|
Why O |
|
Did O |
|
Chinese O |
|
Spyware O |
|
Linger O |
|
in O |
|
U.S O |
|
. O |
|
|
|
Phones O |
|
? O |
|
|
|
November O |
|
16 O |
|
, O |
|
2016 O |
|
In O |
|
what O |
|
's O |
|
being O |
|
chalked O |
|
up O |
|
as O |
|
an O |
|
apparent O |
|
mistake O |
|
, O |
|
more O |
|
than O |
|
120,000 O |
|
Android B-System |
|
phones O |
|
sold O |
|
in O |
|
the O |
|
U.S. O |
|
were O |
|
shipped O |
|
with O |
|
spying O |
|
code O |
|
that O |
|
sent O |
|
text O |
|
messages O |
|
, O |
|
call O |
|
logs O |
|
and O |
|
other O |
|
sensitive O |
|
data O |
|
to O |
|
a O |
|
server O |
|
in O |
|
Shanghai O |
|
. O |
|
|
|
The O |
|
New B-Organization |
|
York I-Organization |
|
Times I-Organization |
|
reported O |
|
on O |
|
Nov. O |
|
15 O |
|
that O |
|
Kryptowire B-Organization |
|
, O |
|
a O |
|
mobile O |
|
enterprise O |
|
security O |
|
company O |
|
, O |
|
discovered O |
|
the O |
|
code O |
|
on O |
|
a O |
|
lower-end O |
|
smartphone O |
|
made O |
|
by O |
|
BLU B-Organization |
|
Products O |
|
of O |
|
Doral O |
|
, O |
|
Fla O |
|
. O |
|
|
|
The O |
|
phones O |
|
are O |
|
sold O |
|
at O |
|
Best B-Organization |
|
Buy I-Organization |
|
and O |
|
Amazon.com B-Organization |
|
, O |
|
among O |
|
other O |
|
retail O |
|
outlets O |
|
. O |
|
|
|
Kryptowire B-Organization |
|
says O |
|
the O |
|
code O |
|
, O |
|
which O |
|
it O |
|
found O |
|
on O |
|
a O |
|
BLU B-Organization |
|
R1 O |
|
HD O |
|
devices O |
|
, O |
|
transmitted O |
|
fine-grained O |
|
location O |
|
information O |
|
and O |
|
allowed O |
|
for O |
|
the O |
|
remote O |
|
installation O |
|
of O |
|
other O |
|
apps O |
|
. O |
|
|
|
Text O |
|
message O |
|
and O |
|
call O |
|
logs O |
|
were O |
|
transmitted O |
|
every O |
|
72 O |
|
hours O |
|
to O |
|
the O |
|
Shanghai O |
|
server O |
|
, O |
|
and O |
|
once O |
|
a O |
|
day O |
|
for O |
|
other O |
|
personally O |
|
identifiable O |
|
data O |
|
, O |
|
the O |
|
company O |
|
says O |
|
. O |
|
|
|
It O |
|
turns O |
|
out O |
|
, O |
|
however O |
|
, O |
|
that O |
|
other O |
|
security O |
|
researchers O |
|
noticed O |
|
suspicious O |
|
and O |
|
faulty O |
|
code O |
|
on O |
|
BLU B-Organization |
|
devices O |
|
as O |
|
early O |
|
as O |
|
March O |
|
2015 O |
|
, O |
|
and O |
|
it O |
|
has O |
|
taken O |
|
nearly O |
|
that O |
|
long O |
|
to O |
|
remove O |
|
it O |
|
from O |
|
the O |
|
company O |
|
's O |
|
devices O |
|
. O |
|
|
|
The O |
|
finding O |
|
, O |
|
in O |
|
part O |
|
, O |
|
shows O |
|
the O |
|
risk O |
|
that O |
|
can O |
|
come O |
|
in O |
|
opting O |
|
for O |
|
less O |
|
expensive O |
|
smartphones O |
|
, O |
|
whose O |
|
manufacturers O |
|
may O |
|
not O |
|
diligently O |
|
fix O |
|
security B-Vulnerability |
|
vulnerabilities I-Vulnerability |
|
. O |
|
|
|
It O |
|
's O |
|
also O |
|
raising O |
|
eyebrows O |
|
because O |
|
of O |
|
the O |
|
connection O |
|
with O |
|
China O |
|
, O |
|
which O |
|
has O |
|
frequently O |
|
sparred O |
|
with O |
|
the O |
|
U.S. O |
|
over O |
|
cyber O |
|
espionage O |
|
. O |
|
|
|
BLU B-Organization |
|
Products O |
|
has O |
|
now O |
|
updated O |
|
its O |
|
phones O |
|
to O |
|
remove O |
|
the O |
|
spying O |
|
code O |
|
, O |
|
which O |
|
most O |
|
likely O |
|
would O |
|
have O |
|
never O |
|
been O |
|
detected O |
|
by O |
|
regular O |
|
users O |
|
. O |
|
|
|
The O |
|
code O |
|
never O |
|
informed O |
|
phone O |
|
users O |
|
that O |
|
it O |
|
was O |
|
collecting O |
|
that O |
|
data O |
|
, O |
|
a O |
|
behavior O |
|
uniformly O |
|
viewed O |
|
by O |
|
many O |
|
as O |
|
a O |
|
serious O |
|
security O |
|
concern O |
|
. O |
|
|
|
The O |
|
developer O |
|
of O |
|
the O |
|
code O |
|
, O |
|
Shanghai B-Organization |
|
Adups I-Organization |
|
Technology I-Organization |
|
Co. I-Organization |
|
, O |
|
has O |
|
apologized O |
|
, O |
|
contending O |
|
that O |
|
the O |
|
code O |
|
was O |
|
intended O |
|
for O |
|
another O |
|
one O |
|
of O |
|
its O |
|
clients O |
|
who O |
|
requested O |
|
better O |
|
blocking O |
|
of O |
|
junk O |
|
text O |
|
messages O |
|
and O |
|
marketing O |
|
calls O |
|
. O |
|
|
|
Vulnerabilities O |
|
Reported O |
|
BLU O |
|
Products O |
|
, O |
|
founded O |
|
in O |
|
2009 O |
|
, O |
|
makes O |
|
lower-end O |
|
Android-powered B-System |
|
smartphones O |
|
that O |
|
sell O |
|
for O |
|
as O |
|
little O |
|
as O |
|
$ O |
|
50 O |
|
on O |
|
Amazon B-Organization |
|
. O |
|
|
|
Like O |
|
many O |
|
original O |
|
equipment O |
|
manufacturers O |
|
, O |
|
it O |
|
uses O |
|
software O |
|
components O |
|
from O |
|
other O |
|
developers O |
|
. O |
|
|
|
The O |
|
company O |
|
uses O |
|
a O |
|
type O |
|
of O |
|
software O |
|
from O |
|
Adups B-Organization |
|
that O |
|
's O |
|
nicknamed O |
|
FOTA B-System |
|
, O |
|
short O |
|
for O |
|
firmware O |
|
over-the-air O |
|
. O |
|
|
|
The O |
|
software O |
|
manages O |
|
the O |
|
delivery O |
|
of O |
|
firmware O |
|
updates O |
|
over-the-air O |
|
, O |
|
the O |
|
term O |
|
used O |
|
for O |
|
transmission O |
|
via O |
|
a O |
|
mobile O |
|
network O |
|
. O |
|
|
|
Firmware O |
|
is O |
|
low-level O |
|
code O |
|
deep O |
|
in O |
|
an O |
|
operating O |
|
system O |
|
that O |
|
often O |
|
has O |
|
high O |
|
access O |
|
privileges O |
|
, O |
|
so O |
|
it O |
|
's O |
|
critical O |
|
that O |
|
it O |
|
's O |
|
verified O |
|
and O |
|
contains O |
|
no O |
|
software O |
|
vulnerabilities O |
|
. O |
|
|
|
Long O |
|
before O |
|
Kryptowire B-Organization |
|
's O |
|
announcement O |
|
, O |
|
Tim O |
|
Strazzere O |
|
, O |
|
a O |
|
mobile O |
|
security O |
|
researcher O |
|
with O |
|
RedNaga B-Organization |
|
Security I-Organization |
|
, O |
|
contacted O |
|
BLU O |
|
Products O |
|
in O |
|
March O |
|
2015 O |
|
after O |
|
he O |
|
found O |
|
two O |
|
vulnerabilities O |
|
that O |
|
could O |
|
be O |
|
traced O |
|
to O |
|
Adup B-Organization |
|
's O |
|
code O |
|
. O |
|
|
|
Those O |
|
vulnerabilities O |
|
could O |
|
have O |
|
enabled O |
|
someone O |
|
to O |
|
gain O |
|
broad O |
|
access O |
|
to O |
|
an O |
|
Android B-System |
|
device O |
|
. O |
|
|
|
Strazzere O |
|
's O |
|
colleague O |
|
, O |
|
Jon O |
|
Sawyer O |
|
, O |
|
suggested O |
|
on O |
|
Twitter B-Organization |
|
that O |
|
the O |
|
vulnerabilities O |
|
might O |
|
have O |
|
not O |
|
been O |
|
there O |
|
by O |
|
mistake O |
|
, O |
|
but O |
|
rather O |
|
included O |
|
as O |
|
intentionally O |
|
coded O |
|
backdoors O |
|
. O |
|
|
|
He O |
|
posted O |
|
a O |
|
tweet O |
|
to O |
|
The O |
|
New B-Organization |
|
York I-Organization |
|
Times I-Organization |
|
report O |
|
, O |
|
sarcastically O |
|
writing O |
|
, O |
|
" O |
|
If O |
|
only O |
|
two O |
|
people O |
|
had O |
|
called O |
|
this O |
|
company O |
|
out O |
|
for O |
|
their O |
|
backdoors O |
|
several O |
|
times O |
|
over O |
|
the O |
|
last O |
|
few O |
|
years O |
|
. O |
|
|
|
'' O |
|
Strazzere O |
|
's O |
|
experience O |
|
in O |
|
trying O |
|
to O |
|
contact O |
|
both O |
|
vendors O |
|
last O |
|
year O |
|
is O |
|
typical O |
|
of O |
|
the O |
|
frustrations O |
|
frequently O |
|
faced O |
|
by O |
|
security O |
|
researchers O |
|
. O |
|
|
|
" O |
|
I O |
|
tried O |
|
reaching O |
|
out O |
|
to O |
|
Adups B-Organization |
|
and O |
|
never O |
|
heard O |
|
back O |
|
, O |
|
'' O |
|
Strazzere O |
|
tells O |
|
Information B-Organization |
|
Security I-Organization |
|
Media I-Organization |
|
Group I-Organization |
|
. O |
|
|
|
" O |
|
BLU B-Organization |
|
said O |
|
they O |
|
had O |
|
no O |
|
security O |
|
department O |
|
when O |
|
I O |
|
emailed O |
|
them O |
|
. O |
|
|
|
'' O |
|
Strazzere O |
|
says O |
|
he O |
|
also O |
|
failed O |
|
to O |
|
reach O |
|
MediaTek B-Organization |
|
, O |
|
a O |
|
Taiwanese O |
|
fabless O |
|
semiconductor O |
|
manufacturer O |
|
whose O |
|
chipsets O |
|
that O |
|
powered O |
|
BLU B-Organization |
|
phones O |
|
also O |
|
contained O |
|
Adups B-Organization |
|
software O |
|
. O |
|
|
|
To O |
|
their O |
|
credit O |
|
, O |
|
both O |
|
Google B-Organization |
|
and O |
|
Amazon B-Organization |
|
appear O |
|
to O |
|
have O |
|
put O |
|
pressure O |
|
on O |
|
device O |
|
manufacturers O |
|
to O |
|
fix O |
|
their O |
|
devices O |
|
when O |
|
flaws O |
|
are O |
|
found O |
|
, O |
|
Strazzere O |
|
says O |
|
. O |
|
|
|
For O |
|
Google B-Organization |
|
, O |
|
Android O |
|
security O |
|
issues O |
|
- O |
|
even O |
|
if O |
|
not O |
|
in O |
|
the O |
|
core O |
|
operating O |
|
code O |
|
- O |
|
are O |
|
a O |
|
reputation O |
|
threat O |
|
, O |
|
and O |
|
for O |
|
Amazon B-Organization |
|
, O |
|
a O |
|
product O |
|
quality O |
|
issue O |
|
. O |
|
|
|
But O |
|
devices O |
|
sold O |
|
outside O |
|
of O |
|
Amazon B-Organization |
|
" O |
|
might O |
|
not O |
|
have O |
|
ever O |
|
seen O |
|
fixes O |
|
, O |
|
'' O |
|
he O |
|
says O |
|
. O |
|
|
|
Officials O |
|
at O |
|
BLU B-Organization |
|
could O |
|
n't O |
|
be O |
|
immediately O |
|
reached O |
|
for O |
|
comment O |
|
. O |
|
|
|
Attitude O |
|
Change O |
|
The O |
|
disinterest O |
|
in O |
|
the O |
|
issues O |
|
appears O |
|
to O |
|
have O |
|
changed O |
|
with O |
|
The O |
|
New B-Organization |
|
York I-Organization |
|
Times I-Organization |
|
report O |
|
, O |
|
which O |
|
lit O |
|
a O |
|
fire O |
|
underneath O |
|
Adups B-Organization |
|
and O |
|
BLU B-Organization |
|
. O |
|
|
|
Adups B-Organization |
|
addressed O |
|
the O |
|
issue O |
|
in O |
|
a O |
|
Nov. O |
|
16 O |
|
news O |
|
release O |
|
, O |
|
writing O |
|
that O |
|
some O |
|
products O |
|
made O |
|
by O |
|
BLU B-Organization |
|
were O |
|
updated O |
|
in O |
|
June O |
|
with O |
|
a O |
|
version O |
|
of O |
|
its O |
|
FOTA B-System |
|
that O |
|
had O |
|
actually O |
|
been O |
|
intended O |
|
for O |
|
other O |
|
clients O |
|
who O |
|
had O |
|
requested O |
|
an O |
|
ability O |
|
to O |
|
stop O |
|
text O |
|
spam O |
|
. O |
|
|
|
That O |
|
version O |
|
flags O |
|
messages O |
|
" O |
|
containing O |
|
certain O |
|
language O |
|
associated O |
|
with O |
|
junk O |
|
texts O |
|
and O |
|
flags O |
|
numbers O |
|
associated O |
|
with O |
|
junk O |
|
calls O |
|
and O |
|
not O |
|
in O |
|
a O |
|
user O |
|
's O |
|
contacts O |
|
, O |
|
'' O |
|
the O |
|
company O |
|
says O |
|
. O |
|
|
|
Manufacturers O |
|
should O |
|
be O |
|
keeping O |
|
close O |
|
tabs O |
|
on O |
|
what O |
|
software O |
|
ends O |
|
up O |
|
on O |
|
their O |
|
devices O |
|
. O |
|
|
|
But O |
|
it O |
|
would O |
|
appear O |
|
that O |
|
BLU B-Organization |
|
only O |
|
took O |
|
action O |
|
after O |
|
Kryptowire B-Organization |
|
notified O |
|
it O |
|
along O |
|
with O |
|
Google B-Organization |
|
, O |
|
Adups B-Organization |
|
and O |
|
Amazon B-Organization |
|
. O |
|
|
|
" O |
|
When O |
|
BLU B-Organization |
|
raised O |
|
objections O |
|
, O |
|
Adups B-Organization |
|
took O |
|
immediate O |
|
measures O |
|
to O |
|
disable O |
|
that O |
|
functionality O |
|
on O |
|
BLU B-Organization |
|
phones O |
|
, O |
|
'' O |
|
Adups I-Organization |
|
says O |
|
. O |
|
|
|
The O |
|
greater O |
|
worry O |
|
is O |
|
that O |
|
these O |
|
situations O |
|
may O |
|
sometimes O |
|
not O |
|
be O |
|
simple O |
|
mistakes O |
|
. O |
|
|
|
Security O |
|
experts O |
|
have O |
|
long O |
|
warned O |
|
of O |
|
the O |
|
ability O |
|
of O |
|
advanced O |
|
adversaries O |
|
to O |
|
subvert O |
|
hardware O |
|
and O |
|
software O |
|
supply O |
|
chains O |
|
. O |
|
|
|
Also O |
|
, O |
|
the O |
|
software B-Vulnerability |
|
vulnerabilities I-Vulnerability |
|
pointed O |
|
out O |
|
in O |
|
the O |
|
FOTA B-System |
|
software O |
|
by O |
|
Strazzere O |
|
in O |
|
2015 O |
|
could O |
|
have O |
|
been O |
|
taken O |
|
advantage O |
|
of O |
|
by O |
|
cybercriminals O |
|
looking O |
|
to O |
|
steal O |
|
bank O |
|
account O |
|
details O |
|
or O |
|
execute O |
|
other O |
|
frauds O |
|
. O |
|
|
|
Strazzere O |
|
advises O |
|
that O |
|
consumers O |
|
should O |
|
look O |
|
at O |
|
the O |
|
pedigree O |
|
of O |
|
mobile O |
|
manufacturers O |
|
and O |
|
take O |
|
a O |
|
close O |
|
look O |
|
at O |
|
their O |
|
security O |
|
track O |
|
record O |
|
before O |
|
making O |
|
a O |
|
decision O |
|
on O |
|
what O |
|
device O |
|
to O |
|
buy O |
|
. O |
|
|
|
" O |
|
In O |
|
the O |
|
end O |
|
, O |
|
the O |
|
consumer O |
|
needs O |
|
to O |
|
vote O |
|
with O |
|
their O |
|
wallet O |
|
, O |
|
'' O |
|
he O |
|
says O |
|
. O |
|
|
|
Skygofree B-Malware |
|
: O |
|
Following O |
|
in O |
|
the O |
|
footsteps O |
|
of O |
|
HackingTeam B-Organization |
|
16 O |
|
JAN O |
|
2018 O |
|
At O |
|
the O |
|
beginning O |
|
of O |
|
October O |
|
2017 O |
|
, O |
|
we O |
|
discovered O |
|
new O |
|
Android B-System |
|
spyware O |
|
with O |
|
several O |
|
features O |
|
previously O |
|
unseen O |
|
in O |
|
the O |
|
wild O |
|
. O |
|
|
|
In O |
|
the O |
|
course O |
|
of O |
|
further O |
|
research O |
|
, O |
|
we O |
|
found O |
|
a O |
|
number O |
|
of O |
|
related O |
|
samples O |
|
that O |
|
point O |
|
to O |
|
a O |
|
long-term O |
|
development O |
|
process O |
|
. O |
|
|
|
We O |
|
believe O |
|
the O |
|
initial O |
|
versions O |
|
of O |
|
this O |
|
malware O |
|
were O |
|
created O |
|
at O |
|
least O |
|
three O |
|
years O |
|
ago O |
|
– O |
|
at O |
|
the O |
|
end O |
|
of O |
|
2014 O |
|
. O |
|
|
|
Since O |
|
then O |
|
, O |
|
the O |
|
implant O |
|
’ O |
|
s O |
|
functionality O |
|
has O |
|
been O |
|
improving O |
|
and O |
|
remarkable O |
|
new O |
|
features O |
|
implemented O |
|
, O |
|
such O |
|
as O |
|
the O |
|
ability O |
|
to O |
|
record O |
|
audio O |
|
surroundings O |
|
via O |
|
the O |
|
microphone O |
|
when O |
|
an O |
|
infected O |
|
device O |
|
is O |
|
in O |
|
a O |
|
specified O |
|
location O |
|
; O |
|
the O |
|
stealing O |
|
of O |
|
WhatsApp B-System |
|
messages O |
|
via O |
|
Accessibility O |
|
Services O |
|
; O |
|
and O |
|
the O |
|
ability O |
|
to O |
|
connect O |
|
an O |
|
infected O |
|
device O |
|
to O |
|
Wi-Fi O |
|
networks O |
|
controlled O |
|
by O |
|
cybercriminals O |
|
. O |
|
|
|
We O |
|
observed O |
|
many O |
|
web O |
|
landing O |
|
pages O |
|
that O |
|
mimic O |
|
the O |
|
sites O |
|
of O |
|
mobile O |
|
operators O |
|
and O |
|
which O |
|
are O |
|
used O |
|
to O |
|
spread O |
|
the O |
|
Android B-System |
|
implants O |
|
. O |
|
|
|
These O |
|
domains O |
|
have O |
|
been O |
|
registered O |
|
by O |
|
the O |
|
attackers O |
|
since O |
|
2015 O |
|
. O |
|
|
|
According O |
|
to O |
|
our O |
|
telemetry O |
|
, O |
|
that O |
|
was O |
|
the O |
|
year O |
|
the O |
|
distribution O |
|
campaign O |
|
was O |
|
at O |
|
its O |
|
most O |
|
active O |
|
. O |
|
|
|
The O |
|
activities O |
|
continue O |
|
: O |
|
the O |
|
most O |
|
recently O |
|
observed O |
|
domain O |
|
was O |
|
registered O |
|
on O |
|
October O |
|
31 O |
|
, O |
|
2017 O |
|
. O |
|
|
|
Based O |
|
on O |
|
our O |
|
KSN O |
|
statistics O |
|
, O |
|
there O |
|
are O |
|
several O |
|
infected O |
|
individuals O |
|
, O |
|
exclusively O |
|
in O |
|
Italy O |
|
. O |
|
|
|
Moreover O |
|
, O |
|
as O |
|
we O |
|
dived O |
|
deeper O |
|
into O |
|
the O |
|
investigation O |
|
, O |
|
we O |
|
discovered O |
|
several O |
|
spyware O |
|
tools O |
|
for O |
|
Windows B-System |
|
that O |
|
form O |
|
an O |
|
implant O |
|
for O |
|
exfiltrating O |
|
sensitive O |
|
data O |
|
on O |
|
a O |
|
targeted O |
|
machine O |
|
. O |
|
|
|
The O |
|
version O |
|
we O |
|
found O |
|
was O |
|
built O |
|
at O |
|
the O |
|
beginning O |
|
of O |
|
2017 O |
|
, O |
|
and O |
|
at O |
|
the O |
|
moment O |
|
we O |
|
are O |
|
not O |
|
sure O |
|
whether O |
|
this O |
|
implant O |
|
has O |
|
been O |
|
used O |
|
in O |
|
the O |
|
wild O |
|
. O |
|
|
|
We O |
|
named O |
|
the O |
|
malware O |
|
Skygofree B-Malware |
|
, O |
|
because O |
|
we O |
|
found O |
|
the O |
|
word O |
|
in O |
|
one O |
|
of O |
|
the O |
|
domains O |
|
* O |
|
. O |
|
|
|
Malware O |
|
Features O |
|
Android B-System |
|
According O |
|
to O |
|
the O |
|
observed O |
|
samples O |
|
and O |
|
their O |
|
signatures O |
|
, O |
|
early O |
|
versions O |
|
of O |
|
this O |
|
Android B-System |
|
malware O |
|
were O |
|
developed O |
|
by O |
|
the O |
|
end O |
|
of O |
|
2014 O |
|
and O |
|
the O |
|
campaign O |
|
has O |
|
remained O |
|
active O |
|
ever O |
|
since O |
|
. O |
|
|
|
The O |
|
code O |
|
and O |
|
functionality O |
|
have O |
|
changed O |
|
numerous O |
|
times O |
|
; O |
|
from O |
|
simple O |
|
unobfuscated O |
|
malware O |
|
at O |
|
the O |
|
beginning O |
|
to O |
|
sophisticated O |
|
multi-stage O |
|
spyware O |
|
that O |
|
gives O |
|
attackers O |
|
full O |
|
remote O |
|
control O |
|
of O |
|
the O |
|
infected O |
|
device O |
|
. O |
|
|
|
We O |
|
have O |
|
examined O |
|
all O |
|
the O |
|
detected O |
|
versions O |
|
, O |
|
including O |
|
the O |
|
latest O |
|
one O |
|
that O |
|
is O |
|
signed O |
|
by O |
|
a O |
|
certificate O |
|
valid O |
|
from O |
|
September O |
|
14 O |
|
, O |
|
2017 O |
|
. O |
|
|
|
The O |
|
implant O |
|
provides O |
|
the O |
|
ability O |
|
to O |
|
grab O |
|
a O |
|
lot O |
|
of O |
|
exfiltrated O |
|
data O |
|
, O |
|
like O |
|
call O |
|
records O |
|
, O |
|
text O |
|
messages O |
|
, O |
|
geolocation O |
|
, O |
|
surrounding O |
|
audio O |
|
, O |
|
calendar O |
|
events O |
|
, O |
|
and O |
|
other O |
|
memory O |
|
information O |
|
stored O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
After O |
|
manual O |
|
launch O |
|
, O |
|
it O |
|
shows O |
|
a O |
|
fake O |
|
welcome O |
|
notification O |
|
to O |
|
the O |
|
user O |
|
: O |
|
Dear O |
|
Customer O |
|
, O |
|
we O |
|
’ O |
|
re O |
|
updating O |
|
your O |
|
configuration O |
|
and O |
|
it O |
|
will O |
|
be O |
|
ready O |
|
as O |
|
soon O |
|
as O |
|
possible O |
|
. O |
|
|
|
At O |
|
the O |
|
same O |
|
time O |
|
, O |
|
it O |
|
hides O |
|
an O |
|
icon O |
|
and O |
|
starts O |
|
background O |
|
services O |
|
to O |
|
hide O |
|
further O |
|
actions O |
|
from O |
|
the O |
|
user O |
|
. O |
|
|
|
Service O |
|
Name O |
|
Purpose O |
|
AndroidAlarmManager O |
|
Uploading O |
|
last O |
|
recorded O |
|
.amr O |
|
audio O |
|
AndroidSystemService O |
|
Audio O |
|
recording O |
|
AndroidSystemQueues O |
|
Location O |
|
tracking O |
|
with O |
|
movement O |
|
detection O |
|
ClearSystems O |
|
GSM B-System |
|
tracking O |
|
( O |
|
CID O |
|
, O |
|
LAC O |
|
, O |
|
PSC O |
|
) O |
|
ClipService O |
|
Clipboard O |
|
stealing O |
|
AndroidFileManager O |
|
Uploading O |
|
all O |
|
exfiltrated O |
|
data O |
|
AndroidPush O |
|
XMPP O |
|
С O |
|
& O |
|
C O |
|
protocol O |
|
( O |
|
url.plus:5223 B-Indicator |
|
) O |
|
RegistrationService O |
|
Registration O |
|
on O |
|
C O |
|
& O |
|
C O |
|
via O |
|
HTTP O |
|
( O |
|
url.plus/app/pro/ B-Indicator |
|
) O |
|
Interestingly O |
|
, O |
|
a O |
|
self-protection O |
|
feature O |
|
was O |
|
implemented O |
|
in O |
|
almost O |
|
every O |
|
service O |
|
|
|
. O |
|
|
|
Since O |
|
in O |
|
Android B-System |
|
8.0 I-System |
|
( O |
|
SDK O |
|
API O |
|
26 O |
|
) O |
|
the O |
|
system O |
|
is O |
|
able O |
|
to O |
|
kill O |
|
idle O |
|
services O |
|
, O |
|
this O |
|
code O |
|
raises O |
|
a O |
|
fake O |
|
update O |
|
notification O |
|
to O |
|
prevent O |
|
it O |
|
: O |
|
Cybercriminals O |
|
have O |
|
the O |
|
ability O |
|
to O |
|
control O |
|
the O |
|
implant O |
|
via O |
|
HTTP O |
|
, O |
|
XMPP O |
|
, O |
|
binary O |
|
SMS O |
|
and O |
|
FirebaseCloudMessaging O |
|
( O |
|
or O |
|
GoogleCloudMessaging O |
|
in O |
|
older O |
|
versions O |
|
) O |
|
protocols O |
|
. O |
|
|
|
Such O |
|
a O |
|
diversity O |
|
of O |
|
protocols O |
|
gives O |
|
the O |
|
attackers O |
|
more O |
|
flexible O |
|
control O |
|
. O |
|
|
|
In O |
|
the O |
|
latest O |
|
implant O |
|
versions O |
|
there O |
|
are O |
|
48 O |
|
different O |
|
commands O |
|
. O |
|
|
|
You O |
|
can O |
|
find O |
|
a O |
|
full O |
|
list O |
|
with O |
|
short O |
|
descriptions O |
|
in O |
|
the O |
|
Appendix O |
|
. O |
|
|
|
Here O |
|
are O |
|
some O |
|
of O |
|
the O |
|
most O |
|
notable O |
|
: O |
|
‘ O |
|
geofence O |
|
’ O |
|
– O |
|
this O |
|
command O |
|
adds O |
|
a O |
|
specified O |
|
location O |
|
to O |
|
the O |
|
implant O |
|
’ O |
|
s O |
|
internal O |
|
database O |
|
and O |
|
when O |
|
it O |
|
matches O |
|
a O |
|
device O |
|
’ O |
|
s O |
|
current O |
|
location O |
|
the O |
|
malware O |
|
triggers O |
|
and O |
|
begins O |
|
to O |
|
record O |
|
surrounding O |
|
audio O |
|
. O |
|
|
|
” O |
|
social O |
|
” O |
|
– O |
|
this O |
|
command O |
|
that O |
|
starts O |
|
the O |
|
‘ O |
|
AndroidMDMSupport O |
|
’ O |
|
service O |
|
– O |
|
this O |
|
allows O |
|
the O |
|
files O |
|
of O |
|
any O |
|
other O |
|
installed O |
|
application O |
|
to O |
|
be O |
|
grabbed O |
|
. O |
|
|
|
The O |
|
service O |
|
name O |
|
makes O |
|
it O |
|
clear O |
|
that O |
|
by O |
|
applications O |
|
the O |
|
attackers O |
|
mean O |
|
MDM O |
|
solutions O |
|
that O |
|
are O |
|
business-specific O |
|
tools O |
|
. O |
|
|
|
The O |
|
operator O |
|
can O |
|
specify O |
|
a O |
|
path O |
|
with O |
|
the O |
|
database O |
|
of O |
|
any O |
|
targeted O |
|
application O |
|
and O |
|
server-side O |
|
PHP O |
|
script O |
|
name O |
|
for O |
|
uploading O |
|
. O |
|
|
|
Several O |
|
hardcoded O |
|
applications O |
|
targeted O |
|
by O |
|
the O |
|
MDM-grabbing O |
|
command O |
|
‘ O |
|
wifi O |
|
’ O |
|
– O |
|
this O |
|
command O |
|
creates O |
|
a O |
|
new O |
|
Wi-Fi O |
|
connection O |
|
with O |
|
specified O |
|
configurations O |
|
from O |
|
the O |
|
command O |
|
and O |
|
enable O |
|
Wi-Fi O |
|
if O |
|
it O |
|
is O |
|
disabled O |
|
. O |
|
|
|
So O |
|
, O |
|
when O |
|
a O |
|
device O |
|
connects O |
|
to O |
|
the O |
|
established O |
|
network O |
|
, O |
|
this O |
|
process O |
|
will O |
|
be O |
|
in O |
|
silent O |
|
and O |
|
automatic O |
|
mode O |
|
. O |
|
|
|
This O |
|
command O |
|
is O |
|
used O |
|
to O |
|
connect O |
|
the O |
|
victim O |
|
to O |
|
a O |
|
Wi-Fi O |
|
network O |
|
controlled O |
|
by O |
|
the O |
|
cybercriminals O |
|
to O |
|
perform O |
|
traffic O |
|
sniffing O |
|
and O |
|
man-in-the-middle O |
|
( O |
|
MitM O |
|
) O |
|
attacks O |
|
. O |
|
|
|
addWifiConfig O |
|
method O |
|
code O |
|
fragments O |
|
‘ O |
|
camera O |
|
’ O |
|
– O |
|
this O |
|
command O |
|
records O |
|
a O |
|
video/capture O |
|
a O |
|
photo O |
|
using O |
|
the O |
|
front-facing O |
|
camera O |
|
when O |
|
someone O |
|
next O |
|
unlocks O |
|
the O |
|
device O |
|
. O |
|
|
|
Some O |
|
versions O |
|
of O |
|
the O |
|
Skygofree B-Malware |
|
feature O |
|
the O |
|
self-protection O |
|
ability O |
|
exclusively O |
|
for O |
|
Huawei B-Organization |
|
devices O |
|
. O |
|
|
|
There O |
|
is O |
|
a O |
|
‘ O |
|
protected O |
|
apps O |
|
’ O |
|
list O |
|
in O |
|
this O |
|
brand O |
|
’ O |
|
s O |
|
smartphones O |
|
, O |
|
related O |
|
to O |
|
a O |
|
battery-saving O |
|
concept O |
|
. O |
|
|
|
Apps O |
|
not O |
|
selected O |
|
as O |
|
protected O |
|
apps O |
|
stop O |
|
working O |
|
once O |
|
the O |
|
screen O |
|
is O |
|
off O |
|
and O |
|
await O |
|
re-activation O |
|
, O |
|
so O |
|
the O |
|
implant O |
|
is O |
|
able O |
|
to O |
|
determine O |
|
that O |
|
it O |
|
is O |
|
running O |
|
on O |
|
a O |
|
Huawei B-Organization |
|
device O |
|
and O |
|
add O |
|
itself O |
|
to O |
|
this O |
|
list O |
|
. O |
|
|
|
Due O |
|
to O |
|
this O |
|
feature O |
|
, O |
|
it O |
|
is O |
|
clear O |
|
that O |
|
the O |
|
developers O |
|
paid O |
|
special O |
|
attention O |
|
to O |
|
the O |
|
work O |
|
of O |
|
the O |
|
implant O |
|
on O |
|
Huawei B-Organization |
|
devices O |
|
. O |
|
|
|
Also O |
|
, O |
|
we O |
|
found O |
|
a O |
|
debug O |
|
version O |
|
of O |
|
the O |
|
implant O |
|
( O |
|
70a937b2504b3ad6c623581424c7e53d B-Indicator |
|
) O |
|
that O |
|
contains O |
|
interesting O |
|
constants O |
|
, O |
|
including O |
|
the O |
|
version O |
|
of O |
|
the O |
|
spyware O |
|
. O |
|
|
|
Debug O |
|
BuildConfig O |
|
with O |
|
the O |
|
version O |
|
After O |
|
a O |
|
deep O |
|
analysis O |
|
of O |
|
all O |
|
discovered O |
|
versions O |
|
of O |
|
Skygofree B-Malware |
|
, O |
|
we O |
|
made O |
|
an O |
|
approximate O |
|
timeline O |
|
of O |
|
the O |
|
implant O |
|
’ O |
|
s O |
|
evolution O |
|
. O |
|
|
|
Mobile O |
|
implant O |
|
evolution O |
|
timeline O |
|
However O |
|
, O |
|
some O |
|
facts O |
|
indicate O |
|
that O |
|
the O |
|
APK O |
|
samples O |
|
from O |
|
stage O |
|
two O |
|
can O |
|
also O |
|
be O |
|
used O |
|
separately O |
|
as O |
|
the O |
|
first O |
|
step O |
|
of O |
|
the O |
|
infection O |
|
. O |
|
|
|
Below O |
|
is O |
|
a O |
|
list O |
|
of O |
|
the O |
|
payloads O |
|
used O |
|
by O |
|
the O |
|
Skygofree B-Malware |
|
implant O |
|
in O |
|
the O |
|
second O |
|
and O |
|
third O |
|
stages O |
|
. O |
|
|
|
Reverse O |
|
shell O |
|
payload O |
|
The O |
|
reverse O |
|
shell O |
|
module O |
|
is O |
|
an O |
|
external O |
|
ELF O |
|
file O |
|
compiled O |
|
by O |
|
the O |
|
attackers O |
|
to O |
|
run O |
|
on O |
|
Android B-System |
|
. O |
|
|
|
The O |
|
choice O |
|
of O |
|
a O |
|
particular O |
|
payload O |
|
is O |
|
determined O |
|
by O |
|
the O |
|
implant O |
|
’ O |
|
s O |
|
version O |
|
, O |
|
and O |
|
it O |
|
can O |
|
be O |
|
downloaded O |
|
from O |
|
the O |
|
command O |
|
and O |
|
control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
server O |
|
soon O |
|
after O |
|
the O |
|
implant O |
|
starts O |
|
, O |
|
or O |
|
after O |
|
a O |
|
specific O |
|
command O |
|
. O |
|
|
|
In O |
|
the O |
|
most O |
|
recent O |
|
case O |
|
, O |
|
the O |
|
choice O |
|
of O |
|
the O |
|
payload O |
|
zip O |
|
file O |
|
depends O |
|
on O |
|
the O |
|
device O |
|
process O |
|
architecture O |
|
. O |
|
|
|
For O |
|
now O |
|
, O |
|
we O |
|
observe O |
|
only O |
|
one O |
|
payload O |
|
version O |
|
for O |
|
following O |
|
the O |
|
ARM B-System |
|
CPUs O |
|
: O |
|
arm64-v8a B-System |
|
, O |
|
armeabi B-System |
|
, O |
|
armeabi-v7a B-System |
|
. O |
|
|
|
Note O |
|
that O |
|
in O |
|
almost O |
|
all O |
|
cases O |
|
, O |
|
this O |
|
payload O |
|
file O |
|
, O |
|
contained O |
|
in O |
|
zip O |
|
archives O |
|
, O |
|
is O |
|
named O |
|
‘ O |
|
setting B-Indicator |
|
’ O |
|
or O |
|
‘ O |
|
setting.o B-Indicator |
|
’ O |
|
. O |
|
|
|
The O |
|
main O |
|
purpose O |
|
of O |
|
this O |
|
module O |
|
is O |
|
providing O |
|
reverse O |
|
shell O |
|
features O |
|
on O |
|
the O |
|
device O |
|
by O |
|
connecting O |
|
with O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
’ O |
|
s O |
|
socket O |
|
. O |
|
|
|
Reverse O |
|
shell O |
|
payload O |
|
The O |
|
payload O |
|
is O |
|
started O |
|
by O |
|
the O |
|
main O |
|
module O |
|
with O |
|
a O |
|
specified O |
|
host O |
|
and O |
|
port O |
|
as O |
|
a O |
|
parameter O |
|
that O |
|
is O |
|
hardcoded O |
|
to O |
|
‘ O |
|
54.67.109.199 B-Indicator |
|
’ O |
|
and O |
|
‘ O |
|
30010 B-Indicator |
|
’ O |
|
in O |
|
some O |
|
versions O |
|
: O |
|
Alternatively O |
|
, O |
|
they O |
|
could O |
|
be O |
|
hardcoded O |
|
directly O |
|
into O |
|
the O |
|
payload O |
|
code O |
|
: O |
|
We O |
|
also O |
|
observed O |
|
variants O |
|
that O |
|
were O |
|
equipped O |
|
with O |
|
similar O |
|
reverse O |
|
shell O |
|
payloads O |
|
directly O |
|
in O |
|
the O |
|
main O |
|
APK O |
|
/lib/ O |
|
path O |
|
. O |
|
|
|
Equipped O |
|
reverse O |
|
shell O |
|
payload O |
|
with O |
|
specific O |
|
string O |
|
After O |
|
an O |
|
in-depth O |
|
look O |
|
, O |
|
we O |
|
found O |
|
that O |
|
some O |
|
versions O |
|
of O |
|
the O |
|
reverse O |
|
shell O |
|
payload O |
|
code O |
|
share O |
|
similarities O |
|
with O |
|
PRISM B-Malware |
|
– O |
|
a O |
|
stealth O |
|
reverse O |
|
shell O |
|
backdoor O |
|
that O |
|
is O |
|
available O |
|
on O |
|
Github B-Organization |
|
. O |
|
|
|
Reverse O |
|
shell O |
|
payload O |
|
from O |
|
update_dev.zip B-Indicator |
|
Exploit O |
|
payload O |
|
At O |
|
the O |
|
same O |
|
time O |
|
, O |
|
we O |
|
found O |
|
an O |
|
important O |
|
payload O |
|
binary O |
|
that O |
|
is O |
|
trying O |
|
to O |
|
exploit O |
|
several O |
|
known O |
|
vulnerabilities O |
|
and O |
|
escalate O |
|
privileges O |
|
. O |
|
|
|
According O |
|
to O |
|
several O |
|
timestamps O |
|
, O |
|
this O |
|
payload O |
|
is O |
|
used O |
|
by O |
|
implant O |
|
versions O |
|
created O |
|
since O |
|
2016 O |
|
. O |
|
|
|
It O |
|
can O |
|
also O |
|
be O |
|
downloaded O |
|
by O |
|
a O |
|
specific O |
|
command O |
|
. O |
|
|
|
The O |
|
exploit O |
|
payload O |
|
contains O |
|
following O |
|
file O |
|
components O |
|
: O |
|
Component O |
|
name O |
|
Description O |
|
run_root_shell/arrs_put_user.o/arrs_put_user/poc B-Indicator |
|
Exploit O |
|
ELF O |
|
db O |
|
Sqlite3 O |
|
tool O |
|
ELF O |
|
device.db B-Indicator |
|
Sqlite3 O |
|
database O |
|
with O |
|
supported O |
|
devices O |
|
and O |
|
their O |
|
constants O |
|
needed O |
|
for O |
|
privilege O |
|
escalation O |
|
‘ O |
|
device.db B-Indicator |
|
’ O |
|
is O |
|
a O |
|
database O |
|
used O |
|
by O |
|
the O |
|
exploit O |
|
. O |
|
|
|
It O |
|
contains O |
|
two O |
|
tables O |
|
– O |
|
‘ O |
|
supported_devices O |
|
’ O |
|
and O |
|
‘ O |
|
device_address O |
|
’ O |
|
. O |
|
|
|
The O |
|
first O |
|
table O |
|
contains O |
|
205 O |
|
devices O |
|
with O |
|
some O |
|
Linux B-System |
|
properties O |
|
; O |
|
the O |
|
second O |
|
contains O |
|
the O |
|
specific O |
|
memory O |
|
addresses O |
|
associated O |
|
with O |
|
them O |
|
that O |
|
are O |
|
needed O |
|
for O |
|
successful O |
|
exploitation O |
|
. O |
|
|
|
You O |
|
can O |
|
find O |
|
a O |
|
full O |
|
list O |
|
of O |
|
targeted O |
|
models O |
|
in O |
|
the O |
|
Appendix O |
|
. O |
|
|
|
Fragment O |
|
of O |
|
the O |
|
database O |
|
with O |
|
targeted O |
|
devices O |
|
and O |
|
specific O |
|
memory O |
|
addresses O |
|
If O |
|
the O |
|
infected O |
|
device O |
|
is O |
|
not O |
|
listed O |
|
in O |
|
this O |
|
database O |
|
, O |
|
the O |
|
exploit O |
|
tries O |
|
to O |
|
discover O |
|
these O |
|
addresses O |
|
programmatically O |
|
. O |
|
|
|
After O |
|
downloading O |
|
and O |
|
unpacking O |
|
, O |
|
the O |
|
main O |
|
module O |
|
executes O |
|
the O |
|
exploit O |
|
binary O |
|
file O |
|
. O |
|
|
|
Once O |
|
executed O |
|
, O |
|
the O |
|
module O |
|
attempts O |
|
to O |
|
get O |
|
root O |
|
privileges O |
|
on O |
|
the O |
|
device O |
|
by O |
|
exploiting O |
|
the O |
|
following O |
|
vulnerabilities O |
|
: O |
|
CVE-2013-2094 B-Vulnerability |
|
CVE-2013-2595 B-Vulnerability |
|
CVE-2013-6282 B-Vulnerability |
|
CVE-2014-3153 B-Vulnerability |
|
( O |
|
futex B-Vulnerability |
|
aka O |
|
TowelRoot B-Vulnerability |
|
) O |
|
CVE-2015-3636 B-Vulnerability |
|
Exploitation O |
|
process O |
|
After O |
|
an O |
|
in-depth O |
|
look O |
|
, O |
|
we O |
|
found O |
|
that O |
|
the O |
|
exploit O |
|
payload O |
|
code O |
|
shares O |
|
several O |
|
similarities O |
|
with O |
|
the O |
|
public O |
|
project O |
|
android-rooting-tools O |
|
. O |
|
|
|
Decompiled O |
|
exploit O |
|
function O |
|
code O |
|
fragment O |
|
run_with_mmap O |
|
function O |
|
from O |
|
the O |
|
android-rooting-tools B-System |
|
project O |
|
As O |
|
can O |
|
be O |
|
seen O |
|
from O |
|
the O |
|
comparison O |
|
, O |
|
there O |
|
are O |
|
similar O |
|
strings O |
|
and O |
|
also O |
|
a O |
|
unique O |
|
comment O |
|
in O |
|
Italian O |
|
, O |
|
so O |
|
it O |
|
looks O |
|
like O |
|
the O |
|
attackers O |
|
created O |
|
this O |
|
exploit O |
|
payload O |
|
based O |
|
on O |
|
android-rooting-tools B-System |
|
project O |
|
source O |
|
code O |
|
. O |
|
|
|
Busybox O |
|
payload O |
|
Busybox O |
|
is O |
|
public O |
|
software O |
|
that O |
|
provides O |
|
several O |
|
Linux O |
|
tools O |
|
in O |
|
a O |
|
single O |
|
ELF O |
|
file O |
|
. O |
|
|
|
In O |
|
earlier O |
|
versions O |
|
, O |
|
it O |
|
operated O |
|
with O |
|
shell O |
|
commands O |
|
like O |
|
this O |
|
: O |
|
Stealing O |
|
WhatsApp O |
|
encryption O |
|
key O |
|
with O |
|
Busybox B-Malware |
|
Social I-Malware |
|
payload I-Malware |
|
Actually O |
|
, O |
|
this O |
|
is O |
|
not O |
|
a O |
|
standalone O |
|
payload O |
|
file O |
|
– O |
|
in O |
|
all O |
|
the O |
|
observed O |
|
versions O |
|
its O |
|
code O |
|
was O |
|
compiled O |
|
with O |
|
exploit O |
|
payload O |
|
in O |
|
one O |
|
file O |
|
( O |
|
‘ O |
|
poc_perm O |
|
’ O |
|
, O |
|
‘ O |
|
arrs_put_user O |
|
’ O |
|
, O |
|
‘ O |
|
arrs_put_user.o O |
|
’ O |
|
) O |
|
. O |
|
|
|
This O |
|
is O |
|
due O |
|
to O |
|
the O |
|
fact O |
|
that O |
|
the O |
|
implant O |
|
needs O |
|
to O |
|
escalate O |
|
privileges O |
|
before O |
|
performing O |
|
social O |
|
payload O |
|
actions O |
|
. O |
|
|
|
This O |
|
payload O |
|
is O |
|
also O |
|
used O |
|
by O |
|
the O |
|
earlier O |
|
versions O |
|
of O |
|
the O |
|
implant O |
|
. O |
|
|
|
It O |
|
has O |
|
similar O |
|
functionality O |
|
to O |
|
the O |
|
‘ O |
|
AndroidMDMSupport O |
|
’ O |
|
command O |
|
from O |
|
the O |
|
current O |
|
versions O |
|
– O |
|
stealing O |
|
data O |
|
belonging O |
|
to O |
|
other O |
|
installed O |
|
applications O |
|
. O |
|
|
|
The O |
|
payload O |
|
will O |
|
execute O |
|
shell O |
|
code O |
|
to O |
|
steal O |
|
data O |
|
from O |
|
various O |
|
applications O |
|
. O |
|
|
|
The O |
|
example O |
|
below O |
|
steals O |
|
Facebook B-System |
|
data O |
|
: O |
|
All O |
|
the O |
|
other O |
|
hardcoded O |
|
applications O |
|
targeted O |
|
by O |
|
the O |
|
payload O |
|
: O |
|
Package O |
|
name O |
|
Name O |
|
jp.naver.line.android B-Indicator |
|
LINE B-System |
|
: I-System |
|
Free I-System |
|
Calls I-System |
|
& I-System |
|
Messages I-System |
|
com.facebook.orca B-Indicator |
|
Facebook B-System |
|
messenger I-System |
|
com.facebook.katana B-Indicator |
|
Facebook B-System |
|
com.whatsapp B-Indicator |
|
WhatsApp B-System |
|
com.viber.voip B-Indicator |
|
Viber B-System |
|
Parser O |
|
payload O |
|
Upon O |
|
receiving O |
|
a O |
|
specific O |
|
command O |
|
, O |
|
the O |
|
implant O |
|
can O |
|
download O |
|
a O |
|
special O |
|
payload O |
|
to O |
|
grab O |
|
sensitive O |
|
information O |
|
from O |
|
external O |
|
applications O |
|
. O |
|
|
|
The O |
|
case O |
|
where O |
|
we O |
|
observed O |
|
this O |
|
involved O |
|
WhatsApp B-System |
|
. O |
|
|
|
In O |
|
the O |
|
examined O |
|
version O |
|
, O |
|
it O |
|
was O |
|
downloaded O |
|
from O |
|
: O |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//url I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
plus/Updates/tt/parser.apk I-Indicator |
|
The O |
|
payload O |
|
can O |
|
be O |
|
a O |
|
.dex O |
|
or O |
|
.apk O |
|
file O |
|
which O |
|
is O |
|
a O |
|
Java-compiled O |
|
Android B-System |
|
executable O |
|
. O |
|
|
|
After O |
|
downloading O |
|
, O |
|
it O |
|
will O |
|
be O |
|
loaded O |
|
by O |
|
the O |
|
main O |
|
module O |
|
via O |
|
DexClassLoader O |
|
api O |
|
: O |
|
As O |
|
mentioned O |
|
, O |
|
we O |
|
observed O |
|
a O |
|
payload O |
|
that O |
|
exclusively O |
|
targets O |
|
the O |
|
WhatsApp B-System |
|
messenger I-System |
|
and O |
|
it O |
|
does O |
|
so O |
|
in O |
|
an O |
|
original O |
|
way O |
|
. O |
|
|
|
The O |
|
payload O |
|
uses O |
|
the O |
|
Android B-System |
|
Accessibility O |
|
Service O |
|
to O |
|
get O |
|
information O |
|
directly O |
|
from O |
|
the O |
|
displayed O |
|
elements O |
|
on O |
|
the O |
|
screen O |
|
, O |
|
so O |
|
it O |
|
waits O |
|
for O |
|
the O |
|
targeted O |
|
application O |
|
to O |
|
be O |
|
launched O |
|
and O |
|
then O |
|
parses O |
|
all O |
|
nodes O |
|
to O |
|
find O |
|
text O |
|
messages O |
|
: O |
|
Note O |
|
that O |
|
the O |
|
implant O |
|
needs O |
|
special O |
|
permission O |
|
to O |
|
use O |
|
the O |
|
Accessibility O |
|
Service O |
|
API O |
|
, O |
|
but O |
|
there O |
|
is O |
|
a O |
|
command O |
|
that O |
|
performs O |
|
a O |
|
request O |
|
with O |
|
a O |
|
phishing O |
|
text O |
|
displayed O |
|
to O |
|
the O |
|
user O |
|
to O |
|
obtain O |
|
such O |
|
permission O |
|
. O |
|
|
|
Windows B-System |
|
We O |
|
have O |
|
found O |
|
multiple O |
|
components O |
|
that O |
|
form O |
|
an O |
|
entire O |
|
spyware O |
|
system O |
|
for O |
|
the O |
|
Windows B-System |
|
platform O |
|
. O |
|
|
|
Name O |
|
MD5 O |
|
Purpose O |
|
msconf.exe B-Indicator |
|
55fb01048b6287eadcbd9a0f86d21adf B-Indicator |
|
Main O |
|
module O |
|
, O |
|
reverse O |
|
shell O |
|
network.exe B-Indicator |
|
f673bb1d519138ced7659484c0b66c5b B-Indicator |
|
Sending O |
|
exfiltrated O |
|
data O |
|
system.exe B-Indicator |
|
d3baa45ed342fbc5a56d974d36d5f73f B-Indicator |
|
Surrounding O |
|
sound O |
|
recording O |
|
by O |
|
mic O |
|
update.exe B-Indicator |
|
395f9f87df728134b5e3c1ca4d48e9fa B-Indicator |
|
Keylogging O |
|
wow.exe B-Indicator |
|
|
|
16311b16fd48c1c87c6476a455093e7a B-Indicator |
|
Screenshot O |
|
capturing O |
|
skype_sync2.exe B-Indicator |
|
6bcc3559d7405f25ea403317353d905f B-Indicator |
|
Skype B-System |
|
call O |
|
recording O |
|
to O |
|
MP3 O |
|
All O |
|
modules O |
|
, O |
|
except O |
|
skype_sync2.exe B-Indicator |
|
, O |
|
are O |
|
written O |
|
in O |
|
Python B-System |
|
and O |
|
packed O |
|
to O |
|
binary O |
|
files O |
|
via O |
|
the O |
|
Py2exe B-System |
|
tool O |
|
. O |
|
|
|
This O |
|
sort O |
|
of O |
|
conversion O |
|
allows O |
|
Python B-System |
|
code O |
|
to O |
|
be O |
|
run O |
|
in O |
|
a O |
|
Windows B-System |
|
environment O |
|
without O |
|
pre-installed O |
|
Python B-System |
|
binaries O |
|
. O |
|
|
|
msconf.exe B-Indicator |
|
is O |
|
the O |
|
main O |
|
module O |
|
that O |
|
provides O |
|
control O |
|
of O |
|
the O |
|
implant O |
|
and O |
|
reverse O |
|
shell O |
|
feature O |
|
. O |
|
|
|
It O |
|
opens O |
|
a O |
|
socket O |
|
on O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
machine O |
|
and O |
|
connects O |
|
with O |
|
a O |
|
server-side O |
|
component O |
|
of O |
|
the O |
|
implant O |
|
located O |
|
at O |
|
54.67.109.199:6500 B-Indicator |
|
. O |
|
|
|
Before O |
|
connecting O |
|
with O |
|
the O |
|
socket O |
|
, O |
|
it O |
|
creates O |
|
a O |
|
malware O |
|
environment O |
|
in O |
|
‘ O |
|
APPDATA/myupd B-Indicator |
|
’ O |
|
and O |
|
creates O |
|
a O |
|
sqlite3 O |
|
database O |
|
there O |
|
– O |
|
‘ O |
|
myupd_tmp\\mng.db B-Indicator |
|
’ O |
|
: O |
|
CREATE O |
|
TABLE O |
|
MANAGE O |
|
( O |
|
ID O |
|
INT O |
|
PRIMARY O |
|
KEY O |
|
NOT O |
|
NULL O |
|
, O |
|
Send O |
|
INT O |
|
NOT O |
|
NULL O |
|
, O |
|
Keylogg O |
|
INT O |
|
NOT O |
|
NULL O |
|
, O |
|
Screenshot O |
|
INT O |
|
NOT O |
|
NULL O |
|
, O |
|
Audio O |
|
INT O |
|
NOT O |
|
NULL O |
|
) O |
|
; O |
|
INSERT O |
|
INTO O |
|
MANAGE O |
|
( O |
|
ID O |
|
, O |
|
Send O |
|
, O |
|
Keylogg O |
|
, O |
|
Screenshot O |
|
, O |
|
Audio O |
|
|
|
) O |
|
VALUES O |
|
( O |
|
1 O |
|
, O |
|
1 O |
|
, O |
|
1 O |
|
, O |
|
1 O |
|
, O |
|
0 O |
|
) O |
|
Finally O |
|
, O |
|
the O |
|
malware O |
|
modifies O |
|
the O |
|
‘ O |
|
Software\Microsoft\Windows\CurrentVersion\Run B-Indicator |
|
’ O |
|
registry O |
|
key O |
|
to O |
|
enable O |
|
autostart O |
|
of O |
|
the O |
|
main O |
|
module O |
|
. O |
|
|
|
The O |
|
code O |
|
contains O |
|
multiple O |
|
comments O |
|
in O |
|
Italian O |
|
, O |
|
here O |
|
is O |
|
the O |
|
most O |
|
noteworthy O |
|
example O |
|
: O |
|
“ O |
|
Receive O |
|
commands O |
|
from O |
|
the O |
|
remote O |
|
server O |
|
, O |
|
here O |
|
you O |
|
can O |
|
set O |
|
the O |
|
key O |
|
commands O |
|
to O |
|
command O |
|
the O |
|
virus O |
|
” O |
|
Here O |
|
are O |
|
the O |
|
available O |
|
commands O |
|
: O |
|
Name O |
|
Description O |
|
cd O |
|
Change O |
|
current O |
|
directory O |
|
to O |
|
specified O |
|
quit O |
|
Close O |
|
the O |
|
socket O |
|
nggexe O |
|
Execute O |
|
received O |
|
command O |
|
via O |
|
Python B-System |
|
’ O |
|
s O |
|
subprocess.Popen O |
|
( O |
|
) O |
|
without O |
|
outputs O |
|
ngguploads O |
|
Upload O |
|
specified O |
|
file O |
|
to O |
|
the O |
|
specified O |
|
URL O |
|
nggdownloads O |
|
Download O |
|
content O |
|
from O |
|
the O |
|
specified O |
|
URLs O |
|
and O |
|
save O |
|
to O |
|
specified O |
|
file O |
|
nggfilesystem O |
|
Dump O |
|
file O |
|
structure O |
|
of O |
|
|
|
the O |
|
C O |
|
: O |
|
path O |
|
, O |
|
save O |
|
it O |
|
to O |
|
the O |
|
file O |
|
in O |
|
json O |
|
format O |
|
and O |
|
zip O |
|
it O |
|
nggstart_screen O |
|
nggstop_screen O |
|
Enable/disable O |
|
screenshot O |
|
module O |
|
. O |
|
|
|
When O |
|
enabled O |
|
, O |
|
it O |
|
makes O |
|
a O |
|
screenshot O |
|
every O |
|
25 O |
|
seconds O |
|
nggstart_key O |
|
nggstop_key O |
|
Enable/disable O |
|
keylogging O |
|
module O |
|
nggstart_rec O |
|
nggstop_rec O |
|
Enable/disable O |
|
surrounding O |
|
sounds O |
|
recording O |
|
module O |
|
ngg_status O |
|
Send O |
|
components O |
|
status O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
socket O |
|
* O |
|
any O |
|
other O |
|
* O |
|
Execute O |
|
received O |
|
command O |
|
via O |
|
Python B-System |
|
’ O |
|
s O |
|
subprocess.Popen O |
|
( O |
|
) O |
|
, O |
|
output O |
|
result O |
|
will O |
|
be O |
|
sent O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
socket O |
|
. O |
|
|
|
All O |
|
modules O |
|
set O |
|
hidden O |
|
attributes O |
|
to O |
|
their O |
|
files O |
|
: O |
|
Module O |
|
Paths O |
|
Exfiltrated O |
|
data O |
|
format O |
|
msconf.exe B-Indicator |
|
% B-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd/gen/ I-Indicator |
|
% I-Indicator |
|
Y I-Indicator |
|
% I-Indicator |
|
m I-Indicator |
|
% I-Indicator |
|
d- I-Indicator |
|
% I-Indicator |
|
H I-Indicator |
|
% I-Indicator |
|
M I-Indicator |
|
% I-Indicator |
|
S_filesystem.zip I-Indicator |
|
( I-Indicator |
|
file I-Indicator |
|
structure I-Indicator |
|
dump I-Indicator |
|
) I-Indicator |
|
system.exe I-Indicator |
|
% I-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd/aud/ I-Indicator |
|
% I-Indicator |
|
d I-Indicator |
|
% I-Indicator |
|
m I-Indicator |
|
% I-Indicator |
|
Y I-Indicator |
|
% I-Indicator |
|
H I-Indicator |
|
% I-Indicator |
|
M I-Indicator |
|
% I-Indicator |
|
S.wav I-Indicator |
|
( I-Indicator |
|
surrounding I-Indicator |
|
sounds I-Indicator |
|
) I-Indicator |
|
update.exe I-Indicator |
|
% I-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd_tmp/txt/ I-Indicator |
|
% I-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd/txt/ I-Indicator |
|
% I-Indicator |
|
Y I-Indicator |
|
% I-Indicator |
|
m I-Indicator |
|
|
|
% I-Indicator |
|
d- I-Indicator |
|
% I-Indicator |
|
H I-Indicator |
|
% I-Indicator |
|
M I-Indicator |
|
% I-Indicator |
|
S.txt I-Indicator |
|
( I-Indicator |
|
keylogging I-Indicator |
|
) I-Indicator |
|
wow.exe I-Indicator |
|
% I-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd/scr/ I-Indicator |
|
% I-Indicator |
|
Y I-Indicator |
|
% I-Indicator |
|
m I-Indicator |
|
% I-Indicator |
|
d- I-Indicator |
|
% I-Indicator |
|
H I-Indicator |
|
% I-Indicator |
|
M I-Indicator |
|
% I-Indicator |
|
S.jpg I-Indicator |
|
( I-Indicator |
|
screenshots I-Indicator |
|
) I-Indicator |
|
skype_sync2.exe I-Indicator |
|
% I-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd_tmp/skype/ I-Indicator |
|
% I-Indicator |
|
APPDATA I-Indicator |
|
% I-Indicator |
|
/myupd/skype/ I-Indicator |
|
yyyyMMddHHmmss_in.mp3 I-Indicator |
|
yyyyMMddHHmmss_out.mp3 B-Indicator |
|
( O |
|
skype O |
|
calls O |
|
records O |
|
) O |
|
Moreover O |
|
, O |
|
we O |
|
found O |
|
one O |
|
module O |
|
written O |
|
|
|
in O |
|
.Net B-System |
|
– O |
|
skype_sync2.exe B-Indicator |
|
. O |
|
|
|
The O |
|
main O |
|
purpose O |
|
of O |
|
this O |
|
module O |
|
is O |
|
to O |
|
exfiltrate O |
|
Skype B-System |
|
call O |
|
recordings O |
|
. O |
|
|
|
Just O |
|
like O |
|
the O |
|
previous O |
|
modules O |
|
, O |
|
it O |
|
contains O |
|
multiple O |
|
strings O |
|
in O |
|
Italian O |
|
. O |
|
|
|
After O |
|
launch O |
|
, O |
|
it O |
|
downloads O |
|
a O |
|
codec O |
|
for O |
|
MP3 O |
|
encoding O |
|
directly O |
|
from O |
|
the O |
|
C O |
|
& O |
|
C O |
|
server O |
|
: O |
|
http B-Indicator |
|
: I-Indicator |
|
//54.67.109.199/skype_resource/libmp3lame.dll I-Indicator |
|
The O |
|
skype_sync2.exe B-Indicator |
|
module O |
|
has O |
|
a O |
|
compilation O |
|
timestamp O |
|
– O |
|
Feb O |
|
06 O |
|
2017 O |
|
and O |
|
the O |
|
following O |
|
PDB O |
|
string O |
|
: O |
|
\\vmware-host\Shared B-Indicator |
|
Folders\dati\Backup\Projects\REcodin_2\REcodin_2\obj\x86\Release\REcodin_2.pdb B-Indicator |
|
network.exe B-Indicator |
|
is O |
|
a O |
|
|
|
module O |
|
for O |
|
submitting O |
|
all O |
|
exfiltrated O |
|
data O |
|
to O |
|
the O |
|
server O |
|
. O |
|
|
|
In O |
|
the O |
|
observed O |
|
version O |
|
of O |
|
the O |
|
implant O |
|
it O |
|
doesn O |
|
’ O |
|
t O |
|
have O |
|
an O |
|
interface O |
|
to O |
|
work O |
|
with O |
|
the O |
|
skype_sync2.exe B-Indicator |
|
module O |
|
. O |
|
|
|
network.exe B-Indicator |
|
submitting O |
|
to O |
|
the O |
|
server O |
|
code O |
|
snippet O |
|
Code O |
|
similarities O |
|
We O |
|
found O |
|
some O |
|
code O |
|
similarities O |
|
between O |
|
the O |
|
implant O |
|
for O |
|
Windows B-System |
|
and O |
|
other O |
|
public O |
|
accessible O |
|
projects O |
|
. O |
|
|
|
https B-Indicator |
|
: I-Indicator |
|
//github.com/El3ct71k/Keylogger/ I-Indicator |
|
It O |
|
appears O |
|
the O |
|
developers O |
|
have O |
|
copied O |
|
the O |
|
functional O |
|
part O |
|
of O |
|
the O |
|
keylogger O |
|
module O |
|
from O |
|
this O |
|
project O |
|
. O |
|
|
|
update.exe B-Indicator |
|
module O |
|
and O |
|
Keylogger O |
|
by O |
|
‘ O |
|
El3ct71k O |
|
’ O |
|
code O |
|
comparison O |
|
Xenotix B-System |
|
Python I-System |
|
Keylogger I-System |
|
including O |
|
specified O |
|
mutex O |
|
‘ O |
|
mutex_var_xboz O |
|
’ O |
|
. O |
|
|
|
update.exe B-Indicator |
|
module O |
|
and O |
|
Xenotix B-System |
|
Python I-System |
|
Keylogger I-System |
|
code O |
|
comparison O |
|
‘ O |
|
addStartup O |
|
’ O |
|
method O |
|
from O |
|
msconf.exe B-Indicator |
|
module O |
|
‘ O |
|
addStartup O |
|
’ O |
|
method O |
|
from O |
|
Xenotix B-System |
|
Python I-System |
|
Keylogger I-System |
|
Distribution O |
|
We O |
|
found O |
|
several O |
|
landing O |
|
pages O |
|
that O |
|
spread O |
|
the O |
|
Android B-System |
|
implants O |
|
. O |
|
|
|
Malicious O |
|
URL O |
|
Referrer O |
|
Dates O |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/tre/internet/Configuratore_3.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/tre/internet/ I-Indicator |
|
2015-02-04 O |
|
to O |
|
present O |
|
time O |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/appPro_AC.apk I-Indicator |
|
– O |
|
2015-07-01 O |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator |
|
% I-Indicator |
|
20Configuratore I-Indicator |
|
% I-Indicator |
|
20v5_4_2.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator |
|
|
|
2015-01-20 O |
|
to O |
|
present O |
|
time O |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/190/configurazione/vodafone/smartphone/Vodafone I-Indicator |
|
% I-Indicator |
|
20Configuratore.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator |
|
currently O |
|
active O |
|
http B-Indicator |
|
: I-Indicator |
|
//vodafoneinfinity.sytes.net/tim/internet/Configuratore_TIM.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//vodafoneinfinity.sytes.net/tim/internet/ I-Indicator |
|
2015-03-04 O |
|
http B-Indicator |
|
: I-Indicator |
|
//vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator |
|
|
|
% I-Indicator |
|
20Configuratore I-Indicator |
|
% I-Indicator |
|
20v5_4_2.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/ I-Indicator |
|
2015-01-14 O |
|
http B-Indicator |
|
: I-Indicator |
|
//windupdate.serveftp.com/wind/LTE/WIND I-Indicator |
|
% I-Indicator |
|
20Configuratore I-Indicator |
|
% I-Indicator |
|
20v5_4_2.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//windupdate.serveftp.com/wind/LTE/ I-Indicator |
|
2015-03-31 O |
|
http B-Indicator |
|
: I-Indicator |
|
//119.network/lte/Internet-TIM-4G-LTE.apk I-Indicator |
|
http B-Indicator |
|
: I-Indicator |
|
//119.network/lte/download.html I-Indicator |
|
|
|
2015-02-04 O |
|
2015-07-20 O |
|
http B-Indicator |
|
: I-Indicator |
|
//119.network/lte/Configuratore_TIM.apk I-Indicator |
|
2015-07-08 O |
|
Many O |
|
of O |
|
these O |
|
domains O |
|
are O |
|
outdated O |
|
, O |
|
but O |
|
almost O |
|
all O |
|
( O |
|
except O |
|
one O |
|
– O |
|
appPro_AC.apk B-Indicator |
|
) O |
|
samples O |
|
located O |
|
on O |
|
the O |
|
217.194.13.133 B-Indicator |
|
server O |
|
are O |
|
still O |
|
accessible O |
|
. O |
|
|
|
All O |
|
the O |
|
observed O |
|
landing O |
|
pages O |
|
mimic O |
|
the O |
|
mobile O |
|
operators O |
|
’ O |
|
web O |
|
pages O |
|
through O |
|
their O |
|
domain O |
|
name O |
|
and O |
|
web O |
|
page O |
|
content O |
|
as O |
|
well O |
|
. O |
|
|
|
Further O |
|
research O |
|
of O |
|
the O |
|
attacker O |
|
’ O |
|
s O |
|
infrastructure O |
|
revealed O |
|
more O |
|
related O |
|
mimicking O |
|
domains O |
|
. O |
|
|
|
Unfortunately O |
|
, O |
|
for O |
|
now O |
|
we O |
|
can O |
|
’ O |
|
t O |
|
say O |
|
in O |
|
what O |
|
environment O |
|
these O |
|
landing O |
|
pages O |
|
were O |
|
used O |
|
in O |
|
the O |
|
wild O |
|
, O |
|
but O |
|
according O |
|
to O |
|
all O |
|
the O |
|
information O |
|
at O |
|
our O |
|
dsiposal O |
|
, O |
|
we O |
|
can O |
|
assume O |
|
that O |
|
they O |
|
are O |
|
perfect O |
|
for O |
|
exploitation O |
|
using O |
|
malicious O |
|
redirects O |
|
or O |
|
man-in-the-middle O |
|
attacks O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
this O |
|
could O |
|
be O |
|
when O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
device O |
|
connects O |
|
to O |
|
a O |
|
Wi-Fi O |
|
access O |
|
point O |
|
that O |
|
is O |
|
infected O |
|
or O |
|
controlled O |
|
by O |
|
the O |
|
attackers O |
|
. O |
|
|
|
Artifacts O |
|
During O |
|
the O |
|
research O |
|
, O |
|
we O |
|
found O |
|
plenty O |
|
of O |
|
traces O |
|
of O |
|
the O |
|
developers O |
|
and O |
|
those O |
|
doing O |
|
the O |
|
maintaining O |
|
. O |
|
|
|
As O |
|
already O |
|
stated O |
|
in O |
|
the O |
|
‘ O |
|
malware O |
|
features O |
|
’ O |
|
part O |
|
, O |
|
there O |
|
are O |
|
multiple O |
|
giveaways O |
|
in O |
|
the O |
|
code O |
|
. O |
|
|
|
Here O |
|
are O |
|
just O |
|
some O |
|
of O |
|
them O |
|
: O |
|
ngglobal O |
|
– O |
|
FirebaseCloudMessaging O |
|
topic O |
|
name O |
|
Issuer O |
|
: O |
|
CN O |
|
= O |
|
negg O |
|
– O |
|
from O |
|
several O |
|
certificates O |
|
negg.ddns B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
, O |
|
negg1.ddns B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
, O |
|
negg2.ddns B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
– O |
|
C O |
|
& O |
|
C O |
|
servers O |
|
NG O |
|
SuperShell O |
|
– O |
|
string O |
|
from O |
|
the O |
|
reverse O |
|
shell O |
|
payload O |
|
ngg O |
|
– O |
|
prefix O |
|
in O |
|
commands O |
|
names O |
|
of O |
|
the O |
|
implant O |
|
for O |
|
Windows B-System |
|
Signature O |
|
with O |
|
specific O |
|
issuer O |
|
Whois O |
|
records O |
|
and O |
|
IP O |
|
relationships O |
|
provide O |
|
many O |
|
interesting O |
|
insights O |
|
as O |
|
well O |
|
. O |
|
|
|
There O |
|
are O |
|
a O |
|
lot O |
|
of O |
|
other O |
|
‘ O |
|
Negg O |
|
’ O |
|
mentions O |
|
in O |
|
Whois O |
|
records O |
|
and O |
|
references O |
|
to O |
|
it O |
|
. O |
|
|
|
For O |
|
example O |
|
: O |
|
Conclusions O |
|
The O |
|
Skygofree B-Malware |
|
Android B-System |
|
implant O |
|
is O |
|
one O |
|
of O |
|
the O |
|
most O |
|
powerful O |
|
spyware O |
|
tools O |
|
that O |
|
we O |
|
have O |
|
ever O |
|
seen O |
|
for O |
|
this O |
|
platform O |
|
. O |
|
|
|
As O |
|
a O |
|
result O |
|
of O |
|
the O |
|
long-term O |
|
development O |
|
process O |
|
, O |
|
there O |
|
are O |
|
multiple O |
|
, O |
|
exceptional O |
|
capabilities O |
|
: O |
|
usage O |
|
of O |
|
multiple O |
|
exploits O |
|
for O |
|
gaining O |
|
root O |
|
privileges O |
|
, O |
|
a O |
|
complex O |
|
payload O |
|
structure O |
|
, O |
|
never-before-seen O |
|
surveillance O |
|
features O |
|
such O |
|
as O |
|
recording O |
|
surrounding O |
|
audio O |
|
in O |
|
specified O |
|
locations O |
|
. O |
|
|
|
Given O |
|
the O |
|
many O |
|
artifacts O |
|
we O |
|
discovered O |
|
in O |
|
the O |
|
malware O |
|
code O |
|
, O |
|
as O |
|
well O |
|
as O |
|
infrastructure O |
|
analysis O |
|
, O |
|
we O |
|
are O |
|
pretty O |
|
confident O |
|
that O |
|
the O |
|
developer O |
|
of O |
|
the O |
|
Skygofree B-Malware |
|
implants O |
|
is O |
|
an O |
|
Italian O |
|
IT O |
|
company O |
|
that O |
|
works O |
|
on O |
|
surveillance O |
|
solutions O |
|
, O |
|
just O |
|
like O |
|
HackingTeam B-Organization |
|
. O |
|
|
|
HenBox B-Malware |
|
: O |
|
The O |
|
Chickens O |
|
Come O |
|
Home O |
|
to O |
|
Roost O |
|
March O |
|
13 O |
|
, O |
|
2018 O |
|
at O |
|
5:00 O |
|
AM O |
|
Unit O |
|
42 O |
|
recently O |
|
discovered O |
|
a O |
|
new O |
|
Android B-System |
|
malware O |
|
family O |
|
we O |
|
named O |
|
“ O |
|
HenBox B-Malware |
|
” O |
|
masquerading O |
|
as O |
|
a O |
|
variety O |
|
of O |
|
legitimate O |
|
Android B-System |
|
apps O |
|
. O |
|
|
|
We O |
|
chose O |
|
the O |
|
name O |
|
“ O |
|
HenBox B-Malware |
|
” O |
|
based O |
|
on O |
|
metadata O |
|
found O |
|
in O |
|
most O |
|
of O |
|
the O |
|
malicious O |
|
apps O |
|
such O |
|
as O |
|
package O |
|
names O |
|
and O |
|
signer O |
|
detail O |
|
. O |
|
|
|
HenBox B-Malware |
|
masquerades O |
|
as O |
|
apps O |
|
such O |
|
as O |
|
VPN O |
|
and O |
|
Android B-System |
|
system O |
|
apps O |
|
and O |
|
often O |
|
installs O |
|
legitimate O |
|
versions O |
|
of O |
|
these O |
|
apps O |
|
along O |
|
with O |
|
HenBox B-Malware |
|
to O |
|
trick O |
|
users O |
|
into O |
|
thinking O |
|
they O |
|
downloaded O |
|
the O |
|
legitimate O |
|
app O |
|
. O |
|
|
|
While O |
|
some O |
|
of O |
|
the O |
|
legitimate O |
|
apps O |
|
HenBox B-Malware |
|
use O |
|
as O |
|
decoys O |
|
can O |
|
be O |
|
found O |
|
on O |
|
Google B-System |
|
Play I-System |
|
, O |
|
HenBox B-Malware |
|
apps O |
|
themselves O |
|
have O |
|
only O |
|
been O |
|
found O |
|
on O |
|
third-party O |
|
( O |
|
non-Google O |
|
Play B-System |
|
) O |
|
app O |
|
stores O |
|
. O |
|
|
|
HenBox B-Malware |
|
appears O |
|
to O |
|
primarily O |
|
target O |
|
the O |
|
Uyghurs O |
|
– O |
|
a O |
|
minority O |
|
Turkic O |
|
ethnic O |
|
group O |
|
that O |
|
is O |
|
primarily O |
|
Muslim O |
|
and O |
|
lives O |
|
mainly O |
|
in O |
|
the O |
|
Xinjiang O |
|
Uyghur O |
|
Autonomous O |
|
Region O |
|
in O |
|
North O |
|
West O |
|
China O |
|
. O |
|
|
|
It O |
|
also O |
|
targets O |
|
devices O |
|
made O |
|
by O |
|
Chinese O |
|
manufacturer O |
|
Xiaomi B-Organization |
|
and O |
|
those O |
|
running O |
|
MIUI B-System |
|
, O |
|
an O |
|
operating O |
|
system O |
|
based O |
|
on O |
|
Google B-System |
|
Android I-System |
|
made O |
|
by O |
|
Xiaomi B-Organization |
|
. O |
|
|
|
Smartphones O |
|
are O |
|
the O |
|
dominant O |
|
form O |
|
of O |
|
internet O |
|
access O |
|
in O |
|
the O |
|
region O |
|
and O |
|
Xinjiang O |
|
was O |
|
recently O |
|
above O |
|
the O |
|
national O |
|
average O |
|
of O |
|
internet O |
|
users O |
|
in O |
|
China O |
|
. O |
|
|
|
The O |
|
result O |
|
is O |
|
a O |
|
large O |
|
online O |
|
population O |
|
who O |
|
have O |
|
been O |
|
the O |
|
subject O |
|
of O |
|
numerous O |
|
cyber-attacks O |
|
in O |
|
the O |
|
past O |
|
. O |
|
|
|
Once O |
|
installed O |
|
, O |
|
HenBox B-Malware |
|
steals O |
|
information O |
|
from O |
|
the O |
|
devices O |
|
from O |
|
a O |
|
myriad O |
|
of O |
|
sources O |
|
, O |
|
including O |
|
many O |
|
mainstream O |
|
chat O |
|
, O |
|
communication O |
|
, O |
|
and O |
|
social O |
|
media O |
|
apps O |
|
. O |
|
|
|
The O |
|
stolen O |
|
information O |
|
includes O |
|
personal O |
|
and O |
|
device O |
|
information O |
|
. O |
|
|
|
Of O |
|
note O |
|
, O |
|
in O |
|
addition O |
|
to O |
|
tracking O |
|
the O |
|
compromised O |
|
device O |
|
’ O |
|
s O |
|
location O |
|
, O |
|
HenBox B-Malware |
|
also O |
|
harvests O |
|
all O |
|
outgoing O |
|
phone O |
|
numbers O |
|
with O |
|
an O |
|
“ O |
|
86 O |
|
” O |
|
prefix O |
|
, O |
|
which O |
|
is O |
|
the O |
|
country O |
|
code O |
|
for O |
|
the O |
|
People O |
|
’ O |
|
s O |
|
Republic O |
|
of O |
|
China O |
|
( O |
|
PRC O |
|
) O |
|
. O |
|
|
|
It O |
|
can O |
|
also O |
|
access O |
|
the O |
|
phone O |
|
’ O |
|
s O |
|
cameras O |
|
and O |
|
microphone O |
|
. O |
|
|
|
HenBox B-Malware |
|
has O |
|
ties O |
|
to O |
|
infrastructure O |
|
used O |
|
in O |
|
targeted O |
|
attacks O |
|
with O |
|
a O |
|
focus O |
|
on O |
|
politics O |
|
in O |
|
South O |
|
East O |
|
Asia O |
|
. O |
|
|
|
These O |
|
attackers O |
|
have O |
|
used O |
|
additional O |
|
malware O |
|
families O |
|
in O |
|
previous O |
|
activity O |
|
dating O |
|
to O |
|
at O |
|
least O |
|
2015 O |
|
that O |
|
include O |
|
PlugX B-Malware |
|
, O |
|
Zupdax B-Malware |
|
, O |
|
9002 B-Malware |
|
, O |
|
and O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
. O |
|
|
|
This O |
|
also O |
|
aligns O |
|
with O |
|
HenBox B-Malware |
|
’ O |
|
s O |
|
timeline O |
|
, O |
|
as O |
|
in O |
|
total O |
|
we O |
|
have O |
|
identified O |
|
almost O |
|
200 O |
|
HenBox B-Malware |
|
samples O |
|
, O |
|
with O |
|
the O |
|
oldest O |
|
dating O |
|
to O |
|
2015 O |
|
. O |
|
|
|
Most O |
|
of O |
|
the O |
|
samples O |
|
we O |
|
found O |
|
date O |
|
from O |
|
the O |
|
last O |
|
half O |
|
of O |
|
2017 O |
|
, O |
|
fewer O |
|
samples O |
|
date O |
|
from O |
|
2016 O |
|
, O |
|
and O |
|
a O |
|
handful O |
|
date O |
|
back O |
|
to O |
|
2015 O |
|
. O |
|
|
|
In O |
|
2018 O |
|
, O |
|
we O |
|
have O |
|
already O |
|
observed O |
|
a O |
|
small O |
|
but O |
|
consistent O |
|
number O |
|
of O |
|
samples O |
|
. O |
|
|
|
We O |
|
believe O |
|
this O |
|
indicates O |
|
a O |
|
fairly O |
|
sustained O |
|
campaign O |
|
that O |
|
has O |
|
gained O |
|
momentum O |
|
over O |
|
recent O |
|
months O |
|
. O |
|
|
|
HenBox B-Malware |
|
Enters O |
|
the O |
|
Uyghur B-System |
|
App I-System |
|
Store I-System |
|
In O |
|
May O |
|
2016 O |
|
, O |
|
a O |
|
HenBox B-Malware |
|
app O |
|
was O |
|
downloaded O |
|
from O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
. O |
|
|
|
Specifically O |
|
, O |
|
the O |
|
app O |
|
was O |
|
an O |
|
Android B-System |
|
Package I-System |
|
( O |
|
APK O |
|
) O |
|
file O |
|
that O |
|
will O |
|
be O |
|
discussed O |
|
in O |
|
more O |
|
detail O |
|
shortly O |
|
. O |
|
|
|
The O |
|
domain O |
|
name O |
|
, O |
|
language O |
|
of O |
|
the O |
|
site O |
|
and O |
|
app O |
|
content O |
|
hosted O |
|
suggest O |
|
this O |
|
site O |
|
is O |
|
a O |
|
third-party O |
|
app O |
|
store O |
|
for O |
|
whom O |
|
the O |
|
intended O |
|
users O |
|
are O |
|
the O |
|
Uyghurs O |
|
. O |
|
|
|
Such O |
|
app O |
|
stores O |
|
are O |
|
so-called O |
|
because O |
|
they O |
|
are O |
|
not O |
|
officially O |
|
supported O |
|
by O |
|
Android B-System |
|
, O |
|
nor O |
|
are O |
|
they O |
|
provided O |
|
by O |
|
Google B-Organization |
|
, O |
|
unlike O |
|
the O |
|
Play B-System |
|
Store I-System |
|
. O |
|
|
|
Third-party O |
|
app O |
|
stores O |
|
are O |
|
ubiquitous O |
|
in O |
|
China O |
|
for O |
|
a O |
|
number O |
|
of O |
|
reasons O |
|
including O |
|
: O |
|
evermore O |
|
powerful O |
|
Chinese B-Organization |
|
Original I-Organization |
|
Equipment I-Organization |
|
Manufacturers I-Organization |
|
( I-Organization |
|
OEM I-Organization |
|
) I-Organization |
|
, O |
|
a O |
|
lack O |
|
of O |
|
an O |
|
official O |
|
Chinese O |
|
Google B-System |
|
Play I-System |
|
app O |
|
store O |
|
, O |
|
and O |
|
a O |
|
growing O |
|
smartphone O |
|
market O |
|
. O |
|
|
|
The O |
|
HenBox B-Malware |
|
app O |
|
downloaded O |
|
in O |
|
May O |
|
2016 O |
|
was O |
|
masquerading O |
|
as O |
|
the O |
|
DroidVPN B-Indicator |
|
app O |
|
. O |
|
|
|
At O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
, O |
|
the O |
|
content O |
|
served O |
|
at O |
|
the O |
|
given O |
|
URL O |
|
on O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
, O |
|
is O |
|
now O |
|
a O |
|
legitimate O |
|
version O |
|
of O |
|
the O |
|
DroidVPN B-Indicator |
|
app O |
|
, O |
|
and O |
|
looks O |
|
as O |
|
shown O |
|
in O |
|
Figure O |
|
1 O |
|
below O |
|
. O |
|
|
|
henbox_2 O |
|
Figure O |
|
1 O |
|
Uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
app O |
|
store O |
|
showing O |
|
the O |
|
current O |
|
DroidVPN B-Indicator |
|
app O |
|
Virtual O |
|
Private O |
|
Network O |
|
( O |
|
VPN O |
|
) O |
|
tools O |
|
allow O |
|
connections O |
|
to O |
|
remote O |
|
private O |
|
networks O |
|
, O |
|
increasing O |
|
the O |
|
security O |
|
and O |
|
privacy O |
|
of O |
|
the O |
|
user O |
|
’ O |
|
s O |
|
communications O |
|
. O |
|
|
|
According O |
|
to O |
|
the O |
|
DroidVPN B-Indicator |
|
app O |
|
description O |
|
, O |
|
it O |
|
“ O |
|
helps O |
|
bypass O |
|
regional O |
|
internet O |
|
restrictions O |
|
, O |
|
web O |
|
filtering O |
|
and O |
|
firewalls O |
|
by O |
|
tunneling O |
|
traffic O |
|
over O |
|
ICMP. O |
|
” O |
|
Some O |
|
features O |
|
may O |
|
require O |
|
devices O |
|
to O |
|
be O |
|
rooted O |
|
to O |
|
function O |
|
and O |
|
according O |
|
to O |
|
some O |
|
3rd O |
|
party O |
|
app O |
|
stores O |
|
, O |
|
unconditional O |
|
rooting O |
|
is O |
|
required O |
|
, O |
|
which O |
|
has O |
|
additional O |
|
security O |
|
implications O |
|
for O |
|
the O |
|
device O |
|
. O |
|
|
|
We O |
|
have O |
|
not O |
|
been O |
|
able O |
|
to O |
|
ascertain O |
|
how O |
|
the O |
|
DroidVPN B-Indicator |
|
app O |
|
on O |
|
the O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
app O |
|
store O |
|
was O |
|
replaced O |
|
with O |
|
the O |
|
malicious O |
|
HenBox B-Malware |
|
app O |
|
; O |
|
however O |
|
, O |
|
some O |
|
indicators O |
|
point O |
|
to O |
|
the O |
|
server O |
|
running O |
|
an O |
|
outdated O |
|
version O |
|
of O |
|
Apache O |
|
Web O |
|
Server O |
|
on O |
|
a O |
|
Windows B-System |
|
32-Bit O |
|
operating O |
|
system O |
|
. O |
|
|
|
In O |
|
light O |
|
of O |
|
this O |
|
, O |
|
we O |
|
believe O |
|
an O |
|
attack O |
|
against O |
|
unpatched B-Vulnerability |
|
vulnerabilities I-Vulnerability |
|
is O |
|
a O |
|
reasonable O |
|
conjecture O |
|
for O |
|
how O |
|
the O |
|
server O |
|
was O |
|
compromised O |
|
. O |
|
|
|
The O |
|
HenBox O |
|
app O |
|
downloaded O |
|
in O |
|
May O |
|
2016 O |
|
, O |
|
as O |
|
described O |
|
in O |
|
Table O |
|
1 O |
|
below O |
|
, O |
|
masquerades O |
|
as O |
|
a O |
|
legitimate O |
|
version O |
|
of O |
|
the O |
|
DroidVPN B-Indicator |
|
app O |
|
by O |
|
using O |
|
the O |
|
same O |
|
app O |
|
name O |
|
“ O |
|
DroidVPN B-System |
|
” O |
|
and O |
|
the O |
|
same O |
|
iconography O |
|
used O |
|
when O |
|
displaying O |
|
the O |
|
app O |
|
in O |
|
Android B-System |
|
’ O |
|
s O |
|
launcher O |
|
view O |
|
, O |
|
as O |
|
highlighted O |
|
in O |
|
Figure O |
|
2 O |
|
below O |
|
Table O |
|
1 O |
|
. O |
|
|
|
APK O |
|
SHA256 O |
|
Size O |
|
( O |
|
bytes O |
|
) O |
|
First O |
|
Seen O |
|
App O |
|
Package O |
|
name O |
|
App O |
|
name O |
|
0589bed1e3b3d6234c30061be3be1cc6685d786ab3a892a8d4dae8e2d7ed92f7 B-Indicator |
|
2,740,860 O |
|
May O |
|
2016 O |
|
com.android.henbox B-Indicator |
|
DroidVPN B-System |
|
Table O |
|
1 O |
|
Details O |
|
of O |
|
the O |
|
HenBox B-Malware |
|
DroidVPN B-System |
|
app O |
|
on O |
|
the O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
app O |
|
store O |
|
henbox_3 O |
|
Figure O |
|
2 O |
|
HenBox B-Malware |
|
app O |
|
installed O |
|
, O |
|
purporting O |
|
to O |
|
be O |
|
DroidVPN B-Indicator |
|
Depending O |
|
on O |
|
the O |
|
language O |
|
setting O |
|
on O |
|
the O |
|
device O |
|
, O |
|
and O |
|
for O |
|
this O |
|
particular O |
|
variant O |
|
of O |
|
HenBox B-Malware |
|
, O |
|
the O |
|
installed O |
|
HenBox B-Malware |
|
app O |
|
may O |
|
have O |
|
the O |
|
name O |
|
“ O |
|
Backup O |
|
” O |
|
but O |
|
uses O |
|
the O |
|
same O |
|
DroidVPN B-Indicator |
|
logo O |
|
. O |
|
|
|
Other O |
|
variants O |
|
use O |
|
other O |
|
names O |
|
and O |
|
logos O |
|
, O |
|
as O |
|
described O |
|
later O |
|
. O |
|
|
|
Given O |
|
the O |
|
DroidVPN B-Indicator |
|
look O |
|
and O |
|
feel O |
|
being O |
|
used O |
|
by O |
|
this O |
|
variant O |
|
of O |
|
HenBox B-Malware |
|
, O |
|
it O |
|
’ O |
|
s O |
|
highly O |
|
likely O |
|
the O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
page O |
|
for O |
|
DroidVPN B-Indicator |
|
remained O |
|
identical O |
|
when O |
|
serving O |
|
either O |
|
HenBox B-Malware |
|
or O |
|
DroidVPN B-Indicator |
|
apps O |
|
, O |
|
just O |
|
that O |
|
the O |
|
legitimate O |
|
APK O |
|
file O |
|
had O |
|
been O |
|
replaced O |
|
with O |
|
HenBox O |
|
for O |
|
an O |
|
unknown O |
|
period O |
|
of O |
|
time O |
|
. O |
|
|
|
In O |
|
addition O |
|
to O |
|
the O |
|
look O |
|
and O |
|
feel O |
|
of O |
|
DroidVPN B-Indicator |
|
, O |
|
this O |
|
HenBox B-Malware |
|
variant O |
|
also O |
|
contained O |
|
a O |
|
legitimate O |
|
DroidVPN B-Indicator |
|
app O |
|
within O |
|
its O |
|
APK O |
|
package O |
|
as O |
|
an O |
|
asset O |
|
, O |
|
which O |
|
could O |
|
be O |
|
compared O |
|
to O |
|
a O |
|
resource O |
|
item O |
|
within O |
|
a O |
|
Windows B-System |
|
Portable I-System |
|
Executable I-System |
|
( O |
|
PE O |
|
) O |
|
file O |
|
. O |
|
|
|
Once O |
|
the O |
|
HenBox B-Malware |
|
app O |
|
is O |
|
installed O |
|
and O |
|
launched O |
|
, O |
|
it O |
|
launches O |
|
an O |
|
install O |
|
process O |
|
for O |
|
the O |
|
embedded O |
|
app O |
|
as O |
|
a O |
|
decoy O |
|
to O |
|
other O |
|
malicious O |
|
behaviors O |
|
occurring O |
|
in O |
|
the O |
|
background O |
|
, O |
|
and O |
|
to O |
|
satisfy O |
|
the O |
|
victim O |
|
with O |
|
the O |
|
app O |
|
they O |
|
were O |
|
requesting O |
|
, O |
|
assuming O |
|
they O |
|
requested O |
|
to O |
|
download O |
|
a O |
|
particular O |
|
app O |
|
, O |
|
such O |
|
as O |
|
DroidVPN B-System |
|
. O |
|
|
|
The O |
|
version O |
|
of O |
|
the O |
|
legitimate O |
|
DroidVPN B-Indicator |
|
embedded O |
|
inside O |
|
this O |
|
HenBox B-Malware |
|
variant O |
|
is O |
|
the O |
|
same O |
|
version O |
|
of O |
|
DroidVPN B-Indicator |
|
available O |
|
for O |
|
download O |
|
from O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
, O |
|
at O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
. O |
|
|
|
It O |
|
’ O |
|
s O |
|
worth O |
|
noting O |
|
, O |
|
newer O |
|
versions O |
|
of O |
|
the O |
|
DroidVPN B-System |
|
app O |
|
are O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
, O |
|
as O |
|
well O |
|
as O |
|
in O |
|
some O |
|
other O |
|
third-party O |
|
app O |
|
stores O |
|
, O |
|
which O |
|
could O |
|
indicate O |
|
uyghurapps B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
is O |
|
not O |
|
awfully O |
|
well O |
|
maintained O |
|
or O |
|
updated O |
|
to O |
|
the O |
|
latest O |
|
apps O |
|
available O |
|
. O |
|
|
|
At O |
|
the O |
|
time O |
|
of O |
|
writing O |
|
, O |
|
to O |
|
our O |
|
knowledge O |
|
no O |
|
other O |
|
third-party O |
|
app O |
|
stores O |
|
, O |
|
nor O |
|
the O |
|
official O |
|
Google B-System |
|
Play I-System |
|
store O |
|
, O |
|
were O |
|
or O |
|
are O |
|
hosting O |
|
this O |
|
malicious O |
|
HenBox B-Malware |
|
variant O |
|
masquerading O |
|
as O |
|
DroidVPN B-Indicator |
|
. O |
|
|
|
The O |
|
Right O |
|
App O |
|
at O |
|
the O |
|
Right O |
|
Time O |
|
The O |
|
malicious O |
|
HenBox B-Malware |
|
and O |
|
embedded O |
|
DroidVPN B-Indicator |
|
app O |
|
combination O |
|
is O |
|
one O |
|
instance O |
|
of O |
|
the O |
|
type O |
|
of O |
|
legitimate O |
|
apps O |
|
the O |
|
attackers O |
|
choose O |
|
to O |
|
mimic O |
|
to O |
|
compromise O |
|
their O |
|
victims O |
|
. O |
|
|
|
These O |
|
threat O |
|
actors O |
|
frequently O |
|
offer O |
|
malicious O |
|
apps O |
|
purporting O |
|
to O |
|
be O |
|
legitimate O |
|
apps O |
|
that O |
|
are O |
|
broadly O |
|
used O |
|
or O |
|
important O |
|
to O |
|
a O |
|
targeted O |
|
population O |
|
. O |
|
|
|
It O |
|
’ O |
|
s O |
|
worth O |
|
noting O |
|
however O |
|
, O |
|
about O |
|
one-third O |
|
of O |
|
the O |
|
HenBox B-Malware |
|
apps O |
|
contained O |
|
embedded O |
|
APK O |
|
objects O |
|
that O |
|
did O |
|
not O |
|
refer O |
|
to O |
|
legitimate O |
|
apps O |
|
. O |
|
|
|
Some O |
|
were O |
|
only O |
|
3 O |
|
bytes O |
|
long O |
|
, O |
|
containing O |
|
strings O |
|
such O |
|
as O |
|
“ O |
|
ddd O |
|
” O |
|
and O |
|
“ O |
|
333 O |
|
” O |
|
, O |
|
or O |
|
were O |
|
otherwise O |
|
corrupted O |
|
. O |
|
|
|
Beyond O |
|
the O |
|
previously O |
|
mentioned O |
|
DroidVPN B-Indicator |
|
example O |
|
, O |
|
other O |
|
viable O |
|
embedded O |
|
apps O |
|
we O |
|
found O |
|
include O |
|
apps O |
|
currently O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
, O |
|
as O |
|
well O |
|
as O |
|
many O |
|
third-party O |
|
app O |
|
stores O |
|
. O |
|
|
|
Table O |
|
2 O |
|
below O |
|
lists O |
|
some O |
|
of O |
|
these O |
|
apps O |
|
with O |
|
their O |
|
respective O |
|
metadata O |
|
. O |
|
|
|
Sample O |
|
1 O |
|
marks O |
|
the O |
|
first O |
|
HenBox B-Malware |
|
sample O |
|
we O |
|
saw O |
|
embedding O |
|
a O |
|
legitimate O |
|
app O |
|
within O |
|
its O |
|
assets O |
|
to O |
|
be O |
|
dropped O |
|
and O |
|
installed O |
|
on O |
|
the O |
|
victim O |
|
device O |
|
as O |
|
a O |
|
decoy O |
|
. O |
|
|
|
The O |
|
legitimate O |
|
app O |
|
in O |
|
question O |
|
was O |
|
a O |
|
Uyghur O |
|
language O |
|
keyboard O |
|
app O |
|
targeted O |
|
at O |
|
native O |
|
speakers O |
|
of O |
|
the O |
|
Uyghur O |
|
language O |
|
and O |
|
their O |
|
smartphones O |
|
. O |
|
|
|
Sample O |
|
2 O |
|
, O |
|
has O |
|
the O |
|
package O |
|
name O |
|
cn.android.setting B-Indicator |
|
masquerading O |
|
as O |
|
Android O |
|
’ O |
|
s O |
|
Settings B-System |
|
app I-System |
|
, O |
|
which O |
|
has O |
|
a O |
|
similar O |
|
package O |
|
name O |
|
( O |
|
com.android.settings B-Indicator |
|
) O |
|
. O |
|
|
|
This O |
|
variant O |
|
of O |
|
HenBox B-Malware |
|
also O |
|
used O |
|
the O |
|
common O |
|
green O |
|
Android B-System |
|
figure O |
|
as O |
|
the O |
|
app O |
|
logo O |
|
and O |
|
was O |
|
named O |
|
设置 O |
|
( O |
|
“ O |
|
Backup O |
|
” O |
|
in O |
|
English O |
|
) O |
|
. O |
|
|
|
This O |
|
variant O |
|
’ O |
|
s O |
|
app O |
|
name O |
|
, O |
|
along O |
|
with O |
|
many O |
|
others O |
|
, O |
|
is O |
|
written O |
|
in O |
|
Chinese O |
|
and O |
|
describes O |
|
the O |
|
app O |
|
as O |
|
a O |
|
backup O |
|
tool O |
|
. O |
|
|
|
Please O |
|
see O |
|
the O |
|
IOCs O |
|
section O |
|
for O |
|
all O |
|
app O |
|
and O |
|
package O |
|
name O |
|
combinations O |
|
. O |
|
|
|
Interestingly O |
|
, O |
|
the O |
|
embedded O |
|
app O |
|
in O |
|
sample O |
|
2 O |
|
is O |
|
not O |
|
a O |
|
version O |
|
of O |
|
the O |
|
Android B-System |
|
Settings I-System |
|
app O |
|
but O |
|
instead O |
|
the O |
|
“ O |
|
Amaq B-System |
|
Agency I-System |
|
” O |
|
app O |
|
, O |
|
which O |
|
reports O |
|
on O |
|
ISIS O |
|
related O |
|
news O |
|
. O |
|
|
|
Reports O |
|
indicate O |
|
fake O |
|
versions O |
|
of O |
|
the O |
|
Amaq B-System |
|
app O |
|
exist O |
|
, O |
|
likely O |
|
in O |
|
order O |
|
to O |
|
spy O |
|
on O |
|
those O |
|
that O |
|
use O |
|
it O |
|
. O |
|
|
|
A O |
|
month O |
|
after O |
|
observing O |
|
sample O |
|
2 O |
|
, O |
|
we O |
|
obtained O |
|
another O |
|
which O |
|
used O |
|
the O |
|
same O |
|
package O |
|
name O |
|
as O |
|
sample O |
|
2 O |
|
( O |
|
cn.android.setting B-Indicator |
|
) O |
|
. O |
|
|
|
However O |
|
, O |
|
this O |
|
time O |
|
the O |
|
app O |
|
name O |
|
for O |
|
both O |
|
HenBox B-Malware |
|
and O |
|
the O |
|
embedded O |
|
app O |
|
were O |
|
identical O |
|
: O |
|
Islamawazi B-System |
|
. O |
|
|
|
Islamawazi B-System |
|
is O |
|
also O |
|
known O |
|
as O |
|
the O |
|
Turkistan B-Organization |
|
Islamic I-Organization |
|
Party I-Organization |
|
or O |
|
“ O |
|
TIP O |
|
” O |
|
. O |
|
|
|
This O |
|
organization O |
|
was O |
|
formerly O |
|
known O |
|
as O |
|
the O |
|
East B-Organization |
|
Turkestan I-Organization |
|
Islamic I-Organization |
|
Party I-Organization |
|
and O |
|
is O |
|
purported O |
|
to O |
|
be O |
|
an O |
|
Islamic O |
|
extremist O |
|
separatist O |
|
organization O |
|
founded O |
|
by O |
|
Uyghur O |
|
jihadists O |
|
. O |
|
|
|
The O |
|
embedded O |
|
app O |
|
appears O |
|
to O |
|
be O |
|
a O |
|
media O |
|
player O |
|
. O |
|
|
|
These O |
|
examples O |
|
, O |
|
together O |
|
with O |
|
the O |
|
HenBox B-Malware |
|
app O |
|
placed O |
|
on O |
|
a O |
|
very O |
|
specific O |
|
third-party O |
|
app O |
|
store O |
|
, O |
|
point O |
|
clearly O |
|
to O |
|
at O |
|
least O |
|
some O |
|
of O |
|
the O |
|
intended O |
|
targets O |
|
of O |
|
these O |
|
malicious O |
|
apps O |
|
being O |
|
Uyghurs O |
|
, O |
|
specifically O |
|
those O |
|
with O |
|
interest O |
|
in O |
|
or O |
|
association O |
|
with O |
|
terrorist O |
|
groups O |
|
. O |
|
|
|
These O |
|
threat O |
|
actors O |
|
appear O |
|
to O |
|
be O |
|
choosing O |
|
the O |
|
right O |
|
apps O |
|
– O |
|
those O |
|
that O |
|
could O |
|
be O |
|
popular O |
|
with O |
|
locals O |
|
in O |
|
the O |
|
region O |
|
, O |
|
at O |
|
the O |
|
right O |
|
time O |
|
– O |
|
while O |
|
tensions O |
|
grow O |
|
in O |
|
this O |
|
region O |
|
of O |
|
China O |
|
, O |
|
to O |
|
ensure O |
|
a O |
|
good O |
|
victim O |
|
install-base O |
|
. O |
|
|
|
HenBox B-Malware |
|
Roosts O |
|
HenBox B-Malware |
|
has O |
|
evolved O |
|
over O |
|
the O |
|
past O |
|
three O |
|
years O |
|
, O |
|
and O |
|
of O |
|
the O |
|
almost O |
|
two O |
|
hundred O |
|
HenBox B-Malware |
|
apps O |
|
in O |
|
AutoFocus O |
|
, O |
|
the O |
|
vast O |
|
majority O |
|
contain O |
|
several O |
|
native O |
|
libraries O |
|
as O |
|
well O |
|
as O |
|
other O |
|
components O |
|
in O |
|
order O |
|
to O |
|
achieve O |
|
their O |
|
objective O |
|
. O |
|
|
|
Most O |
|
components O |
|
are O |
|
obfuscated O |
|
in O |
|
some O |
|
way O |
|
, O |
|
whether O |
|
it O |
|
be O |
|
simple O |
|
XOR O |
|
with O |
|
a O |
|
single-byte O |
|
key O |
|
, O |
|
or O |
|
through O |
|
the O |
|
use O |
|
of O |
|
ZIP B-System |
|
or O |
|
Zlib B-System |
|
compression O |
|
wrapped O |
|
with O |
|
RC4 O |
|
encryption O |
|
. O |
|
|
|
These O |
|
components O |
|
are O |
|
responsible O |
|
for O |
|
a O |
|
myriad O |
|
of O |
|
functions O |
|
including O |
|
handling O |
|
decryption O |
|
, O |
|
network O |
|
communications O |
|
, O |
|
gaining O |
|
super-user O |
|
privileges O |
|
, O |
|
monitoring O |
|
system O |
|
logs O |
|
, O |
|
loading O |
|
additional O |
|
Dalvik O |
|
code O |
|
files O |
|
, O |
|
tracking O |
|
the O |
|
device O |
|
location O |
|
and O |
|
more O |
|
. O |
|
|
|
The O |
|
remainder O |
|
of O |
|
this O |
|
section O |
|
describes O |
|
at O |
|
a O |
|
high-level O |
|
what O |
|
HenBox O |
|
is O |
|
capable O |
|
of O |
|
, O |
|
and O |
|
how O |
|
it O |
|
operates O |
|
. O |
|
|
|
The O |
|
description O |
|
is O |
|
based O |
|
on O |
|
analysis O |
|
of O |
|
the O |
|
sample O |
|
described O |
|
in O |
|
Table O |
|
3 O |
|
below O |
|
, O |
|
which O |
|
was O |
|
of O |
|
interest O |
|
given O |
|
its O |
|
C2 O |
|
domain B-Indicator |
|
mefound I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
overlaps O |
|
with O |
|
PlugX B-Malware |
|
, O |
|
Zupdax B-Malware |
|
, O |
|
and O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
malware O |
|
families O |
|
discussed O |
|
in O |
|
more O |
|
detail O |
|
later O |
|
. O |
|
|
|
SHA256 O |
|
Package O |
|
Name O |
|
App O |
|
Name O |
|
a6c7351b09a733a1b3ff8a0901c5bde B-Indicator |
|
fdc3b566bfcedcdf5a338c3a97c9f249b O |
|
com.android.henbox B-Indicator |
|
备份 O |
|
( O |
|
Backup O |
|
) O |
|
Table O |
|
3 O |
|
HenBox B-Malware |
|
variant O |
|
used O |
|
in O |
|
description O |
|
Once O |
|
this O |
|
variant O |
|
of O |
|
HenBox B-Malware |
|
is O |
|
installed O |
|
on O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
device O |
|
, O |
|
the O |
|
app O |
|
can O |
|
be O |
|
executed O |
|
in O |
|
two O |
|
different O |
|
ways O |
|
: O |
|
One O |
|
method O |
|
for O |
|
executing O |
|
HenBox B-Malware |
|
is O |
|
for O |
|
the O |
|
victim O |
|
to O |
|
launch O |
|
the O |
|
malicious O |
|
app O |
|
( O |
|
named O |
|
“ O |
|
Backup O |
|
” O |
|
, O |
|
in O |
|
|
|
this O |
|
instance O |
|
) O |
|
from O |
|
the O |
|
launcher O |
|
view O |
|
on O |
|
their O |
|
device O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
Figure O |
|
3 O |
|
below O |
|
. O |
|
|
|
This O |
|
runs O |
|
code O |
|
in O |
|
the O |
|
onCreate O |
|
( O |
|
) O |
|
method O |
|
of O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
MainActivity O |
|
class O |
|
, O |
|
which O |
|
in O |
|
effect O |
|
is O |
|
the O |
|
program O |
|
’ O |
|
s O |
|
entry O |
|
point O |
|
. O |
|
|
|
This O |
|
process O |
|
is O |
|
defined O |
|
in O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
AndroidManifest.xml O |
|
config O |
|
file O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
the O |
|
following O |
|
snippet O |
|
. O |
|
|
|
Doing O |
|
so O |
|
executes O |
|
code O |
|
checking O |
|
if O |
|
the O |
|
device O |
|
is O |
|
manufactured O |
|
by O |
|
Xiaomi B-Organization |
|
, O |
|
or O |
|
if O |
|
Xiaomi B-Organization |
|
’ I-Organization |
|
s I-Organization |
|
fork O |
|
of O |
|
Android B-System |
|
is O |
|
running O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
Under O |
|
these O |
|
conditions O |
|
, O |
|
the O |
|
app O |
|
continues O |
|
executing O |
|
and O |
|
the O |
|
intent O |
|
of O |
|
targeting O |
|
Xiaomi B-Organization |
|
devices O |
|
and O |
|
users O |
|
could O |
|
be O |
|
inferred O |
|
, O |
|
however O |
|
poorly O |
|
written O |
|
code O |
|
results O |
|
in O |
|
execution O |
|
in O |
|
more O |
|
environments O |
|
than O |
|
perhaps O |
|
intended O |
|
; O |
|
further O |
|
checks O |
|
are O |
|
made O |
|
to O |
|
ascertain O |
|
whether O |
|
the O |
|
app O |
|
is O |
|
running O |
|
on O |
|
an O |
|
emulator O |
|
, O |
|
perhaps O |
|
to O |
|
evade O |
|
researcher O |
|
analysis O |
|
environments O |
|
. O |
|
|
|
Assuming O |
|
these O |
|
checks O |
|
pass O |
|
, O |
|
one O |
|
of O |
|
the O |
|
main O |
|
ELF O |
|
libraries O |
|
is O |
|
loaded O |
|
that O |
|
orchestrates O |
|
other O |
|
components O |
|
and O |
|
provides O |
|
functionality O |
|
to O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
Dalvik O |
|
code O |
|
through O |
|
the O |
|
Java O |
|
Native O |
|
Interface O |
|
( O |
|
JNI O |
|
) O |
|
. O |
|
|
|
HenBox B-Malware |
|
checks O |
|
whether O |
|
this O |
|
execution O |
|
is O |
|
its O |
|
first O |
|
by O |
|
using O |
|
Android B-System |
|
’ O |
|
s O |
|
shared O |
|
preferences O |
|
feature O |
|
to O |
|
persist O |
|
XML O |
|
key-value O |
|
pair O |
|
data O |
|
. O |
|
|
|
If O |
|
it O |
|
is O |
|
the O |
|
first O |
|
execution O |
|
, O |
|
and O |
|
if O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
path O |
|
does O |
|
not O |
|
contain O |
|
“ O |
|
/system/app B-Indicator |
|
” O |
|
( O |
|
i.e O |
|
. O |
|
|
|
HenBox B-Malware |
|
is O |
|
not O |
|
running O |
|
as O |
|
a O |
|
system O |
|
app O |
|
) O |
|
, O |
|
another O |
|
ELF O |
|
library O |
|
is O |
|
loaded O |
|
to O |
|
aid O |
|
with O |
|
executing O |
|
super-user O |
|
commands O |
|
. O |
|
|
|
The O |
|
second O |
|
method O |
|
uses O |
|
intents O |
|
, O |
|
broadcasts O |
|
, O |
|
and O |
|
receivers O |
|
to O |
|
execute O |
|
HenBox O |
|
code O |
|
. O |
|
|
|
Providing O |
|
the O |
|
app O |
|
has O |
|
registered O |
|
an O |
|
intent O |
|
to O |
|
process O |
|
particular O |
|
events O |
|
from O |
|
the O |
|
system O |
|
, O |
|
and O |
|
one O |
|
of O |
|
said O |
|
events O |
|
occurs O |
|
, O |
|
HenBox O |
|
is O |
|
effectively O |
|
brought O |
|
to O |
|
life O |
|
through O |
|
external O |
|
stimulus O |
|
from O |
|
another O |
|
app O |
|
on O |
|
the O |
|
system O |
|
broadcasting O |
|
a O |
|
request O |
|
, O |
|
or O |
|
the O |
|
system O |
|
itself O |
|
broadcasting O |
|
a O |
|
particular O |
|
event O |
|
has O |
|
occurred O |
|
. O |
|
|
|
These O |
|
intents O |
|
are O |
|
typically O |
|
defined O |
|
statically O |
|
in O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
AndroidManifest.xml O |
|
config O |
|
file O |
|
; O |
|
some O |
|
HenBox B-Malware |
|
variants O |
|
register O |
|
further O |
|
intents O |
|
from O |
|
their O |
|
code O |
|
at O |
|
run-time O |
|
. O |
|
|
|
Once O |
|
a O |
|
matching O |
|
intent O |
|
is O |
|
triggered O |
|
, O |
|
the O |
|
respective O |
|
Receiver O |
|
code O |
|
will O |
|
be O |
|
executed O |
|
, O |
|
leading O |
|
to O |
|
other O |
|
HenBox O |
|
behaviors O |
|
being O |
|
launched O |
|
, O |
|
which O |
|
are O |
|
described O |
|
later O |
|
. O |
|
|
|
Table O |
|
4 O |
|
below O |
|
lists O |
|
the O |
|
intents O |
|
that O |
|
are O |
|
statically O |
|
registered O |
|
in O |
|
this O |
|
HenBox B-Malware |
|
variant O |
|
’ O |
|
s O |
|
AndroidManifest.xml O |
|
config O |
|
file O |
|
, O |
|
together O |
|
with O |
|
a O |
|
description O |
|
of O |
|
what O |
|
that O |
|
intent O |
|
does O |
|
, O |
|
and O |
|
when O |
|
it O |
|
would O |
|
be O |
|
used O |
|
. O |
|
|
|
Depending O |
|
on O |
|
the O |
|
intent O |
|
triggered O |
|
, O |
|
one O |
|
of O |
|
two O |
|
Receivers O |
|
would O |
|
be O |
|
called O |
|
, O |
|
in O |
|
this O |
|
instance O |
|
they O |
|
are O |
|
called O |
|
Boot O |
|
or O |
|
Time O |
|
but O |
|
the O |
|
name O |
|
is O |
|
somewhat O |
|
immaterial O |
|
. O |
|
|
|
Receiver O |
|
Intent O |
|
Name O |
|
Description O |
|
BootReceiver O |
|
android.intent.action.BOOT_COMPLETED B-Indicator |
|
System O |
|
notification O |
|
that O |
|
the O |
|
device O |
|
has O |
|
finished O |
|
booting O |
|
. O |
|
|
|
android.intent.action.restart B-Indicator |
|
A O |
|
legacy O |
|
intent O |
|
used O |
|
to O |
|
indicate O |
|
a O |
|
system O |
|
restart O |
|
. O |
|
|
|
android.intent.action.SIM_STATE_CHANGED B-Indicator |
|
System O |
|
notification O |
|
that O |
|
the O |
|
SIM O |
|
card O |
|
has O |
|
changed O |
|
or O |
|
been O |
|
removed O |
|
. O |
|
|
|
android.intent.action.PACKAGE_INSTALL B-Indicator |
|
System O |
|
notification O |
|
that O |
|
the O |
|
download O |
|
and O |
|
eventual O |
|
installation O |
|
of O |
|
an O |
|
app O |
|
package O |
|
is O |
|
happening O |
|
( O |
|
this O |
|
is O |
|
deprecated O |
|
) O |
|
android.intent.action.PACKAGE_ADDED B-Indicator |
|
System O |
|
notification O |
|
that O |
|
a O |
|
new O |
|
app O |
|
package O |
|
has O |
|
been O |
|
installed O |
|
on O |
|
the O |
|
device O |
|
, O |
|
including O |
|
the O |
|
name O |
|
of O |
|
said O |
|
package O |
|
. O |
|
|
|
com.xiaomi.smarthome.receive_alarm B-Indicator |
|
Received O |
|
notifications O |
|
from O |
|
Xiaomi B-Organization |
|
’ O |
|
s O |
|
smart O |
|
home O |
|
IoT O |
|
devices O |
|
. O |
|
|
|
TimeReceiver O |
|
android.intent.action.ACTION_TIME_CHANGED B-Indicator |
|
System O |
|
notification O |
|
that O |
|
the O |
|
time O |
|
was O |
|
set O |
|
. O |
|
|
|
android.intent.action.CONNECTIVITY_CHANGE B-Indicator |
|
System O |
|
notification O |
|
that O |
|
a O |
|
change O |
|
in O |
|
network O |
|
connectivity O |
|
has O |
|
occurred O |
|
, O |
|
either O |
|
lost O |
|
or O |
|
established O |
|
. O |
|
|
|
Since O |
|
Android B-System |
|
version O |
|
7 O |
|
( O |
|
Nougat B-System |
|
) O |
|
this O |
|
information O |
|
is O |
|
gathered O |
|
using O |
|
other O |
|
means O |
|
, O |
|
perhaps O |
|
inferring O |
|
the O |
|
devices O |
|
used O |
|
by O |
|
potential O |
|
victim O |
|
run O |
|
older O |
|
versions O |
|
of O |
|
Android B-System |
|
. O |
|
|
|
Table O |
|
4 O |
|
HenBox B-Malware |
|
variant O |
|
's O |
|
Intents O |
|
and O |
|
Receivers O |
|
Most O |
|
of O |
|
the O |
|
intents O |
|
registered O |
|
in O |
|
the O |
|
AndroidManifest.xml O |
|
file O |
|
, O |
|
or O |
|
loaded O |
|
during O |
|
run-time O |
|
, O |
|
are O |
|
commonly O |
|
found O |
|
in O |
|
malicious O |
|
Android B-System |
|
apps O |
|
. O |
|
|
|
What O |
|
’ O |
|
s O |
|
more O |
|
interesting O |
|
, O |
|
and O |
|
much O |
|
less O |
|
common O |
|
, O |
|
is O |
|
the O |
|
inclusion O |
|
of O |
|
the O |
|
com.xiaomi.smarthome.receive_alarm B-Indicator |
|
intent O |
|
filter O |
|
. O |
|
|
|
Xiaomi B-Organization |
|
, O |
|
a O |
|
privately O |
|
owned O |
|
Chinese O |
|
electronics O |
|
and O |
|
software O |
|
company O |
|
, O |
|
is O |
|
the O |
|
5th O |
|
largest O |
|
smart O |
|
phone O |
|
manufacturer O |
|
in O |
|
the O |
|
world O |
|
and O |
|
also O |
|
manufactures O |
|
IoT O |
|
devices O |
|
for O |
|
the O |
|
home O |
|
. O |
|
|
|
Most O |
|
devices O |
|
can O |
|
be O |
|
controlled O |
|
by O |
|
Xiaomi B-Organization |
|
’ O |
|
s O |
|
“ O |
|
MiHome B-System |
|
” O |
|
Android B-System |
|
app O |
|
, O |
|
which O |
|
is O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
with O |
|
between O |
|
1,000,000 O |
|
and O |
|
5,000,000 O |
|
downloads O |
|
. O |
|
|
|
Given O |
|
the O |
|
nature O |
|
of O |
|
connected O |
|
devices O |
|
in O |
|
smart O |
|
homes O |
|
, O |
|
it O |
|
’ O |
|
s O |
|
highly O |
|
likely O |
|
many O |
|
of O |
|
these O |
|
devices O |
|
, O |
|
and O |
|
indeed O |
|
the O |
|
controller O |
|
app O |
|
itself O |
|
, O |
|
communicate O |
|
with O |
|
one O |
|
another O |
|
sending O |
|
status O |
|
notifications O |
|
, O |
|
alerts O |
|
and O |
|
so O |
|
on O |
|
. O |
|
|
|
Such O |
|
notifications O |
|
would O |
|
be O |
|
received O |
|
by O |
|
the O |
|
MiHome B-System |
|
app O |
|
or O |
|
any O |
|
other O |
|
, O |
|
such O |
|
as O |
|
HenBox B-Malware |
|
, O |
|
so O |
|
long O |
|
as O |
|
they O |
|
register O |
|
their O |
|
intent O |
|
to O |
|
do O |
|
so O |
|
. O |
|
|
|
This O |
|
could O |
|
essentially O |
|
allow O |
|
for O |
|
external O |
|
devices O |
|
to O |
|
act O |
|
as O |
|
a O |
|
trigger O |
|
to O |
|
execute O |
|
the O |
|
malicious O |
|
HenBox B-Malware |
|
code O |
|
, O |
|
or O |
|
perhaps O |
|
afford O |
|
additional O |
|
data O |
|
HenBox B-Malware |
|
can O |
|
collect O |
|
and O |
|
exfiltrate O |
|
. O |
|
|
|
Either O |
|
method O |
|
to O |
|
load O |
|
HenBox B-Malware |
|
ultimately O |
|
results O |
|
in O |
|
an O |
|
instance O |
|
of O |
|
a O |
|
service O |
|
being O |
|
launched O |
|
. O |
|
|
|
This O |
|
service O |
|
hides O |
|
the O |
|
app O |
|
from O |
|
plain O |
|
sight O |
|
and O |
|
loads O |
|
another O |
|
ELF O |
|
library O |
|
to O |
|
gather O |
|
environmental O |
|
information O |
|
about O |
|
the O |
|
device O |
|
, O |
|
such O |
|
as O |
|
running O |
|
processes O |
|
and O |
|
apps O |
|
, O |
|
and O |
|
details O |
|
about O |
|
device O |
|
hardware O |
|
, O |
|
primarily O |
|
through O |
|
parsing O |
|
system O |
|
logs O |
|
and O |
|
querying O |
|
running O |
|
processes O |
|
. O |
|
|
|
The O |
|
service O |
|
continues O |
|
by O |
|
loading O |
|
an O |
|
ELF O |
|
, O |
|
created O |
|
by O |
|
Baidu B-Organization |
|
, O |
|
which O |
|
is O |
|
capable O |
|
of O |
|
tracking O |
|
the O |
|
device O |
|
location O |
|
before O |
|
setting O |
|
up O |
|
a O |
|
monitor O |
|
to O |
|
harvest O |
|
phone O |
|
numbers O |
|
associated O |
|
with O |
|
outgoing O |
|
calls O |
|
for O |
|
those O |
|
numbers O |
|
with O |
|
a O |
|
country O |
|
code O |
|
“ O |
|
+86 O |
|
” O |
|
prefix O |
|
, O |
|
which O |
|
relates O |
|
to O |
|
the O |
|
People O |
|
’ O |
|
s O |
|
Republic O |
|
of O |
|
China O |
|
. O |
|
|
|
Further O |
|
assets O |
|
are O |
|
decrypted O |
|
and O |
|
deployed O |
|
, O |
|
including O |
|
another O |
|
Dalvik O |
|
DEX O |
|
code O |
|
file O |
|
, O |
|
which O |
|
has O |
|
various O |
|
capabilities O |
|
including O |
|
registering O |
|
itself O |
|
as O |
|
the O |
|
incoming O |
|
SMS O |
|
handler O |
|
for O |
|
the O |
|
device O |
|
to O |
|
intercept O |
|
SMS O |
|
messages O |
|
, O |
|
loading O |
|
another O |
|
ELF O |
|
library O |
|
that O |
|
includes O |
|
a O |
|
version O |
|
of O |
|
BusyBox B-System |
|
- O |
|
a O |
|
package O |
|
containing O |
|
various O |
|
stripped-down O |
|
Unix O |
|
tools O |
|
useful O |
|
for O |
|
administering O |
|
such O |
|
systems O |
|
– O |
|
and O |
|
, O |
|
interestingly O |
|
, O |
|
is O |
|
capable O |
|
of O |
|
turning O |
|
off O |
|
the O |
|
sound O |
|
played O |
|
when O |
|
the O |
|
device O |
|
’ O |
|
s O |
|
cameras O |
|
take O |
|
pictures O |
|
. O |
|
|
|
The O |
|
Android B-System |
|
permissions O |
|
requested O |
|
by O |
|
HenBox B-Malware |
|
, O |
|
as O |
|
defined O |
|
in O |
|
the O |
|
apps O |
|
’ O |
|
AndroidManifest.xml O |
|
files O |
|
, O |
|
range O |
|
from O |
|
accessing O |
|
location O |
|
and O |
|
network O |
|
settings O |
|
to O |
|
messages O |
|
, O |
|
call O |
|
, O |
|
and O |
|
contact O |
|
data O |
|
. O |
|
|
|
HenBox B-Malware |
|
can O |
|
also O |
|
access O |
|
sensors O |
|
such O |
|
as O |
|
the O |
|
device O |
|
camera O |
|
( O |
|
s O |
|
) O |
|
and O |
|
the O |
|
microphone O |
|
. O |
|
|
|
Beyond O |
|
the O |
|
Android B-System |
|
app O |
|
itself O |
|
, O |
|
other O |
|
components O |
|
such O |
|
as O |
|
the O |
|
aforementioned O |
|
ELF O |
|
libraries O |
|
have O |
|
additional O |
|
data-stealing O |
|
capabilities O |
|
. O |
|
|
|
One O |
|
ELF O |
|
library O |
|
, O |
|
libloc4d.so B-Indicator |
|
, O |
|
handles O |
|
amongst O |
|
other O |
|
things O |
|
the O |
|
loading O |
|
of O |
|
the O |
|
app-decoded O |
|
ELF O |
|
library O |
|
file O |
|
“ O |
|
sux O |
|
” O |
|
, O |
|
as O |
|
well O |
|
as O |
|
handling O |
|
connectivity O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
The O |
|
sux O |
|
library O |
|
appears O |
|
to O |
|
be O |
|
a O |
|
customized O |
|
super O |
|
user O |
|
( O |
|
su O |
|
) O |
|
tool O |
|
that O |
|
includes O |
|
code O |
|
from O |
|
the O |
|
com.koushikdutta.superuser B-Indicator |
|
app O |
|
and O |
|
carries O |
|
the O |
|
equivalent O |
|
of O |
|
a O |
|
super O |
|
user O |
|
( O |
|
su O |
|
) O |
|
binary O |
|
in O |
|
order O |
|
to O |
|
run O |
|
privileged O |
|
commands O |
|
on O |
|
the O |
|
system O |
|
. O |
|
|
|
The O |
|
primary O |
|
goal O |
|
of O |
|
sux O |
|
appears O |
|
to O |
|
be O |
|
steal O |
|
messages O |
|
and O |
|
other O |
|
data O |
|
from O |
|
popular O |
|
messaging O |
|
and O |
|
social O |
|
media O |
|
apps O |
|
specified O |
|
within O |
|
the O |
|
HenBox B-Malware |
|
sample O |
|
. O |
|
|
|
A O |
|
similar O |
|
tool O |
|
, O |
|
with O |
|
the O |
|
same O |
|
filename O |
|
, O |
|
has O |
|
been O |
|
discussed O |
|
in O |
|
previous O |
|
research O |
|
but O |
|
the O |
|
SpyDealer B-Malware |
|
malware O |
|
appears O |
|
unrelated O |
|
to O |
|
HenBox B-Malware |
|
. O |
|
|
|
More O |
|
likely O |
|
, O |
|
this O |
|
is O |
|
a O |
|
case O |
|
of O |
|
common O |
|
attack O |
|
tools O |
|
being O |
|
re-used O |
|
between O |
|
different O |
|
threat O |
|
actor O |
|
groups O |
|
. O |
|
|
|
This O |
|
particular O |
|
HenBox B-Malware |
|
variant O |
|
, O |
|
as O |
|
listed O |
|
in O |
|
Table O |
|
3 O |
|
above O |
|
, O |
|
harvests O |
|
data O |
|
from O |
|
two O |
|
popular O |
|
messaging O |
|
and O |
|
social O |
|
media O |
|
apps O |
|
: O |
|
Voxer B-System |
|
Walkie B-System |
|
Talkie I-System |
|
Messenger B-System |
|
( O |
|
com.rebelvox.voxer B-Indicator |
|
) O |
|
and O |
|
Tencent B-Organization |
|
’ O |
|
s O |
|
WeChat B-System |
|
( O |
|
com.tencent.mm B-Indicator |
|
) O |
|
. O |
|
|
|
These O |
|
types O |
|
of O |
|
apps O |
|
tend O |
|
to O |
|
store O |
|
their O |
|
data O |
|
in O |
|
databases O |
|
and O |
|
, O |
|
as O |
|
an O |
|
example O |
|
, O |
|
HenBox B-Malware |
|
accesses O |
|
Voxer O |
|
’ O |
|
s O |
|
database O |
|
from O |
|
the O |
|
file O |
|
“ O |
|
/data/data/com.rebelvox.voxer/databases/rv.db B-Indicator |
|
” O |
|
. O |
|
|
|
Once O |
|
opened O |
|
, O |
|
HenBox B-Malware |
|
runs O |
|
the O |
|
following O |
|
query O |
|
to O |
|
gather O |
|
message O |
|
information O |
|
. O |
|
|
|
Not O |
|
long O |
|
after O |
|
this O |
|
variant O |
|
was O |
|
public O |
|
, O |
|
newer O |
|
variants O |
|
of O |
|
HenBox B-Malware |
|
were O |
|
seen O |
|
, O |
|
and O |
|
some O |
|
had O |
|
significant O |
|
increases O |
|
in O |
|
the O |
|
number O |
|
of O |
|
targeted O |
|
apps O |
|
. O |
|
|
|
Table O |
|
5 O |
|
describes O |
|
the O |
|
latest O |
|
variant O |
|
seen O |
|
in O |
|
AutoFocus O |
|
. O |
|
|
|
SHA256 O |
|
Package O |
|
Name O |
|
App O |
|
Name O |
|
First O |
|
Seen O |
|
07994c9f2eeeede199dd6b4e760fce3 B-Indicator |
|
71f03f3cc4307e6551c18d2fbd024a24f B-Indicator |
|
com.android.henbox B-Indicator |
|
备份 O |
|
( O |
|
Backup O |
|
) O |
|
January O |
|
3rd O |
|
2018 O |
|
Table O |
|
6 O |
|
contains O |
|
an O |
|
updated O |
|
list O |
|
of O |
|
targeted O |
|
apps O |
|
from O |
|
which O |
|
this O |
|
newer O |
|
variant O |
|
of O |
|
HenBox B-Malware |
|
is O |
|
capable O |
|
of O |
|
harvesting O |
|
data O |
|
. O |
|
|
|
Interestingly O |
|
, O |
|
the O |
|
two O |
|
communication O |
|
apps O |
|
described O |
|
above O |
|
as O |
|
being O |
|
targeted O |
|
by O |
|
the O |
|
HenBox O |
|
variant O |
|
listed O |
|
in O |
|
Table O |
|
3 O |
|
do O |
|
not O |
|
appear O |
|
in O |
|
this O |
|
updated O |
|
list O |
|
. O |
|
|
|
Package O |
|
Name O |
|
App O |
|
Name O |
|
com.whatsapp B-Indicator |
|
WhatsApp B-System |
|
Messenger B-System |
|
com.pugna.magiccall B-Indicator |
|
n/a O |
|
org.telegram.messenger B-Indicator |
|
Telegram B-System |
|
com.facebook.katana B-Indicator |
|
Facebook B-System |
|
com.twitter.android B-Indicator |
|
Twitter B-System |
|
jp.naver.line.android B-Indicator |
|
LINE B-System |
|
: O |
|
Free O |
|
Calls O |
|
& O |
|
Messages O |
|
com.instanza.cocovoice B-Indicator |
|
Coco O |
|
com.beetalk B-Indicator |
|
BeeTalk B-System |
|
com.gtomato.talkbox B-Indicator |
|
TalkBox B-System |
|
Voice O |
|
Messenger B-System |
|
- O |
|
PTT O |
|
com.viber.voip B-Indicator |
|
Viber B-System |
|
Messenger B-System |
|
com.immomo.momo B-Indicator |
|
MOMO陌陌 B-System |
|
com.facebook.orca B-Indicator |
|
Messenger B-System |
|
– O |
|
Text O |
|
and O |
|
Video O |
|
Chat O |
|
for O |
|
Free O |
|
com.skype.rover B-Indicator |
|
|
|
Skype B-System |
|
; O |
|
3rd O |
|
party O |
|
stores O |
|
only O |
|
Most O |
|
of O |
|
these O |
|
apps O |
|
are O |
|
well O |
|
established O |
|
and O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
, O |
|
however O |
|
, O |
|
com.skype.rover B-Indicator |
|
appears O |
|
to O |
|
be O |
|
available O |
|
only O |
|
on O |
|
third-party O |
|
app O |
|
stores O |
|
. O |
|
|
|
The O |
|
same O |
|
is O |
|
likely O |
|
to O |
|
be O |
|
the O |
|
case O |
|
for O |
|
com.pugna.magiccall B-Indicator |
|
but O |
|
this O |
|
is O |
|
unknown O |
|
currently O |
|
. O |
|
|
|
It O |
|
’ O |
|
s O |
|
clear O |
|
to O |
|
see O |
|
that O |
|
the O |
|
capabilities O |
|
of O |
|
HenBox B-Malware |
|
are O |
|
very O |
|
comprehensive O |
|
, O |
|
both O |
|
in O |
|
terms O |
|
of O |
|
an O |
|
Android B-System |
|
app O |
|
with O |
|
its O |
|
native O |
|
libraries O |
|
and O |
|
given O |
|
the O |
|
amount O |
|
of O |
|
data O |
|
it O |
|
can O |
|
glean O |
|
from O |
|
a O |
|
victim O |
|
. O |
|
|
|
Such O |
|
data O |
|
includes O |
|
contact O |
|
and O |
|
location O |
|
information O |
|
, O |
|
phone O |
|
and O |
|
message O |
|
activity O |
|
, O |
|
the O |
|
ability O |
|
to O |
|
record O |
|
from O |
|
the O |
|
microphone O |
|
, O |
|
camera O |
|
, O |
|
and O |
|
other O |
|
sensors O |
|
as O |
|
well O |
|
as O |
|
the O |
|
capability O |
|
to O |
|
access O |
|
data O |
|
from O |
|
many O |
|
popular O |
|
messaging O |
|
and O |
|
social O |
|
media O |
|
apps O |
|
. O |
|
|
|
Infrastructure O |
|
While O |
|
investigating O |
|
HenBox B-Malware |
|
we O |
|
discovered O |
|
infrastructure O |
|
ties O |
|
to O |
|
other O |
|
malware O |
|
families O |
|
associated O |
|
with O |
|
targeted O |
|
attacks O |
|
against O |
|
Windows B-System |
|
users O |
|
– O |
|
notable O |
|
overlaps O |
|
included O |
|
PlugX B-Malware |
|
, O |
|
Zupdax B-Malware |
|
, O |
|
9002 B-Malware |
|
, O |
|
and O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
. O |
|
|
|
The O |
|
overall O |
|
image O |
|
of O |
|
these O |
|
ties O |
|
is O |
|
below O |
|
in O |
|
Figure O |
|
5 O |
|
and O |
|
paints O |
|
a O |
|
picture O |
|
of O |
|
an O |
|
adversary O |
|
with O |
|
at O |
|
least O |
|
5 O |
|
malware O |
|
families O |
|
in O |
|
their O |
|
toolbox O |
|
dating O |
|
back O |
|
to O |
|
at O |
|
least O |
|
2015 O |
|
. O |
|
|
|
The O |
|
overlap O |
|
between O |
|
the O |
|
HenBox B-Malware |
|
and O |
|
9002 B-Malware |
|
malware O |
|
families O |
|
Unit O |
|
42 O |
|
has O |
|
seen O |
|
involves O |
|
three O |
|
shared O |
|
C2s O |
|
between O |
|
several O |
|
samples O |
|
; O |
|
the O |
|
first O |
|
IP O |
|
below O |
|
is O |
|
used O |
|
for O |
|
more O |
|
than O |
|
half O |
|
of O |
|
the O |
|
HenBox B-Malware |
|
samples O |
|
we O |
|
have O |
|
seen O |
|
to O |
|
date O |
|
: O |
|
47.90.81 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
23 I-Indicator |
|
222.139.212 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
16 I-Indicator |
|
lala513.gicp B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
The O |
|
overlaps O |
|
between O |
|
the O |
|
Henbox B-Malware |
|
, O |
|
PlugX B-Malware |
|
, O |
|
Zupdax B-Malware |
|
, O |
|
and O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
malware O |
|
families O |
|
involves O |
|
a O |
|
web O |
|
of O |
|
shared O |
|
C2s O |
|
and O |
|
IP O |
|
resolutions O |
|
centered O |
|
around O |
|
the O |
|
below O |
|
: O |
|
59.188.196 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
172 I-Indicator |
|
cdncool B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
( O |
|
and O |
|
third-levels O |
|
of O |
|
this O |
|
domain O |
|
) O |
|
www3.mefound B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
www5.zyns B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
w3.changeip B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
org I-Indicator |
|
Ties O |
|
to O |
|
previous O |
|
activity O |
|
The O |
|
registrant O |
|
of O |
|
cdncool B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
also O |
|
registered O |
|
six O |
|
other O |
|
domains O |
|
. O |
|
|
|
To O |
|
date O |
|
, O |
|
Unit O |
|
42 O |
|
has O |
|
seen O |
|
four O |
|
of O |
|
the O |
|
seven O |
|
( O |
|
the O |
|
first O |
|
three O |
|
in O |
|
the O |
|
list O |
|
below O |
|
, O |
|
along O |
|
with O |
|
cdncool B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
) O |
|
used O |
|
in O |
|
malicious O |
|
activity O |
|
and O |
|
it O |
|
is O |
|
reasonable O |
|
to O |
|
assume O |
|
the O |
|
remaining O |
|
three O |
|
are O |
|
or O |
|
were O |
|
intended O |
|
to O |
|
serve O |
|
the O |
|
same O |
|
purpose B-Indicator |
|
. I-Indicator |
|
|
|
tcpdo I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
adminsysteminfo B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
md5c B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
linkdatax B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
csip6 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
biz I-Indicator |
|
adminloader B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
Unit O |
|
42 O |
|
published O |
|
a O |
|
blog O |
|
in O |
|
July O |
|
2016 O |
|
about O |
|
9002 B-Malware |
|
malware O |
|
being O |
|
delivered O |
|
using O |
|
a O |
|
combination O |
|
of O |
|
shortened O |
|
links O |
|
and O |
|
a O |
|
file O |
|
hosted O |
|
on O |
|
Google O |
|
Drive O |
|
. O |
|
|
|
The O |
|
spear O |
|
phishing O |
|
emails O |
|
had O |
|
Myanmar O |
|
political-themed O |
|
lures O |
|
and O |
|
, O |
|
if O |
|
the O |
|
9002 B-Malware |
|
C2 O |
|
server O |
|
responded O |
|
, O |
|
the O |
|
Trojan O |
|
sent O |
|
system O |
|
specific O |
|
information O |
|
along O |
|
with O |
|
the O |
|
string O |
|
“ O |
|
jackhex O |
|
” O |
|
. O |
|
|
|
“ O |
|
jackhex O |
|
” O |
|
has O |
|
also O |
|
been O |
|
part O |
|
of O |
|
a O |
|
C2 O |
|
for O |
|
what O |
|
is O |
|
likely O |
|
related O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
activity O |
|
detailed O |
|
below O |
|
, O |
|
along O |
|
with O |
|
additional O |
|
infrastructure O |
|
ties O |
|
. O |
|
|
|
The O |
|
C2 O |
|
for O |
|
the O |
|
aforementioned O |
|
9002 B-Malware |
|
sample O |
|
was O |
|
logitechwkgame B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
, O |
|
which O |
|
resolved O |
|
to O |
|
the O |
|
IP O |
|
address O |
|
222.239.91 B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
30 I-Indicator |
|
. O |
|
|
|
At O |
|
the O |
|
same O |
|
time O |
|
, O |
|
the O |
|
domain B-Indicator |
|
admin.nslookupdns I-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
also O |
|
resolved O |
|
to O |
|
the O |
|
same O |
|
IP O |
|
address O |
|
, O |
|
suggesting O |
|
that O |
|
these O |
|
two O |
|
domains O |
|
are O |
|
associated O |
|
with O |
|
the O |
|
same O |
|
threat O |
|
actors O |
|
. O |
|
|
|
In O |
|
addition O |
|
, O |
|
admin.nslookupdns B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
was O |
|
a O |
|
C2 O |
|
for O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
samples O |
|
associated O |
|
with O |
|
attacks O |
|
on O |
|
Myanmar O |
|
and O |
|
other O |
|
Asian O |
|
countries O |
|
discussed O |
|
in O |
|
a O |
|
blog O |
|
published O |
|
by O |
|
Arbor B-Organization |
|
Networks I-Organization |
|
in O |
|
April O |
|
2016 O |
|
. O |
|
|
|
Another O |
|
tie O |
|
between O |
|
the O |
|
activity O |
|
is O |
|
the O |
|
C2 O |
|
jackhex.md5c B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
net I-Indicator |
|
, O |
|
which O |
|
was O |
|
also O |
|
used O |
|
as O |
|
a O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
C2 O |
|
in O |
|
the O |
|
Arbor B-Organization |
|
Networks I-Organization |
|
blog O |
|
. O |
|
|
|
“ O |
|
jackhex O |
|
” O |
|
is O |
|
not O |
|
a O |
|
common O |
|
word O |
|
or O |
|
phrase O |
|
and O |
|
, O |
|
as O |
|
noted O |
|
above O |
|
, O |
|
was O |
|
also O |
|
seen O |
|
in O |
|
the O |
|
beacon O |
|
activity O |
|
with O |
|
the O |
|
previously O |
|
discussed O |
|
9002 B-Malware |
|
sample O |
|
. O |
|
|
|
Finally O |
|
, O |
|
since O |
|
publishing O |
|
the O |
|
9002 B-Malware |
|
blog O |
|
, O |
|
Unit O |
|
42 O |
|
has O |
|
also O |
|
seen O |
|
the O |
|
aforementioned O |
|
9002 B-Malware |
|
C2 O |
|
used O |
|
as O |
|
a O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
C2 O |
|
with O |
|
a O |
|
Myanmar O |
|
political-themed O |
|
lure O |
|
. O |
|
|
|
In O |
|
our O |
|
9002 B-Malware |
|
blog O |
|
we O |
|
noted O |
|
some O |
|
additional O |
|
infrastructure O |
|
used O |
|
either O |
|
as O |
|
C2s O |
|
for O |
|
related O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
samples O |
|
, O |
|
or O |
|
domain O |
|
registrant O |
|
overlap O |
|
with O |
|
those O |
|
C2 O |
|
domains O |
|
. O |
|
|
|
When O |
|
we O |
|
published O |
|
that O |
|
blog O |
|
Unit O |
|
42 O |
|
hadn O |
|
’ O |
|
t O |
|
seen O |
|
any O |
|
of O |
|
the O |
|
three O |
|
registrants O |
|
overlap O |
|
domains O |
|
used O |
|
in O |
|
malicious O |
|
activity O |
|
. O |
|
|
|
Since O |
|
then O |
|
, O |
|
we O |
|
have O |
|
seen O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
samples O |
|
using O |
|
third-levels O |
|
of O |
|
querlyurl B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
, O |
|
lending O |
|
further O |
|
credence O |
|
the O |
|
remaining O |
|
two O |
|
domains O |
|
, O |
|
gooledriveservice B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
and O |
|
appupdatemoremagic B-Indicator |
|
[ I-Indicator |
|
. I-Indicator |
|
|
|
] I-Indicator |
|
com I-Indicator |
|
are O |
|
or O |
|
were O |
|
intended O |
|
for O |
|
malicious O |
|
use O |
|
. O |
|
|
|
While O |
|
we O |
|
do O |
|
not O |
|
have O |
|
complete O |
|
targeting O |
|
, O |
|
information O |
|
associated O |
|
with O |
|
these O |
|
Poison B-Malware |
|
Ivy I-Malware |
|
samples O |
|
, O |
|
several O |
|
of O |
|
the O |
|
decoy O |
|
files O |
|
were O |
|
in O |
|
Chinese O |
|
and O |
|
appear O |
|
to O |
|
be O |
|
part O |
|
of O |
|
a O |
|
2016 O |
|
campaign O |
|
targeting O |
|
organizations O |
|
in O |
|
Taiwan O |
|
with O |
|
political-themed O |
|
lures O |
|
. O |
|
|
|
Conclusion O |
|
Typically O |
|
masquerading O |
|
as O |
|
legitimate O |
|
Android B-Malware |
|
system O |
|
apps O |
|
, O |
|
and O |
|
sometimes O |
|
embedding O |
|
legitimate O |
|
apps O |
|
within O |
|
them O |
|
, O |
|
the O |
|
primary O |
|
goal O |
|
of O |
|
the O |
|
malicious O |
|
HenBox B-Malware |
|
appears O |
|
to O |
|
be O |
|
to O |
|
spy O |
|
on O |
|
those O |
|
who O |
|
install O |
|
them O |
|
. O |
|
|
|
Using O |
|
similar O |
|
traits O |
|
, O |
|
such O |
|
as O |
|
copycat O |
|
iconography O |
|
and O |
|
app O |
|
or O |
|
package O |
|
names O |
|
, O |
|
victims O |
|
are O |
|
likely O |
|
socially O |
|
engineered O |
|
into O |
|
installing O |
|
the O |
|
malicious O |
|
apps O |
|
, O |
|
especially O |
|
when O |
|
available O |
|
on O |
|
so-called O |
|
third-party O |
|
( O |
|
i.e O |
|
. O |
|
|
|
non-Google O |
|
Play B-System |
|
) O |
|
app O |
|
stores O |
|
which O |
|
often O |
|
have O |
|
fewer O |
|
security O |
|
and O |
|
vetting O |
|
procedures O |
|
for O |
|
the O |
|
apps O |
|
they O |
|
host O |
|
. O |
|
|
|
It O |
|
’ O |
|
s O |
|
possible O |
|
, O |
|
as O |
|
with O |
|
other O |
|
Android B-System |
|
malware O |
|
, O |
|
that O |
|
some O |
|
apps O |
|
may O |
|
also O |
|
be O |
|
available O |
|
on O |
|
forums O |
|
, O |
|
file-sharing O |
|
sites O |
|
or O |
|
even O |
|
sent O |
|
to O |
|
victims O |
|
as O |
|
email O |
|
attachments O |
|
, O |
|
and O |
|
we O |
|
were O |
|
only O |
|
able O |
|
to O |
|
determine O |
|
the O |
|
delivery O |
|
mechanism O |
|
for O |
|
a O |
|
handful O |
|
of O |
|
the O |
|
apps O |
|
we O |
|
have O |
|
been O |
|
able O |
|
to O |
|
find O |
|
. O |
|
|
|
The O |
|
hosting O |
|
locations O |
|
seen O |
|
for O |
|
some O |
|
HenBox B-Malware |
|
samples O |
|
, O |
|
together O |
|
with O |
|
the O |
|
nature O |
|
of O |
|
some O |
|
embedded O |
|
apps O |
|
including O |
|
: O |
|
those O |
|
targeted O |
|
at O |
|
extremist O |
|
groups O |
|
, O |
|
those O |
|
who O |
|
use O |
|
VPN O |
|
or O |
|
other O |
|
privacy-enabling O |
|
apps O |
|
, O |
|
and O |
|
those O |
|
who O |
|
speak O |
|
the O |
|
Uyghur O |
|
language O |
|
, O |
|
highlights O |
|
the O |
|
victim O |
|
profile O |
|
the O |
|
threat O |
|
actors O |
|
were O |
|
seeking O |
|
to O |
|
attack O |
|
. O |
|
|
|
The O |
|
targets O |
|
and O |
|
capabilities O |
|
of O |
|
HenBox B-Malware |
|
, O |
|
in O |
|
addition O |
|
to O |
|
the O |
|
ties O |
|
to O |
|
previous O |
|
activity O |
|
using O |
|
four O |
|
different O |
|
Windows O |
|
malware O |
|
families O |
|
with O |
|
political-themed O |
|
lures O |
|
against O |
|
several O |
|
different O |
|
South O |
|
East O |
|
Asian O |
|
countries O |
|
, O |
|
indicates O |
|
this O |
|
activity O |
|
likely O |
|
represents O |
|
an O |
|
at O |
|
least O |
|
three-year-old O |
|
espionage O |
|
campaign O |
|
. O |
|
|
|
THURSDAY O |
|
, O |
|
OCTOBER O |
|
11 O |
|
, O |
|
2018 O |
|
GPlayed B-Malware |
|
Trojan O |
|
- O |
|
.Net O |
|
playing O |
|
with O |
|
Google B-Organization |
|
Market O |
|
Introduction O |
|
In O |
|
a O |
|
world O |
|
where O |
|
everything O |
|
is O |
|
always O |
|
connected O |
|
, O |
|
and O |
|
mobile O |
|
devices O |
|
are O |
|
involved O |
|
in O |
|
individuals O |
|
' O |
|
day-to-day O |
|
lives O |
|
more O |
|
and O |
|
more O |
|
often O |
|
, O |
|
malicious O |
|
actors O |
|
are O |
|
seeing O |
|
increased O |
|
opportunities O |
|
to O |
|
attack O |
|
these O |
|
devices O |
|
. O |
|
|
|
Cisco B-Organization |
|
Talos I-Organization |
|
has O |
|
identified O |
|
the O |
|
latest O |
|
attempt O |
|
to O |
|
penetrate O |
|
mobile O |
|
devices O |
|
— O |
|
a O |
|
new O |
|
Android B-System |
|
trojan O |
|
that O |
|
we O |
|
have O |
|
dubbed O |
|
" O |
|
GPlayed B-Malware |
|
. O |
|
|
|
'' O |
|
This O |
|
is O |
|
a O |
|
trojan O |
|
with O |
|
many O |
|
built-in O |
|
capabilities O |
|
. O |
|
|
|
At O |
|
the O |
|
same O |
|
time O |
|
, O |
|
it O |
|
's O |
|
extremely O |
|
flexible O |
|
, O |
|
making O |
|
it O |
|
a O |
|
very O |
|
effective O |
|
tool O |
|
for O |
|
malicious O |
|
actors O |
|
. O |
|
|
|
The O |
|
sample O |
|
we O |
|
analyzed O |
|
uses O |
|
an O |
|
icon O |
|
very O |
|
similar O |
|
to O |
|
Google B-System |
|
Apps I-System |
|
, O |
|
with O |
|
the O |
|
label O |
|
" O |
|
Google B-System |
|
Play I-System |
|
Marketplace I-System |
|
'' O |
|
to O |
|
disguise O |
|
itself O |
|
. O |
|
|
|
The O |
|
malicious O |
|
application O |
|
is O |
|
on O |
|
the O |
|
left-hand O |
|
side O |
|
. O |
|
|
|
What O |
|
makes O |
|
this O |
|
malware O |
|
extremely O |
|
powerful O |
|
is O |
|
the O |
|
capability O |
|
to O |
|
adapt O |
|
after O |
|
it O |
|
's O |
|
deployed O |
|
. O |
|
|
|
In O |
|
order O |
|
to O |
|
achieve O |
|
this O |
|
adaptability O |
|
, O |
|
the O |
|
operator O |
|
has O |
|
the O |
|
capability O |
|
to O |
|
remotely O |
|
load O |
|
plugins O |
|
, O |
|
inject O |
|
scripts O |
|
and O |
|
even O |
|
compile O |
|
new O |
|
.NET B-System |
|
code O |
|
that O |
|
can O |
|
be O |
|
executed O |
|
. O |
|
|
|
Our O |
|
analysis O |
|
indicates O |
|
that O |
|
this O |
|
trojan O |
|
is O |
|
in O |
|
its O |
|
testing O |
|
stage O |
|
but O |
|
given O |
|
its O |
|
potential O |
|
, O |
|
every O |
|
mobile O |
|
user O |
|
should O |
|
be O |
|
aware O |
|
of O |
|
GPlayed B-Malware |
|
. O |
|
|
|
Mobile O |
|
developers O |
|
have O |
|
recently O |
|
begun O |
|
eschewing O |
|
traditional O |
|
app O |
|
stores O |
|
and O |
|
instead O |
|
want O |
|
to O |
|
deliver O |
|
their O |
|
software O |
|
directly O |
|
through O |
|
their O |
|
own O |
|
means O |
|
. O |
|
|
|
But O |
|
GPlayed B-Malware |
|
is O |
|
an O |
|
example O |
|
of O |
|
where O |
|
this O |
|
can O |
|
go O |
|
wrong O |
|
, O |
|
especially O |
|
if O |
|
a O |
|
mobile O |
|
user O |
|
is O |
|
not O |
|
aware O |
|
of O |
|
how O |
|
to O |
|
distinguish O |
|
a O |
|
fake O |
|
app O |
|
versus O |
|
a O |
|
real O |
|
one O |
|
. O |
|
|
|
Trojan O |
|
architecture O |
|
and O |
|
capabilities O |
|
This O |
|
malware O |
|
is O |
|
written O |
|
in O |
|
.NET B-System |
|
using O |
|
the O |
|
Xamarin B-System |
|
environment O |
|
for O |
|
mobile O |
|
applications O |
|
. O |
|
|
|
The O |
|
main O |
|
DLL O |
|
is O |
|
called O |
|
" O |
|
Reznov.DLL B-Indicator |
|
. O |
|
|
|
'' O |
|
This O |
|
DLL O |
|
contains O |
|
one O |
|
root O |
|
class O |
|
called O |
|
" O |
|
eClient O |
|
, O |
|
'' O |
|
which O |
|
is O |
|
the O |
|
core O |
|
of O |
|
the O |
|
trojan O |
|
. O |
|
|
|
The O |
|
imports O |
|
reveal O |
|
the O |
|
use O |
|
of O |
|
a O |
|
second O |
|
DLL O |
|
called O |
|
" O |
|
eCommon.dll B-Indicator |
|
. O |
|
|
|
'' O |
|
We O |
|
determined O |
|
that O |
|
the O |
|
" O |
|
eCommon O |
|
'' O |
|
file O |
|
contains O |
|
support O |
|
code O |
|
and O |
|
structures O |
|
that O |
|
are O |
|
platform O |
|
independent O |
|
. O |
|
|
|
The O |
|
main O |
|
DLL O |
|
also O |
|
contains O |
|
eClient O |
|
subclasses O |
|
that O |
|
implement O |
|
some O |
|
of O |
|
the O |
|
native O |
|
capabilities O |
|
. O |
|
|
|
The O |
|
package O |
|
certificate O |
|
is O |
|
issued O |
|
under O |
|
the O |
|
package O |
|
name O |
|
, O |
|
which O |
|
also O |
|
resembles O |
|
the O |
|
name O |
|
of O |
|
the O |
|
main O |
|
DLL O |
|
name O |
|
. O |
|
|
|
Certificate O |
|
information O |
|
The O |
|
Android B-System |
|
package O |
|
is O |
|
named O |
|
" O |
|
verReznov.Coampany B-Indicator |
|
. O |
|
|
|
'' O |
|
The O |
|
application O |
|
uses O |
|
the O |
|
label O |
|
" O |
|
Installer B-Indicator |
|
'' O |
|
and O |
|
its O |
|
name O |
|
is O |
|
" O |
|
android.app.Application B-Indicator |
|
. O |
|
|
|
'' O |
|
Package O |
|
permissions O |
|
The O |
|
trojan O |
|
declares O |
|
numerous O |
|
permissions O |
|
in O |
|
the O |
|
manifest O |
|
, O |
|
from O |
|
which O |
|
we O |
|
should O |
|
highlight O |
|
the O |
|
BIND_DEVICE_ADMIN O |
|
, O |
|
which O |
|
provides O |
|
nearly O |
|
full O |
|
control O |
|
of O |
|
the O |
|
device O |
|
to O |
|
the O |
|
trojan O |
|
. O |
|
|
|
This O |
|
trojan O |
|
is O |
|
highly O |
|
evolved O |
|
in O |
|
its O |
|
design O |
|
. O |
|
|
|
It O |
|
has O |
|
modular O |
|
architecture O |
|
implemented O |
|
in O |
|
the O |
|
form O |
|
of O |
|
plugins O |
|
, O |
|
or O |
|
it O |
|
can O |
|
receive O |
|
new O |
|
.NET B-System |
|
source O |
|
code O |
|
, O |
|
which O |
|
will O |
|
be O |
|
compiled O |
|
on O |
|
the O |
|
device O |
|
in O |
|
runtime O |
|
. O |
|
|
|
Initialization O |
|
of O |
|
the O |
|
compiler O |
|
object O |
|
The O |
|
plugins O |
|
can O |
|
be O |
|
added O |
|
in O |
|
runtime O |
|
, O |
|
or O |
|
they O |
|
can O |
|
be O |
|
added O |
|
as O |
|
a O |
|
package O |
|
resource O |
|
at O |
|
packaging O |
|
time O |
|
. O |
|
|
|
This O |
|
means O |
|
that O |
|
the O |
|
authors O |
|
or O |
|
the O |
|
operators O |
|
can O |
|
add O |
|
capabilities O |
|
without O |
|
the O |
|
need O |
|
to O |
|
recompile O |
|
and O |
|
upgrade O |
|
the O |
|
trojan O |
|
package O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
Trojan O |
|
native O |
|
capabilities O |
|
This O |
|
is O |
|
a O |
|
full-fledged O |
|
trojan O |
|
with O |
|
capabilities O |
|
ranging O |
|
from O |
|
those O |
|
of O |
|
a O |
|
banking O |
|
trojan O |
|
to O |
|
a O |
|
full O |
|
spying O |
|
trojan O |
|
. O |
|
|
|
This O |
|
means O |
|
that O |
|
the O |
|
malware O |
|
can O |
|
do O |
|
anything O |
|
from O |
|
harvest O |
|
the O |
|
user O |
|
's O |
|
banking O |
|
credentials O |
|
, O |
|
to O |
|
monitoring O |
|
the O |
|
device O |
|
's O |
|
location O |
|
. O |
|
|
|
There O |
|
are O |
|
several O |
|
indicators O |
|
( O |
|
see O |
|
section O |
|
" O |
|
trojan O |
|
activity O |
|
'' O |
|
below O |
|
) O |
|
that O |
|
it O |
|
is O |
|
in O |
|
its O |
|
last O |
|
stages O |
|
of O |
|
development O |
|
, O |
|
but O |
|
it O |
|
has O |
|
the O |
|
potential O |
|
to O |
|
be O |
|
a O |
|
serious O |
|
threat O |
|
. O |
|
|
|
Trojan O |
|
details O |
|
Upon O |
|
boot O |
|
, O |
|
the O |
|
trojan O |
|
will O |
|
start O |
|
by O |
|
populating O |
|
a O |
|
shared O |
|
preferences O |
|
file O |
|
with O |
|
the O |
|
configuration O |
|
it O |
|
has O |
|
on O |
|
its O |
|
internal O |
|
structures O |
|
. O |
|
|
|
Afterward O |
|
, O |
|
it O |
|
will O |
|
start O |
|
several O |
|
timers O |
|
to O |
|
execute O |
|
different O |
|
tasks O |
|
. O |
|
|
|
The O |
|
first O |
|
timer O |
|
will O |
|
be O |
|
fired O |
|
on O |
|
the O |
|
configured O |
|
interval O |
|
( O |
|
20 O |
|
seconds O |
|
in O |
|
this O |
|
case O |
|
) O |
|
, O |
|
pinging O |
|
the O |
|
command O |
|
and O |
|
control O |
|
( O |
|
C2 O |
|
) O |
|
server O |
|
. O |
|
|
|
The O |
|
response O |
|
can O |
|
either O |
|
be O |
|
a O |
|
simple O |
|
" O |
|
OK O |
|
, O |
|
'' O |
|
or O |
|
can O |
|
be O |
|
a O |
|
request O |
|
to O |
|
perform O |
|
some O |
|
action O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
The O |
|
second O |
|
timer O |
|
will O |
|
run O |
|
every O |
|
five O |
|
seconds O |
|
and O |
|
it O |
|
will O |
|
try O |
|
to O |
|
enable O |
|
the O |
|
WiFi O |
|
if O |
|
it O |
|
's O |
|
disabled O |
|
. O |
|
|
|
The O |
|
third O |
|
timer O |
|
will O |
|
fire O |
|
every O |
|
10 O |
|
seconds O |
|
and O |
|
will O |
|
attempt O |
|
to O |
|
register O |
|
the O |
|
device O |
|
into O |
|
the O |
|
C2 O |
|
and O |
|
register O |
|
wake-up O |
|
locks O |
|
on O |
|
the O |
|
system O |
|
to O |
|
control O |
|
the O |
|
device O |
|
's O |
|
status O |
|
. O |
|
|
|
During O |
|
the O |
|
trojan O |
|
registration O |
|
stage O |
|
, O |
|
the O |
|
trojan O |
|
exfiltrates O |
|
private O |
|
information O |
|
such O |
|
as O |
|
the O |
|
phone O |
|
's O |
|
model O |
|
, O |
|
IMEI O |
|
, O |
|
phone O |
|
number O |
|
and O |
|
country O |
|
. O |
|
|
|
It O |
|
will O |
|
also O |
|
report O |
|
the O |
|
version O |
|
of O |
|
Android B-System |
|
that O |
|
the O |
|
phone O |
|
is O |
|
running O |
|
and O |
|
any O |
|
additional O |
|
capabilities O |
|
. O |
|
|
|
Device O |
|
registration O |
|
This O |
|
is O |
|
the O |
|
last O |
|
of O |
|
the O |
|
three O |
|
main O |
|
timers O |
|
that O |
|
are O |
|
created O |
|
. O |
|
|
|
The O |
|
trojan O |
|
will O |
|
register O |
|
the O |
|
SMS O |
|
handler O |
|
, O |
|
which O |
|
will O |
|
forward O |
|
the O |
|
contents O |
|
and O |
|
the O |
|
sender O |
|
of O |
|
all O |
|
of O |
|
the O |
|
SMS O |
|
messages O |
|
on O |
|
the O |
|
phone O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
The O |
|
final O |
|
step O |
|
in O |
|
the O |
|
trojan O |
|
's O |
|
initialization O |
|
is O |
|
the O |
|
escalation O |
|
and O |
|
maintenance O |
|
of O |
|
privileges O |
|
in O |
|
the O |
|
device O |
|
. O |
|
|
|
This O |
|
is O |
|
done O |
|
both O |
|
by O |
|
requesting O |
|
admin O |
|
privileges O |
|
on O |
|
the O |
|
device O |
|
and O |
|
asking O |
|
the O |
|
user O |
|
to O |
|
allow O |
|
the O |
|
application O |
|
to O |
|
access O |
|
the O |
|
device O |
|
's O |
|
settings O |
|
. O |
|
|
|
Privilege O |
|
escalation O |
|
requests O |
|
The O |
|
screens O |
|
asking O |
|
for O |
|
the O |
|
user O |
|
's O |
|
approval O |
|
wo O |
|
n't O |
|
close O |
|
unless O |
|
the O |
|
user O |
|
approves O |
|
the O |
|
privilege O |
|
escalation O |
|
. O |
|
|
|
If O |
|
the O |
|
user O |
|
closes O |
|
the O |
|
windows O |
|
, O |
|
they O |
|
will O |
|
appear O |
|
again O |
|
due O |
|
to O |
|
the O |
|
timer O |
|
configuration O |
|
. O |
|
|
|
After O |
|
the O |
|
installation O |
|
of O |
|
the O |
|
trojan O |
|
, O |
|
it O |
|
will O |
|
wait O |
|
randomly O |
|
between O |
|
three O |
|
and O |
|
five O |
|
minutes O |
|
to O |
|
activate O |
|
one O |
|
of O |
|
the O |
|
native O |
|
capabilities O |
|
— O |
|
these O |
|
are O |
|
implemented O |
|
on O |
|
the O |
|
eClient O |
|
subclass O |
|
called O |
|
" O |
|
GoogleCC O |
|
. O |
|
|
|
'' O |
|
This O |
|
class O |
|
will O |
|
open O |
|
a O |
|
WebView O |
|
with O |
|
a O |
|
Google-themed B-Organization |
|
page O |
|
asking O |
|
for O |
|
payment O |
|
in O |
|
order O |
|
to O |
|
use O |
|
the O |
|
Google B-Organization |
|
services O |
|
. O |
|
|
|
This O |
|
will O |
|
take O |
|
the O |
|
user O |
|
through O |
|
several O |
|
steps O |
|
until O |
|
it O |
|
collects O |
|
all O |
|
the O |
|
necessary O |
|
credit O |
|
card O |
|
information O |
|
, O |
|
which O |
|
will O |
|
be O |
|
checked O |
|
online O |
|
and O |
|
exfiltrated O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
During O |
|
this O |
|
process O |
|
, O |
|
an O |
|
amount O |
|
of O |
|
money O |
|
, O |
|
configured O |
|
by O |
|
the O |
|
malicious O |
|
operator O |
|
, O |
|
is O |
|
requested O |
|
to O |
|
the O |
|
user O |
|
. O |
|
|
|
Steps O |
|
to O |
|
request O |
|
the O |
|
user O |
|
's O |
|
credit O |
|
card O |
|
information O |
|
In O |
|
our O |
|
sample O |
|
configuration O |
|
, O |
|
the O |
|
request O |
|
for O |
|
the O |
|
views O |
|
above O |
|
can O |
|
not O |
|
be O |
|
canceled O |
|
or O |
|
removed O |
|
from O |
|
the O |
|
screen O |
|
— O |
|
behaving O |
|
just O |
|
like O |
|
a O |
|
screen O |
|
lock O |
|
that O |
|
wo O |
|
n't O |
|
be O |
|
disabled O |
|
without O |
|
providing O |
|
credit O |
|
card O |
|
information O |
|
. O |
|
|
|
All O |
|
communication O |
|
with O |
|
the O |
|
C2 O |
|
is O |
|
done O |
|
over O |
|
HTTP O |
|
. O |
|
|
|
It O |
|
will O |
|
use O |
|
either O |
|
a O |
|
standard O |
|
web O |
|
request O |
|
or O |
|
it O |
|
will O |
|
write O |
|
data O |
|
into O |
|
a O |
|
web O |
|
socket O |
|
if O |
|
the O |
|
first O |
|
method O |
|
fails O |
|
. O |
|
|
|
The O |
|
C2 O |
|
can O |
|
also O |
|
use O |
|
WebSocket O |
|
as O |
|
a O |
|
backup O |
|
communication O |
|
channel O |
|
. O |
|
|
|
Before O |
|
sending O |
|
any O |
|
data O |
|
to O |
|
the O |
|
C2 O |
|
using O |
|
the O |
|
trojan O |
|
attempts O |
|
to O |
|
disguise O |
|
its O |
|
data O |
|
, O |
|
the O |
|
data O |
|
is O |
|
serialized O |
|
using O |
|
JSON O |
|
, O |
|
which O |
|
is O |
|
then O |
|
encoded O |
|
in O |
|
Base64 O |
|
. O |
|
|
|
However O |
|
, O |
|
the O |
|
trojan O |
|
replaces O |
|
the O |
|
'= O |
|
' O |
|
by O |
|
'AAAZZZXXX O |
|
' O |
|
, O |
|
the O |
|
'+ O |
|
' O |
|
by O |
|
'| O |
|
' O |
|
and O |
|
the O |
|
'/ O |
|
' O |
|
by O |
|
' O |
|
. O |
|
|
|
' O |
|
to O |
|
disguise O |
|
the O |
|
Base64 O |
|
. O |
|
|
|
Request O |
|
encoding O |
|
process O |
|
The O |
|
HTTP O |
|
requests O |
|
follow O |
|
the O |
|
format O |
|
below O |
|
, O |
|
while O |
|
on O |
|
the O |
|
WebSocket O |
|
only O |
|
the O |
|
query O |
|
data O |
|
is O |
|
written O |
|
. O |
|
|
|
? O |
|
|
|
q= O |
|
- O |
|
: O |
|
As O |
|
is O |
|
common O |
|
with O |
|
trojans O |
|
, O |
|
the O |
|
communication O |
|
is O |
|
always O |
|
initiated O |
|
by O |
|
the O |
|
trojan O |
|
on O |
|
the O |
|
device O |
|
to O |
|
the O |
|
C2 O |
|
. O |
|
|
|
The O |
|
request O |
|
codes O |
|
are O |
|
actually O |
|
replies O |
|
to O |
|
the O |
|
C2 O |
|
action O |
|
requests O |
|
, O |
|
which O |
|
are O |
|
actually O |
|
called O |
|
" O |
|
responses O |
|
. O |
|
|
|
'' O |
|
There O |
|
are O |
|
27 O |
|
response O |
|
codes O |
|
that O |
|
the O |
|
C2 O |
|
can O |
|
use O |
|
to O |
|
make O |
|
requests O |
|
to O |
|
the O |
|
trojan O |
|
, O |
|
which O |
|
pretty O |
|
much O |
|
match O |
|
what O |
|
's O |
|
listed O |
|
in O |
|
the O |
|
capabilities O |
|
section O |
|
. O |
|
|
|
Error O |
|
Registration O |
|
Ok O |
|
Empty O |
|
SendSMS O |
|
RequestGoogleCC O |
|
Wipe O |
|
OpenBrowser O |
|
SendUSSD O |
|
RequestSMSList O |
|
RequestAppList O |
|
RequestLocation O |
|
ShowNotification O |
|
SetLockPassword O |
|
LockNow O |
|
MuteSound O |
|
LoadScript O |
|
LoadPlugin O |
|
ServerChange O |
|
StartApp O |
|
CallPhone O |
|
SetPingTimer O |
|
SMSBroadcast O |
|
RequestContacts O |
|
AddInject O |
|
RemoveInject O |
|
Evaluate O |
|
Another O |
|
feature O |
|
of O |
|
this O |
|
trojan O |
|
is O |
|
the O |
|
ability O |
|
to O |
|
register O |
|
injects O |
|
, O |
|
which O |
|
are O |
|
JavaScript O |
|
snippets O |
|
of O |
|
code O |
|
. O |
|
|
|
These O |
|
will O |
|
be O |
|
executed O |
|
in O |
|
a O |
|
WebView O |
|
object O |
|
created O |
|
by O |
|
the O |
|
trojan O |
|
. O |
|
|
|
This O |
|
gives O |
|
the O |
|
operators O |
|
the O |
|
capability O |
|
to O |
|
trick O |
|
the O |
|
user O |
|
into O |
|
accessing O |
|
any O |
|
site O |
|
while O |
|
stealing O |
|
the O |
|
user O |
|
's O |
|
cookies O |
|
or O |
|
forging O |
|
form O |
|
fields O |
|
, O |
|
like O |
|
account O |
|
numbers O |
|
or O |
|
phone O |
|
numbers O |
|
. O |
|
|
|
Trojan O |
|
activity O |
|
At O |
|
the O |
|
time O |
|
of O |
|
the O |
|
writing O |
|
of O |
|
this O |
|
post O |
|
, O |
|
all O |
|
URLs O |
|
( O |
|
see O |
|
IOC O |
|
section O |
|
) O |
|
found O |
|
on O |
|
the O |
|
sample O |
|
were O |
|
inactive O |
|
, O |
|
and O |
|
it O |
|
does O |
|
not O |
|
seem O |
|
to O |
|
be O |
|
widespread O |
|
. O |
|
|
|
There O |
|
are O |
|
some O |
|
indicators O |
|
that O |
|
this O |
|
sample O |
|
is O |
|
just O |
|
a O |
|
test O |
|
sample O |
|
on O |
|
its O |
|
final O |
|
stages O |
|
of O |
|
development O |
|
. O |
|
|
|
There O |
|
are O |
|
several O |
|
strings O |
|
and O |
|
labels O |
|
still O |
|
mentioning O |
|
'test O |
|
' O |
|
or O |
|
'testcc O |
|
' O |
|
— O |
|
even O |
|
the O |
|
URL O |
|
used O |
|
for O |
|
the O |
|
credit O |
|
card O |
|
data O |
|
exfiltration O |
|
is O |
|
named O |
|
" O |
|
testcc.php B-Indicator |
|
. O |
|
|
|
'' O |
|
Debug O |
|
information O |
|
on O |
|
logcat O |
|
Another O |
|
indicator O |
|
is O |
|
the O |
|
amount O |
|
of O |
|
debugging O |
|
information O |
|
the O |
|
trojan O |
|
is O |
|
still O |
|
generating O |
|
— O |
|
a O |
|
production-level O |
|
trojan O |
|
would O |
|
keep O |
|
its O |
|
logging O |
|
to O |
|
a O |
|
minimum O |
|
. O |
|
|
|
The O |
|
only O |
|
sample O |
|
was O |
|
found O |
|
on O |
|
public O |
|
repositories O |
|
and O |
|
almost O |
|
seemed O |
|
to O |
|
indicate O |
|
a O |
|
test O |
|
run O |
|
to O |
|
determine O |
|
the O |
|
detection O |
|
ratio O |
|
of O |
|
the O |
|
sample O |
|
. O |
|
|
|
We O |
|
have O |
|
observed O |
|
this O |
|
trojan O |
|
being O |
|
submitted O |
|
to O |
|
public O |
|
antivirus O |
|
testing O |
|
platforms O |
|
, O |
|
once O |
|
as O |
|
a O |
|
package O |
|
and O |
|
once O |
|
for O |
|
each O |
|
DLL O |
|
to O |
|
determine O |
|
the O |
|
detection O |
|
ratio O |
|
. O |
|
|
|
The O |
|
sample O |
|
analyzed O |
|
was O |
|
targeted O |
|
at O |
|
Russian-speaking O |
|
users O |
|
, O |
|
as O |
|
most O |
|
of O |
|
the O |
|
user O |
|
interaction O |
|
pages O |
|
are O |
|
written O |
|
in O |
|
Russian O |
|
. O |
|
|
|
However O |
|
, O |
|
given O |
|
the O |
|
way O |
|
the O |
|
trojan O |
|
is O |
|
built O |
|
, O |
|
it O |
|
is O |
|
highly O |
|
customizable O |
|
, O |
|
meaning O |
|
that O |
|
adapting O |
|
it O |
|
to O |
|
a O |
|
different O |
|
language O |
|
would O |
|
be O |
|
extremely O |
|
easy O |
|
. O |
|
|
|
The O |
|
wide O |
|
range O |
|
of O |
|
capabilities O |
|
does O |
|
n't O |
|
limit O |
|
this O |
|
trojan O |
|
to O |
|
a O |
|
specific O |
|
malicious O |
|
activity O |
|
like O |
|
a O |
|
banking O |
|
trojan O |
|
or O |
|
a O |
|
ransomware O |
|
. O |
|
|
|
This O |
|
makes O |
|
it O |
|
impossible O |
|
to O |
|
create O |
|
a O |
|
target O |
|
profile O |
|
. O |
|
|
|
Conclusion O |
|
This O |
|
trojan O |
|
shows O |
|
a O |
|
new O |
|
path O |
|
for O |
|
threats O |
|
to O |
|
evolve O |
|
. O |
|
|
|
Having O |
|
the O |
|
ability O |
|
to O |
|
move O |
|
code O |
|
from O |
|
desktops O |
|
to O |
|
mobile O |
|
platforms O |
|
with O |
|
no O |
|
effort O |
|
, O |
|
like O |
|
the O |
|
eCommon.DLL B-Indicator |
|
demonstrates O |
|
that O |
|
malicious O |
|
actors O |
|
can O |
|
create O |
|
hybrid O |
|
threats O |
|
faster O |
|
and O |
|
with O |
|
fewer O |
|
resources O |
|
involved O |
|
than O |
|
ever O |
|
before O |
|
. O |
|
|
|
This O |
|
trojan O |
|
's O |
|
design O |
|
and O |
|
implementation O |
|
is O |
|
of O |
|
an O |
|
uncommonly O |
|
high O |
|
level O |
|
, O |
|
making O |
|
it O |
|
a O |
|
dangerous O |
|
threat O |
|
. O |
|
|
|
These O |
|
kinds O |
|
of O |
|
threats O |
|
will O |
|
become O |
|
more O |
|
common O |
|
, O |
|
as O |
|
more O |
|
and O |
|
more O |
|
companies O |
|
decide O |
|
to O |
|
publish O |
|
their O |
|
software O |
|
directly O |
|
to O |
|
consumers O |
|
. O |
|
|
|
There O |
|
have O |
|
been O |
|
several O |
|
recent O |
|
examples O |
|
of O |
|
companies O |
|
choosing O |
|
to O |
|
release O |
|
their O |
|
software O |
|
directly O |
|
to O |
|
consumers O |
|
, O |
|
bypassing O |
|
traditional O |
|
storefronts O |
|
. O |
|
|
|
The O |
|
average O |
|
user O |
|
might O |
|
not O |
|
have O |
|
the O |
|
necessary O |
|
skills O |
|
to O |
|
distinguish O |
|
legitimate O |
|
sites O |
|
from O |
|
malicious O |
|
ones O |
|
. O |
|
|
|
We O |
|
've O |
|
seen O |
|
that O |
|
this O |
|
has O |
|
been O |
|
the O |
|
case O |
|
for O |
|
many O |
|
years O |
|
with O |
|
spear-phishing O |
|
campaigns O |
|
on O |
|
desktop O |
|
and O |
|
mobile O |
|
platforms O |
|
, O |
|
so O |
|
, O |
|
unfortunately O |
|
, O |
|
it O |
|
does O |
|
n't O |
|
seem O |
|
that O |
|
this O |
|
will O |
|
change O |
|
any O |
|
time O |
|
soon O |
|
. O |
|
|
|
And O |
|
this O |
|
just O |
|
means O |
|
attackers O |
|
will O |
|
continue O |
|
to O |
|
be O |
|
successful O |
|
. O |
|
|
|
Coverage O |
|
Additional O |
|
ways O |
|
our O |
|
customers O |
|
can O |
|
detect O |
|
and O |
|
block O |
|
this O |
|
threat O |
|
are O |
|
listed O |
|
below O |
|
. O |
|
|
|
Advanced B-System |
|
Malware I-System |
|
Protection I-System |
|
( I-System |
|
AMP I-System |
|
) I-System |
|
is O |
|
ideally O |
|
suited O |
|
to O |
|
prevent O |
|
the O |
|
execution O |
|
of O |
|
the O |
|
malware O |
|
used O |
|
by O |
|
these O |
|
threat O |
|
actors O |
|
. O |
|
|
|
Cisco B-System |
|
Cloud I-System |
|
Web I-System |
|
Security I-System |
|
( I-System |
|
CWS I-System |
|
) I-System |
|
or O |
|
Web B-System |
|
Security I-System |
|
Appliance I-System |
|
( I-System |
|
WSA I-System |
|
) I-System |
|
web O |
|
scanning O |
|
prevents O |
|
access O |
|
to O |
|
malicious O |
|
websites O |
|
and O |
|
detects O |
|
malware O |
|
used O |
|
in O |
|
these O |
|
attacks O |
|
. O |
|
|
|
Email O |
|
Security O |
|
can O |
|
block O |
|
malicious O |
|
emails O |
|
sent O |
|
by O |
|
threat O |
|
actors O |
|
as O |
|
part O |
|
of O |
|
their O |
|
campaign O |
|
. O |
|
|
|
Network O |
|
Security O |
|
appliances O |
|
such O |
|
as O |
|
Next-Generation B-System |
|
Firewall I-System |
|
( I-System |
|
NGFW I-System |
|
) I-System |
|
, O |
|
Next-Generation B-System |
|
Intrusion I-System |
|
Prevention I-System |
|
System I-System |
|
( I-System |
|
NGIPS I-System |
|
) I-System |
|
, O |
|
and O |
|
Meraki B-System |
|
MX I-System |
|
can O |
|
detect O |
|
malicious O |
|
activity O |
|
associated O |
|
with O |
|
this O |
|
threat O |
|
. O |
|
|
|
AMP O |
|
Threat O |
|
Grid O |
|
helps O |
|
identify O |
|
malicious O |
|
binaries O |
|
and O |
|
build O |
|
protection O |
|
into O |
|
all O |
|
Cisco B-Organization |
|
Security O |
|
products O |
|
. O |
|
|
|
Umbrella B-System |
|
, O |
|
our O |
|
secure O |
|
internet O |
|
gateway O |
|
( O |
|
SIG O |
|
) O |
|
, O |
|
blocks O |
|
users O |
|
from O |
|
connecting O |
|
to O |
|
malicious O |
|
domains O |
|
, O |
|
IPs O |
|
, O |
|
and O |
|
URLs O |
|
, O |
|
whether O |
|
users O |
|
are O |
|
on O |
|
or O |
|
off O |
|
the O |
|
corporate O |
|
network O |
|
. O |
|
|
|
Open O |
|
Source O |
|
Snort O |
|
Subscriber O |
|
Rule O |
|
Set O |
|
customers O |
|
can O |
|
stay O |
|
up O |
|
to O |
|
date O |
|
by O |
|
downloading O |
|
the O |
|
latest O |
|
rule O |
|
pack O |
|
available O |
|
for O |
|
purchase O |
|
on O |
|
Snort.org O |
|
. O |
|
|
|
Indicators O |
|
of O |
|
compromise O |
|
( O |
|
IOC O |
|
) O |
|
URLs O |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//5.9.33.226:5416 I-Indicator |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//172.110.10.171:85/testcc.php I-Indicator |
|
hxxp B-Indicator |
|
: I-Indicator |
|
//sub1.tdsworker.ru:5555/3ds/ I-Indicator |
|
Hash O |
|
values O |
|
Package.apk B-Indicator |
|
- O |
|
A342a16082ea53d101f556b50532651cd3e3fdc7d9e0be3aa136680ad9c6a69f B-Indicator |
|
eCommon.dl B-Indicator |
|
- O |
|
604deb75eedf439766896f05799752de268baf437bf89a7185540627ab4a4bd1 B-Indicator |
|
|
|
Reznov.dll B-Indicator |
|
- O |
|
17b8665cdbbb94482ca970a754d11d6e29c46af6390a2d8e8193d8d6a527dec3 B-Indicator |
|
Custom O |
|
activity O |
|
prefix O |
|
com.cact.CAct B-Indicator |
|
Cerberus B-Malware |
|
- O |
|
A O |
|
new O |
|
banking O |
|
Trojan O |
|
from O |
|
the O |
|
underworld O |
|
August O |
|
2019 O |
|
In O |
|
June O |
|
2019 O |
|
, O |
|
ThreatFabric B-Organization |
|
analysts O |
|
found O |
|
a O |
|
new O |
|
Android B-System |
|
malware O |
|
, O |
|
dubbed O |
|
“ O |
|
Cerberus B-Malware |
|
” O |
|
, O |
|
being O |
|
rented O |
|
out O |
|
on O |
|
underground O |
|
forums O |
|
. O |
|
|
|
Its O |
|
authors O |
|
claim O |
|
that O |
|
it O |
|
was O |
|
used O |
|
for O |
|
private O |
|
operations O |
|
for O |
|
two O |
|
years O |
|
preceding O |
|
the O |
|
start O |
|
of O |
|
the O |
|
rental O |
|
. O |
|
|
|
They O |
|
also O |
|
state O |
|
that O |
|
the O |
|
code O |
|
is O |
|
written O |
|
from O |
|
scratch O |
|
and O |
|
is O |
|
not O |
|
using O |
|
parts O |
|
of O |
|
other O |
|
existing O |
|
banking O |
|
Trojans O |
|
unlike O |
|
many O |
|
other O |
|
Trojans O |
|
that O |
|
are O |
|
either O |
|
based O |
|
completely O |
|
on O |
|
the O |
|
source O |
|
of O |
|
another O |
|
Trojan O |
|
( O |
|
such O |
|
as O |
|
the O |
|
leaked O |
|
Anubis B-Malware |
|
source O |
|
code O |
|
that O |
|
is O |
|
now O |
|
being O |
|
resold O |
|
) O |
|
or O |
|
at O |
|
least O |
|
borrow O |
|
parts O |
|
of O |
|
other O |
|
Trojans O |
|
. O |
|
|
|
After O |
|
thorough O |
|
analysis O |
|
we O |
|
can O |
|
confirm O |
|
that O |
|
Cerberus B-Malware |
|
was O |
|
indeed O |
|
not O |
|
based O |
|
on O |
|
the O |
|
Anubis B-Malware |
|
source O |
|
code O |
|
. O |
|
|
|
One O |
|
peculiar O |
|
thing O |
|
about O |
|
the O |
|
actor O |
|
group O |
|
behind O |
|
this O |
|
banking O |
|
malware O |
|
is O |
|
that O |
|
they O |
|
have O |
|
an O |
|
“ O |
|
official O |
|
” O |
|
twitter B-Organization |
|
account O |
|
that O |
|
they O |
|
use O |
|
to O |
|
post O |
|
promotional O |
|
content O |
|
( O |
|
even O |
|
videos O |
|
) O |
|
about O |
|
the O |
|
malware O |
|
. O |
|
|
|
Oddly O |
|
enough O |
|
they O |
|
also O |
|
use O |
|
it O |
|
to O |
|
make O |
|
fun O |
|
of O |
|
the O |
|
AV O |
|
community O |
|
, O |
|
sharing O |
|
detection O |
|
screenshots O |
|
from O |
|
VirusTotal B-Organization |
|
( O |
|
thus O |
|
leaking O |
|
IoC O |
|
) O |
|
and O |
|
even O |
|
engaging O |
|
in O |
|
discussions O |
|
with O |
|
malware O |
|
researchers O |
|
directly O |
|
The O |
|
following O |
|
screenshot O |
|
shows O |
|
tweets O |
|
from O |
|
their O |
|
advertisement O |
|
campaign O |
|
: O |
|
That O |
|
unusual O |
|
behavior O |
|
could O |
|
be O |
|
explained O |
|
by O |
|
the O |
|
combination O |
|
of O |
|
the O |
|
need O |
|
for O |
|
attention O |
|
and O |
|
a O |
|
probable O |
|
lack O |
|
of O |
|
experience O |
|
. O |
|
|
|
What O |
|
is O |
|
sure O |
|
is O |
|
that O |
|
the O |
|
gap O |
|
in O |
|
the O |
|
Android B-System |
|
banking O |
|
malware O |
|
rental O |
|
business O |
|
left O |
|
open O |
|
after O |
|
the O |
|
rental O |
|
of O |
|
the O |
|
Anubis B-Malware |
|
2 I-Malware |
|
and O |
|
RedAlert B-Malware |
|
2 I-Malware |
|
Trojans O |
|
ended O |
|
provides O |
|
a O |
|
good O |
|
opportunity O |
|
for O |
|
the O |
|
actors O |
|
behind O |
|
Cerberus B-Malware |
|
to O |
|
grow O |
|
their O |
|
business O |
|
quickly O |
|
. O |
|
|
|
The O |
|
Android B-System |
|
banking O |
|
Trojan O |
|
rental O |
|
business O |
|
Rental O |
|
of O |
|
banking O |
|
Trojans O |
|
is O |
|
not O |
|
new O |
|
. O |
|
|
|
It O |
|
was O |
|
an O |
|
existing O |
|
business O |
|
model O |
|
when O |
|
computer-based O |
|
banking O |
|
malware O |
|
was O |
|
the O |
|
only O |
|
form O |
|
of O |
|
banking O |
|
malware O |
|
and O |
|
has O |
|
shifted O |
|
to O |
|
the O |
|
Android B-System |
|
equivalent O |
|
a O |
|
few O |
|
years O |
|
later O |
|
. O |
|
|
|
The O |
|
life O |
|
span O |
|
of O |
|
Android B-System |
|
banking O |
|
malware O |
|
is O |
|
limited O |
|
to O |
|
either O |
|
the O |
|
will O |
|
of O |
|
its O |
|
author O |
|
( O |
|
s O |
|
) O |
|
to O |
|
support O |
|
it O |
|
or O |
|
the O |
|
arrest O |
|
of O |
|
those O |
|
actors O |
|
. O |
|
|
|
This O |
|
malware-life-cycle O |
|
has O |
|
been O |
|
observed O |
|
to O |
|
reoccur O |
|
every O |
|
few O |
|
years O |
|
, O |
|
bringing O |
|
new O |
|
malware O |
|
families O |
|
into O |
|
light O |
|
. O |
|
|
|
Each O |
|
time O |
|
a O |
|
rented O |
|
malware O |
|
reaches O |
|
the O |
|
end O |
|
of O |
|
its O |
|
life O |
|
it O |
|
provides O |
|
the O |
|
opportunity O |
|
for O |
|
other O |
|
actors O |
|
a O |
|
to O |
|
take O |
|
over O |
|
the O |
|
malware O |
|
rental O |
|
market-share O |
|
. O |
|
|
|
As O |
|
visible O |
|
on O |
|
following O |
|
chart O |
|
, O |
|
the O |
|
lifespan O |
|
of O |
|
many O |
|
well-known O |
|
rented O |
|
Android B-System |
|
bankers O |
|
is O |
|
usually O |
|
no O |
|
more O |
|
than O |
|
one O |
|
or O |
|
two O |
|
years O |
|
. O |
|
|
|
When O |
|
the O |
|
family O |
|
ceases O |
|
to O |
|
exist O |
|
a O |
|
new O |
|
one O |
|
is O |
|
already O |
|
available O |
|
to O |
|
fill O |
|
the O |
|
void O |
|
, O |
|
proving O |
|
that O |
|
the O |
|
demand O |
|
for O |
|
such O |
|
malware O |
|
is O |
|
always O |
|
present O |
|
and O |
|
that O |
|
therefore O |
|
Cerberus B-Malware |
|
has O |
|
a O |
|
good O |
|
chance O |
|
to O |
|
survive O |
|
. O |
|
|
|
After O |
|
the O |
|
actor O |
|
behind O |
|
RedAlert B-Malware |
|
2 I-Malware |
|
decided O |
|
to O |
|
quit O |
|
the O |
|
rental O |
|
business O |
|
, O |
|
we O |
|
observed O |
|
a O |
|
surge O |
|
in O |
|
Anubis B-Malware |
|
samples O |
|
in O |
|
the O |
|
wild O |
|
. O |
|
|
|
After O |
|
the O |
|
Anubis B-Malware |
|
actor O |
|
was O |
|
allegedly O |
|
arrested O |
|
and O |
|
the O |
|
source O |
|
code O |
|
was O |
|
leaked O |
|
there O |
|
was O |
|
also O |
|
huge O |
|
increase O |
|
in O |
|
the O |
|
number O |
|
of O |
|
Anubis B-Malware |
|
samples O |
|
found O |
|
in O |
|
the O |
|
wild O |
|
, O |
|
but O |
|
the O |
|
new O |
|
actors O |
|
using O |
|
Anubis B-Malware |
|
have O |
|
no O |
|
support O |
|
or O |
|
updates O |
|
. O |
|
|
|
Due O |
|
to O |
|
this O |
|
Cerberus B-Malware |
|
will O |
|
come O |
|
in O |
|
handy O |
|
for O |
|
actors O |
|
that O |
|
want O |
|
to O |
|
focus O |
|
on O |
|
performing O |
|
fraud O |
|
without O |
|
having O |
|
to O |
|
develop O |
|
and O |
|
maintain O |
|
a O |
|
botnet O |
|
and O |
|
C2 O |
|
infrastructure O |
|
. O |
|
|
|
Analysis O |
|
of O |
|
evasion O |
|
techniques O |
|
Along O |
|
with O |
|
the O |
|
standard O |
|
payload O |
|
and O |
|
string O |
|
obfuscation O |
|
, O |
|
Cerberus B-Malware |
|
uses O |
|
a O |
|
rather O |
|
interesting O |
|
technique O |
|
to O |
|
prevent O |
|
analysis O |
|
of O |
|
the O |
|
Trojan O |
|
. O |
|
|
|
Using O |
|
the O |
|
device O |
|
accelerometer O |
|
sensor O |
|
it O |
|
implements O |
|
a O |
|
simple O |
|
pedometer O |
|
that O |
|
is O |
|
used O |
|
to O |
|
measure O |
|
movements O |
|
of O |
|
the O |
|
victim O |
|
. O |
|
|
|
The O |
|
idea O |
|
is O |
|
simple O |
|
- O |
|
if O |
|
the O |
|
infected O |
|
device O |
|
belongs O |
|
to O |
|
a O |
|
real O |
|
person O |
|
, O |
|
sooner O |
|
or O |
|
later O |
|
this O |
|
person O |
|
will O |
|
move O |
|
around O |
|
, O |
|
increasing O |
|
the O |
|
step O |
|
counter O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
uses O |
|
this O |
|
counter O |
|
to O |
|
activate O |
|
the O |
|
bot O |
|
- O |
|
if O |
|
aforementioned O |
|
step O |
|
counter O |
|
hits O |
|
the O |
|
pre-configured O |
|
threshold O |
|
it O |
|
considers O |
|
running O |
|
on O |
|
the O |
|
device O |
|
to O |
|
be O |
|
safe O |
|
. O |
|
|
|
This O |
|
simple O |
|
measure O |
|
prevents O |
|
the O |
|
Trojan O |
|
from O |
|
running O |
|
and O |
|
being O |
|
analyzed O |
|
in O |
|
dynamic O |
|
analysis O |
|
environments O |
|
( O |
|
sandboxes O |
|
) O |
|
and O |
|
on O |
|
the O |
|
test O |
|
devices O |
|
of O |
|
malware O |
|
analysts O |
|
. O |
|
|
|
The O |
|
code O |
|
responsible O |
|
for O |
|
this O |
|
verification O |
|
is O |
|
shown O |
|
in O |
|
the O |
|
following O |
|
snippet O |
|
: O |
|
How O |
|
it O |
|
works O |
|
When O |
|
the O |
|
malware O |
|
is O |
|
first O |
|
started O |
|
on O |
|
the O |
|
device O |
|
it O |
|
will O |
|
begin O |
|
by O |
|
hiding O |
|
its O |
|
icon O |
|
from O |
|
the O |
|
application O |
|
drawer O |
|
. O |
|
|
|
Then O |
|
it O |
|
will O |
|
ask O |
|
for O |
|
the O |
|
accessibility O |
|
service O |
|
privilege O |
|
as O |
|
visible O |
|
in O |
|
the O |
|
following O |
|
screenshot O |
|
: O |
|
After O |
|
the O |
|
user O |
|
grants O |
|
the O |
|
requested O |
|
privilege O |
|
, O |
|
Cerberus B-Malware |
|
starts O |
|
to O |
|
abuse O |
|
it O |
|
by O |
|
granting O |
|
itself O |
|
additional O |
|
permissions O |
|
, O |
|
such O |
|
as O |
|
permissions O |
|
needed O |
|
to O |
|
send O |
|
messages O |
|
and O |
|
make O |
|
calls O |
|
, O |
|
without O |
|
requiring O |
|
any O |
|
user O |
|
interaction O |
|
. O |
|
|
|
It O |
|
also O |
|
disables O |
|
Play B-System |
|
Protect I-System |
|
( O |
|
Google B-Organization |
|
’ O |
|
s O |
|
preinstalled O |
|
antivirus O |
|
solution O |
|
) O |
|
to O |
|
prevent O |
|
its O |
|
discovery O |
|
and O |
|
deletion O |
|
in O |
|
the O |
|
future O |
|
. O |
|
|
|
After O |
|
conveniently O |
|
granting O |
|
itself O |
|
additional O |
|
privileges O |
|
and O |
|
securing O |
|
its O |
|
persistence O |
|
on O |
|
the O |
|
device O |
|
, O |
|
Cerberus B-Malware |
|
registers O |
|
the O |
|
infected O |
|
device O |
|
in O |
|
the O |
|
botnet O |
|
and O |
|
waits O |
|
for O |
|
commands O |
|
from O |
|
the O |
|
C2 O |
|
server O |
|
while O |
|
also O |
|
being O |
|
ready O |
|
to O |
|
perform O |
|
overlay O |
|
attacks O |
|
. O |
|
|
|
The O |
|
commands O |
|
supported O |
|
by O |
|
the O |
|
analyzed O |
|
version O |
|
of O |
|
the O |
|
Cerberus B-Malware |
|
bot O |
|
are O |
|
listed O |
|
below O |
|
. O |
|
|
|
As O |
|
can O |
|
be O |
|
seen O |
|
, O |
|
the O |
|
possibilities O |
|
offered O |
|
by O |
|
the O |
|
bot O |
|
are O |
|
pretty O |
|
common O |
|
. O |
|
|
|
Command O |
|
Description O |
|
push O |
|
Shows O |
|
a O |
|
push O |
|
notification O |
|
. O |
|
|
|
Clicking O |
|
on O |
|
thenotification O |
|
will O |
|
result O |
|
in O |
|
launching O |
|
a O |
|
specified O |
|
app O |
|
startApp O |
|
Starts O |
|
the O |
|
specified O |
|
application O |
|
getInstallApps O |
|
Gets O |
|
the O |
|
list O |
|
of O |
|
installedapplications O |
|
on O |
|
the O |
|
infected O |
|
device O |
|
getContacts O |
|
Gets O |
|
the O |
|
contact O |
|
names O |
|
and O |
|
phone O |
|
numbers O |
|
from O |
|
the O |
|
addressbook O |
|
on O |
|
the O |
|
infected O |
|
device O |
|
deleteApplication O |
|
Triggers O |
|
the O |
|
deletion O |
|
of O |
|
the O |
|
specified O |
|
application O |
|
forwardCall O |
|
Enables O |
|
call O |
|
forwarding O |
|
to O |
|
the O |
|
specified O |
|
number O |
|
sendSms O |
|
Sends O |
|
a O |
|
text O |
|
message O |
|
with O |
|
specified O |
|
text O |
|
from O |
|
the O |
|
infecteddevice O |
|
to O |
|
the O |
|
specified O |
|
phone O |
|
number O |
|
startInject O |
|
Triggers O |
|
the O |
|
overlay O |
|
attack O |
|
against O |
|
the O |
|
specified O |
|
application O |
|
startUssd O |
|
|
|
Calls O |
|
the O |
|
specified O |
|
USSD O |
|
code O |
|
openUrl O |
|
Opens O |
|
the O |
|
specified O |
|
URL O |
|
in O |
|
the O |
|
WebView O |
|
getSMS O |
|
Gets O |
|
all O |
|
text O |
|
messages O |
|
from O |
|
the O |
|
infected O |
|
device O |
|
killMe O |
|
Triggers O |
|
the O |
|
kill O |
|
switch O |
|
for O |
|
the O |
|
bot O |
|
updateModule O |
|
Updates O |
|
the O |
|
payload O |
|
module O |
|
Cerberus B-Malware |
|
features O |
|
Cerberus B-Malware |
|
malware O |
|
has O |
|
the O |
|
same O |
|
capabilities O |
|
as O |
|
most O |
|
other O |
|
Android B-System |
|
banking O |
|
Trojans O |
|
such O |
|
as O |
|
the O |
|
use O |
|
of O |
|
overlay O |
|
attacks O |
|
, O |
|
SMS O |
|
control O |
|
and O |
|
contact O |
|
list O |
|
harvesting O |
|
. O |
|
|
|
The O |
|
Trojan O |
|
can O |
|
also O |
|
leverage O |
|
keylogging O |
|
to O |
|
broaden O |
|
the O |
|
attack O |
|
scope O |
|
. O |
|
|
|
Overall O |
|
, O |
|
Cerberus B-Malware |
|
has O |
|
a O |
|
pretty O |
|
common O |
|
feature O |
|
list O |
|
and O |
|
although O |
|
the O |
|
malware O |
|
seems O |
|
to O |
|
have O |
|
been O |
|
written O |
|
from O |
|
scratch O |
|
there O |
|
does O |
|
not O |
|
seem O |
|
to O |
|
be O |
|
any O |
|
innovative O |
|
functionality O |
|
at O |
|
this O |
|
time O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
some O |
|
of O |
|
the O |
|
more O |
|
advanced O |
|
banking O |
|
Trojans O |
|
now O |
|
offer O |
|
features O |
|
such O |
|
as O |
|
a O |
|
back-connect O |
|
proxy O |
|
, O |
|
screen-streaming O |
|
and O |
|
even O |
|
remote O |
|
control O |
|
. O |
|
|
|
Cerberus B-Malware |
|
embeds O |
|
the O |
|
following O |
|
set O |
|
of O |
|
features O |
|
that O |
|
allows O |
|
itself O |
|
to O |
|
remain O |
|
under O |
|
the O |
|
radar O |
|
and O |
|
successfully O |
|
perform O |
|
attacks O |
|
: O |
|
Overlaying O |
|
: O |
|
Dynamic O |
|
( O |
|
Local O |
|
injects O |
|
obtained O |
|
from O |
|
C2 O |
|
) O |
|
Keylogging O |
|
SMS O |
|
harvesting O |
|
: O |
|
SMS O |
|
listing O |
|
SMS O |
|
harvesting O |
|
: O |
|
SMS O |
|
forwarding O |
|
Device O |
|
info O |
|
collection O |
|
Contact O |
|
list O |
|
collection O |
|
Application O |
|
listing O |
|
Location O |
|
collection O |
|
Overlaying O |
|
: O |
|
Targets O |
|
list O |
|
update O |
|
SMS O |
|
: O |
|
Sending O |
|
Calls O |
|
: O |
|
USSD O |
|
request O |
|
making O |
|
Calls O |
|
: O |
|
Call O |
|
forwarding O |
|
Remote O |
|
actions O |
|
: O |
|
App O |
|
installing O |
|
Remote O |
|
actions O |
|
: O |
|
App O |
|
starting O |
|
Remote O |
|
actions O |
|
: O |
|
App O |
|
removal O |
|
Remote O |
|
actions O |
|
: O |
|
Showing O |
|
arbitrary O |
|
web O |
|
pages O |
|
Remote O |
|
actions O |
|
: O |
|
Screen-locking O |
|
|
|
Notifications O |
|
: O |
|
Push O |
|
notifications O |
|
C2 O |
|
Resilience O |
|
: O |
|
Auxiliary O |
|
C2 O |
|
list O |
|
Self-protection O |
|
: O |
|
Hiding O |
|
the O |
|
App O |
|
icon O |
|
Self-protection O |
|
: O |
|
Preventing O |
|
removal O |
|
Self-protection O |
|
: O |
|
Emulation-detection O |
|
Architecture O |
|
: O |
|
Modular O |
|
Overlay O |
|
attack O |
|
Most O |
|
Android O |
|
banking O |
|
Trojans O |
|
use O |
|
overlay O |
|
attacks O |
|
to O |
|
trick O |
|
the O |
|
victim O |
|
into O |
|
providing O |
|
their O |
|
personal O |
|
information O |
|
( O |
|
such O |
|
as O |
|
but O |
|
not O |
|
limited O |
|
to O |
|
: O |
|
credit O |
|
card O |
|
information O |
|
, O |
|
banking O |
|
credentials O |
|
, O |
|
mail O |
|
credentials O |
|
) O |
|
and O |
|
Cerberus B-Malware |
|
is O |
|
no O |
|
exception O |
|
. O |
|
|
|
In O |
|
this O |
|
particular O |
|
case O |
|
, O |
|
the O |
|
bot O |
|
abuses O |
|
the O |
|
accessibility O |
|
service O |
|
privilege O |
|
to O |
|
obtain O |
|
the O |
|
package O |
|
name O |
|
of O |
|
the O |
|
foreground O |
|
application O |
|
and O |
|
determine O |
|
whether O |
|
or O |
|
not O |
|
to O |
|
show O |
|
a O |
|
phishing O |
|
overlay O |
|
window O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
the O |
|
following O |
|
code O |
|
snippet O |
|
: O |
|
Targets O |
|
Some O |
|
examples O |
|
of O |
|
phishing O |
|
overlays O |
|
are O |
|
shown O |
|
below O |
|
. O |
|
|
|
They O |
|
exist O |
|
in O |
|
two O |
|
types O |
|
: O |
|
the O |
|
credentials O |
|
stealers O |
|
( O |
|
first O |
|
2 O |
|
screenshots O |
|
) O |
|
and O |
|
the O |
|
credit O |
|
card O |
|
grabbers O |
|
( O |
|
last O |
|
screenshot O |
|
) O |
|
. O |
|
|
|
The O |
|
only O |
|
active O |
|
target O |
|
list O |
|
observed O |
|
in O |
|
the O |
|
wild O |
|
is O |
|
available O |
|
in O |
|
the O |
|
appendix O |
|
and O |
|
contains O |
|
a O |
|
total O |
|
of O |
|
30 O |
|
unique O |
|
targets O |
|
. O |
|
|
|
It O |
|
is O |
|
interesting O |
|
to O |
|
observe O |
|
that O |
|
the O |
|
actual O |
|
target O |
|
list O |
|
contains O |
|
: O |
|
7 O |
|
French O |
|
banking O |
|
apps O |
|
7 O |
|
U.S. O |
|
banking O |
|
apps O |
|
1 O |
|
Japanese O |
|
banking O |
|
app O |
|
15 O |
|
non-banking O |
|
apps O |
|
This O |
|
uncommon O |
|
target O |
|
list O |
|
might O |
|
either O |
|
be O |
|
the O |
|
result O |
|
of O |
|
specific O |
|
customer O |
|
demand O |
|
, O |
|
or O |
|
due O |
|
to O |
|
some O |
|
actors O |
|
having O |
|
partially O |
|
reused O |
|
an O |
|
existing O |
|
target O |
|
list O |
|
. O |
|
|
|
Conclusion O |
|
Although O |
|
not O |
|
yet O |
|
mature O |
|
enough O |
|
to O |
|
provide O |
|
the O |
|
equivalent O |
|
of O |
|
a O |
|
full-blown O |
|
set O |
|
of O |
|
Android B-System |
|
banking O |
|
malware O |
|
features O |
|
( O |
|
such O |
|
as O |
|
RAT O |
|
, O |
|
RAT O |
|
with O |
|
ATS O |
|
( O |
|
Automated O |
|
Transaction O |
|
Script O |
|
) O |
|
, O |
|
back-connect O |
|
proxy O |
|
, O |
|
media O |
|
streaming O |
|
) O |
|
, O |
|
or O |
|
providing O |
|
an O |
|
exhaustive O |
|
target O |
|
list O |
|
, O |
|
Cerberus B-Malware |
|
should O |
|
not O |
|
be O |
|
taken O |
|
lightly O |
|
. O |
|
|
|
Due O |
|
to O |
|
the O |
|
current O |
|
absence O |
|
of O |
|
maintained O |
|
and O |
|
supported O |
|
Android B-Malware |
|
banking O |
|
Malware-as-a-Service O |
|
in O |
|
the O |
|
underground O |
|
community O |
|
, O |
|
there O |
|
is O |
|
a O |
|
certainly O |
|
demand O |
|
for O |
|
a O |
|
new O |
|
service O |
|
. O |
|
|
|
Cerberus B-Malware |
|
is O |
|
already O |
|
capable O |
|
to O |
|
fulfill O |
|
this O |
|
demand O |
|
. O |
|
|
|
In O |
|
addition O |
|
to O |
|
the O |
|
feature O |
|
base O |
|
it O |
|
already O |
|
possesses O |
|
and O |
|
the O |
|
money O |
|
that O |
|
can O |
|
be O |
|
made O |
|
from O |
|
the O |
|
rental O |
|
, O |
|
it O |
|
could O |
|
evolve O |
|
to O |
|
compete O |
|
with O |
|
the O |
|
mightiest O |
|
Android B-System |
|
banking O |
|
Trojans O |
|
. O |
|
|
|
Next O |
|
to O |
|
the O |
|
features O |
|
, O |
|
we O |
|
expect O |
|
the O |
|
target O |
|
list O |
|
to O |
|
be O |
|
expanded O |
|
to O |
|
contain O |
|
additional O |
|
( O |
|
banking O |
|
) O |
|
apps O |
|
in O |
|
the O |
|
near O |
|
future O |
|
. O |
|
|
|
Knowledge O |
|
of O |
|
the O |
|
threat O |
|
landscape O |
|
and O |
|
implementation O |
|
of O |
|
the O |
|
right O |
|
detection O |
|
tools O |
|
remains O |
|
crucial O |
|
to O |
|
be O |
|
able O |
|
to O |
|
protect O |
|
yourself O |
|
from O |
|
fraud O |
|
; O |
|
Cerberus B-Malware |
|
is O |
|
yet O |
|
a O |
|
new O |
|
Trojan O |
|
active O |
|
in O |
|
the O |
|
wild O |
|
! O |
|
|
|
Appendix O |
|
Samples O |
|
Some O |
|
of O |
|
the O |
|
latest O |
|
Cerberus B-Malware |
|
samples O |
|
found O |
|
in O |
|
the O |
|
wild O |
|
: O |
|
App O |
|
name O |
|
Package O |
|
name O |
|
SHA O |
|
256 O |
|
hash O |
|
Flash B-System |
|
Player I-System |
|
com.uxlgtsvfdc.zipvwntdy B-Indicator |
|
728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f B-Indicator |
|
Flash B-System |
|
Player I-System |
|
com.ognbsfhszj.hqpquokjdp B-Indicator |
|
fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329 B-Indicator |
|
|
|
Flash B-System |
|
Player I-System |
|
com.mwmnfwt.arhkrgajn B-Indicator |
|
ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c B-Indicator |
|
Flash B-System |
|
Player I-System |
|
com.wogdjywtwq.oiofvpzpxyo B-Indicator |
|
6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4 B-Indicator |
|
Flash B-System |
|
Player I-System |
|
com.hvdnaiujzwo.fovzeukzywfr B-Indicator |
|
|
|
cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b B-Indicator |
|
Flash B-System |
|
Player I-System |
|
com.gzhlubw.pmevdiexmn B-Indicator |
|
3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63 B-Indicator |
|
Target O |
|
list O |
|
The O |
|
actual O |
|
observed O |
|
list O |
|
of O |
|
mobile O |
|
apps O |
|
targeted O |
|
by O |
|
Cerberus B-Malware |
|
contains O |
|
a O |
|
total O |
|
of O |
|
30 O |
|
unique O |
|
applications O |
|
. O |
|
|
|
This O |
|
list O |
|
is O |
|
expected O |
|
to O |
|
expand O |
|
: O |
|
Package O |
|
name O |
|
Application O |
|
name O |
|
com.android.vending B-Indicator |
|
Play B-System |
|
Market I-System |
|
com.boursorama.android.clients B-Indicator |
|
Boursorama I-Indicator |
|
Banque B-System |
|
com.caisseepargne.android.mobilebanking B-Indicator |
|
Banque B-System |
|
com.chase.sig.android B-Indicator |
|
Chase B-System |
|
Mobile I-System |
|
com.clairmail.fth B-Indicator |
|
Fifth B-System |
|
Third I-System |
|
Mobile I-System |
|
Banking I-System |
|
com.connectivityapps.hotmail B-Indicator |
|
Connect B-System |
|
for I-System |
|
Hotmail I-System |
|
com.google.android.gm B-Indicator |
|
Gmail B-System |
|
com.imo.android.imoim B-Indicator |
|
imo B-System |
|
free O |
|
video O |
|
calls O |
|
and O |
|
chat O |
|
com.infonow.bofa B-Indicator |
|
Bank B-System |
|
of I-System |
|
America I-System |
|
|
|
Mobile I-System |
|
Banking I-System |
|
com.IngDirectAndroid B-Indicator |
|
ING O |
|
com.instagram.android B-Indicator |
|
Instagram I-Indicator |
|
com.konylabs.capitalone B-Indicator |
|
Capital B-System |
|
One® I-System |
|
Mobile I-System |
|
com.mail.mobile.android.mail B-Indicator |
|
mail.com I-Indicator |
|
mail B-System |
|
com.microsoft.office.outlook B-Indicator |
|
Microsoft B-System |
|
Outlook I-System |
|
com.snapchat.android B-Indicator |
|
Snapchat B-System |
|
com.tencent.mm B-Indicator |
|
WeChat B-System |
|
com.twitter.android B-Indicator |
|
Twitter B-System |
|
com.ubercab B-Indicator |
|
Uber B-Organization |
|
com.usaa.mobile.android.usaa B-Indicator |
|
USAA B-System |
|
Mobile I-System |
|
com.usbank.mobilebanking B-Indicator |
|
U.S. I-Indicator |
|
Bank O |
|
- O |
|
Inspired O |
|
by O |
|
customers O |
|
com.viber.voip B-Indicator |
|
Viber B-System |
|
com.wf.wellsfargomobile B-Indicator |
|
|
|
Wells B-System |
|
Fargo I-System |
|
Mobile I-System |
|
com.whatsapp B-Indicator |
|
WhatsApp B-System |
|
com.yahoo.mobile.client.android.mail B-Indicator |
|
Yahoo B-System |
|
Mail I-System |
|
– O |
|
Organized O |
|
Email O |
|
fr.banquepopulaire.cyberplus B-Indicator |
|
Banque B-System |
|
Populaire O |
|
fr.creditagricole.androidapp B-Indicator |
|
Ma B-System |
|
Banque I-System |
|
jp.co.rakuten_bank.rakutenbank B-Indicator |
|
楽天銀行 O |
|
-個人のお客様向けアプリ O |
|
mobi.societegenerale.mobile.lappli B-Indicator |
|
L O |
|
’ O |
|
Appli O |
|
Société O |
|
Générale O |
|
net.bnpparibas.mescomptes B-Indicator |
|
Mes O |
|
Comptes O |
|
BNP O |
|
Paribas O |
|
org.telegram.messenger B-Indicator |
|
Telegram I-Indicator |
|
Triout B-Malware |
|
- O |
|
Spyware O |
|
Framework O |
|
|
|
for O |
|
Android B-System |
|
with O |
|
Extensive O |
|
Surveillance O |
|
Capabilities O |
|
August O |
|
20 O |
|
, O |
|
2018 O |
|
No O |
|
operating O |
|
system O |
|
is O |
|
safe O |
|
from O |
|
malware O |
|
, O |
|
as O |
|
cyber O |
|
criminals O |
|
will O |
|
always O |
|
want O |
|
to O |
|
steal O |
|
, O |
|
spy O |
|
or O |
|
tamper O |
|
with O |
|
your O |
|
data O |
|
. O |
|
|
|
The O |
|
proliferation O |
|
of O |
|
Android B-Malware |
|
devices O |
|
– O |
|
from O |
|
smartphones O |
|
to O |
|
tablets O |
|
and O |
|
smart O |
|
TVs O |
|
– O |
|
has O |
|
opened O |
|
up O |
|
new O |
|
possibilities O |
|
for O |
|
malware O |
|
developers O |
|
, O |
|
as O |
|
all O |
|
these O |
|
devices O |
|
pack O |
|
microphones O |
|
, O |
|
cameras O |
|
and O |
|
location-tracking O |
|
hardware O |
|
they O |
|
can O |
|
turn O |
|
into O |
|
the O |
|
perfect O |
|
spy O |
|
tools O |
|
. O |
|
|
|
Bitdefender B-Organization |
|
researchers O |
|
have O |
|
identified O |
|
a O |
|
new O |
|
Android B-System |
|
spyware O |
|
, O |
|
dubbed O |
|
Triout B-Malware |
|
, O |
|
which O |
|
appears O |
|
to O |
|
act O |
|
as O |
|
a O |
|
framework O |
|
for O |
|
building O |
|
extensive O |
|
surveillance O |
|
capabilities O |
|
into O |
|
seemingly O |
|
benign O |
|
applications O |
|
. O |
|
|
|
Found O |
|
bundled O |
|
with O |
|
a O |
|
repackaged O |
|
app O |
|
, O |
|
the O |
|
spyware O |
|
’ O |
|
s O |
|
surveillance O |
|
capabilities O |
|
involve O |
|
hiding O |
|
its O |
|
presence O |
|
on O |
|
the O |
|
device O |
|
, O |
|
recording O |
|
phone O |
|
calls O |
|
, O |
|
logging O |
|
incoming O |
|
text O |
|
messages O |
|
, O |
|
recoding O |
|
videos O |
|
, O |
|
taking O |
|
pictures O |
|
and O |
|
collecting O |
|
GPS B-System |
|
coordinates O |
|
, O |
|
then O |
|
broadcasting O |
|
all O |
|
of O |
|
that O |
|
to O |
|
an O |
|
attacker-controlled O |
|
C O |
|
& O |
|
C O |
|
( O |
|
command O |
|
and O |
|
control O |
|
) O |
|
server O |
|
. O |
|
|
|
It O |
|
’ O |
|
s O |
|
interesting O |
|
that O |
|
Triout B-Malware |
|
, O |
|
which O |
|
is O |
|
detected O |
|
by O |
|
Bitdefender B-Organization |
|
’ O |
|
s O |
|
machine O |
|
learning O |
|
algorithms O |
|
, O |
|
was O |
|
first O |
|
submitted O |
|
from O |
|
Russia O |
|
, O |
|
and O |
|
most O |
|
scans/reports O |
|
came O |
|
from O |
|
Israel O |
|
. O |
|
|
|
The O |
|
sample O |
|
’ O |
|
s O |
|
first O |
|
appearance O |
|
seems O |
|
to O |
|
be O |
|
May O |
|
15 O |
|
, O |
|
2018 O |
|
, O |
|
when O |
|
it O |
|
was O |
|
uploaded O |
|
to O |
|
VirusTotal B-Organization |
|
, O |
|
but O |
|
it O |
|
’ O |
|
s O |
|
unclear O |
|
how O |
|
the O |
|
tainted O |
|
sample O |
|
is O |
|
disseminated O |
|
. O |
|
|
|
Third-party O |
|
marketplaces O |
|
or O |
|
some O |
|
other O |
|
attacker-controlled O |
|
domains O |
|
are O |
|
likely O |
|
used O |
|
to O |
|
host O |
|
the O |
|
sample O |
|
. O |
|
|
|
A O |
|
subsequent O |
|
investigation O |
|
revealed O |
|
that O |
|
the O |
|
spyware O |
|
has O |
|
the O |
|
following O |
|
capabilities O |
|
: O |
|
Records O |
|
every O |
|
phone O |
|
call O |
|
( O |
|
literally O |
|
the O |
|
conversation O |
|
as O |
|
a O |
|
media O |
|
file O |
|
) O |
|
, O |
|
then O |
|
sends O |
|
it O |
|
together O |
|
with O |
|
the O |
|
caller O |
|
id O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
( O |
|
incall3.php B-Indicator |
|
and O |
|
outcall3.php B-Indicator |
|
) O |
|
Logs O |
|
every O |
|
incoming O |
|
SMS O |
|
message O |
|
( O |
|
SMS O |
|
body O |
|
and O |
|
SMS O |
|
sender O |
|
) O |
|
to O |
|
C O |
|
& O |
|
C O |
|
( O |
|
script3.php B-Indicator |
|
) O |
|
Has O |
|
capability O |
|
to O |
|
hide O |
|
self O |
|
Can O |
|
send O |
|
all O |
|
call O |
|
logs O |
|
( O |
|
“ O |
|
content B-Indicator |
|
: I-Indicator |
|
//call_log/calls I-Indicator |
|
” O |
|
, O |
|
info O |
|
: O |
|
callname O |
|
, O |
|
callnum O |
|
, O |
|
calldate O |
|
, O |
|
calltype O |
|
, O |
|
callduration O |
|
|
|
) O |
|
to O |
|
C O |
|
& O |
|
C O |
|
( O |
|
calllog.php B-Indicator |
|
) O |
|
Whenever O |
|
the O |
|
user O |
|
snaps O |
|
a O |
|
picture O |
|
, O |
|
either O |
|
with O |
|
the O |
|
front O |
|
or O |
|
rear O |
|
camera O |
|
, O |
|
it O |
|
gets O |
|
sent O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
( O |
|
uppc.php B-Indicator |
|
, O |
|
fi O |
|
npic.php B-Indicator |
|
orreqpic.php B-Indicator |
|
) O |
|
Can O |
|
send O |
|
GPS B-System |
|
coordinates O |
|
to O |
|
C O |
|
& O |
|
C O |
|
( O |
|
gps3.php B-Indicator |
|
) O |
|
The O |
|
C O |
|
& O |
|
C O |
|
server O |
|
to O |
|
which O |
|
the O |
|
application O |
|
seems O |
|
to O |
|
be O |
|
sending O |
|
collected O |
|
data O |
|
appears O |
|
to O |
|
be O |
|
operational O |
|
, O |
|
as O |
|
of O |
|
this O |
|
writing O |
|
, O |
|
and O |
|
running O |
|
since O |
|
May O |
|
2018 O |
|
. O |
|
|
|
January O |
|
23 O |
|
, O |
|
2017 O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
posing O |
|
as O |
|
Netflix B-System |
|
app I-System |
|
As O |
|
users O |
|
have O |
|
become O |
|
more O |
|
attached O |
|
to O |
|
their O |
|
mobile O |
|
devices O |
|
, O |
|
they O |
|
want O |
|
everything O |
|
on O |
|
those O |
|
devices O |
|
. O |
|
|
|
There O |
|
’ O |
|
s O |
|
an O |
|
app O |
|
for O |
|
just O |
|
about O |
|
any O |
|
facet O |
|
of O |
|
one O |
|
’ O |
|
s O |
|
personal O |
|
and O |
|
professional O |
|
life O |
|
, O |
|
from O |
|
booking O |
|
travel O |
|
and O |
|
managing O |
|
projects O |
|
, O |
|
to O |
|
buying O |
|
groceries O |
|
and O |
|
binge-watching O |
|
the O |
|
latest O |
|
Netflix B-Organization |
|
series O |
|
. O |
|
|
|
The O |
|
iOS B-System |
|
and O |
|
Android B-System |
|
apps O |
|
for O |
|
Netflix B-Organization |
|
are O |
|
enormously O |
|
popular O |
|
, O |
|
effectively O |
|
turning O |
|
a O |
|
mobile O |
|
device O |
|
into O |
|
a O |
|
television O |
|
with O |
|
which O |
|
users O |
|
can O |
|
stream O |
|
full O |
|
movies O |
|
and O |
|
TV O |
|
programs O |
|
anytime O |
|
, O |
|
anywhere O |
|
. O |
|
|
|
But O |
|
the O |
|
apps O |
|
, O |
|
with O |
|
their O |
|
many O |
|
millions O |
|
of O |
|
users O |
|
, O |
|
have O |
|
captured O |
|
the O |
|
attention O |
|
of O |
|
the O |
|
bad O |
|
actors O |
|
, O |
|
too O |
|
, O |
|
who O |
|
are O |
|
exploiting O |
|
the O |
|
popularity O |
|
of O |
|
Netflix B-Organization |
|
to O |
|
spread O |
|
malware O |
|
. O |
|
|
|
Recently O |
|
, O |
|
the O |
|
ThreatLabZ B-Organization |
|
research O |
|
team O |
|
came O |
|
across O |
|
a O |
|
fake B-System |
|
Netflix I-System |
|
app I-System |
|
, O |
|
which O |
|
turned O |
|
out O |
|
to O |
|
be O |
|
a O |
|
new O |
|
variant O |
|
of O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
( O |
|
Remote O |
|
Access O |
|
Trojan O |
|
) O |
|
. O |
|
|
|
SpyNote B-Malware |
|
RAT I-Malware |
|
is O |
|
capable O |
|
of O |
|
performing O |
|
a O |
|
variety O |
|
of O |
|
alarming O |
|
functions O |
|
that O |
|
includes O |
|
: O |
|
Activating O |
|
the O |
|
device O |
|
’ O |
|
s O |
|
microphone O |
|
and O |
|
listening O |
|
to O |
|
live O |
|
conversations O |
|
Executing O |
|
commands O |
|
on O |
|
the O |
|
device O |
|
Copying O |
|
files O |
|
from O |
|
the O |
|
device O |
|
to O |
|
a O |
|
Command O |
|
& O |
|
Control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
center O |
|
Recording O |
|
screen O |
|
captures O |
|
Viewing O |
|
contacts O |
|
Reading O |
|
SMS O |
|
messages O |
|
The O |
|
screenshot O |
|
below O |
|
shows O |
|
part O |
|
of O |
|
the O |
|
sandbox O |
|
’ O |
|
s O |
|
report O |
|
on O |
|
the O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
’ O |
|
s O |
|
signature O |
|
and O |
|
detected O |
|
functions O |
|
: O |
|
The O |
|
fake O |
|
Netflix B-Organization |
|
app O |
|
we O |
|
are O |
|
analyzing O |
|
in O |
|
this O |
|
blog O |
|
appears O |
|
to O |
|
be O |
|
built O |
|
using O |
|
an O |
|
updated O |
|
version O |
|
of O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
builder O |
|
, O |
|
|
|
which O |
|
was O |
|
leaked O |
|
last O |
|
year O |
|
. O |
|
|
|
Technical O |
|
details O |
|
Please O |
|
note O |
|
that O |
|
our O |
|
research O |
|
is O |
|
not O |
|
about O |
|
the O |
|
legitimate O |
|
Netflix B-System |
|
app I-System |
|
on O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
The O |
|
spyware O |
|
in O |
|
this O |
|
analysis O |
|
was O |
|
portraying O |
|
itself O |
|
as O |
|
the O |
|
Netflix B-System |
|
app I-System |
|
. O |
|
|
|
Once O |
|
installed O |
|
, O |
|
it O |
|
displayed O |
|
the O |
|
icon O |
|
found O |
|
in O |
|
the O |
|
actual O |
|
Netflix B-System |
|
app I-System |
|
on O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
As O |
|
soon O |
|
as O |
|
the O |
|
user O |
|
clicks O |
|
the O |
|
spyware O |
|
’ O |
|
s O |
|
icon O |
|
for O |
|
the O |
|
first O |
|
time O |
|
, O |
|
nothing O |
|
seems O |
|
to O |
|
happen O |
|
and O |
|
the O |
|
icon O |
|
disappears O |
|
from O |
|
the O |
|
home O |
|
screen O |
|
. O |
|
|
|
This O |
|
is O |
|
a O |
|
common O |
|
trick O |
|
played O |
|
by O |
|
malware O |
|
developers O |
|
, O |
|
making O |
|
the O |
|
user O |
|
think O |
|
the O |
|
app O |
|
may O |
|
have O |
|
been O |
|
removed O |
|
. O |
|
|
|
But O |
|
, O |
|
behind O |
|
the O |
|
scenes O |
|
, O |
|
the O |
|
malware O |
|
has O |
|
not O |
|
been O |
|
removed O |
|
; O |
|
instead O |
|
it O |
|
starts O |
|
preparing O |
|
its O |
|
onslaught O |
|
of O |
|
attacks O |
|
. O |
|
|
|
For O |
|
contacting O |
|
C O |
|
& O |
|
C O |
|
, O |
|
the O |
|
spyware O |
|
was O |
|
found O |
|
to O |
|
be O |
|
using O |
|
free O |
|
DNS B-Indicator |
|
services O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
the O |
|
screenshot O |
|
below O |
|
: O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
uses O |
|
an O |
|
unusual O |
|
trick O |
|
to O |
|
make O |
|
sure O |
|
that O |
|
it O |
|
remains O |
|
up O |
|
and O |
|
running O |
|
and O |
|
that O |
|
the O |
|
spying O |
|
does O |
|
not O |
|
stop O |
|
. O |
|
|
|
It O |
|
does O |
|
so O |
|
using O |
|
the O |
|
Services O |
|
, O |
|
Broadcast O |
|
Receivers O |
|
, O |
|
and O |
|
Activities O |
|
components O |
|
of O |
|
the O |
|
Android B-System |
|
platform O |
|
. O |
|
|
|
Services O |
|
can O |
|
perform O |
|
long-running O |
|
operations O |
|
in O |
|
the O |
|
background O |
|
and O |
|
does O |
|
not O |
|
need O |
|
a O |
|
user O |
|
interface O |
|
. O |
|
|
|
Broadcast O |
|
Receivers O |
|
are O |
|
Android B-System |
|
components O |
|
that O |
|
can O |
|
register O |
|
themselves O |
|
for O |
|
particular O |
|
events O |
|
. O |
|
|
|
Activities O |
|
are O |
|
key O |
|
building O |
|
blocks O |
|
, O |
|
central O |
|
to O |
|
an O |
|
app O |
|
’ O |
|
s O |
|
navigation O |
|
, O |
|
for O |
|
example O |
|
. O |
|
|
|
The O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
registers O |
|
a O |
|
service O |
|
called O |
|
AutoStartup O |
|
and O |
|
a O |
|
broadcast O |
|
receiver O |
|
named O |
|
BootComplete O |
|
. O |
|
|
|
MainActivity O |
|
registers O |
|
BootComplete O |
|
with O |
|
a O |
|
boot O |
|
event O |
|
, O |
|
so O |
|
that O |
|
whenever O |
|
the O |
|
device O |
|
is O |
|
booted O |
|
, O |
|
BootComplete O |
|
gets O |
|
triggered O |
|
. O |
|
|
|
BootComplete O |
|
starts O |
|
the O |
|
AutoStartup O |
|
service O |
|
and O |
|
the O |
|
AutoStartup O |
|
service O |
|
makes O |
|
sure O |
|
that O |
|
MainActivity O |
|
is O |
|
always O |
|
running O |
|
. O |
|
|
|
What O |
|
follows O |
|
are O |
|
some O |
|
of O |
|
the O |
|
features O |
|
exhibited O |
|
by O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
. O |
|
|
|
Command O |
|
execution O |
|
Command O |
|
execution O |
|
can O |
|
create O |
|
havoc O |
|
for O |
|
victim O |
|
if O |
|
the O |
|
malware O |
|
developer O |
|
decides O |
|
to O |
|
execute O |
|
commands O |
|
in O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
device O |
|
. O |
|
|
|
Leveraging O |
|
this O |
|
feature O |
|
, O |
|
the O |
|
malware O |
|
developer O |
|
can O |
|
root O |
|
the O |
|
device O |
|
using O |
|
a O |
|
range O |
|
of O |
|
vulnerabilities O |
|
, O |
|
well-known O |
|
or O |
|
zero-day O |
|
. O |
|
|
|
The O |
|
following O |
|
screenshot O |
|
shows O |
|
the O |
|
command O |
|
execution O |
|
functionality O |
|
in O |
|
action O |
|
: O |
|
The O |
|
paramString O |
|
parameter O |
|
shown O |
|
in O |
|
the O |
|
above O |
|
screenshot O |
|
can O |
|
be O |
|
any O |
|
command O |
|
received O |
|
from O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
Screen O |
|
capture O |
|
and O |
|
audio O |
|
recording O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
was O |
|
able O |
|
to O |
|
take O |
|
screen O |
|
captures O |
|
and O |
|
, O |
|
using O |
|
the O |
|
device O |
|
’ O |
|
s O |
|
microphone O |
|
, O |
|
listen O |
|
to O |
|
audio O |
|
conversations O |
|
. O |
|
|
|
This O |
|
capability O |
|
was O |
|
confirmed O |
|
when O |
|
the O |
|
Android B-System |
|
permission O |
|
, O |
|
called O |
|
android.permission.RECORD_AUDIO B-Indicator |
|
, O |
|
was O |
|
being O |
|
requested O |
|
along O |
|
with O |
|
code O |
|
found O |
|
in O |
|
the O |
|
app O |
|
. O |
|
|
|
SpyNote B-Malware |
|
RAT I-Malware |
|
captured O |
|
the O |
|
device O |
|
’ O |
|
s O |
|
screen O |
|
activities O |
|
along O |
|
with O |
|
audio O |
|
using O |
|
the O |
|
MediaProjectionCallback O |
|
functionality O |
|
( O |
|
available O |
|
with O |
|
Lollipop B-System |
|
, O |
|
the O |
|
Android B-System |
|
5.0 I-System |
|
release O |
|
, O |
|
and O |
|
later O |
|
) O |
|
and O |
|
saved O |
|
the O |
|
output O |
|
in O |
|
a O |
|
file O |
|
named O |
|
" O |
|
video.mp4 B-Indicator |
|
'' O |
|
as O |
|
shown O |
|
in O |
|
the O |
|
following O |
|
screenshot O |
|
SMS O |
|
stealing O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
was O |
|
also O |
|
observed O |
|
stealing O |
|
SMS O |
|
messages O |
|
from O |
|
the O |
|
affected O |
|
devices O |
|
, O |
|
as O |
|
shown O |
|
in O |
|
screenshot O |
|
below O |
|
: O |
|
Stealing O |
|
contacts O |
|
The O |
|
ability O |
|
to O |
|
steal O |
|
contacts O |
|
is O |
|
a O |
|
favorite O |
|
feature O |
|
for O |
|
spyware O |
|
developers O |
|
, O |
|
as O |
|
the O |
|
stolen O |
|
contacts O |
|
can O |
|
be O |
|
used O |
|
to O |
|
further O |
|
spread O |
|
the O |
|
spyware O |
|
|
|
. O |
|
|
|
The O |
|
following O |
|
screenshot O |
|
shows O |
|
the O |
|
contacts O |
|
being O |
|
stolen O |
|
and O |
|
written O |
|
in O |
|
a O |
|
local O |
|
array O |
|
, O |
|
which O |
|
is O |
|
then O |
|
sent O |
|
to O |
|
C O |
|
& O |
|
C O |
|
: O |
|
Uninstalling O |
|
apps O |
|
Uninstalling O |
|
apps O |
|
is O |
|
another O |
|
function O |
|
favored O |
|
by O |
|
developers O |
|
of O |
|
Android B-System |
|
spyware O |
|
and O |
|
malware O |
|
. O |
|
|
|
They O |
|
tend O |
|
to O |
|
target O |
|
any O |
|
antivirus O |
|
protections O |
|
on O |
|
the O |
|
device O |
|
and O |
|
uninstall O |
|
them O |
|
, O |
|
which O |
|
increases O |
|
the O |
|
possibility O |
|
of O |
|
their O |
|
malware O |
|
persisting O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
Following O |
|
screenshot O |
|
shows O |
|
this O |
|
functionality O |
|
in O |
|
action O |
|
: O |
|
Other O |
|
functions O |
|
In O |
|
addition O |
|
to O |
|
the O |
|
functionalities O |
|
we O |
|
’ O |
|
ve O |
|
described O |
|
, O |
|
the O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
was O |
|
exhibiting O |
|
many O |
|
other O |
|
behaviors O |
|
that O |
|
make O |
|
it O |
|
more O |
|
robust O |
|
than O |
|
most O |
|
off-the-shelf O |
|
malware O |
|
. O |
|
|
|
SpyNote B-Malware |
|
RAT I-Malware |
|
was O |
|
designed O |
|
to O |
|
function O |
|
only O |
|
over O |
|
Wi-Fi O |
|
, O |
|
which O |
|
is O |
|
the O |
|
preferable O |
|
mode O |
|
for O |
|
Android B-System |
|
malware O |
|
to O |
|
send O |
|
files O |
|
to O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
The O |
|
screenshot O |
|
below O |
|
shows O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
scanning O |
|
for O |
|
Wi-Fi O |
|
and O |
|
enabling O |
|
it O |
|
if O |
|
a O |
|
known O |
|
channel O |
|
is O |
|
found O |
|
: O |
|
Additional O |
|
features O |
|
- O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
could O |
|
click O |
|
photos O |
|
using O |
|
the O |
|
device O |
|
's O |
|
camera O |
|
, O |
|
based O |
|
on O |
|
commands O |
|
from O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|
|
- O |
|
There O |
|
were O |
|
two O |
|
interesting O |
|
sub-classes O |
|
found O |
|
inside O |
|
Main O |
|
Activity O |
|
: O |
|
Receiver O |
|
and O |
|
Sender O |
|
. O |
|
|
|
Receiver O |
|
was O |
|
involved O |
|
in O |
|
receiving O |
|
commands O |
|
from O |
|
the O |
|
Server O |
|
and O |
|
the O |
|
main O |
|
functionality O |
|
of O |
|
Sender O |
|
was O |
|
to O |
|
send O |
|
all O |
|
the O |
|
data O |
|
collected O |
|
to O |
|
the O |
|
C O |
|
& O |
|
C O |
|
over O |
|
Wi-Fi O |
|
. O |
|
|
|
- O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
was O |
|
also O |
|
collecting O |
|
the O |
|
device O |
|
’ O |
|
s O |
|
location O |
|
to O |
|
identify O |
|
the O |
|
exact O |
|
location O |
|
of O |
|
the O |
|
victim O |
|
. O |
|
|
|
SpyNote B-Malware |
|
RAT I-Malware |
|
builder O |
|
The O |
|
SpyNote B-Malware |
|
Remote O |
|
Access O |
|
Trojan O |
|
( O |
|
RAT O |
|
) O |
|
builder O |
|
is O |
|
gaining O |
|
popularity O |
|
in O |
|
the O |
|
hacking O |
|
community O |
|
, O |
|
so O |
|
we O |
|
decided O |
|
to O |
|
study O |
|
its O |
|
pervasiveness O |
|
. O |
|
|
|
What O |
|
we O |
|
found O |
|
were O |
|
several O |
|
other O |
|
fake O |
|
apps O |
|
developed O |
|
using O |
|
the O |
|
SpyNote B-Malware |
|
builder O |
|
, O |
|
which O |
|
should O |
|
come O |
|
as O |
|
a O |
|
warning O |
|
to O |
|
Android B-System |
|
users O |
|
. O |
|
|
|
Some O |
|
of O |
|
the O |
|
targeted O |
|
apps O |
|
were O |
|
: O |
|
Whatsapp B-System |
|
YouTube B-System |
|
Video I-System |
|
Downloader I-System |
|
Google B-System |
|
Update I-System |
|
Instagram B-System |
|
Hack B-System |
|
Wifi I-System |
|
AirDroid B-System |
|
WifiHacker B-System |
|
Facebook B-System |
|
Photoshop B-System |
|
SkyTV B-System |
|
Hotstar B-System |
|
Trump B-System |
|
Dash I-System |
|
PokemonGo B-System |
|
With O |
|
many O |
|
more O |
|
to O |
|
come O |
|
. O |
|
|
|
Furthermore O |
|
, O |
|
we O |
|
found O |
|
that O |
|
in O |
|
just O |
|
the O |
|
first O |
|
two O |
|
weeks O |
|
of O |
|
2017 O |
|
, O |
|
there O |
|
have O |
|
been O |
|
more O |
|
than O |
|
120 O |
|
such O |
|
spyware O |
|
variants O |
|
already O |
|
built O |
|
using O |
|
the O |
|
same O |
|
SpyNote B-Malware |
|
Trojan O |
|
builder O |
|
as O |
|
SpyNote B-Malware |
|
RAT I-Malware |
|
and O |
|
roaming O |
|
in O |
|
the O |
|
wild O |
|
. O |
|
|
|
A O |
|
complete O |
|
list O |
|
of O |
|
sample O |
|
hashes O |
|
is O |
|
available O |
|
here O |
|
. O |
|
|
|
Conclusion O |
|
The O |
|
days O |
|
when O |
|
one O |
|
needed O |
|
in-depth O |
|
coding O |
|
knowledge O |
|
to O |
|
develop O |
|
malware O |
|
are O |
|
long O |
|
gone O |
|
. O |
|
|
|
Nowadays O |
|
, O |
|
script O |
|
kiddies O |
|
can O |
|
build O |
|
a O |
|
piece O |
|
of O |
|
malware O |
|
that O |
|
can O |
|
create O |
|
real O |
|
havoc O |
|
. O |
|
|
|
Moreover O |
|
, O |
|
there O |
|
are O |
|
many O |
|
toolkits O |
|
like O |
|
the O |
|
SpyNote B-Malware |
|
Trojan O |
|
builder O |
|
that O |
|
enable O |
|
users O |
|
to O |
|
build O |
|
malware O |
|
with O |
|
ease O |
|
and O |
|
few O |
|
clicks O |
|
. O |
|
|
|
In O |
|
particular O |
|
, O |
|
avoid O |
|
side-loading O |
|
apps O |
|
from O |
|
third-party O |
|
app O |
|
stores O |
|
and O |
|
avoid O |
|
the O |
|
temptation O |
|
to O |
|
play O |
|
games O |
|
that O |
|
are O |
|
not O |
|
yet O |
|
available O |
|
on O |
|
Android B-System |
|
. O |
|
|
|
Yes O |
|
, O |
|
we O |
|
are O |
|
talking O |
|
about O |
|
SuperMarioRun B-System |
|
, O |
|
which O |
|
was O |
|
recently O |
|
launched O |
|
by O |
|
Nintendo B-Organization |
|
only O |
|
for O |
|
iOS B-System |
|
users O |
|
. O |
|
|
|
Recent O |
|
blogs O |
|
by O |
|
the O |
|
Zscaler B-Organization |
|
research O |
|
team O |
|
explain O |
|
how O |
|
some O |
|
variants O |
|
of O |
|
Android B-Malware |
|
malware O |
|
are O |
|
exploiting O |
|
the O |
|
popularity O |
|
of O |
|
this O |
|
game O |
|
and O |
|
tricking O |
|
Android B-System |
|
users O |
|
into O |
|
downloading O |
|
a O |
|
fake O |
|
version O |
|
. O |
|
|
|
( O |
|
Have O |
|
a O |
|
look O |
|
here O |
|
and O |
|
here O |
|
. O |
|
|
|
) O |
|
You O |
|
should O |
|
also O |
|
avoid O |
|
the O |
|
temptation O |
|
to O |
|
play O |
|
games O |
|
from O |
|
sources O |
|
other O |
|
than O |
|
legitimate O |
|
app O |
|
stores O |
|
; O |
|
such O |
|
games O |
|
are O |
|
not O |
|
safe O |
|
and O |
|
may O |
|
bring O |
|
harm O |
|
to O |
|
your O |
|
reputation O |
|
and O |
|
your O |
|
bank O |
|
account O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
Masquerades O |
|
as O |
|
Postal O |
|
Service O |
|
Apps O |
|
Around O |
|
the O |
|
World O |
|
July O |
|
1 O |
|
, O |
|
2020 O |
|
KEY O |
|
FINDINGS O |
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
is O |
|
investigating O |
|
a O |
|
new O |
|
campaign O |
|
involving O |
|
FakeSpy B-Malware |
|
, O |
|
an O |
|
Android B-System |
|
mobile O |
|
malware O |
|
that O |
|
emerged O |
|
around O |
|
October O |
|
2017 O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
is O |
|
an O |
|
information O |
|
stealer O |
|
used O |
|
to O |
|
steal O |
|
SMS O |
|
messages O |
|
, O |
|
send O |
|
SMS O |
|
messages O |
|
, O |
|
steal O |
|
financial O |
|
data O |
|
, O |
|
read O |
|
account O |
|
information O |
|
and O |
|
contact O |
|
lists O |
|
, O |
|
steal O |
|
application O |
|
data O |
|
, O |
|
and O |
|
do O |
|
much O |
|
more O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
first O |
|
targeted O |
|
South O |
|
Korean O |
|
and O |
|
Japanese O |
|
speakers O |
|
. O |
|
|
|
However O |
|
, O |
|
it O |
|
has O |
|
begun O |
|
to O |
|
target O |
|
users O |
|
all O |
|
around O |
|
the O |
|
world O |
|
, O |
|
especially O |
|
users O |
|
in O |
|
countries O |
|
like O |
|
China O |
|
, O |
|
Taiwan O |
|
, O |
|
France O |
|
, O |
|
Switzerland O |
|
, O |
|
Germany O |
|
, O |
|
United O |
|
Kingdom O |
|
, O |
|
United O |
|
States O |
|
, O |
|
and O |
|
others O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
masquerades O |
|
as O |
|
legitimate O |
|
postal O |
|
service O |
|
apps O |
|
and O |
|
transportation O |
|
services O |
|
in O |
|
order O |
|
to O |
|
gain O |
|
the O |
|
users O |
|
' O |
|
trust O |
|
. O |
|
|
|
Once O |
|
installed O |
|
, O |
|
the O |
|
application O |
|
requests O |
|
permissions O |
|
so O |
|
that O |
|
it O |
|
may O |
|
control O |
|
SMS O |
|
messages O |
|
and O |
|
steal O |
|
sensitive O |
|
data O |
|
on O |
|
the O |
|
device O |
|
, O |
|
as O |
|
well O |
|
as O |
|
proliferate O |
|
to O |
|
other O |
|
devices O |
|
in O |
|
the O |
|
target O |
|
device O |
|
’ O |
|
s O |
|
contact O |
|
list O |
|
. O |
|
|
|
Cybereason B-Organization |
|
's O |
|
investigation O |
|
shows O |
|
that O |
|
the O |
|
threat O |
|
actor O |
|
behind O |
|
the O |
|
FakeSpy B-Malware |
|
campaign O |
|
is O |
|
a O |
|
Chinese-speaking O |
|
group O |
|
dubbed O |
|
" O |
|
Roaming B-Organization |
|
Mantis I-Organization |
|
'' O |
|
, O |
|
a I-Organization |
|
group O |
|
that O |
|
has O |
|
led O |
|
similar O |
|
campaigns O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
has O |
|
been O |
|
in O |
|
the O |
|
wild O |
|
since O |
|
2017 O |
|
; O |
|
this O |
|
latest O |
|
campaign O |
|
indicates O |
|
that O |
|
it O |
|
has O |
|
become O |
|
more O |
|
powerful O |
|
. O |
|
|
|
Code O |
|
improvements O |
|
, O |
|
new O |
|
capabilities O |
|
, O |
|
anti-emulation O |
|
techniques O |
|
, O |
|
and O |
|
new O |
|
, O |
|
global O |
|
targets O |
|
all O |
|
suggest O |
|
that O |
|
this O |
|
malware O |
|
is O |
|
well-maintained O |
|
by O |
|
its O |
|
authors O |
|
and O |
|
continues O |
|
to O |
|
evolve O |
|
. O |
|
|
|
TABLE O |
|
OF O |
|
CONTENTS O |
|
Key O |
|
Findings O |
|
Introduction O |
|
Threat O |
|
Analysis O |
|
Fakespy B-Malware |
|
Code O |
|
Analysis O |
|
Dynamic O |
|
Library O |
|
Loading O |
|
Stealing O |
|
Sensitive O |
|
Information O |
|
Anti-Emulator O |
|
Techniques O |
|
Under O |
|
Active O |
|
Development O |
|
Who O |
|
is O |
|
Behind O |
|
Fakespy B-Malware |
|
's O |
|
Smishing O |
|
Campaigns O |
|
? O |
|
|
|
Conclusions O |
|
Cybereason B-Organization |
|
Mobile I-Organization |
|
Detects O |
|
and O |
|
Stops O |
|
FakeSpy B-Malware |
|
Indicators O |
|
of O |
|
Compromise O |
|
INTRODUCTION O |
|
For O |
|
the O |
|
past O |
|
several O |
|
weeks O |
|
, O |
|
Cybereason B-Organization |
|
has O |
|
been O |
|
investigating O |
|
a O |
|
new O |
|
version O |
|
of O |
|
Android B-System |
|
malware O |
|
dubbed O |
|
FakeSpy B-Malware |
|
, O |
|
which O |
|
was O |
|
first O |
|
identified O |
|
in O |
|
October O |
|
2017 O |
|
and O |
|
reported O |
|
again O |
|
in O |
|
October O |
|
2018 O |
|
. O |
|
|
|
A O |
|
new O |
|
campaign O |
|
is O |
|
up O |
|
and O |
|
running O |
|
using O |
|
newly O |
|
improved O |
|
, O |
|
significantly O |
|
more O |
|
powerful O |
|
malware O |
|
as O |
|
compared O |
|
to O |
|
previous O |
|
versions O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
is O |
|
under O |
|
active O |
|
development O |
|
and O |
|
is O |
|
evolving O |
|
rapidly O |
|
; O |
|
new O |
|
versions O |
|
are O |
|
released O |
|
every O |
|
week O |
|
with O |
|
additional O |
|
evasion O |
|
techniques O |
|
and O |
|
capabilities O |
|
. O |
|
|
|
Our O |
|
analysis O |
|
shows O |
|
that O |
|
the O |
|
threat O |
|
actor O |
|
behind O |
|
the O |
|
FakeSpy B-Malware |
|
malware O |
|
is O |
|
a O |
|
Chinese-speaking O |
|
group O |
|
, O |
|
commonly O |
|
referred O |
|
to O |
|
as O |
|
" O |
|
Roaming B-Organization |
|
Mantis I-Organization |
|
'' O |
|
, O |
|
a I-Organization |
|
group O |
|
that O |
|
is O |
|
known O |
|
to O |
|
have O |
|
launched O |
|
similar O |
|
campaigns O |
|
in O |
|
the O |
|
past O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
is O |
|
an O |
|
information O |
|
stealer O |
|
that O |
|
exfiltrates O |
|
and O |
|
sends O |
|
SMS O |
|
messages O |
|
, O |
|
steals O |
|
financial O |
|
and O |
|
application O |
|
data O |
|
, O |
|
reads O |
|
account O |
|
information O |
|
and O |
|
contact O |
|
lists O |
|
, O |
|
and O |
|
more O |
|
. O |
|
|
|
The O |
|
malware O |
|
uses O |
|
smishing O |
|
, O |
|
or O |
|
SMS O |
|
phishing O |
|
, O |
|
to O |
|
infiltrate O |
|
target O |
|
devices O |
|
, O |
|
which O |
|
is O |
|
a O |
|
technique O |
|
that O |
|
relies O |
|
on O |
|
social O |
|
engineering O |
|
. O |
|
|
|
The O |
|
attackers O |
|
send O |
|
fake O |
|
text O |
|
messages O |
|
to O |
|
lure O |
|
the O |
|
victims O |
|
to O |
|
click O |
|
on O |
|
a O |
|
malicious O |
|
link O |
|
. O |
|
|
|
The O |
|
link O |
|
directs O |
|
them O |
|
to O |
|
a O |
|
malicious O |
|
web O |
|
page O |
|
, O |
|
which O |
|
prompts O |
|
them O |
|
to O |
|
download O |
|
an O |
|
Android O |
|
application O |
|
package O |
|
( O |
|
APK O |
|
) O |
|
. O |
|
|
|
This O |
|
most O |
|
recent O |
|
FakeSpy B-Malware |
|
campaign O |
|
appears O |
|
to O |
|
target O |
|
users O |
|
of O |
|
postal O |
|
services O |
|
around O |
|
the O |
|
world O |
|
. O |
|
|
|
New O |
|
versions O |
|
of O |
|
FakeSpy B-Malware |
|
masquerade O |
|
as O |
|
government O |
|
post O |
|
office O |
|
apps O |
|
and O |
|
transportation O |
|
services O |
|
apps O |
|
. O |
|
|
|
Our O |
|
analysis O |
|
indicates O |
|
that O |
|
the O |
|
threat O |
|
actors O |
|
are O |
|
no O |
|
longer O |
|
limiting O |
|
their O |
|
campaigns O |
|
to O |
|
East O |
|
Asian O |
|
countries O |
|
, O |
|
but O |
|
are O |
|
targeting O |
|
additional O |
|
countries O |
|
around O |
|
the O |
|
world O |
|
. O |
|
|
|
THREAT O |
|
ANALYSIS O |
|
Infection O |
|
Vector O |
|
: O |
|
Smishing O |
|
Your O |
|
Device O |
|
Thus O |
|
far O |
|
, O |
|
FakeSpy B-Malware |
|
campaigns O |
|
are O |
|
characterized O |
|
by O |
|
SMS O |
|
phishing O |
|
( O |
|
a.k.a O |
|
. O |
|
|
|
smishing O |
|
) O |
|
. O |
|
|
|
These O |
|
SMS O |
|
messages O |
|
masquerade O |
|
as O |
|
a O |
|
message O |
|
from O |
|
the O |
|
local O |
|
post O |
|
office O |
|
and O |
|
link O |
|
to O |
|
the O |
|
FakeSpy B-Malware |
|
download O |
|
. O |
|
|
|
In O |
|
a O |
|
previous O |
|
campaign O |
|
reported O |
|
by O |
|
JPCERT B-Organization |
|
, O |
|
mobile O |
|
users O |
|
were O |
|
alerted O |
|
by O |
|
phishy O |
|
messages O |
|
containing O |
|
“ O |
|
delivery O |
|
updates O |
|
” O |
|
purportedly O |
|
from O |
|
Sagawa B-Organization |
|
Express I-Organization |
|
. O |
|
|
|
Fake O |
|
SMS O |
|
message O |
|
luring O |
|
users O |
|
to O |
|
enter O |
|
a O |
|
fake O |
|
website O |
|
, O |
|
which O |
|
contains O |
|
the O |
|
malicious O |
|
APK O |
|
( O |
|
JPCERT B-Organization |
|
report O |
|
) O |
|
. O |
|
|
|
Clicking O |
|
the O |
|
SMS O |
|
link O |
|
brings O |
|
the O |
|
user O |
|
to O |
|
a O |
|
fake O |
|
website O |
|
that O |
|
prompts O |
|
them O |
|
to O |
|
download O |
|
and O |
|
install O |
|
the O |
|
FakeSpy B-Malware |
|
APK O |
|
, O |
|
which O |
|
is O |
|
masquerading O |
|
as O |
|
a O |
|
local O |
|
postal O |
|
service O |
|
app O |
|
. O |
|
|
|
Targeting O |
|
Postal O |
|
and O |
|
Transportation O |
|
Services O |
|
Companies O |
|
One O |
|
of O |
|
the O |
|
most O |
|
significant O |
|
findings O |
|
is O |
|
that O |
|
new O |
|
versions O |
|
of O |
|
FakeSpy B-Malware |
|
target O |
|
not O |
|
only O |
|
Korean O |
|
and O |
|
Japanese O |
|
speakers O |
|
, O |
|
but O |
|
also O |
|
almost O |
|
any O |
|
postal O |
|
service O |
|
company O |
|
around O |
|
the O |
|
world O |
|
. O |
|
|
|
Example O |
|
of O |
|
more O |
|
recent O |
|
FakeSpy B-Malware |
|
campaigns O |
|
targeting O |
|
France O |
|
. O |
|
|
|
New O |
|
FakeSpy B-Malware |
|
campaign O |
|
applications O |
|
leveraging O |
|
fake O |
|
postal O |
|
services O |
|
apps O |
|
. O |
|
|
|
All O |
|
recent O |
|
FakeSpy B-Malware |
|
versions O |
|
contain O |
|
the O |
|
same O |
|
code O |
|
with O |
|
minor O |
|
changes O |
|
. O |
|
|
|
The O |
|
FakeSpy B-Malware |
|
malware O |
|
has O |
|
been O |
|
found O |
|
to O |
|
masquerade O |
|
as O |
|
any O |
|
of O |
|
the O |
|
following O |
|
companies O |
|
: O |
|
United B-Organization |
|
States I-Organization |
|
Postal I-Organization |
|
Service I-Organization |
|
- O |
|
An O |
|
independent O |
|
agency O |
|
of O |
|
the O |
|
executive O |
|
branch O |
|
of O |
|
the O |
|
United O |
|
States O |
|
federal O |
|
government O |
|
. O |
|
|
|
USPS B-Organization |
|
is O |
|
the O |
|
most O |
|
well-known O |
|
branch O |
|
of O |
|
the O |
|
US O |
|
government O |
|
and O |
|
provides O |
|
a O |
|
publicly O |
|
funded O |
|
postal O |
|
service O |
|
. O |
|
|
|
Royal B-Organization |
|
Mail I-Organization |
|
- O |
|
British O |
|
postal O |
|
service O |
|
and O |
|
courier O |
|
company O |
|
. O |
|
|
|
For O |
|
most O |
|
of O |
|
its O |
|
history O |
|
it O |
|
operated O |
|
as O |
|
a O |
|
government O |
|
department O |
|
or O |
|
public O |
|
corporation O |
|
. O |
|
|
|
Deutsche B-Organization |
|
Post I-Organization |
|
- O |
|
Deutsche O |
|
Post O |
|
DHL B-Organization |
|
Group I-Organization |
|
, O |
|
a O |
|
German O |
|
multinational O |
|
package O |
|
delivery O |
|
and O |
|
supply O |
|
chain O |
|
management O |
|
company O |
|
headquartered O |
|
in O |
|
Bonn O |
|
. O |
|
|
|
La B-Organization |
|
Poste I-Organization |
|
- O |
|
La O |
|
Poste O |
|
is O |
|
a O |
|
public O |
|
limited O |
|
postal O |
|
service O |
|
company O |
|
in O |
|
France O |
|
. O |
|
|
|
Japan B-Organization |
|
Post I-Organization |
|
- O |
|
A O |
|
private O |
|
Japanese O |
|
post O |
|
, O |
|
logistics O |
|
and O |
|
courier O |
|
headquartered O |
|
in O |
|
Tokyo O |
|
. O |
|
|
|
Yamato B-Organization |
|
Transport I-Organization |
|
- O |
|
One O |
|
of O |
|
Japan O |
|
's O |
|
largest O |
|
door-to-door O |
|
delivery O |
|
service O |
|
companies O |
|
, O |
|
also O |
|
in O |
|
Tokyo O |
|
. O |
|
|
|
Chunghwa B-Organization |
|
Post I-Organization |
|
- O |
|
The O |
|
government-owned O |
|
corporation O |
|
Chunghwa B-Organization |
|
is O |
|
the O |
|
official O |
|
postal O |
|
service O |
|
of O |
|
Taiwan O |
|
. O |
|
|
|
Swiss B-Organization |
|
Post I-Organization |
|
- O |
|
The O |
|
national O |
|
postal O |
|
service O |
|
of O |
|
Switzerland O |
|
, O |
|
a O |
|
fully O |
|
state-owned O |
|
limited O |
|
company O |
|
( O |
|
AG O |
|
) O |
|
regulated O |
|
by O |
|
public O |
|
law O |
|
. O |
|
|
|
The O |
|
fake O |
|
applications O |
|
are O |
|
built O |
|
using O |
|
WebView B-System |
|
, O |
|
a O |
|
popular O |
|
extension O |
|
of O |
|
Android B-System |
|
’ O |
|
s O |
|
View O |
|
class O |
|
that O |
|
lets O |
|
the O |
|
developer O |
|
show O |
|
a O |
|
webpage O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
uses O |
|
this O |
|
view O |
|
to O |
|
redirect O |
|
users O |
|
to O |
|
the O |
|
original O |
|
post O |
|
office O |
|
carrier O |
|
webpage O |
|
on O |
|
launch O |
|
of O |
|
the O |
|
application O |
|
, O |
|
continuing O |
|
the O |
|
deception O |
|
. O |
|
|
|
This O |
|
allows O |
|
the O |
|
application O |
|
to O |
|
appear O |
|
legitimate O |
|
, O |
|
especially O |
|
given O |
|
these O |
|
applications O |
|
icons O |
|
and O |
|
user O |
|
interface O |
|
. O |
|
|
|
New O |
|
FakeSpy B-Malware |
|
applications O |
|
masquerading O |
|
as O |
|
post O |
|
office O |
|
apps O |
|
. O |
|
|
|
FAKESPY B-Malware |
|
CODE O |
|
ANALYSIS O |
|
Once O |
|
the O |
|
user O |
|
clicks O |
|
on O |
|
the O |
|
malicious O |
|
link O |
|
from O |
|
the O |
|
SMS O |
|
message O |
|
, O |
|
the O |
|
app O |
|
asks O |
|
them O |
|
to O |
|
approve O |
|
installation O |
|
from O |
|
unknown O |
|
resources O |
|
. O |
|
|
|
This O |
|
configuration O |
|
can O |
|
be O |
|
toggled O |
|
on O |
|
by O |
|
going O |
|
to O |
|
‘ O |
|
Settings O |
|
’ O |
|
- O |
|
> O |
|
‘ O |
|
Security O |
|
’ O |
|
- O |
|
> O |
|
‘ O |
|
Unknown O |
|
Resources O |
|
’ O |
|
. O |
|
|
|
PackageInstaller O |
|
shows O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
permission O |
|
access O |
|
and O |
|
asks O |
|
for O |
|
the O |
|
user O |
|
's O |
|
approval O |
|
, O |
|
which O |
|
then O |
|
installs O |
|
the O |
|
application O |
|
. O |
|
|
|
This O |
|
analysis O |
|
dissects O |
|
FakeSpy B-Malware |
|
’ O |
|
s O |
|
Chunghwa O |
|
Post O |
|
app O |
|
version O |
|
, O |
|
which O |
|
emerged O |
|
in O |
|
April O |
|
2020 O |
|
. O |
|
|
|
During O |
|
the O |
|
installation O |
|
, O |
|
the O |
|
malware O |
|
asks O |
|
for O |
|
the O |
|
following O |
|
permissions O |
|
: O |
|
READ_PHONE_STATE O |
|
- O |
|
Allows O |
|
read-only O |
|
access O |
|
to O |
|
the O |
|
phone O |
|
state O |
|
, O |
|
including O |
|
the O |
|
current O |
|
cellular O |
|
network O |
|
information O |
|
, O |
|
the O |
|
status O |
|
of O |
|
any O |
|
ongoing O |
|
calls O |
|
, O |
|
and O |
|
a O |
|
list O |
|
of O |
|
any O |
|
PhoneAccounts O |
|
registered O |
|
on O |
|
the O |
|
device O |
|
. O |
|
|
|
READ_SMS O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
read O |
|
text O |
|
messages O |
|
. O |
|
|
|
RECEIVE_SMS O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
receive O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
WRITE_SMS O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
write O |
|
to O |
|
SMS O |
|
messages O |
|
stored O |
|
on O |
|
the O |
|
device O |
|
or O |
|
SIM O |
|
card O |
|
, O |
|
including O |
|
y O |
|
deleting O |
|
messages O |
|
. O |
|
|
|
SEND_SMS O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
send O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
INTERNET O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
open O |
|
network O |
|
sockets O |
|
. O |
|
|
|
WRITE_EXTERNAL_STORAGE O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
write O |
|
to O |
|
external O |
|
storage O |
|
. O |
|
|
|
READ_EXTERNAL_STORAGE O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
read O |
|
from O |
|
external O |
|
storage O |
|
. O |
|
|
|
RECEIVE_BOOT_COMPLETED O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
receive O |
|
a O |
|
broadcast O |
|
after O |
|
the O |
|
system O |
|
finishes O |
|
booting O |
|
. O |
|
|
|
GET_TASKS O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
get O |
|
information O |
|
about O |
|
current O |
|
or O |
|
recently O |
|
run O |
|
tasks O |
|
. O |
|
|
|
( O |
|
deprecated O |
|
in O |
|
API O |
|
level O |
|
21 O |
|
) O |
|
SYSTEM_ALERT_WINDOW O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
create O |
|
windows O |
|
shown O |
|
on O |
|
top O |
|
of O |
|
all O |
|
other O |
|
apps O |
|
. O |
|
|
|
WAKE_LOCK O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
use O |
|
PowerManager O |
|
WakeLocks O |
|
to O |
|
keep O |
|
the O |
|
processor O |
|
from O |
|
sleeping O |
|
or O |
|
the O |
|
screen O |
|
from O |
|
dimming O |
|
. O |
|
|
|
ACCESS_NETWORK_STATE O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
access O |
|
information O |
|
about O |
|
networks O |
|
. O |
|
|
|
REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O |
|
- O |
|
Whitelists O |
|
the O |
|
application O |
|
to O |
|
allow O |
|
it O |
|
to O |
|
ignore O |
|
battery O |
|
optimizations O |
|
. O |
|
|
|
READ_CONTACTS O |
|
- O |
|
Allows O |
|
the O |
|
application O |
|
to O |
|
read O |
|
the O |
|
user O |
|
's O |
|
contacts O |
|
data O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
package O |
|
permissions O |
|
. O |
|
|
|
On O |
|
opening O |
|
the O |
|
app O |
|
, O |
|
two O |
|
pop-up O |
|
messages O |
|
appear O |
|
on O |
|
screen O |
|
: O |
|
Change O |
|
SMS O |
|
App O |
|
: O |
|
This O |
|
sets O |
|
permissions O |
|
to O |
|
intercept O |
|
every O |
|
SMS O |
|
received O |
|
on O |
|
the O |
|
device O |
|
and O |
|
send O |
|
a O |
|
copy O |
|
of O |
|
these O |
|
messages O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
. O |
|
|
|
Ignore O |
|
Battery O |
|
Optimization O |
|
: O |
|
This O |
|
sets O |
|
permissions O |
|
to O |
|
continue O |
|
to O |
|
operate O |
|
at O |
|
full O |
|
capacity O |
|
while O |
|
the O |
|
phone O |
|
's O |
|
screen O |
|
is O |
|
turned O |
|
off O |
|
and O |
|
the O |
|
phone O |
|
locked O |
|
. O |
|
|
|
These O |
|
requests O |
|
rely O |
|
on O |
|
the O |
|
end O |
|
user O |
|
accepting O |
|
the O |
|
permission O |
|
changes O |
|
and O |
|
points O |
|
to O |
|
the O |
|
importance O |
|
of O |
|
healthy O |
|
skepticism O |
|
when O |
|
giving O |
|
applications O |
|
permissions O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
Chunghwa B-Organization |
|
Post I-Organization |
|
version O |
|
installation O |
|
process O |
|
and O |
|
application O |
|
UI O |
|
. O |
|
|
|
DYNAMIC O |
|
LIBRARY O |
|
LOADING O |
|
Once O |
|
the O |
|
application O |
|
has O |
|
finished O |
|
the O |
|
installation O |
|
process O |
|
, O |
|
the O |
|
malware O |
|
starts O |
|
its O |
|
real O |
|
malicious O |
|
activity O |
|
. O |
|
|
|
The O |
|
malicious O |
|
application O |
|
da.hao.pao.bin B-Indicator |
|
( O |
|
Chunghwa B-Organization |
|
Post I-Organization |
|
) O |
|
loads O |
|
a O |
|
library O |
|
file O |
|
libmsy.so B-Indicator |
|
used O |
|
to O |
|
execute O |
|
the O |
|
packed O |
|
mycode.jar B-Indicator |
|
file I-Indicator |
|
. O |
|
|
|
The O |
|
JAR O |
|
file O |
|
is O |
|
the O |
|
decrypted O |
|
version O |
|
of O |
|
the O |
|
file O |
|
tong.luo B-Indicator |
|
, O |
|
which O |
|
is O |
|
located O |
|
in O |
|
the O |
|
assets O |
|
folder O |
|
. O |
|
|
|
Decompiled O |
|
APK O |
|
resources O |
|
. O |
|
|
|
By O |
|
comparing O |
|
the O |
|
sizes O |
|
of O |
|
the O |
|
encrypted O |
|
asset O |
|
file O |
|
tong.luo B-Indicator |
|
vs O |
|
the O |
|
decrypted O |
|
JAR O |
|
file O |
|
mycode.jar B-Indicator |
|
, O |
|
it O |
|
is O |
|
interesting O |
|
to O |
|
note O |
|
that O |
|
it O |
|
is O |
|
the O |
|
same O |
|
file O |
|
( O |
|
almost O |
|
the O |
|
same O |
|
size O |
|
) O |
|
. O |
|
|
|
Comparing O |
|
encrypted O |
|
vs O |
|
decrypted O |
|
asset O |
|
file O |
|
. O |
|
|
|
After O |
|
libmsy.so B-Indicator |
|
decrypts O |
|
the O |
|
asset O |
|
file O |
|
tong.luo B-Indicator |
|
, O |
|
it O |
|
loads O |
|
mycode.jar B-Indicator |
|
dynamically O |
|
into O |
|
FakeSpy B-Malware |
|
’ O |
|
s O |
|
process O |
|
, O |
|
as O |
|
is O |
|
shown O |
|
from O |
|
the O |
|
output O |
|
of O |
|
the O |
|
“ O |
|
adb O |
|
logcat O |
|
” O |
|
command O |
|
. O |
|
|
|
Logcat O |
|
logs O |
|
show O |
|
FakeSpy B-Malware |
|
uses O |
|
libmsy.so B-Indicator |
|
to O |
|
execute O |
|
the O |
|
malicious O |
|
packed O |
|
mycode.jar B-Indicator |
|
file I-Indicator |
|
. O |
|
|
|
By O |
|
analyzing O |
|
running O |
|
processes O |
|
on O |
|
the O |
|
infected O |
|
device O |
|
, O |
|
it O |
|
shows O |
|
that O |
|
the O |
|
malware O |
|
creates O |
|
a O |
|
child O |
|
process O |
|
of O |
|
itself O |
|
to O |
|
perform O |
|
the O |
|
multi-process O |
|
ptrace O |
|
anti-debugging O |
|
technique O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
uses O |
|
an O |
|
anti-debugging O |
|
technique O |
|
by O |
|
creating O |
|
another O |
|
child O |
|
process O |
|
of O |
|
itself O |
|
. O |
|
|
|
By O |
|
performing O |
|
a O |
|
deep O |
|
analysis O |
|
of O |
|
the O |
|
malware O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
extract O |
|
the O |
|
unpacked O |
|
JAR O |
|
file O |
|
mycode.jar B-Indicator |
|
and O |
|
reveal O |
|
some O |
|
very O |
|
interesting O |
|
code O |
|
. O |
|
|
|
STEALING O |
|
SENSITIVE O |
|
INFORMATION O |
|
FakeSpy B-Malware |
|
has O |
|
multiple O |
|
built O |
|
in O |
|
information O |
|
stealing O |
|
capabilities O |
|
. O |
|
|
|
The O |
|
first O |
|
function O |
|
is O |
|
used O |
|
for O |
|
contact O |
|
information O |
|
stealing O |
|
: O |
|
the O |
|
function O |
|
upCon O |
|
steals O |
|
all O |
|
contacts O |
|
in O |
|
the O |
|
contact O |
|
list O |
|
and O |
|
their O |
|
information O |
|
. O |
|
|
|
Then O |
|
, O |
|
it O |
|
sends O |
|
it O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
using O |
|
the O |
|
URL O |
|
that O |
|
ends O |
|
with O |
|
/servlet/ContactUpload B-Indicator |
|
. O |
|
|
|
The O |
|
stolen O |
|
data O |
|
fields O |
|
are O |
|
: O |
|
Mobile O |
|
- O |
|
The O |
|
infected O |
|
device O |
|
phone O |
|
number O |
|
and O |
|
contact O |
|
’ O |
|
s O |
|
phone O |
|
number O |
|
Contacts O |
|
- O |
|
A O |
|
headline O |
|
used O |
|
for O |
|
the O |
|
attacker O |
|
to O |
|
distinguish O |
|
between O |
|
the O |
|
type O |
|
of O |
|
stolen O |
|
information O |
|
he O |
|
gets O |
|
Name O |
|
- O |
|
Contact O |
|
’ O |
|
s O |
|
full O |
|
name O |
|
( O |
|
Display O |
|
name O |
|
) O |
|
upCon O |
|
( O |
|
upload O |
|
contact O |
|
) O |
|
function O |
|
used O |
|
for O |
|
stealing O |
|
contact O |
|
list O |
|
information O |
|
. O |
|
|
|
For O |
|
testing O |
|
purposes O |
|
we O |
|
inserted O |
|
a O |
|
fake O |
|
contacts O |
|
list O |
|
to O |
|
our O |
|
Android B-System |
|
Emulator O |
|
and O |
|
observed O |
|
resultant O |
|
behavior O |
|
. O |
|
|
|
Exfiltrated O |
|
contact O |
|
list O |
|
data O |
|
sent O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
. O |
|
|
|
The O |
|
second O |
|
stealing O |
|
function O |
|
is O |
|
the O |
|
onStartCommand O |
|
, O |
|
which O |
|
steals O |
|
infected O |
|
device O |
|
data O |
|
and O |
|
additional O |
|
information O |
|
. O |
|
|
|
The O |
|
stolen O |
|
data O |
|
is O |
|
sent O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
using O |
|
the O |
|
URL O |
|
ending O |
|
with O |
|
/servlet/xx B-Indicator |
|
. O |
|
|
|
The O |
|
stolen O |
|
data O |
|
fields O |
|
are O |
|
: O |
|
Mobile O |
|
- O |
|
The O |
|
infected O |
|
device O |
|
phone O |
|
number O |
|
Machine O |
|
- O |
|
The O |
|
device O |
|
model O |
|
( O |
|
in O |
|
our O |
|
example O |
|
: O |
|
Google B-System |
|
Pixel I-System |
|
2 I-System |
|
) O |
|
Sversion O |
|
- O |
|
The O |
|
OS O |
|
version O |
|
Bank O |
|
- O |
|
Checks O |
|
if O |
|
there O |
|
are O |
|
any O |
|
banking-related O |
|
or O |
|
cryptocurrency O |
|
trading O |
|
apps O |
|
Provider O |
|
- O |
|
The O |
|
telecommunication O |
|
provider O |
|
( O |
|
IMSI O |
|
value O |
|
in O |
|
device O |
|
settings O |
|
) O |
|
npki O |
|
- O |
|
Checks O |
|
if O |
|
the O |
|
folder O |
|
named O |
|
NPKI O |
|
( O |
|
National O |
|
Public O |
|
Key O |
|
Infrastructure O |
|
) O |
|
might O |
|
contain O |
|
authentication O |
|
certificates O |
|
related O |
|
to O |
|
financial O |
|
transactions O |
|
onStartCommand O |
|
function O |
|
for O |
|
stealing O |
|
device O |
|
information O |
|
and O |
|
additional O |
|
sensitive O |
|
data O |
|
. O |
|
|
|
Exfiltrated O |
|
device O |
|
information O |
|
and O |
|
additional O |
|
sensitive O |
|
data O |
|
sent O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
asks O |
|
to O |
|
be O |
|
the O |
|
default O |
|
SMS O |
|
app O |
|
because O |
|
it O |
|
uses O |
|
the O |
|
function O |
|
onReceive O |
|
to O |
|
intercept O |
|
incoming O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
It O |
|
saves O |
|
the O |
|
messages O |
|
’ O |
|
metadata O |
|
and O |
|
content O |
|
, O |
|
filters O |
|
the O |
|
information O |
|
by O |
|
fields O |
|
, O |
|
and O |
|
sends O |
|
them O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
using O |
|
the O |
|
URL O |
|
/servlet/SendMassage2 B-Indicator |
|
. O |
|
|
|
The O |
|
fields O |
|
it O |
|
collects O |
|
are O |
|
: O |
|
Mobile O |
|
- O |
|
The O |
|
phone O |
|
number O |
|
which O |
|
sent O |
|
the O |
|
SMS O |
|
Content O |
|
- O |
|
The O |
|
message O |
|
body O |
|
Sender O |
|
- O |
|
The O |
|
contact O |
|
name O |
|
who O |
|
sent O |
|
the O |
|
message O |
|
Time O |
|
- O |
|
The O |
|
time O |
|
the O |
|
message O |
|
was O |
|
received O |
|
onReceive O |
|
function O |
|
used O |
|
to O |
|
intercept O |
|
incoming O |
|
SMS O |
|
messages O |
|
. O |
|
|
|
The O |
|
malware O |
|
uses O |
|
the O |
|
function O |
|
sendAll O |
|
to O |
|
send O |
|
messages O |
|
that O |
|
spread O |
|
the O |
|
malware O |
|
to O |
|
other O |
|
devices O |
|
. O |
|
|
|
It O |
|
sends O |
|
a O |
|
smishing O |
|
message O |
|
to O |
|
the O |
|
entire O |
|
contact O |
|
list O |
|
of O |
|
the O |
|
infected O |
|
device O |
|
along O |
|
with O |
|
the O |
|
malicious O |
|
link O |
|
to O |
|
the O |
|
FakeSpy B-Malware |
|
installation O |
|
page O |
|
. O |
|
|
|
sendAll O |
|
function O |
|
used O |
|
to O |
|
spread O |
|
malicious O |
|
messages O |
|
to O |
|
the O |
|
contact O |
|
list O |
|
. O |
|
|
|
Another O |
|
interesting O |
|
feature O |
|
in O |
|
FakeSpy B-Malware |
|
’ O |
|
s O |
|
code O |
|
is O |
|
the O |
|
collection O |
|
of O |
|
the O |
|
device O |
|
's O |
|
IMEI O |
|
( O |
|
International O |
|
Mobile O |
|
Station O |
|
Equipment O |
|
Identity O |
|
) O |
|
number O |
|
and O |
|
all O |
|
installed O |
|
applications O |
|
using O |
|
the O |
|
function O |
|
upAppinfos O |
|
. O |
|
|
|
It O |
|
sends O |
|
all O |
|
of O |
|
this O |
|
data O |
|
to O |
|
the O |
|
C2 O |
|
server O |
|
using O |
|
the O |
|
URL O |
|
ending O |
|
with O |
|
/servlet/AppInfos B-Indicator |
|
. O |
|
|
|
upAppinfos O |
|
function O |
|
used O |
|
for O |
|
obtaining O |
|
the O |
|
device O |
|
IMEI O |
|
and O |
|
all O |
|
of O |
|
its O |
|
installed O |
|
applications O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
is O |
|
able O |
|
to O |
|
check O |
|
the O |
|
network O |
|
connectivity O |
|
status O |
|
by O |
|
using O |
|
the O |
|
function O |
|
isNetworkAvailable O |
|
. O |
|
|
|
What O |
|
makes O |
|
this O |
|
function O |
|
more O |
|
suspicious O |
|
is O |
|
the O |
|
two O |
|
strings O |
|
written O |
|
in O |
|
Chinese O |
|
characters O |
|
: O |
|
===状态=== O |
|
( O |
|
===Status=== O |
|
) O |
|
- O |
|
Checks O |
|
whether O |
|
the O |
|
device O |
|
is O |
|
connected O |
|
to O |
|
a O |
|
network O |
|
===类型=== O |
|
( O |
|
===Type=== O |
|
) O |
|
- O |
|
Checks O |
|
whether O |
|
the O |
|
device O |
|
sees O |
|
available O |
|
nearby O |
|
Wifi O |
|
networks O |
|
isNetworkAvailable O |
|
function O |
|
used O |
|
for O |
|
monitoring O |
|
network O |
|
connectivity O |
|
status O |
|
. O |
|
|
|
ANTI-EMULATOR O |
|
TECHNIQUES O |
|
FakeSpy B-Malware |
|
appears O |
|
to O |
|
use O |
|
multiple O |
|
techniques O |
|
to O |
|
evade O |
|
detection O |
|
via O |
|
the O |
|
emulator O |
|
. O |
|
|
|
It O |
|
shows O |
|
that O |
|
the O |
|
malware O |
|
can O |
|
detect O |
|
whether O |
|
it O |
|
’ O |
|
s O |
|
running O |
|
in O |
|
an O |
|
emulated O |
|
environment O |
|
or O |
|
a O |
|
real O |
|
mobile O |
|
device O |
|
, O |
|
and O |
|
can O |
|
change O |
|
its O |
|
code O |
|
pattern O |
|
accordingly O |
|
. O |
|
|
|
The O |
|
first O |
|
example O |
|
of O |
|
this O |
|
is O |
|
in O |
|
the O |
|
onStart O |
|
function O |
|
, O |
|
where O |
|
the O |
|
malware O |
|
looks O |
|
for O |
|
the O |
|
string O |
|
“ O |
|
Emulator O |
|
” O |
|
and O |
|
a O |
|
x86 O |
|
processor O |
|
model O |
|
. O |
|
|
|
Anti-emulator O |
|
code O |
|
. O |
|
|
|
In O |
|
order O |
|
to O |
|
simulate O |
|
this O |
|
technique O |
|
, O |
|
we O |
|
took O |
|
two O |
|
videos O |
|
side O |
|
by O |
|
side O |
|
of O |
|
how O |
|
FakeSpy B-Malware |
|
( O |
|
the O |
|
Royal B-Organization |
|
Mail I-Organization |
|
sample O |
|
) O |
|
behaves O |
|
differently O |
|
on O |
|
a O |
|
physical O |
|
device O |
|
versus O |
|
an O |
|
emulator O |
|
. O |
|
|
|
FakeSpy B-Malware |
|
behavior O |
|
on O |
|
physical O |
|
device O |
|
vs O |
|
emulator O |
|
( O |
|
anti-emulator O |
|
) O |
|
. O |
|
|
|
This O |
|
simulation O |
|
shows O |
|
that O |
|
FakeSpy B-Malware |
|
behaves O |
|
differently O |
|
on O |
|
a O |
|
physical O |
|
device O |
|
versus O |
|
an O |
|
emulator O |
|
. O |
|
|
|
When O |
|
executed O |
|
the O |
|
second O |
|
time O |
|
by O |
|
clicking O |
|
on O |
|
the O |
|
app O |
|
on O |
|
the O |
|
physical O |
|
device O |
|
, O |
|
FakeSpy B-Malware |
|
redirects O |
|
to O |
|
the O |
|
app O |
|
settings O |
|
. O |
|
|
|
In O |
|
contrast O |
|
, O |
|
on O |
|
the O |
|
emulator O |
|
, O |
|
a O |
|
toast O |
|
message O |
|
is O |
|
displayed O |
|
that O |
|
shows O |
|
“ O |
|
Install O |
|
completed O |
|
” O |
|
, O |
|
at O |
|
which O |
|
point O |
|
FakeSpy B-Malware |
|
removes O |
|
its O |
|
shortcut O |
|
from O |
|
the O |
|
device O |
|
's O |
|
homescreen O |
|
. O |
|
|
|
Another O |
|
example O |
|
of O |
|
FakeSpy B-Malware |
|
’ O |
|
s O |
|
anti-emulation O |
|
techniques O |
|
is O |
|
how O |
|
it O |
|
uses O |
|
the O |
|
getMachine O |
|
function O |
|
, O |
|
which O |
|
uses O |
|
the O |
|
TelephonyManager O |
|
class O |
|
to O |
|
check O |
|
for O |
|
the O |
|
deviceID O |
|
, O |
|
phone O |
|
number O |
|
, O |
|
IMEI O |
|
, O |
|
and O |
|
IMSI O |
|
. O |
|
|
|
Some O |
|
emulators O |
|
build O |
|
their O |
|
phone O |
|
number O |
|
out O |
|
of O |
|
the O |
|
default O |
|
number O |
|
created O |
|
in O |
|
the O |
|
emulator O |
|
software O |
|
and O |
|
the O |
|
port B-Indicator |
|
number I-Indicator |
|
: I-Indicator |
|
5554. I-Indicator |
|
getMachine O |
|
function O |
|
using O |
|
anti-emulator O |
|
technique O |
|
. O |
|
|
|
UNDER O |
|
ACTIVE O |
|
DEVELOPMENT O |
|
An O |
|
analysis O |
|
of O |
|
new O |
|
FakeSpy B-Malware |
|
samples O |
|
to O |
|
old O |
|
ones O |
|
showed O |
|
code O |
|
discrepancies O |
|
and O |
|
new O |
|
features O |
|
. O |
|
|
|
These O |
|
artifacts O |
|
indicate O |
|
that O |
|
FakeSpy B-Malware |
|
's O |
|
campaign O |
|
is O |
|
still O |
|
live O |
|
and O |
|
under O |
|
development O |
|
. O |
|
|
|
The O |
|
newer O |
|
version O |
|
of O |
|
FakeSpy B-Malware |
|
uses O |
|
new O |
|
URL O |
|
addresses O |
|
for O |
|
malicious O |
|
communication O |
|
with O |
|
FakeSpy B-Malware |
|
. O |
|
|
|
The O |
|
function O |
|
main O |
|
uses O |
|
a O |
|
DES O |
|
encryption O |
|
algorithm O |
|
to O |
|
encode O |
|
these O |
|
addresses O |
|
. O |
|
|
|
The O |
|
examples O |
|
below O |
|
show O |
|
the O |
|
plaintext O |
|
key O |
|
“ O |
|
TEST O |
|
” O |
|
to O |
|
decrypt O |
|
encoded O |
|
hexadecimal O |
|
strings O |
|
( O |
|
jUtils.decrypt O |
|
( O |
|
) O |
|
) O |
|
. O |
|
|
|
These O |
|
encoded O |
|
strings O |
|
contain O |
|
the O |
|
new O |
|
URL O |
|
addresses O |
|
not O |
|
seen O |
|
in O |
|
older O |
|
versions O |
|
of O |
|
FakeSpy B-Malware |
|
. O |
|
|
|
Comparing O |
|
strings O |
|
from O |
|
an O |
|
old O |
|
FakeSpy B-Malware |
|
sample O |
|
to O |
|
a O |
|
new O |
|
one O |
|
. O |
|
|
|
WHO O |
|
IS O |
|
BEHIND O |
|
FAKESPY B-Malware |
|
’ O |
|
S O |
|
SMISHING O |
|
CAMPAIGNS O |
|
? O |
|
|
|
The O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
suspects O |
|
that O |
|
the O |
|
malware O |
|
operators O |
|
and O |
|
authors O |
|
are O |
|
Chinese O |
|
speakers O |
|
. O |
|
|
|
Our O |
|
findings O |
|
, O |
|
along O |
|
with O |
|
previous O |
|
research O |
|
, O |
|
indicates O |
|
that O |
|
the O |
|
threat O |
|
actor O |
|
behind O |
|
these O |
|
recent O |
|
campaigns O |
|
is O |
|
likely O |
|
a O |
|
Chinese O |
|
group O |
|
dubbed O |
|
“ O |
|
Roaming B-Organization |
|
Mantis I-Organization |
|
” O |
|
. O |
|
|
|
Roaming B-Organization |
|
Mantis I-Organization |
|
is O |
|
believed O |
|
to O |
|
be O |
|
a O |
|
Chinese O |
|
threat O |
|
actor O |
|
group O |
|
first O |
|
discovered O |
|
in O |
|
April O |
|
2018 O |
|
that O |
|
has O |
|
continuously O |
|
evolved O |
|
. O |
|
|
|
In O |
|
the O |
|
beginning O |
|
, O |
|
this O |
|
threat O |
|
group O |
|
mainly O |
|
targeted O |
|
Asian O |
|
countries O |
|
. O |
|
|
|
Now O |
|
, O |
|
they O |
|
are O |
|
expanding O |
|
their O |
|
activity O |
|
to O |
|
audiences O |
|
all O |
|
around O |
|
the O |
|
world O |
|
. O |
|
|
|
As O |
|
part O |
|
of O |
|
their O |
|
activities O |
|
, O |
|
they O |
|
are O |
|
known O |
|
for O |
|
hijacking O |
|
DNS O |
|
settings O |
|
on O |
|
Japanese O |
|
routers O |
|
that O |
|
redirect O |
|
users O |
|
to O |
|
malicious O |
|
IP O |
|
addresses O |
|
, O |
|
creating O |
|
disguised O |
|
malicious O |
|
Android B-System |
|
apps O |
|
that O |
|
appear O |
|
as O |
|
popular O |
|
apps O |
|
, O |
|
stealing O |
|
Apple B-Organization |
|
ID O |
|
credentials O |
|
by O |
|
creating O |
|
Apple B-Organization |
|
phishing O |
|
pages O |
|
, O |
|
as O |
|
well O |
|
as O |
|
performing O |
|
web O |
|
crypto O |
|
mining O |
|
on O |
|
browsers O |
|
. O |
|
|
|
CONNECTION O |
|
TO O |
|
CHINA O |
|
Chinese O |
|
server O |
|
infrastructure O |
|
: O |
|
FakeSpy B-Malware |
|
applications O |
|
send O |
|
stolen O |
|
information O |
|
to O |
|
C2 O |
|
domains O |
|
with O |
|
.club B-Indicator |
|
TLDs I-Indicator |
|
and O |
|
URLs O |
|
ending O |
|
with O |
|
/servlet/ B-Indicator |
|
[ I-Indicator |
|
C2 I-Indicator |
|
Command I-Indicator |
|
] I-Indicator |
|
( O |
|
mentioned O |
|
above O |
|
in O |
|
the O |
|
“ O |
|
Stealing O |
|
Sensitive O |
|
Information O |
|
” O |
|
section O |
|
) O |
|
. O |
|
|
|
All O |
|
of O |
|
these O |
|
domains O |
|
are O |
|
registered O |
|
to O |
|
‘ O |
|
Li O |
|
Jun O |
|
Biao O |
|
’ O |
|
on O |
|
Bizcn B-Organization |
|
, I-Organization |
|
Inc I-Organization |
|
, O |
|
a O |
|
Chinese O |
|
Internet O |
|
application O |
|
service O |
|
provider O |
|
. O |
|
|
|
Chinese O |
|
language O |
|
traces O |
|
in O |
|
the O |
|
code O |
|
: O |
|
During O |
|
the O |
|
investigation O |
|
, O |
|
the O |
|
Cybereason B-Organization |
|
Nocturnus I-Organization |
|
team O |
|
discovered O |
|
code O |
|
artifacts O |
|
that O |
|
may O |
|
indicate O |
|
Chinese O |
|
threat O |
|
actors O |
|
. O |
|
|
|
For O |
|
example O |
|
, O |
|
we O |
|
found O |
|
several O |
|
suspicious O |
|
strings O |
|
written O |
|
in O |
|
the O |
|
Chinese O |
|
language O |
|
in O |
|
a O |
|
function O |
|
called O |
|
isNetworkAvailable O |
|
, O |
|
previously O |
|
discussed O |
|
in O |
|
this O |
|
blog O |
|
: O |
|
An O |
|
almost O |
|
identical O |
|
function O |
|
is O |
|
mentioned O |
|
in O |
|
an O |
|
earlier O |
|
research O |
|
, O |
|
that O |
|
ties O |
|
FakeSpy B-Malware |
|
and O |
|
other O |
|
malware O |
|
to O |
|
the O |
|
Roaming B-Organization |
|
Mantis I-Organization |
|
group O |
|
. O |
|
|
|
Chinese O |
|
APK O |
|
names O |
|
: O |
|
Some O |
|
of O |
|
FakeSpy B-Malware |
|
’ O |
|
s O |
|
APK O |
|
package O |
|
names O |
|
contain O |
|
anglicized O |
|
Chinese O |
|
( O |
|
Mandarin O |
|
) O |
|
words O |
|
that O |
|
might O |
|
be O |
|
related O |
|
to O |
|
Chinese O |
|
songs O |
|
and O |
|
lyrics O |
|
, O |
|
food O |
|
, O |
|
provinces O |
|
, O |
|
etc O |
|
. O |
|
|
|
CONCLUSIONS O |
|
FakeSpy B-Malware |
|
was O |
|
first O |
|
seen O |
|
in O |
|
October O |
|
2017 O |
|
and O |
|
until O |
|
recently O |
|
mainly O |
|
targeted O |
|
East O |
|
Asian O |
|
countries O |
|
. O |
|
|
|
Our O |
|
research O |
|
shows O |
|
fresh O |
|
developments O |
|
in O |
|
the O |
|
malware O |
|
’ O |
|
s O |
|
code O |
|
and O |
|
sophistication O |
|
, O |
|
as O |
|
well O |
|
as O |
|
an O |
|
expansion O |
|
to O |
|
target O |
|
Europe O |
|
and O |
|
North O |
|
America O |
|
. O |
|
|
|
This O |
|
mobile O |
|
malware O |
|
masquerades O |
|
as O |
|
legitimate O |
|
, O |
|
trusted O |
|
postal O |
|
service O |
|
applications O |
|
so O |
|
that O |
|
it O |
|
can O |
|
gain O |
|
the O |
|
users O |
|
trust O |
|
. O |
|
|
|
Once O |
|
it O |
|
has O |
|
been O |
|
installed O |
|
, O |
|
it O |
|
requests O |
|
permissions O |
|
from O |
|
the O |
|
user O |
|
so O |
|
that O |
|
it O |
|
can O |
|
steal O |
|
sensitive O |
|
data O |
|
, O |
|
manipulate O |
|
SMS O |
|
messages O |
|
, O |
|
and O |
|
potentially O |
|
infect O |
|
contacts O |
|
of O |
|
the O |
|
user O |
|
. O |
|
|
|
The O |
|
malware O |
|
now O |
|
targets O |
|
more O |
|
countries O |
|
all O |
|
over O |
|
the O |
|
world O |
|
by O |
|
masquerading O |
|
as O |
|
official O |
|
post O |
|
office O |
|
and O |
|
transportation O |
|
services O |
|
apps O |
|
. O |
|
|
|
These O |
|
apps O |
|
appear O |
|
legitimate O |
|
due O |
|
to O |
|
their O |
|
app O |
|
logo O |
|
, O |
|
UI O |
|
appearance O |
|
, O |
|
and O |
|
redirects O |
|
to O |
|
the O |
|
carrier O |
|
webpage O |
|
-- O |
|
all O |
|
luring O |
|
end O |
|
users O |
|
to O |
|
believe O |
|
it O |
|
’ O |
|
s O |
|
the O |
|
original O |
|
one O |
|
. O |
|
|
|
In O |
|
this O |
|
blog O |
|
, O |
|
we O |
|
showed O |
|
that O |
|
the O |
|
threat O |
|
actor O |
|
behind O |
|
the O |
|
recent O |
|
FakeSpy B-Malware |
|
campaign O |
|
is O |
|
a O |
|
Chinese-speaking O |
|
group O |
|
called O |
|
“ O |
|
Roaming B-Organization |
|
Mantis I-Organization |
|
” O |
|
known O |
|
to O |
|
operate O |
|
mainly O |
|
in O |
|
Asia O |
|
. O |
|
|
|
It O |
|
is O |
|
interesting O |
|
to O |
|
see O |
|
that O |
|
the O |
|
group O |
|
has O |
|
expanded O |
|
their O |
|
operation O |
|
to O |
|
other O |
|
regions O |
|
, O |
|
such O |
|
as O |
|
the O |
|
United O |
|
States O |
|
and O |
|
Europe O |
|
. O |
|
|
|
The O |
|
malware O |
|
authors O |
|
seem O |
|
to O |
|
be O |
|
putting O |
|
a O |
|
lot O |
|
of O |
|
effort O |
|
into O |
|
improving O |
|
this O |
|
malware O |
|
, O |
|
bundling O |
|
it O |
|
with O |
|
numerous O |
|
new O |
|
upgrades O |
|
that O |
|
make O |
|
it O |
|
more O |
|
sophisticated O |
|
, O |
|
evasive O |
|
, O |
|
and O |
|
well-equipped O |
|
. O |
|
|
|
These O |
|
improvements O |
|
render O |
|
FakeSpy B-Malware |
|
one O |
|
of O |
|
the O |
|
most O |
|
powerful O |
|
information O |
|
stealers O |
|
on O |
|
the O |
|
market O |
|
. O |
|
|
|
We O |
|
anticipate O |
|
this O |
|
malware O |
|
to O |
|
continue O |
|
to O |
|
evolve O |
|
with O |
|
additional O |
|
new O |
|
features O |
|
; O |
|
the O |
|
only O |
|
question O |
|
now O |
|
is O |
|
when O |
|
we O |
|
will O |
|
see O |
|
the O |
|
next O |
|
wave O |
|
. O |
|
|
|
First O |
|
Twitter‑controlled B-System |
|
Android B-System |
|
botnet O |
|
discovered O |
|
Detected O |
|
by O |
|
ESET B-Organization |
|
as O |
|
Android/Twitoor B-Malware |
|
, O |
|
this O |
|
malware O |
|
is O |
|
unique O |
|
because O |
|
of O |
|
its O |
|
resilience O |
|
mechanism O |
|
. O |
|
|
|
Instead O |
|
of O |
|
being O |
|
controlled O |
|
by O |
|
a O |
|
traditional O |
|
command-and-control O |
|
server O |
|
, O |
|
it O |
|
receives O |
|
instructions O |
|
via O |
|
tweets O |
|
. O |
|
|
|
24 O |
|
Aug O |
|
2016 O |
|
- O |
|
02:05PM O |
|
Android/Twitoor B-Malware |
|
is O |
|
a O |
|
backdoor O |
|
capable O |
|
of O |
|
downloading O |
|
other O |
|
malware O |
|
onto O |
|
an O |
|
infected O |
|
device O |
|
. O |
|
|
|
It O |
|
has O |
|
been O |
|
active O |
|
for O |
|
around O |
|
one O |
|
month O |
|
. O |
|
|
|
This O |
|
malicious O |
|
app O |
|
, O |
|
detected O |
|
by O |
|
ESET B-Organization |
|
as O |
|
a O |
|
variant O |
|
of O |
|
Android/Twitoor.A B-Malware |
|
, O |
|
can O |
|
’ O |
|
t O |
|
be O |
|
found O |
|
on O |
|
any O |
|
official O |
|
Android B-System |
|
app I-System |
|
store I-System |
|
– O |
|
it O |
|
probably O |
|
spreads O |
|
by O |
|
SMS O |
|
or O |
|
via O |
|
malicious O |
|
URLs O |
|
. O |
|
|
|
It O |
|
impersonates O |
|
a O |
|
porn O |
|
player O |
|
app O |
|
or O |
|
MMS O |
|
application O |
|
but O |
|
without O |
|
having O |
|
their O |
|
functionality O |
|
. O |
|
|
|
After O |
|
launching O |
|
, O |
|
it O |
|
hides O |
|
its O |
|
presence O |
|
on O |
|
the O |
|
system O |
|
and O |
|
checks O |
|
the O |
|
defined O |
|
Twitter B-System |
|
account O |
|
at O |
|
regular O |
|
intervals O |
|
for O |
|
commands O |
|
. O |
|
|
|
Based O |
|
on O |
|
received O |
|
commands O |
|
, O |
|
it O |
|
can O |
|
either O |
|
download O |
|
malicious O |
|
apps O |
|
or O |
|
switch O |
|
the O |
|
C O |
|
& O |
|
C O |
|
Twitter B-System |
|
account O |
|
to O |
|
another O |
|
one O |
|
. O |
|
|
|
“ O |
|
Using O |
|
Twitter B-System |
|
instead O |
|
of O |
|
command-and-control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
servers O |
|
is O |
|
pretty O |
|
innovative O |
|
for O |
|
an O |
|
Android B-System |
|
botnet. O |
|
” O |
|
“ O |
|
Using O |
|
Twitter B-Organization |
|
instead O |
|
of O |
|
command-and-control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
servers O |
|
is O |
|
pretty O |
|
innovative O |
|
for O |
|
an O |
|
Android B-System |
|
botnet O |
|
, O |
|
” O |
|
says O |
|
Lukáš O |
|
Štefanko O |
|
, O |
|
the O |
|
ESET B-Organization |
|
malware O |
|
researcher O |
|
who O |
|
discovered O |
|
the O |
|
malicious O |
|
app O |
|
. O |
|
|
|
Malware O |
|
that O |
|
enslaves O |
|
devices O |
|
to O |
|
form O |
|
botnets O |
|
needs O |
|
to O |
|
be O |
|
able O |
|
to O |
|
receive O |
|
updated O |
|
instructions O |
|
. O |
|
|
|
That O |
|
communication O |
|
is O |
|
an O |
|
Achilles O |
|
heel O |
|
for O |
|
any O |
|
botnet O |
|
– O |
|
it O |
|
may O |
|
raise O |
|
suspicion O |
|
and O |
|
, O |
|
cutting O |
|
the O |
|
bots O |
|
off O |
|
is O |
|
always O |
|
lethal O |
|
to O |
|
the O |
|
botnet O |
|
’ O |
|
s O |
|
functioning O |
|
. O |
|
|
|
Additionally O |
|
, O |
|
should O |
|
the O |
|
command-and-control O |
|
( O |
|
C O |
|
& O |
|
C O |
|
) O |
|
servers O |
|
get O |
|
seized O |
|
by O |
|
the O |
|
authorities O |
|
, O |
|
it O |
|
would O |
|
ultimately O |
|
lead O |
|
to O |
|
disclosing O |
|
information O |
|
about O |
|
the O |
|
entire O |
|
botnet O |
|
. O |
|
|
|
To O |
|
make O |
|
the O |
|
Twitoor B-Malware |
|
botnet O |
|
’ O |
|
s O |
|
communication O |
|
more O |
|
resilient O |
|
, O |
|
botnet O |
|
designers O |
|
took O |
|
various O |
|
steps O |
|
like O |
|
encrypting O |
|
their O |
|
messages O |
|
, O |
|
using O |
|
complex O |
|
topologies O |
|
of O |
|
the O |
|
C O |
|
& O |
|
C O |
|
network O |
|
– O |
|
or O |
|
using O |
|
innovative O |
|
means O |
|
for O |
|
communication O |
|
, O |
|
among O |
|
them O |
|
the O |
|
use O |
|
of O |
|
social O |
|
networks O |
|
. O |
|
|
|
“ O |
|
These O |
|
communication O |
|
channels O |
|
are O |
|
hard O |
|
to O |
|
discover O |
|
and O |
|
even O |
|
harder O |
|
to O |
|
block O |
|
entirely O |
|
. O |
|
|
|
On O |
|
the O |
|
other O |
|
hand O |
|
, O |
|
it O |
|
’ O |
|
s O |
|
extremely O |
|
easy O |
|
for O |
|
the O |
|
crooks O |
|
to O |
|
re-direct O |
|
communications O |
|
to O |
|
another O |
|
freshly O |
|
created O |
|
account O |
|
, O |
|
” O |
|
explains O |
|
Štefanko O |
|
. O |
|
|
|
In O |
|
the O |
|
Windows B-System |
|
space O |
|
, O |
|
Twitter B-Organization |
|
, O |
|
founded O |
|
in O |
|
2006 O |
|
, O |
|
was O |
|
first O |
|
used O |
|
to O |
|
control O |
|
botnets O |
|
as O |
|
early O |
|
as O |
|
in O |
|
2009 O |
|
. O |
|
|
|
Android B-System |
|
bots O |
|
have O |
|
also O |
|
already O |
|
been O |
|
found O |
|
being O |
|
controlled O |
|
via O |
|
other O |
|
non-traditional O |
|
means O |
|
– O |
|
blogs O |
|
or O |
|
some O |
|
of O |
|
the O |
|
many O |
|
cloud O |
|
messaging O |
|
systems O |
|
like O |
|
Google B-Organization |
|
’ O |
|
s O |
|
or O |
|
Baidu B-Organization |
|
’ O |
|
s O |
|
– O |
|
but O |
|
Twitoor B-Malware |
|
is O |
|
the O |
|
first O |
|
Twitter-based B-System |
|
bot O |
|
malware O |
|
, O |
|
according O |
|
to O |
|
Štefanko O |
|
. O |
|
|
|
“ O |
|
In O |
|
the O |
|
future O |
|
, O |
|
we O |
|
can O |
|
expect O |
|
that O |
|
the O |
|
bad O |
|
guys O |
|
will O |
|
try O |
|
to O |
|
make O |
|
use O |
|
of O |
|
Facebook B-System |
|
statuses O |
|
or O |
|
deploy O |
|
LinkedIn B-System |
|
and O |
|
other O |
|
social O |
|
networks O |
|
” O |
|
, O |
|
states O |
|
ESET B-Organization |
|
’ O |
|
s O |
|
researcher O |
|
. O |
|
|
|
Currently O |
|
, O |
|
the O |
|
Twitoor B-Malware |
|
trojan O |
|
has O |
|
been O |
|
downloading O |
|
several O |
|
versions O |
|
of O |
|
mobile O |
|
banking O |
|
malware O |
|
. O |
|
|
|
However O |
|
, O |
|
the O |
|
botnet O |
|
operators O |
|
can O |
|
start O |
|
distributing O |
|
other O |
|
malware O |
|
, O |
|
including O |
|
ransomware O |
|
, O |
|
at O |
|
any O |
|
time O |
|
warns O |
|
Štefanko O |
|
. O |
|
|
|
“ O |
|
Twitoor B-Malware |
|
serves O |
|
as O |
|
another O |
|
example O |
|
of O |
|
how O |
|
cybercriminals O |
|
keep O |
|
on O |
|
innovating O |
|
their O |
|
business O |
|
, O |
|
” O |
|
Stefanko O |
|
continues O |
|
. O |
|
|
|
“ O |
|
The O |
|
takeaway O |
|
? O |
|
|
|
Internet O |
|
users O |
|
should O |
|
keep O |
|
on O |
|
securing O |
|
their O |
|
activities O |
|
with O |
|
good O |
|
security O |
|
solutions O |
|
for O |
|
both O |
|
computers O |
|
and O |
|
mobile O |
|
devices. O |
|
” O |
|
Hashes O |
|
: O |
|
E5212D4416486AF42E7ED1F58A526AEF77BE89BE B-Indicator |
|
A9891222232145581FE8D0D483EDB4B18836BCFC B-Indicator |
|
AFF9F39A6CA5D68C599B30012D79DA29E2672C6E B-Indicator |
|
Insidious O |
|
Android B-System |
|
malware O |
|
gives O |
|
up O |
|
all O |
|
malicious O |
|
features O |
|
but O |
|
one O |
|
to O |
|
gain O |
|
stealth O |
|
ESET B-Organization |
|
researchers O |
|
detect O |
|
a O |
|
new O |
|
way O |
|
of O |
|
misusing O |
|
Accessibility O |
|
|
|
Service O |
|
, O |
|
the O |
|
Achilles O |
|
’ O |
|
heel O |
|
of O |
|
Android B-System |
|
security O |
|
22 O |
|
May O |
|
2020 O |
|
- O |
|
03:00PM O |
|
ESET B-Organization |
|
researchers O |
|
have O |
|
analyzed O |
|
an O |
|
extremely O |
|
dangerous O |
|
Android B-System |
|
app O |
|
that O |
|
can O |
|
perform O |
|
a O |
|
host O |
|
of O |
|
nefarious O |
|
actions O |
|
, O |
|
notably O |
|
wiping O |
|
out O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
bank O |
|
account O |
|
or O |
|
cryptocurrency O |
|
wallet O |
|
and O |
|
taking O |
|
over O |
|
their O |
|
email O |
|
or O |
|
social O |
|
media O |
|
accounts O |
|
. O |
|
|
|
Called O |
|
“ O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
” O |
|
, O |
|
the O |
|
banking O |
|
trojan O |
|
was O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
at O |
|
the O |
|
time O |
|
of O |
|
the O |
|
analysis O |
|
. O |
|
|
|
The O |
|
app O |
|
is O |
|
fitted O |
|
with O |
|
standard O |
|
information-stealing O |
|
capabilities O |
|
; O |
|
however O |
|
, O |
|
this O |
|
banker O |
|
is O |
|
exceptionally O |
|
insidious O |
|
in O |
|
that O |
|
after O |
|
installation O |
|
it O |
|
requires O |
|
a O |
|
single O |
|
action O |
|
from O |
|
the O |
|
victim O |
|
– O |
|
enable O |
|
Android B-System |
|
’ O |
|
s O |
|
Accessibility O |
|
Service O |
|
– O |
|
to O |
|
fully O |
|
unleash O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
malicious O |
|
functionality O |
|
. O |
|
|
|
The O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
app O |
|
made O |
|
it O |
|
onto O |
|
the O |
|
heavily O |
|
guarded O |
|
Google B-System |
|
Play I-System |
|
store I-System |
|
thanks O |
|
to O |
|
its O |
|
extreme O |
|
stealth O |
|
. O |
|
|
|
Its O |
|
creators O |
|
reduced O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
malicious O |
|
surface O |
|
to O |
|
the O |
|
bare O |
|
minimum O |
|
by O |
|
removing O |
|
all O |
|
potentially O |
|
malicious O |
|
functionalities O |
|
but O |
|
one O |
|
: O |
|
abusing O |
|
Accessibility O |
|
Service O |
|
. O |
|
|
|
Accessibility O |
|
Service O |
|
is O |
|
long O |
|
known O |
|
to O |
|
be O |
|
the O |
|
Achilles O |
|
’ O |
|
heel O |
|
of O |
|
the O |
|
Android B-System |
|
operating O |
|
system O |
|
. O |
|
|
|
Security O |
|
solutions O |
|
can O |
|
detect O |
|
it O |
|
in O |
|
countless O |
|
combinations O |
|
with O |
|
other O |
|
suspicious O |
|
permissions O |
|
and O |
|
functions O |
|
, O |
|
or O |
|
malicious O |
|
functionalities O |
|
– O |
|
but O |
|
when O |
|
faced O |
|
with O |
|
no O |
|
additional O |
|
functionality O |
|
nor O |
|
permission O |
|
, O |
|
all O |
|
failed O |
|
to O |
|
trigger O |
|
any O |
|
alarm O |
|
on O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
. O |
|
|
|
By O |
|
“ O |
|
all O |
|
” O |
|
we O |
|
mean O |
|
all O |
|
security O |
|
mechanisms O |
|
guarding O |
|
the O |
|
official O |
|
Android B-System |
|
app I-System |
|
store I-System |
|
( O |
|
including O |
|
the O |
|
detection O |
|
engines O |
|
of O |
|
the O |
|
members O |
|
of O |
|
the O |
|
App B-Organization |
|
Defense I-Organization |
|
Alliance I-Organization |
|
) O |
|
and O |
|
all O |
|
security O |
|
vendors O |
|
participating O |
|
in O |
|
the O |
|
VirusTotal B-Organization |
|
program O |
|
( O |
|
see O |
|
Figure O |
|
1 O |
|
) O |
|
. O |
|
|
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
was O |
|
released O |
|
on O |
|
Feb O |
|
3 O |
|
, O |
|
2020 O |
|
and O |
|
last O |
|
updated O |
|
to O |
|
v1.4 O |
|
on O |
|
May O |
|
6 O |
|
, O |
|
2020 O |
|
. O |
|
|
|
The O |
|
latest O |
|
version O |
|
is O |
|
analyzed O |
|
here O |
|
; O |
|
we O |
|
weren O |
|
’ O |
|
t O |
|
able O |
|
to O |
|
determine O |
|
if O |
|
the O |
|
earlier O |
|
versions O |
|
were O |
|
also O |
|
malicious O |
|
. O |
|
|
|
According O |
|
to O |
|
its O |
|
profile O |
|
at O |
|
Google B-System |
|
Play I-System |
|
( O |
|
see O |
|
Figure O |
|
2 O |
|
) O |
|
the O |
|
app O |
|
reached O |
|
a O |
|
mere O |
|
10+ O |
|
downloads O |
|
. O |
|
|
|
We O |
|
reported O |
|
it O |
|
to O |
|
Google B-Organization |
|
on O |
|
May O |
|
16 O |
|
, O |
|
2020 O |
|
and O |
|
since O |
|
May O |
|
19 O |
|
, O |
|
2020 O |
|
the O |
|
app O |
|
has O |
|
no O |
|
longer O |
|
been O |
|
available O |
|
on O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
The O |
|
developer O |
|
name O |
|
used O |
|
, O |
|
GAS O |
|
Brazil O |
|
, O |
|
suggests O |
|
the O |
|
criminals O |
|
behind O |
|
the O |
|
app O |
|
targeted O |
|
Brazilian O |
|
users O |
|
. O |
|
|
|
Apart O |
|
from O |
|
including O |
|
the O |
|
country O |
|
’ O |
|
s O |
|
name O |
|
, O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
name O |
|
is O |
|
probably O |
|
intended O |
|
to O |
|
imply O |
|
a O |
|
relationship O |
|
with O |
|
the O |
|
antifraud O |
|
solution O |
|
named O |
|
GAS B-System |
|
Tecnologia I-System |
|
. O |
|
|
|
That O |
|
security O |
|
software O |
|
is O |
|
commonly O |
|
installed O |
|
on O |
|
computers O |
|
in O |
|
Brazil O |
|
as O |
|
several O |
|
banks O |
|
require O |
|
it O |
|
to O |
|
log O |
|
into O |
|
their O |
|
online O |
|
banking O |
|
. O |
|
|
|
However O |
|
, O |
|
there O |
|
is O |
|
also O |
|
an O |
|
English O |
|
version O |
|
of O |
|
the O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
app O |
|
( O |
|
see O |
|
Figure O |
|
3 O |
|
) O |
|
besides O |
|
the O |
|
Portuguese O |
|
one O |
|
, O |
|
and O |
|
that O |
|
app O |
|
has O |
|
neither O |
|
geographical O |
|
nor O |
|
language O |
|
restrictions O |
|
. O |
|
|
|
Playing O |
|
further O |
|
off O |
|
the O |
|
suggested O |
|
GAS B-System |
|
Tecnologia I-System |
|
link O |
|
, O |
|
the O |
|
app O |
|
promises O |
|
better O |
|
security O |
|
for O |
|
its O |
|
users O |
|
. O |
|
|
|
The O |
|
description O |
|
in O |
|
Portuguese O |
|
promises O |
|
more O |
|
protection O |
|
for O |
|
the O |
|
user O |
|
’ O |
|
s O |
|
applications O |
|
, O |
|
including O |
|
end-to-end O |
|
encryption O |
|
. O |
|
|
|
Deceptively O |
|
, O |
|
the O |
|
app O |
|
was O |
|
listed O |
|
in O |
|
the O |
|
Education O |
|
section O |
|
. O |
|
|
|
Functionality O |
|
After O |
|
starting O |
|
, O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
requests O |
|
the O |
|
following O |
|
permissions O |
|
: O |
|
allow O |
|
modify O |
|
system O |
|
settings O |
|
permit O |
|
drawing O |
|
over O |
|
other O |
|
apps O |
|
, O |
|
and O |
|
activate O |
|
accessibility O |
|
services O |
|
. O |
|
|
|
If O |
|
an O |
|
unsuspecting O |
|
user O |
|
grants O |
|
these O |
|
permissions O |
|
( O |
|
see O |
|
Figure O |
|
4 O |
|
) O |
|
, O |
|
the O |
|
trojan O |
|
can O |
|
read O |
|
any O |
|
text O |
|
displayed O |
|
in O |
|
any O |
|
app O |
|
the O |
|
user O |
|
may O |
|
launch O |
|
– O |
|
and O |
|
send O |
|
it O |
|
to O |
|
the O |
|
attackers O |
|
. O |
|
|
|
This O |
|
means O |
|
the O |
|
attackers O |
|
can O |
|
steal O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
credentials O |
|
for O |
|
logging O |
|
into O |
|
apps O |
|
, O |
|
SMS O |
|
and O |
|
email O |
|
messages O |
|
, O |
|
displayed O |
|
cryptocurrency O |
|
private O |
|
keys O |
|
, O |
|
and O |
|
even O |
|
software-generated O |
|
2FA O |
|
codes O |
|
. O |
|
|
|
The O |
|
fact O |
|
the O |
|
trojan O |
|
can O |
|
steal O |
|
both O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
credentials O |
|
and O |
|
also O |
|
can O |
|
control O |
|
their O |
|
SMS O |
|
messages O |
|
and O |
|
generated O |
|
2FA O |
|
codes O |
|
means O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
’ O |
|
s O |
|
operators O |
|
can O |
|
bypass O |
|
two-factor O |
|
authentication O |
|
. O |
|
|
|
This O |
|
opens O |
|
the O |
|
door O |
|
to O |
|
, O |
|
for O |
|
example O |
|
, O |
|
fully O |
|
controlling O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
bank O |
|
account O |
|
. O |
|
|
|
To O |
|
make O |
|
sure O |
|
the O |
|
trojan O |
|
survives O |
|
a O |
|
device O |
|
restart O |
|
, O |
|
it O |
|
abuses O |
|
already O |
|
activated O |
|
accessibility O |
|
services O |
|
that O |
|
will O |
|
launch O |
|
the O |
|
trojan O |
|
right O |
|
after O |
|
start O |
|
. O |
|
|
|
Our O |
|
analysis O |
|
shows O |
|
the O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
trojan O |
|
can O |
|
execute O |
|
17 O |
|
commands O |
|
received O |
|
from O |
|
the O |
|
attacker-controlled O |
|
server O |
|
such O |
|
as O |
|
uninstalling O |
|
an O |
|
app O |
|
, O |
|
launching O |
|
an O |
|
app O |
|
and O |
|
then O |
|
performing O |
|
any O |
|
click/tap O |
|
action O |
|
controlled O |
|
remotely O |
|
by O |
|
the O |
|
attacker O |
|
( O |
|
see O |
|
Figure O |
|
5 O |
|
) O |
|
. O |
|
|
|
In O |
|
2018 O |
|
, O |
|
we O |
|
saw O |
|
similar O |
|
behavior O |
|
, O |
|
but O |
|
all O |
|
the O |
|
click O |
|
actions O |
|
were O |
|
hardcoded O |
|
and O |
|
suited O |
|
only O |
|
for O |
|
the O |
|
app O |
|
of O |
|
the O |
|
attacker O |
|
’ O |
|
s O |
|
choice O |
|
. O |
|
|
|
In O |
|
this O |
|
case O |
|
, O |
|
the O |
|
attacker O |
|
can O |
|
get O |
|
the O |
|
list O |
|
of O |
|
all O |
|
installed O |
|
apps O |
|
and O |
|
then O |
|
remotely O |
|
launch O |
|
the O |
|
victim O |
|
’ O |
|
s O |
|
app O |
|
of O |
|
their O |
|
choice O |
|
to O |
|
either O |
|
steal O |
|
credentials O |
|
or O |
|
perform O |
|
malicious O |
|
actions O |
|
( O |
|
e.g O |
|
. O |
|
|
|
send O |
|
funds O |
|
via O |
|
a O |
|
wire O |
|
transfer O |
|
) O |
|
. O |
|
|
|
We O |
|
believe O |
|
that O |
|
this O |
|
is O |
|
the O |
|
reason O |
|
the O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
trojan O |
|
requests O |
|
the O |
|
user O |
|
to O |
|
allow O |
|
“ O |
|
Modify O |
|
system O |
|
settings O |
|
” O |
|
. O |
|
|
|
Subsequently O |
|
, O |
|
the O |
|
malware O |
|
will O |
|
change O |
|
the O |
|
screen O |
|
off O |
|
time-out O |
|
to O |
|
10 O |
|
minutes O |
|
. O |
|
|
|
This O |
|
means O |
|
that O |
|
, O |
|
unless O |
|
victims O |
|
lock O |
|
their O |
|
devices O |
|
via O |
|
the O |
|
hardware O |
|
button O |
|
, O |
|
the O |
|
timer O |
|
provides O |
|
plenty O |
|
of O |
|
time O |
|
for O |
|
the O |
|
malware O |
|
to O |
|
remotely O |
|
perform O |
|
malicious O |
|
, O |
|
in-app O |
|
operations O |
|
. O |
|
|
|
If O |
|
the O |
|
device O |
|
gets O |
|
locked O |
|
, O |
|
the O |
|
malware O |
|
can O |
|
’ O |
|
t O |
|
unlock O |
|
it O |
|
. O |
|
|
|
Malware O |
|
data O |
|
leak O |
|
When O |
|
we O |
|
analyzed O |
|
the O |
|
sample O |
|
, O |
|
we O |
|
realized O |
|
that O |
|
the O |
|
malware O |
|
operators O |
|
left O |
|
the O |
|
remote O |
|
database O |
|
with O |
|
some O |
|
of O |
|
the O |
|
victims O |
|
’ O |
|
data O |
|
freely O |
|
accessible O |
|
, O |
|
without O |
|
any O |
|
authentication O |
|
. O |
|
|
|
The O |
|
database O |
|
contained O |
|
the O |
|
last O |
|
activity O |
|
performed O |
|
on O |
|
around O |
|
60 O |
|
compromised O |
|
devices O |
|
. O |
|
|
|
We O |
|
found O |
|
no O |
|
other O |
|
information O |
|
stolen O |
|
from O |
|
the O |
|
victims O |
|
to O |
|
be O |
|
accessible O |
|
. O |
|
|
|
Thanks O |
|
to O |
|
this O |
|
data O |
|
leak O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
confirm O |
|
that O |
|
the O |
|
malware O |
|
really O |
|
worked O |
|
as O |
|
designed O |
|
: O |
|
the O |
|
attacker O |
|
had O |
|
access O |
|
to O |
|
the O |
|
victims O |
|
’ O |
|
entered O |
|
credentials O |
|
, O |
|
displayed O |
|
or O |
|
written O |
|
emails O |
|
and O |
|
messages O |
|
, O |
|
etc O |
|
. O |
|
|
|
Once O |
|
we O |
|
reached O |
|
the O |
|
non-secured O |
|
database O |
|
, O |
|
we O |
|
were O |
|
able O |
|
to O |
|
directly O |
|
observe O |
|
the O |
|
app O |
|
’ O |
|
s O |
|
malicious O |
|
behavior O |
|
. O |
|
|
|
To O |
|
illustrate O |
|
the O |
|
level O |
|
of O |
|
threat O |
|
the O |
|
DEFENSOR B-Malware |
|
ID I-Malware |
|
app O |
|
posed O |
|
, O |
|
we O |
|
performed O |
|
three O |
|
tests O |
|
. O |
|
|
|
First O |
|
, O |
|
we O |
|
launched O |
|
a O |
|
banking O |
|
app O |
|
and O |
|
entered O |
|
the O |
|
credentials O |
|
there O |
|
. O |
|
|
|
The O |
|
credentials O |
|
were O |
|
immediately O |
|
available O |
|
in O |
|
the O |
|
leaky O |
|
database O |
|
– O |
|
see O |
|
Figure O |
|
6 O |
|
. O |
|
|
|
Figure O |
|
6 O |
|
. O |
|
|
|
The O |
|
banking O |
|
app O |
|
test O |
|
: O |
|
the O |
|
credentials O |
|
as O |
|
entered O |
|
( O |
|
left O |
|
) O |
|
and O |
|
as O |
|
available O |
|
in O |
|
the O |
|
database O |
|
( O |
|
right O |
|
) O |
|
Second O |
|
, O |
|
we O |
|
wrote O |
|
a O |
|
test O |
|
message O |
|
in O |
|
an O |
|
email O |
|
client O |
|
. O |
|
|
|
We O |
|
saw O |
|
the O |
|
message O |
|
uploaded O |
|
to O |
|
the O |
|
attackers O |
|
’ O |
|
server O |
|
within O |
|
a O |
|
second O |
|
– O |
|
see O |
|
Figure O |
|
7 O |
|
. O |
|
|
|
Figure O |
|
7 O |
|
. O |
|
|
|
The O |
|
email O |
|
message O |
|
test O |
|
: O |
|
the O |
|
message O |
|
as O |
|
written O |
|
( O |
|
left O |
|
) O |
|
and O |
|
as O |
|
available O |
|
in O |
|
the O |
|
database O |
|
( O |
|
right O |
|
) O |
|
Third O |
|
, O |
|
we O |
|
documented O |
|
the O |
|
trojan O |
|
retrieving O |
|
the O |
|
Google B-System |
|
Authenticator I-System |
|
2FA O |
|
code O |
|
. O |
|
|
|
Figure O |
|
8 O |
|
. O |
|
|
|
The O |
|
software O |
|
generated O |
|
2FA O |
|
code O |
|
as O |
|
it O |
|
appeared O |
|
on O |
|
the O |
|
device O |
|
’ O |
|
s O |
|
display O |
|
( O |
|
left O |
|
) O |
|
and O |
|
as O |
|
available O |
|
in O |
|
the O |
|
database O |
|
( O |
|
right O |
|
) O |
|
Along O |
|
with O |
|
the O |
|
malicious O |
|
DEFENSOR O |
|
ID O |
|
app O |
|
, O |
|
another O |
|
malicious O |
|
app O |
|
named O |
|
Defensor B-Malware |
|
Digital I-Malware |
|
was O |
|
discovered O |
|
. O |
|
|
|
Both O |
|
apps O |
|
shared O |
|
the O |
|
same O |
|
C O |
|
& O |
|
C O |
|
server O |
|
, O |
|
but O |
|
we O |
|
couldn O |
|
’ O |
|
t O |
|
investigate O |
|
the O |
|
latter O |
|
as O |
|
it O |
|
had O |
|
already O |
|
been O |
|
removed O |
|
from O |
|
the O |
|
Google B-System |
|
Play I-System |
|
store I-System |
|
. O |
|
|
|
Indicators O |
|
of O |
|
Compromise O |
|
( O |
|
IoCs O |
|
) O |
|
Package O |
|
Name O |
|
Hash O |
|
ESET B-Organization |
|
detection O |
|
name O |
|
com.secure.protect.world B-Indicator |
|
F17AEBC741957AA21CFE7C7D7BAEC0900E863F61 B-Indicator |
|
Android/Spy.BanBra.A B-Indicator |
|
com.brazil.android.free B-Indicator |
|
EA069A5C96DC1DB0715923EB68192FD325F3D3CE B-Indicator |
|
Android/Spy.BanBra.A B-Indicator |
|
MITRE B-Organization |
|
ATT O |
|
& O |
|
CK O |
|
techniques O |
|
Tactic O |
|
ID O |
|
Name O |
|
Description O |
|
Initial O |
|
Access O |
|
T1475 O |
|
Deliver O |
|
Malicious O |
|
App O |
|
|
|
via O |
|
Authorized O |
|
App B-System |
|
Store I-System |
|
Impersonates O |
|
security O |
|
app O |
|
on O |
|
Google B-System |
|
Play I-System |
|
. O |
|
|
|
T1444 O |
|
Masquerade O |
|
as O |
|
Legitimate O |
|
Application O |
|
Impersonates O |
|
legitimate O |
|
GAS B-System |
|
Tecnologia I-System |
|
application O |
|
. O |
|
|
|
Discovery O |
|
T1418 O |
|
Application O |
|
Discovery O |
|
Sends O |
|
list O |
|
of O |
|
installed O |
|
apps O |
|
on O |
|
device O |
|
. O |
|
|
|
Impact O |
|
T1516 O |
|
Input O |
|
Injection O |
|
Can O |
|
enter O |
|
text O |
|
and O |
|
perform O |
|
clicks O |
|
on O |
|
behalf O |
|
of O |
|
user O |
|
. O |
|
|
|
Collection O |
|
T1417 O |
|
Input O |
|
Capture O |
|
Records O |
|
user O |
|
input O |
|
data O |
|
. O |
|
|
|
Command O |
|
and O |
|
Control O |
|
T1437 O |
|
Standard O |
|
Application O |
|
Layer O |
|
Protocol O |
|
Uses O |
|
Firebase O |
|
Cloud O |
|
Messaging O |
|
for O |
|
C O |
|
& O |
|
C O |
|
. O |
|
|