |
|
screen O |
|
β O |
|
β O |
|
5 O |
|
β O |
|
Display O |
|
a O |
|
picture O |
|
in O |
|
a O |
|
WebView O |
|
from O |
|
an O |
|
arbitrary O |
|
URL O |
|
β O |
|
β O |
|
11 O |
|
β O |
|
Send O |
|
an O |
|
arbitrary O |
|
SMS O |
|
message O |
|
β O |
|
β O |
|
8 O |
|
β O |
|
Steal O |
|
images O |
|
|
|
saved O |
|
on O |
|
the O |
|
device O |
|
β O |
|
β O |
|
12 O |
|
β O |
|
and O |
|
β O |
|
13 O |
|
β O |
|
Use O |
|
the O |
|
accessibility O |
|
service O |
|
to O |
|
become O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
β O |
|
β O |
|
6 O |
|
β O |
|
Enable O |
|
recording O |
|
of O |
|
other O |
|
apps O |
|
β O |
|
β O |
|
15 O |
|
β O |
|
Kill O |
|
switch O |
|
β O |
|
β O |
|
4 O |
|
β O |
|
The O |
|
Lockdown O |
|
Screen O |
|
Most O |
|
thieves O |
|
don O |
|
β O |
|
t O |
|
want O |
|
to O |
|
be O |
|
caught O |
|
red-handed O |
|
as O |
|
they O |
|
steal O |
|
β O |
|
they O |
|
want O |
|
to O |
|
buy O |
|
some O |
|
time O |
|
to O |
|
get O |
|
away O |
|
with O |
|
the O |
|
loot O |
|
. O |
|
|
|
The O |
|
same O |
|
is O |
|
true O |
|
for O |
|
banking O |
|
malware O |
|
. O |
|
|
|
Desktop O |
|
banking O |
|
malware O |
|
often O |
|
blocks O |
|
the O |
|
user O |
|
β O |
|
s O |
|
access O |
|
to O |
|
their O |
|
banking O |
|
website O |
|
after O |
|
a O |
|
successful O |
|
transaction O |
|
by O |
|
using O |
|
web O |
|
injects O |
|
that O |
|
show O |
|
a O |
|
variety O |
|
of O |
|
β O |
|
service O |
|
unavailable O |
|
β O |
|
screens O |
|
. O |
|
|
|
TrickMo B-Malware |
|
is O |
|
no O |
|
different O |
|
; O |
|
the O |
|
goal O |
|
is O |
|
to O |
|
complete O |
|
the O |
|
operation O |
|
while O |
|
raising O |
|
minimal O |
|
suspicion O |
|
. O |
|
|
|
After O |
|
performing O |
|
a O |
|
fraudulent O |
|
action O |
|
, O |
|
stealing O |
|
the O |
|
OTP/mTAN O |
|
, O |
|
TrickMo B-Malware |
|
buys O |
|
some O |
|
time O |
|
by O |
|
activating O |
|
the O |
|
lock O |
|
screen O |
|
and O |
|
preventing O |
|
the O |
|
user O |
|
from O |
|
accessing O |
|
their O |
|
device O |
|
. O |
|
|
|
This O |
|
lockdown O |
|
screen O |
|
includes O |
|
two O |
|
parts O |
|
: O |
|
A O |
|
WebView O |
|
containing O |
|
a O |
|
background O |
|
picture O |
|
loaded O |
|
from O |
|
a O |
|
predefined O |
|
URL O |
|
. O |
|
|
|
This O |
|
background O |
|
image O |
|
likely O |
|
contains O |
|
a O |
|
fake O |
|
β O |
|
software O |
|
update O |
|
β O |
|
screen O |
|
. O |
|
|
|
A O |
|
lockdown O |
|
activity O |
|
, O |
|
which O |
|
is O |
|
a O |
|
transparent O |
|
window O |
|
shown O |
|
at O |
|
the O |
|
top O |
|
of O |
|
the O |
|
screen O |
|
that O |
|
contains O |
|
a O |
|
β O |
|
loading O |
|
β O |
|
cursor O |
|
. O |
|
|
|
This O |
|
screen O |
|
persists O |
|
on O |
|
the O |
|
screen O |
|
and O |
|
prevents O |
|
the O |
|
user O |
|
from O |
|
using O |
|
the O |
|
navigation O |
|
buttons O |
|
. O |
|
|
|
Due O |
|
to O |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
persistence O |
|
implementation O |
|
mentioned O |
|
earlier O |
|
, O |
|
this O |
|
lockdown O |
|
screen O |
|
persists O |
|
after O |
|
a O |
|
restart O |
|
and O |
|
is O |
|
re-initiated O |
|
every O |
|
time O |
|
the O |
|
device O |
|
becomes O |
|
interactive O |
|
. O |
|
|
|
In O |
|
some O |
|
cases O |
|
, O |
|
TrickMo B-Malware |
|
may O |
|
use O |
|
this O |
|
feature O |
|
to O |
|
intercept O |
|
SMS O |
|
messages O |
|
without O |
|
the O |
|
knowledge O |
|
of O |
|
the O |
|
user O |
|
by O |
|
activating O |
|
the O |
|
lockdown O |
|
screen O |
|
and O |
|
intercepting O |
|
SMS O |
|
messages O |
|
in O |
|
the O |
|
background O |
|
. O |
|
|
|
Application O |
|
Recording O |
|
β O |
|
Stealing O |
|
OTPs O |
|
and O |
|
TANs O |
|
The O |
|
feature O |
|
that O |
|
makes O |
|
TrickMo B-Malware |
|
different O |
|
from O |
|
standard O |
|
SMS O |
|
stealers O |
|
is O |
|
its O |
|
unique O |
|
ability O |
|
to O |
|
record O |
|
the O |
|
screen O |
|
when O |
|
targeted O |
|
apps O |
|
are O |
|
running O |
|
. O |
|
|
|
This O |
|
feature O |
|
was O |
|
enabled O |
|
only O |
|
in O |
|
newer O |
|
versions O |
|
of O |
|
TrickMo B-Malware |
|
that O |
|
were O |
|
tailored O |
|
specifically O |
|
for O |
|
German O |
|
banks O |
|
and O |
|
use O |
|
a O |
|
special O |
|
application O |
|
for O |
|
implementing O |
|
TAN-based O |
|
2FA O |
|
. O |
|
|
|
The O |
|
application O |
|
recording O |
|
is O |
|
implemented O |
|
via O |
|
two O |
|
methods O |
|
: O |
|
Using O |
|
the O |
|
Android B-System |
|
MediaRecorder O |
|
class O |
|
to O |
|
capture O |
|
a O |
|
video O |
|
of O |
|
the O |
|
screen O |
|
when O |
|
the O |
|
targeted O |
|
application O |
|
is O |
|
presented O |
|
to O |
|
the O |
|
user O |
|
Using O |
|
the O |
|
accessibility O |
|
service O |
|
to O |
|
save O |
|
a O |
|
text O |
|
file O |
|
containing O |
|
the O |
|
data O |
|
of O |
|
all O |
|
the O |
|
objects O |
|
on O |
|
the O |
|
screen O |
|
Both O |
|
files O |
|
are O |
|
later O |
|
sent O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
of O |
|
the O |
|
attacker O |
|
. O |
|
|
|
In O |
|
the O |
|
following O |
|
image O |
|
, O |
|
we O |
|
can O |
|
see O |
|
how O |
|
the O |
|
malware O |
|
receives O |
|
a O |
|
JSON O |
|
object O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
containing O |
|
the O |
|
command O |
|
to O |
|
start O |
|
recording O |
|
, O |
|
the O |
|
targeted O |
|
apps O |
|
and O |
|
the O |
|
recorded O |
|
video O |
|
size O |
|
ratio O |
|
. O |
|
|
|
In O |
|
the O |
|
image O |
|
below O |
|
, O |
|
the O |
|
function O |
|
recursively O |
|
collects O |
|
all O |
|
the O |
|
text O |
|
data O |
|
from O |
|
the O |
|
child O |
|
nodes O |
|
of O |
|
each O |
|
accessibility O |
|
node O |
|
. O |
|
|
|
In O |
|
other O |
|
words O |
|
, O |
|
it O |
|
goes O |
|
through O |
|
every O |
|
object O |
|
on O |
|
the O |
|
screen O |
|
and O |
|
saves O |
|
its O |
|
text O |
|
data O |
|
. O |
|
|
|
A O |
|
TrickMo B-Malware |
|
Kill O |
|
Switch O |
|
One O |
|
of O |
|
the O |
|
most O |
|
interesting O |
|
features O |
|
of O |
|
the O |
|
TrickMo B-Malware |
|
malware I-Malware |
|
is O |
|
having O |
|
its O |
|
own O |
|
kill O |
|
switch O |
|
. O |
|
|
|
Kill O |
|
switches O |
|
are O |
|
used O |
|
by O |
|
many O |
|
malware O |
|
authors O |
|
to O |
|
remove O |
|
traces O |
|
from O |
|
a O |
|
device O |
|
after O |
|
a O |
|
successful O |
|
operation O |
|
. O |
|
|
|
Since O |
|
TrickMo O |
|
β O |
|
s O |
|
HTTP B-Indicator |
|
traffic O |
|
with O |
|
its O |
|
C O |
|
& O |
|
C O |
|
server O |
|
is O |
|
not O |
|
encrypted O |
|
, O |
|
it O |
|
can O |
|
easily O |
|
be O |
|
tampered O |
|
with O |
|
. O |
|
|
|
In O |
|
the O |
|
following O |
|
image O |
|
, O |
|
we O |
|
can O |
|
see O |
|
the O |
|
function O |
|
that O |
|
parses O |
|
the O |
|
commands O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
. O |
|
|
|
If O |
|
the O |
|
returned O |
|
JSON O |
|
object O |
|
has O |
|
the O |
|
β O |
|
4 O |
|
β O |
|
key O |
|
, O |
|
it O |
|
will O |
|
turn O |
|
on O |
|
the O |
|
kill O |
|
switch O |
|
and O |
|
initiate O |
|
its O |
|
own O |
|
removal O |
|
by O |
|
sending O |
|
an O |
|
intent O |
|
and O |
|
seamlessly O |
|
confirming O |
|
the O |
|
uninstall O |
|
using O |
|
the O |
|
accessibility O |
|
service O |
|
, O |
|
all O |
|
without O |
|
the O |
|
victim O |
|
ever O |
|
noticing O |
|
anything O |
|
. O |
|
|
|
The O |
|
kill O |
|
switch O |
|
can O |
|
also O |
|
be O |
|
turned O |
|
on O |
|
by O |
|
SMS O |
|
. O |
|
|
|
This O |
|
is O |
|
a O |
|
bit O |
|
more O |
|
complicated O |
|
since O |
|
the O |
|
SMS O |
|
commands O |
|
are O |
|
encrypted O |
|
and O |
|
encoded O |
|
with O |
|
base64 O |
|
. O |
|
|
|
The O |
|
encryption O |
|
algorithm O |
|
used O |
|
is O |
|
RSA O |
|
, O |
|
and O |
|
interestingly O |
|
, O |
|
the O |
|
authors O |
|
chose O |
|
to O |
|
use O |
|
the O |
|
private O |
|
key O |
|
for O |
|
decryption O |
|
and O |
|
leave O |
|
it O |
|
in O |
|
the O |
|
code O |
|
as O |
|
a O |
|
hardcoded O |
|
string O |
|
. O |
|
|
|
The O |
|
image O |
|
below O |
|
shows O |
|
the O |
|
function O |
|
that O |
|
parses O |
|
the O |
|
SMS O |
|
messages O |
|
, O |
|
decrypts O |
|
them O |
|
using O |
|
the O |
|
hardcoded O |
|
RSA O |
|
private O |
|
key O |
|
and O |
|
executes O |
|
the O |
|
commands O |
|
. O |
|
|
|
Having O |
|
analyzed O |
|
a O |
|
few O |
|
variants O |
|
of O |
|
the O |
|
malware O |
|
, O |
|
we O |
|
noticed O |
|
that O |
|
the O |
|
private O |
|
key O |
|
was O |
|
exposed O |
|
in O |
|
the O |
|
code O |
|
and O |
|
did O |
|
not O |
|
change O |
|
. O |
|
|
|
Therefore O |
|
, O |
|
our O |
|
team O |
|
managed O |
|
to O |
|
generate O |
|
the O |
|
public O |
|
key O |
|
and O |
|
craft O |
|
an O |
|
SMS O |
|
message O |
|
that O |
|
activated O |
|
the O |
|
kill O |
|
switch O |
|
. O |
|
|
|
This O |
|
means O |
|
that O |
|
the O |
|
malware O |
|
can O |
|
be O |
|
remotely O |
|
eliminated O |
|
by O |
|
an O |
|
SMS O |
|
message O |
|
. O |
|
|
|
Our O |
|
team O |
|
was O |
|
also O |
|
able O |
|
to O |
|
test O |
|
other O |
|
commands O |
|
in O |
|
the O |
|
lab O |
|
either O |
|
by O |
|
tampering O |
|
with O |
|
the O |
|
HTTP O |
|
traffic O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
or O |
|
by O |
|
sending O |
|
crafted O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
Suspect O |
|
You O |
|
β O |
|
re O |
|
Infected O |
|
? O |
|
|
|
The O |
|
following O |
|
SMS O |
|
message O |
|
can O |
|
be O |
|
used O |
|
to O |
|
kill O |
|
the O |
|
sample O |
|
analyzed O |
|
in O |
|
this O |
|
research O |
|
and O |
|
all O |
|
other O |
|
variants O |
|
that O |
|
use O |
|
the O |
|
same O |
|
private O |
|
key O |
|
: O |
|
HrLbpr3x/htAVnAgYepBuH2xmFDb68TYTt7FwGn0ddGlQJv/hqsctL57ocFU0Oz3L+uhLcOGG7GVBAfHKL1TBQ== O |
|
Sending O |
|
this O |
|
SMS O |
|
will O |
|
trigger O |
|
TrickMo B-Malware |
|
β O |
|
s O |
|
kill O |
|
switch O |
|
by O |
|
sending O |
|
the O |
|
string O |
|
β O |
|
4 O |
|
β O |
|
encrypted O |
|
with O |
|
the O |
|
generated O |
|
RSA O |
|
public O |
|
key O |
|
and O |
|
base64 O |
|
|
|
encoded O |
|
. O |
|
|
|
Indicators O |
|
of O |
|
Compromise O |
|
( O |
|
IoCs O |
|
) O |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//mcsoft365.com/c I-Indicator |
|
hxxp I-Indicator |
|
: I-Indicator |
|
//pingconnect.net/c I-Indicator |
|
Hashes O |
|
MD5 O |
|
: O |
|
5c749c9fce8c41bf6bcc9bd8a691621b B-Indicator |
|
SHA256 O |
|
: O |
|
284bd2d16092b4d13b6bc85d87950eb4c5e8cbba9af2a04d76d88da2f26c485c B-Indicator |
|
MD5 O |
|
: O |
|
b264af5d2f3390e465052ab502b0726d B-Indicator |
|
|
|
SHA256 O |
|
: O |
|
8ab1712ce9ca2d7952ab763d8a4872aa6a278c3f60dc13e0aebe59f50e6e30f6 B-Indicator |
|
The O |
|
TrickMo B-Malware |
|
Factor O |
|
The O |
|
TrickBot B-Malware |
|
Trojan I-Malware |
|
was O |
|
one O |
|
of O |
|
the O |
|
most O |
|
active O |
|
banking O |
|
malware O |
|
strains O |
|
in O |
|
the O |
|
cybercrime O |
|
arena O |
|
in O |
|
2019 O |
|
. O |
|
|
|
From O |
|
our O |
|
analysis O |
|
, O |
|
it O |
|
is O |
|
apparent O |
|
that O |
|
TrickMo B-Malware |
|
is O |
|
designed O |
|
to O |
|
help O |
|
TrickBot B-Malware |
|
break O |
|
the O |
|
most O |
|
recent O |
|
methods O |
|
of O |
|
TAN-based O |
|
authentication O |
|
. O |
|
|
|
One O |
|
of O |
|
the O |
|
most O |
|
significant O |
|
features O |
|
TrickMo B-Malware |
|
possesses O |
|
is O |
|
the O |
|
app O |
|
recording O |
|
feature O |
|
, O |
|
which O |
|
is O |
|
what O |
|
gives O |
|
TrickBot B-Malware |
|
the O |
|
ability O |
|
to O |
|
overcome O |
|
the O |
|
newer O |
|
pushTAN O |
|
app O |
|
validations O |
|
deployed O |
|
by O |
|
banks O |
|
. O |
|
|
|
SimBad B-Malware |
|
: O |
|
A O |
|
Rogue O |
|
Adware O |
|
Campaign O |
|
On O |
|
Google B-System |
|
Play I-System |
|
March O |
|
13 O |
|
, O |
|
2019 O |
|
Check B-Organization |
|
Point I-Organization |
|
researchers O |
|
from O |
|
the O |
|
Mobile O |
|
Threat O |
|
Team O |
|
have O |
|
discovered O |
|
a O |
|
new O |
|
adware O |
|
campaign O |
|
on O |
|
the O |
|
Google B-System |
|
Play I-System |
|
Store I-System |
|
. O |
|
|
|
This O |
|
particular O |
|
strain O |
|
of O |
|
Adware O |
|
was O |
|
found O |
|
in O |
|
206 O |
|
applications O |
|
, O |
|
and O |
|
the O |
|
combined O |
|
download O |
|
count O |
|
has O |
|
reached O |
|
almost O |
|
150 O |
|
million O |
|
. O |
|
|
|
Google B-Organization |
|
was O |
|
swiftly O |
|
notified O |
|
and O |
|
removed O |
|
the O |
|
infected O |
|
applications O |
|
from O |
|
the O |
|
Google B-System |
|
Play I-System |
|
Store O |
|
. O |
|
|
|
Inside O |
|
the O |
|
SDK O |
|
The O |
|
malware O |
|
resides O |
|
within O |
|
the O |
|
β O |
|
RXDrioder O |
|
β O |
|
Software O |
|
Development O |
|
Kit O |
|
( O |
|
SDK O |
|
) O |
|
, O |
|
which O |
|
is O |
|
provided O |
|
by O |
|
β O |
|
addroider B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
β O |
|
as O |
|
an O |
|
ad-related O |
|
SDK O |
|
. O |
|
|
|
We O |
|
believe O |
|
the O |
|
developers O |
|
were O |
|
scammed O |
|
to O |
|
use O |
|
this O |
|
malicious O |
|
SDK O |
|
, O |
|
unaware O |
|
of O |
|
its O |
|
content O |
|
, O |
|
leading O |
|
to O |
|
the O |
|
fact O |
|
that O |
|
this O |
|
campaign O |
|
was O |
|
not O |
|
targeting O |
|
a O |
|
specific O |
|
county O |
|
or O |
|
developed O |
|
by O |
|
the O |
|
same O |
|
developer O |
|
. O |
|
|
|
The O |
|
malware O |
|
has O |
|
been O |
|
dubbed O |
|
β O |
|
SimBad B-Malware |
|
β O |
|
due O |
|
to O |
|
the O |
|
fact O |
|
that O |
|
a O |
|
large O |
|
portion O |
|
of O |
|
the O |
|
infected O |
|
applications O |
|
are O |
|
simulator O |
|
games O |
|
. O |
|
|
|
The O |
|
Infection O |
|
Chain O |
|
Once O |
|
the O |
|
user O |
|
downloads O |
|
and O |
|
installs O |
|
one O |
|
of O |
|
the O |
|
infected O |
|
applications O |
|
, O |
|
β O |
|
SimBad B-Malware |
|
β O |
|
registers O |
|
itself O |
|
to O |
|
the O |
|
β O |
|
BOOT_COMPLETE O |
|
β O |
|
and O |
|
β O |
|
USER_PRESENT O |
|
β O |
|
intents O |
|
, O |
|
which O |
|
lets O |
|
β O |
|
SimBad B-Malware |
|
β O |
|
to O |
|
perform O |
|
actions O |
|
after O |
|
the O |
|
device O |
|
has O |
|
finished O |
|
booting O |
|
and O |
|
while O |
|
the O |
|
user O |
|
is O |
|
using O |
|
his O |
|
device O |
|
respectively O |
|
. O |
|
|
|
After O |
|
installation O |
|
, O |
|
the O |
|
malware O |
|
connects O |
|
to O |
|
the O |
|
designated O |
|
Command O |
|
and O |
|
Control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
server O |
|
, O |
|
and O |
|
receives O |
|
a O |
|
command O |
|
to O |
|
perform O |
|
. O |
|
|
|
β O |
|
SimBad B-Malware |
|
β O |
|
comes O |
|
with O |
|
a O |
|
respected O |
|
list O |
|
of O |
|
capabilities O |
|
on O |
|
the O |
|
user O |
|
β O |
|
s O |
|
device O |
|
, O |
|
such O |
|
as O |
|
removing O |
|
the O |
|
icon O |
|
from O |
|
the O |
|
launcher O |
|
, O |
|
thus O |
|
making O |
|
it O |
|
harder O |
|
for O |
|
the O |
|
user O |
|
to O |
|
uninstall O |
|
, O |
|
start O |
|
to O |
|
display O |
|
background O |
|
ads O |
|
and O |
|
open O |
|
a O |
|
browser O |
|
with O |
|
a O |
|
given O |
|
URL O |
|
. O |
|
|
|
What O |
|
Does O |
|
SimBad B-Malware |
|
Do O |
|
? O |
|
|
|
β O |
|
SimBad B-Malware |
|
β O |
|
has O |
|
capabilities O |
|
that O |
|
can O |
|
be O |
|
divided O |
|
into O |
|
three O |
|
groups O |
|
β O |
|
Show O |
|
Ads O |
|
, O |
|
Phishing O |
|
, O |
|
and O |
|
Exposure O |
|
to O |
|
other O |
|
applications O |
|
. O |
|
|
|
With O |
|
the O |
|
capability O |
|
to O |
|
open O |
|
a O |
|
given O |
|
URL O |
|
in O |
|
a O |
|
browser O |
|
, O |
|
the O |
|
actor O |
|
behind O |
|
β O |
|
SimBad B-Malware |
|
β O |
|
can O |
|
generate O |
|
phishing O |
|
pages O |
|
for O |
|
multiple O |
|
platforms O |
|
and O |
|
open O |
|
them O |
|
in O |
|
a O |
|
browser O |
|
, O |
|
thus O |
|
performing O |
|
spear-phishing O |
|
attacks O |
|
on O |
|
the O |
|
user O |
|
. O |
|
|
|
With O |
|
the O |
|
capability O |
|
to O |
|
open O |
|
market O |
|
applications O |
|
, O |
|
such O |
|
as O |
|
Google B-System |
|
Play I-System |
|
and O |
|
9Apps B-System |
|
, O |
|
with O |
|
a O |
|
specific O |
|
keyword O |
|
search O |
|
or O |
|
even O |
|
a O |
|
single O |
|
application O |
|
β O |
|
s O |
|
page O |
|
, O |
|
the O |
|
actor O |
|
can O |
|
gain O |
|
exposure O |
|
for O |
|
other O |
|
threat O |
|
actors O |
|
and O |
|
increase O |
|
his O |
|
profits O |
|
. O |
|
|
|
The O |
|
actor O |
|
can O |
|
even O |
|
take O |
|
his O |
|
malicious O |
|
activities O |
|
to O |
|
the O |
|
next O |
|
level O |
|
by O |
|
installing O |
|
a O |
|
remote O |
|
application O |
|
from O |
|
a O |
|
designated O |
|
server O |
|
, O |
|
thus O |
|
allowing O |
|
him O |
|
to O |
|
install O |
|
new O |
|
malware O |
|
once O |
|
it O |
|
is O |
|
required O |
|
. O |
|
|
|
The O |
|
C O |
|
& O |
|
C O |
|
server O |
|
observed O |
|
in O |
|
this O |
|
campaign O |
|
is O |
|
β O |
|
www B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
addroider.com I-Indicator |
|
β O |
|
. O |
|
|
|
This O |
|
server O |
|
runs O |
|
an O |
|
instance O |
|
of O |
|
β O |
|
Parse O |
|
Server O |
|
β O |
|
( O |
|
source O |
|
on O |
|
GitHub B-Organization |
|
) O |
|
, O |
|
an O |
|
open O |
|
source O |
|
version O |
|
of O |
|
the O |
|
Parse O |
|
Backend O |
|
infrastructure O |
|
, O |
|
which O |
|
is O |
|
a O |
|
model O |
|
for O |
|
providing O |
|
web O |
|
app O |
|
and O |
|
mobile O |
|
app O |
|
developers O |
|
with O |
|
a O |
|
way O |
|
to O |
|
link O |
|
their O |
|
applications O |
|
to O |
|
backend O |
|
cloud O |
|
storage O |
|
and O |
|
APIs O |
|
exposed O |
|
by O |
|
back-end O |
|
applications O |
|
, O |
|
while O |
|
also O |
|
providing O |
|
features O |
|
such O |
|
as O |
|
user O |
|
management O |
|
, O |
|
push O |
|
notifications O |
|
and O |
|
more O |
|
. O |
|
|
|
The O |
|
domain O |
|
β O |
|
addroider B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
β O |
|
was O |
|
registered O |
|
via O |
|
GoDaddy B-Organization |
|
, O |
|
and O |
|
uses O |
|
privacy O |
|
protection O |
|
service O |
|
. O |
|
|
|
While O |
|
accessing O |
|
the O |
|
domain O |
|
from O |
|
a O |
|
browser O |
|
you O |
|
get O |
|
a O |
|
login O |
|
page O |
|
very O |
|
similar O |
|
to O |
|
other O |
|
malware O |
|
panels O |
|
. O |
|
|
|
The O |
|
β O |
|
Register O |
|
β O |
|
and O |
|
β O |
|
Sign O |
|
Up O |
|
β O |
|
links O |
|
are O |
|
broken O |
|
and O |
|
β O |
|
redirects O |
|
β O |
|
the O |
|
user O |
|
back O |
|
to O |
|
the O |
|
login O |
|
page O |
|
. O |
|
|
|
According O |
|
to O |
|
RiskIQ B-System |
|
β O |
|
s O |
|
PassiveTotal O |
|
, O |
|
the O |
|
domain O |
|
expired O |
|
7 O |
|
months O |
|
ago O |
|
. O |
|
|
|
As O |
|
a O |
|
result O |
|
, O |
|
it O |
|
may O |
|
be O |
|
that O |
|
are O |
|
looking O |
|
into O |
|
a O |
|
compromised O |
|
, O |
|
parked O |
|
domain O |
|
that O |
|
was O |
|
initially O |
|
used O |
|
legitimately O |
|
, O |
|
but O |
|
is O |
|
now O |
|
participating O |
|
in O |
|
malicious O |
|
activities O |
|
. O |
|
|
|
With O |
|
the O |
|
capabilities O |
|
of O |
|
showing O |
|
out-of-scope O |
|
ads O |
|
, O |
|
exposing O |
|
the O |
|
user O |
|
to O |
|
other O |
|
applications O |
|
, O |
|
and O |
|
opening O |
|
a O |
|
URL O |
|
in O |
|
a O |
|
browser O |
|
, O |
|
β O |
|
SimBad B-Malware |
|
β O |
|
acts O |
|
now O |
|
as O |
|
an O |
|
Adware O |
|
, O |
|
but O |
|
already O |
|
has O |
|
the O |
|
infrastructure O |
|
to O |
|
evolve O |
|
into O |
|
a O |
|
much O |
|
larger O |
|
threat O |
|
. O |
|
|