Bonusmain / test.txt
rizamatya's picture
Upload 3 files
f24f1ea
Why O
Did O
Chinese O
Spyware O
Linger O
in O
U.S O
. O
Phones O
? O
November O
16 O
, O
2016 O
In O
what O
's O
being O
chalked O
up O
as O
an O
apparent O
mistake O
, O
more O
than O
120,000 O
Android B-System
phones O
sold O
in O
the O
U.S. O
were O
shipped O
with O
spying O
code O
that O
sent O
text O
messages O
, O
call O
logs O
and O
other O
sensitive O
data O
to O
a O
server O
in O
Shanghai O
. O
The O
New B-Organization
York I-Organization
Times I-Organization
reported O
on O
Nov. O
15 O
that O
Kryptowire B-Organization
, O
a O
mobile O
enterprise O
security O
company O
, O
discovered O
the O
code O
on O
a O
lower-end O
smartphone O
made O
by O
BLU B-Organization
Products O
of O
Doral O
, O
Fla O
. O
The O
phones O
are O
sold O
at O
Best B-Organization
Buy I-Organization
and O
Amazon.com B-Organization
, O
among O
other O
retail O
outlets O
. O
Kryptowire B-Organization
says O
the O
code O
, O
which O
it O
found O
on O
a O
BLU B-Organization
R1 O
HD O
devices O
, O
transmitted O
fine-grained O
location O
information O
and O
allowed O
for O
the O
remote O
installation O
of O
other O
apps O
. O
Text O
message O
and O
call O
logs O
were O
transmitted O
every O
72 O
hours O
to O
the O
Shanghai O
server O
, O
and O
once O
a O
day O
for O
other O
personally O
identifiable O
data O
, O
the O
company O
says O
. O
It O
turns O
out O
, O
however O
, O
that O
other O
security O
researchers O
noticed O
suspicious O
and O
faulty O
code O
on O
BLU B-Organization
devices O
as O
early O
as O
March O
2015 O
, O
and O
it O
has O
taken O
nearly O
that O
long O
to O
remove O
it O
from O
the O
company O
's O
devices O
. O
The O
finding O
, O
in O
part O
, O
shows O
the O
risk O
that O
can O
come O
in O
opting O
for O
less O
expensive O
smartphones O
, O
whose O
manufacturers O
may O
not O
diligently O
fix O
security B-Vulnerability
vulnerabilities I-Vulnerability
. O
It O
's O
also O
raising O
eyebrows O
because O
of O
the O
connection O
with O
China O
, O
which O
has O
frequently O
sparred O
with O
the O
U.S. O
over O
cyber O
espionage O
. O
BLU B-Organization
Products O
has O
now O
updated O
its O
phones O
to O
remove O
the O
spying O
code O
, O
which O
most O
likely O
would O
have O
never O
been O
detected O
by O
regular O
users O
. O
The O
code O
never O
informed O
phone O
users O
that O
it O
was O
collecting O
that O
data O
, O
a O
behavior O
uniformly O
viewed O
by O
many O
as O
a O
serious O
security O
concern O
. O
The O
developer O
of O
the O
code O
, O
Shanghai B-Organization
Adups I-Organization
Technology I-Organization
Co. I-Organization
, O
has O
apologized O
, O
contending O
that O
the O
code O
was O
intended O
for O
another O
one O
of O
its O
clients O
who O
requested O
better O
blocking O
of O
junk O
text O
messages O
and O
marketing O
calls O
. O
Vulnerabilities O
Reported O
BLU O
Products O
, O
founded O
in O
2009 O
, O
makes O
lower-end O
Android-powered B-System
smartphones O
that O
sell O
for O
as O
little O
as O
$ O
50 O
on O
Amazon B-Organization
. O
Like O
many O
original O
equipment O
manufacturers O
, O
it O
uses O
software O
components O
from O
other O
developers O
. O
The O
company O
uses O
a O
type O
of O
software O
from O
Adups B-Organization
that O
's O
nicknamed O
FOTA B-System
, O
short O
for O
firmware O
over-the-air O
. O
The O
software O
manages O
the O
delivery O
of O
firmware O
updates O
over-the-air O
, O
the O
term O
used O
for O
transmission O
via O
a O
mobile O
network O
. O
Firmware O
is O
low-level O
code O
deep O
in O
an O
operating O
system O
that O
often O
has O
high O
access O
privileges O
, O
so O
it O
's O
critical O
that O
it O
's O
verified O
and O
contains O
no O
software O
vulnerabilities O
. O
Long O
before O
Kryptowire B-Organization
's O
announcement O
, O
Tim O
Strazzere O
, O
a O
mobile O
security O
researcher O
with O
RedNaga B-Organization
Security I-Organization
, O
contacted O
BLU O
Products O
in O
March O
2015 O
after O
he O
found O
two O
vulnerabilities O
that O
could O
be O
traced O
to O
Adup B-Organization
's O
code O
. O
Those O
vulnerabilities O
could O
have O
enabled O
someone O
to O
gain O
broad O
access O
to O
an O
Android B-System
device O
. O
Strazzere O
's O
colleague O
, O
Jon O
Sawyer O
, O
suggested O
on O
Twitter B-Organization
that O
the O
vulnerabilities O
might O
have O
not O
been O
there O
by O
mistake O
, O
but O
rather O
included O
as O
intentionally O
coded O
backdoors O
. O
He O
posted O
a O
tweet O
to O
The O
New B-Organization
York I-Organization
Times I-Organization
report O
, O
sarcastically O
writing O
, O
" O
If O
only O
two O
people O
had O
called O
this O
company O
out O
for O
their O
backdoors O
several O
times O
over O
the O
last O
few O
years O
. O
'' O
Strazzere O
's O
experience O
in O
trying O
to O
contact O
both O
vendors O
last O
year O
is O
typical O
of O
the O
frustrations O
frequently O
faced O
by O
security O
researchers O
. O
" O
I O
tried O
reaching O
out O
to O
Adups B-Organization
and O
never O
heard O
back O
, O
'' O
Strazzere O
tells O
Information B-Organization
Security I-Organization
Media I-Organization
Group I-Organization
. O
" O
BLU B-Organization
said O
they O
had O
no O
security O
department O
when O
I O
emailed O
them O
. O
'' O
Strazzere O
says O
he O
also O
failed O
to O
reach O
MediaTek B-Organization
, O
a O
Taiwanese O
fabless O
semiconductor O
manufacturer O
whose O
chipsets O
that O
powered O
BLU B-Organization
phones O
also O
contained O
Adups B-Organization
software O
. O
To O
their O
credit O
, O
both O
Google B-Organization
and O
Amazon B-Organization
appear O
to O
have O
put O
pressure O
on O
device O
manufacturers O
to O
fix O
their O
devices O
when O
flaws O
are O
found O
, O
Strazzere O
says O
. O
For O
Google B-Organization
, O
Android O
security O
issues O
- O
even O
if O
not O
in O
the O
core O
operating O
code O
- O
are O
a O
reputation O
threat O
, O
and O
for O
Amazon B-Organization
, O
a O
product O
quality O
issue O
. O
But O
devices O
sold O
outside O
of O
Amazon B-Organization
" O
might O
not O
have O
ever O
seen O
fixes O
, O
'' O
he O
says O
. O
Officials O
at O
BLU B-Organization
could O
n't O
be O
immediately O
reached O
for O
comment O
. O
Attitude O
Change O
The O
disinterest O
in O
the O
issues O
appears O
to O
have O
changed O
with O
The O
New B-Organization
York I-Organization
Times I-Organization
report O
, O
which O
lit O
a O
fire O
underneath O
Adups B-Organization
and O
BLU B-Organization
. O
Adups B-Organization
addressed O
the O
issue O
in O
a O
Nov. O
16 O
news O
release O
, O
writing O
that O
some O
products O
made O
by O
BLU B-Organization
were O
updated O
in O
June O
with O
a O
version O
of O
its O
FOTA B-System
that O
had O
actually O
been O
intended O
for O
other O
clients O
who O
had O
requested O
an O
ability O
to O
stop O
text O
spam O
. O
That O
version O
flags O
messages O
" O
containing O
certain O
language O
associated O
with O
junk O
texts O
and O
flags O
numbers O
associated O
with O
junk O
calls O
and O
not O
in O
a O
user O
's O
contacts O
, O
'' O
the O
company O
says O
. O
Manufacturers O
should O
be O
keeping O
close O
tabs O
on O
what O
software O
ends O
up O
on O
their O
devices O
. O
But O
it O
would O
appear O
that O
BLU B-Organization
only O
took O
action O
after O
Kryptowire B-Organization
notified O
it O
along O
with O
Google B-Organization
, O
Adups B-Organization
and O
Amazon B-Organization
. O
" O
When O
BLU B-Organization
raised O
objections O
, O
Adups B-Organization
took O
immediate O
measures O
to O
disable O
that O
functionality O
on O
BLU B-Organization
phones O
, O
'' O
Adups I-Organization
says O
. O
The O
greater O
worry O
is O
that O
these O
situations O
may O
sometimes O
not O
be O
simple O
mistakes O
. O
Security O
experts O
have O
long O
warned O
of O
the O
ability O
of O
advanced O
adversaries O
to O
subvert O
hardware O
and O
software O
supply O
chains O
. O
Also O
, O
the O
software B-Vulnerability
vulnerabilities I-Vulnerability
pointed O
out O
in O
the O
FOTA B-System
software O
by O
Strazzere O
in O
2015 O
could O
have O
been O
taken O
advantage O
of O
by O
cybercriminals O
looking O
to O
steal O
bank O
account O
details O
or O
execute O
other O
frauds O
. O
Strazzere O
advises O
that O
consumers O
should O
look O
at O
the O
pedigree O
of O
mobile O
manufacturers O
and O
take O
a O
close O
look O
at O
their O
security O
track O
record O
before O
making O
a O
decision O
on O
what O
device O
to O
buy O
. O
" O
In O
the O
end O
, O
the O
consumer O
needs O
to O
vote O
with O
their O
wallet O
, O
'' O
he O
says O
. O
Skygofree B-Malware
: O
Following O
in O
the O
footsteps O
of O
HackingTeam B-Organization
16 O
JAN O
2018 O
At O
the O
beginning O
of O
October O
2017 O
, O
we O
discovered O
new O
Android B-System
spyware O
with O
several O
features O
previously O
unseen O
in O
the O
wild O
. O
In O
the O
course O
of O
further O
research O
, O
we O
found O
a O
number O
of O
related O
samples O
that O
point O
to O
a O
long-term O
development O
process O
. O
We O
believe O
the O
initial O
versions O
of O
this O
malware O
were O
created O
at O
least O
three O
years O
ago O
– O
at O
the O
end O
of O
2014 O
. O
Since O
then O
, O
the O
implant O
’ O
s O
functionality O
has O
been O
improving O
and O
remarkable O
new O
features O
implemented O
, O
such O
as O
the O
ability O
to O
record O
audio O
surroundings O
via O
the O
microphone O
when O
an O
infected O
device O
is O
in O
a O
specified O
location O
; O
the O
stealing O
of O
WhatsApp B-System
messages O
via O
Accessibility O
Services O
; O
and O
the O
ability O
to O
connect O
an O
infected O
device O
to O
Wi-Fi O
networks O
controlled O
by O
cybercriminals O
. O
We O
observed O
many O
web O
landing O
pages O
that O
mimic O
the O
sites O
of O
mobile O
operators O
and O
which O
are O
used O
to O
spread O
the O
Android B-System
implants O
. O
These O
domains O
have O
been O
registered O
by O
the O
attackers O
since O
2015 O
. O
According O
to O
our O
telemetry O
, O
that O
was O
the O
year O
the O
distribution O
campaign O
was O
at O
its O
most O
active O
. O
The O
activities O
continue O
: O
the O
most O
recently O
observed O
domain O
was O
registered O
on O
October O
31 O
, O
2017 O
. O
Based O
on O
our O
KSN O
statistics O
, O
there O
are O
several O
infected O
individuals O
, O
exclusively O
in O
Italy O
. O
Moreover O
, O
as O
we O
dived O
deeper O
into O
the O
investigation O
, O
we O
discovered O
several O
spyware O
tools O
for O
Windows B-System
that O
form O
an O
implant O
for O
exfiltrating O
sensitive O
data O
on O
a O
targeted O
machine O
. O
The O
version O
we O
found O
was O
built O
at O
the O
beginning O
of O
2017 O
, O
and O
at O
the O
moment O
we O
are O
not O
sure O
whether O
this O
implant O
has O
been O
used O
in O
the O
wild O
. O
We O
named O
the O
malware O
Skygofree B-Malware
, O
because O
we O
found O
the O
word O
in O
one O
of O
the O
domains O
* O
. O
Malware O
Features O
Android B-System
According O
to O
the O
observed O
samples O
and O
their O
signatures O
, O
early O
versions O
of O
this O
Android B-System
malware O
were O
developed O
by O
the O
end O
of O
2014 O
and O
the O
campaign O
has O
remained O
active O
ever O
since O
. O
The O
code O
and O
functionality O
have O
changed O
numerous O
times O
; O
from O
simple O
unobfuscated O
malware O
at O
the O
beginning O
to O
sophisticated O
multi-stage O
spyware O
that O
gives O
attackers O
full O
remote O
control O
of O
the O
infected O
device O
. O
We O
have O
examined O
all O
the O
detected O
versions O
, O
including O
the O
latest O
one O
that O
is O
signed O
by O
a O
certificate O
valid O
from O
September O
14 O
, O
2017 O
. O
The O
implant O
provides O
the O
ability O
to O
grab O
a O
lot O
of O
exfiltrated O
data O
, O
like O
call O
records O
, O
text O
messages O
, O
geolocation O
, O
surrounding O
audio O
, O
calendar O
events O
, O
and O
other O
memory O
information O
stored O
on O
the O
device O
. O
After O
manual O
launch O
, O
it O
shows O
a O
fake O
welcome O
notification O
to O
the O
user O
: O
Dear O
Customer O
, O
we O
’ O
re O
updating O
your O
configuration O
and O
it O
will O
be O
ready O
as O
soon O
as O
possible O
. O
At O
the O
same O
time O
, O
it O
hides O
an O
icon O
and O
starts O
background O
services O
to O
hide O
further O
actions O
from O
the O
user O
. O
Service O
Name O
Purpose O
AndroidAlarmManager O
Uploading O
last O
recorded O
.amr O
audio O
AndroidSystemService O
Audio O
recording O
AndroidSystemQueues O
Location O
tracking O
with O
movement O
detection O
ClearSystems O
GSM B-System
tracking O
( O
CID O
, O
LAC O
, O
PSC O
) O
ClipService O
Clipboard O
stealing O
AndroidFileManager O
Uploading O
all O
exfiltrated O
data O
AndroidPush O
XMPP O
С O
& O
C O
protocol O
( O
url.plus:5223 B-Indicator
) O
RegistrationService O
Registration O
on O
C O
& O
C O
via O
HTTP O
( O
url.plus/app/pro/ B-Indicator
) O
Interestingly O
, O
a O
self-protection O
feature O
was O
implemented O
in O
almost O
every O
service O
. O
Since O
in O
Android B-System
8.0 I-System
( O
SDK O
API O
26 O
) O
the O
system O
is O
able O
to O
kill O
idle O
services O
, O
this O
code O
raises O
a O
fake O
update O
notification O
to O
prevent O
it O
: O
Cybercriminals O
have O
the O
ability O
to O
control O
the O
implant O
via O
HTTP O
, O
XMPP O
, O
binary O
SMS O
and O
FirebaseCloudMessaging O
( O
or O
GoogleCloudMessaging O
in O
older O
versions O
) O
protocols O
. O
Such O
a O
diversity O
of O
protocols O
gives O
the O
attackers O
more O
flexible O
control O
. O
In O
the O
latest O
implant O
versions O
there O
are O
48 O
different O
commands O
. O
You O
can O
find O
a O
full O
list O
with O
short O
descriptions O
in O
the O
Appendix O
. O
Here O
are O
some O
of O
the O
most O
notable O
: O
‘ O
geofence O
’ O
– O
this O
command O
adds O
a O
specified O
location O
to O
the O
implant O
’ O
s O
internal O
database O
and O
when O
it O
matches O
a O
device O
’ O
s O
current O
location O
the O
malware O
triggers O
and O
begins O
to O
record O
surrounding O
audio O
. O
” O
social O
” O
– O
this O
command O
that O
starts O
the O
‘ O
AndroidMDMSupport O
’ O
service O
– O
this O
allows O
the O
files O
of O
any O
other O
installed O
application O
to O
be O
grabbed O
. O
The O
service O
name O
makes O
it O
clear O
that O
by O
applications O
the O
attackers O
mean O
MDM O
solutions O
that O
are O
business-specific O
tools O
. O
The O
operator O
can O
specify O
a O
path O
with O
the O
database O
of O
any O
targeted O
application O
and O
server-side O
PHP O
script O
name O
for O
uploading O
. O
Several O
hardcoded O
applications O
targeted O
by O
the O
MDM-grabbing O
command O
‘ O
wifi O
’ O
– O
this O
command O
creates O
a O
new O
Wi-Fi O
connection O
with O
specified O
configurations O
from O
the O
command O
and O
enable O
Wi-Fi O
if O
it O
is O
disabled O
. O
So O
, O
when O
a O
device O
connects O
to O
the O
established O
network O
, O
this O
process O
will O
be O
in O
silent O
and O
automatic O
mode O
. O
This O
command O
is O
used O
to O
connect O
the O
victim O
to O
a O
Wi-Fi O
network O
controlled O
by O
the O
cybercriminals O
to O
perform O
traffic O
sniffing O
and O
man-in-the-middle O
( O
MitM O
) O
attacks O
. O
addWifiConfig O
method O
code O
fragments O
‘ O
camera O
’ O
– O
this O
command O
records O
a O
video/capture O
a O
photo O
using O
the O
front-facing O
camera O
when O
someone O
next O
unlocks O
the O
device O
. O
Some O
versions O
of O
the O
Skygofree B-Malware
feature O
the O
self-protection O
ability O
exclusively O
for O
Huawei B-Organization
devices O
. O
There O
is O
a O
‘ O
protected O
apps O
’ O
list O
in O
this O
brand O
’ O
s O
smartphones O
, O
related O
to O
a O
battery-saving O
concept O
. O
Apps O
not O
selected O
as O
protected O
apps O
stop O
working O
once O
the O
screen O
is O
off O
and O
await O
re-activation O
, O
so O
the O
implant O
is O
able O
to O
determine O
that O
it O
is O
running O
on O
a O
Huawei B-Organization
device O
and O
add O
itself O
to O
this O
list O
. O
Due O
to O
this O
feature O
, O
it O
is O
clear O
that O
the O
developers O
paid O
special O
attention O
to O
the O
work O
of O
the O
implant O
on O
Huawei B-Organization
devices O
. O
Also O
, O
we O
found O
a O
debug O
version O
of O
the O
implant O
( O
70a937b2504b3ad6c623581424c7e53d B-Indicator
) O
that O
contains O
interesting O
constants O
, O
including O
the O
version O
of O
the O
spyware O
. O
Debug O
BuildConfig O
with O
the O
version O
After O
a O
deep O
analysis O
of O
all O
discovered O
versions O
of O
Skygofree B-Malware
, O
we O
made O
an O
approximate O
timeline O
of O
the O
implant O
’ O
s O
evolution O
. O
Mobile O
implant O
evolution O
timeline O
However O
, O
some O
facts O
indicate O
that O
the O
APK O
samples O
from O
stage O
two O
can O
also O
be O
used O
separately O
as O
the O
first O
step O
of O
the O
infection O
. O
Below O
is O
a O
list O
of O
the O
payloads O
used O
by O
the O
Skygofree B-Malware
implant O
in O
the O
second O
and O
third O
stages O
. O
Reverse O
shell O
payload O
The O
reverse O
shell O
module O
is O
an O
external O
ELF O
file O
compiled O
by O
the O
attackers O
to O
run O
on O
Android B-System
. O
The O
choice O
of O
a O
particular O
payload O
is O
determined O
by O
the O
implant O
’ O
s O
version O
, O
and O
it O
can O
be O
downloaded O
from O
the O
command O
and O
control O
( O
C O
& O
C O
) O
server O
soon O
after O
the O
implant O
starts O
, O
or O
after O
a O
specific O
command O
. O
In O
the O
most O
recent O
case O
, O
the O
choice O
of O
the O
payload O
zip O
file O
depends O
on O
the O
device O
process O
architecture O
. O
For O
now O
, O
we O
observe O
only O
one O
payload O
version O
for O
following O
the O
ARM B-System
CPUs O
: O
arm64-v8a B-System
, O
armeabi B-System
, O
armeabi-v7a B-System
. O
Note O
that O
in O
almost O
all O
cases O
, O
this O
payload O
file O
, O
contained O
in O
zip O
archives O
, O
is O
named O
‘ O
setting B-Indicator
’ O
or O
‘ O
setting.o B-Indicator
’ O
. O
The O
main O
purpose O
of O
this O
module O
is O
providing O
reverse O
shell O
features O
on O
the O
device O
by O
connecting O
with O
the O
C O
& O
C O
server O
’ O
s O
socket O
. O
Reverse O
shell O
payload O
The O
payload O
is O
started O
by O
the O
main O
module O
with O
a O
specified O
host O
and O
port O
as O
a O
parameter O
that O
is O
hardcoded O
to O
‘ O
54.67.109.199 B-Indicator
’ O
and O
‘ O
30010 B-Indicator
’ O
in O
some O
versions O
: O
Alternatively O
, O
they O
could O
be O
hardcoded O
directly O
into O
the O
payload O
code O
: O
We O
also O
observed O
variants O
that O
were O
equipped O
with O
similar O
reverse O
shell O
payloads O
directly O
in O
the O
main O
APK O
/lib/ O
path O
. O
Equipped O
reverse O
shell O
payload O
with O
specific O
string O
After O
an O
in-depth O
look O
, O
we O
found O
that O
some O
versions O
of O
the O
reverse O
shell O
payload O
code O
share O
similarities O
with O
PRISM B-Malware
– O
a O
stealth O
reverse O
shell O
backdoor O
that O
is O
available O
on O
Github B-Organization
. O
Reverse O
shell O
payload O
from O
update_dev.zip B-Indicator
Exploit O
payload O
At O
the O
same O
time O
, O
we O
found O
an O
important O
payload O
binary O
that O
is O
trying O
to O
exploit O
several O
known O
vulnerabilities O
and O
escalate O
privileges O
. O
According O
to O
several O
timestamps O
, O
this O
payload O
is O
used O
by O
implant O
versions O
created O
since O
2016 O
. O
It O
can O
also O
be O
downloaded O
by O
a O
specific O
command O
. O
The O
exploit O
payload O
contains O
following O
file O
components O
: O
Component O
name O
Description O
run_root_shell/arrs_put_user.o/arrs_put_user/poc B-Indicator
Exploit O
ELF O
db O
Sqlite3 O
tool O
ELF O
device.db B-Indicator
Sqlite3 O
database O
with O
supported O
devices O
and O
their O
constants O
needed O
for O
privilege O
escalation O
‘ O
device.db B-Indicator
’ O
is O
a O
database O
used O
by O
the O
exploit O
. O
It O
contains O
two O
tables O
– O
‘ O
supported_devices O
’ O
and O
‘ O
device_address O
’ O
. O
The O
first O
table O
contains O
205 O
devices O
with O
some O
Linux B-System
properties O
; O
the O
second O
contains O
the O
specific O
memory O
addresses O
associated O
with O
them O
that O
are O
needed O
for O
successful O
exploitation O
. O
You O
can O
find O
a O
full O
list O
of O
targeted O
models O
in O
the O
Appendix O
. O
Fragment O
of O
the O
database O
with O
targeted O
devices O
and O
specific O
memory O
addresses O
If O
the O
infected O
device O
is O
not O
listed O
in O
this O
database O
, O
the O
exploit O
tries O
to O
discover O
these O
addresses O
programmatically O
. O
After O
downloading O
and O
unpacking O
, O
the O
main O
module O
executes O
the O
exploit O
binary O
file O
. O
Once O
executed O
, O
the O
module O
attempts O
to O
get O
root O
privileges O
on O
the O
device O
by O
exploiting O
the O
following O
vulnerabilities O
: O
CVE-2013-2094 B-Vulnerability
CVE-2013-2595 B-Vulnerability
CVE-2013-6282 B-Vulnerability
CVE-2014-3153 B-Vulnerability
( O
futex B-Vulnerability
aka O
TowelRoot B-Vulnerability
) O
CVE-2015-3636 B-Vulnerability
Exploitation O
process O
After O
an O
in-depth O
look O
, O
we O
found O
that O
the O
exploit O
payload O
code O
shares O
several O
similarities O
with O
the O
public O
project O
android-rooting-tools O
. O
Decompiled O
exploit O
function O
code O
fragment O
run_with_mmap O
function O
from O
the O
android-rooting-tools B-System
project O
As O
can O
be O
seen O
from O
the O
comparison O
, O
there O
are O
similar O
strings O
and O
also O
a O
unique O
comment O
in O
Italian O
, O
so O
it O
looks O
like O
the O
attackers O
created O
this O
exploit O
payload O
based O
on O
android-rooting-tools B-System
project O
source O
code O
. O
Busybox O
payload O
Busybox O
is O
public O
software O
that O
provides O
several O
Linux O
tools O
in O
a O
single O
ELF O
file O
. O
In O
earlier O
versions O
, O
it O
operated O
with O
shell O
commands O
like O
this O
: O
Stealing O
WhatsApp O
encryption O
key O
with O
Busybox B-Malware
Social I-Malware
payload I-Malware
Actually O
, O
this O
is O
not O
a O
standalone O
payload O
file O
– O
in O
all O
the O
observed O
versions O
its O
code O
was O
compiled O
with O
exploit O
payload O
in O
one O
file O
( O
‘ O
poc_perm O
’ O
, O
‘ O
arrs_put_user O
’ O
, O
‘ O
arrs_put_user.o O
’ O
) O
. O
This O
is O
due O
to O
the O
fact O
that O
the O
implant O
needs O
to O
escalate O
privileges O
before O
performing O
social O
payload O
actions O
. O
This O
payload O
is O
also O
used O
by O
the O
earlier O
versions O
of O
the O
implant O
. O
It O
has O
similar O
functionality O
to O
the O
‘ O
AndroidMDMSupport O
’ O
command O
from O
the O
current O
versions O
– O
stealing O
data O
belonging O
to O
other O
installed O
applications O
. O
The O
payload O
will O
execute O
shell O
code O
to O
steal O
data O
from O
various O
applications O
. O
The O
example O
below O
steals O
Facebook B-System
data O
: O
All O
the O
other O
hardcoded O
applications O
targeted O
by O
the O
payload O
: O
Package O
name O
Name O
jp.naver.line.android B-Indicator
LINE B-System
: I-System
Free I-System
Calls I-System
& I-System
Messages I-System
com.facebook.orca B-Indicator
Facebook B-System
messenger I-System
com.facebook.katana B-Indicator
Facebook B-System
com.whatsapp B-Indicator
WhatsApp B-System
com.viber.voip B-Indicator
Viber B-System
Parser O
payload O
Upon O
receiving O
a O
specific O
command O
, O
the O
implant O
can O
download O
a O
special O
payload O
to O
grab O
sensitive O
information O
from O
external O
applications O
. O
The O
case O
where O
we O
observed O
this O
involved O
WhatsApp B-System
. O
In O
the O
examined O
version O
, O
it O
was O
downloaded O
from O
: O
hxxp B-Indicator
: I-Indicator
//url I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
plus/Updates/tt/parser.apk I-Indicator
The O
payload O
can O
be O
a O
.dex O
or O
.apk O
file O
which O
is O
a O
Java-compiled O
Android B-System
executable O
. O
After O
downloading O
, O
it O
will O
be O
loaded O
by O
the O
main O
module O
via O
DexClassLoader O
api O
: O
As O
mentioned O
, O
we O
observed O
a O
payload O
that O
exclusively O
targets O
the O
WhatsApp B-System
messenger I-System
and O
it O
does O
so O
in O
an O
original O
way O
. O
The O
payload O
uses O
the O
Android B-System
Accessibility O
Service O
to O
get O
information O
directly O
from O
the O
displayed O
elements O
on O
the O
screen O
, O
so O
it O
waits O
for O
the O
targeted O
application O
to O
be O
launched O
and O
then O
parses O
all O
nodes O
to O
find O
text O
messages O
: O
Note O
that O
the O
implant O
needs O
special O
permission O
to O
use O
the O
Accessibility O
Service O
API O
, O
but O
there O
is O
a O
command O
that O
performs O
a O
request O
with O
a O
phishing O
text O
displayed O
to O
the O
user O
to O
obtain O
such O
permission O
. O
Windows B-System
We O
have O
found O
multiple O
components O
that O
form O
an O
entire O
spyware O
system O
for O
the O
Windows B-System
platform O
. O
Name O
MD5 O
Purpose O
msconf.exe B-Indicator
55fb01048b6287eadcbd9a0f86d21adf B-Indicator
Main O
module O
, O
reverse O
shell O
network.exe B-Indicator
f673bb1d519138ced7659484c0b66c5b B-Indicator
Sending O
exfiltrated O
data O
system.exe B-Indicator
d3baa45ed342fbc5a56d974d36d5f73f B-Indicator
Surrounding O
sound O
recording O
by O
mic O
update.exe B-Indicator
395f9f87df728134b5e3c1ca4d48e9fa B-Indicator
Keylogging O
wow.exe B-Indicator
16311b16fd48c1c87c6476a455093e7a B-Indicator
Screenshot O
capturing O
skype_sync2.exe B-Indicator
6bcc3559d7405f25ea403317353d905f B-Indicator
Skype B-System
call O
recording O
to O
MP3 O
All O
modules O
, O
except O
skype_sync2.exe B-Indicator
, O
are O
written O
in O
Python B-System
and O
packed O
to O
binary O
files O
via O
the O
Py2exe B-System
tool O
. O
This O
sort O
of O
conversion O
allows O
Python B-System
code O
to O
be O
run O
in O
a O
Windows B-System
environment O
without O
pre-installed O
Python B-System
binaries O
. O
msconf.exe B-Indicator
is O
the O
main O
module O
that O
provides O
control O
of O
the O
implant O
and O
reverse O
shell O
feature O
. O
It O
opens O
a O
socket O
on O
the O
victim O
’ O
s O
machine O
and O
connects O
with O
a O
server-side O
component O
of O
the O
implant O
located O
at O
54.67.109.199:6500 B-Indicator
. O
Before O
connecting O
with O
the O
socket O
, O
it O
creates O
a O
malware O
environment O
in O
‘ O
APPDATA/myupd B-Indicator
’ O
and O
creates O
a O
sqlite3 O
database O
there O
– O
‘ O
myupd_tmp\\mng.db B-Indicator
’ O
: O
CREATE O
TABLE O
MANAGE O
( O
ID O
INT O
PRIMARY O
KEY O
NOT O
NULL O
, O
Send O
INT O
NOT O
NULL O
, O
Keylogg O
INT O
NOT O
NULL O
, O
Screenshot O
INT O
NOT O
NULL O
, O
Audio O
INT O
NOT O
NULL O
) O
; O
INSERT O
INTO O
MANAGE O
( O
ID O
, O
Send O
, O
Keylogg O
, O
Screenshot O
, O
Audio O
) O
VALUES O
( O
1 O
, O
1 O
, O
1 O
, O
1 O
, O
0 O
) O
Finally O
, O
the O
malware O
modifies O
the O
‘ O
Software\Microsoft\Windows\CurrentVersion\Run B-Indicator
’ O
registry O
key O
to O
enable O
autostart O
of O
the O
main O
module O
. O
The O
code O
contains O
multiple O
comments O
in O
Italian O
, O
here O
is O
the O
most O
noteworthy O
example O
: O
“ O
Receive O
commands O
from O
the O
remote O
server O
, O
here O
you O
can O
set O
the O
key O
commands O
to O
command O
the O
virus O
” O
Here O
are O
the O
available O
commands O
: O
Name O
Description O
cd O
Change O
current O
directory O
to O
specified O
quit O
Close O
the O
socket O
nggexe O
Execute O
received O
command O
via O
Python B-System
’ O
s O
subprocess.Popen O
( O
) O
without O
outputs O
ngguploads O
Upload O
specified O
file O
to O
the O
specified O
URL O
nggdownloads O
Download O
content O
from O
the O
specified O
URLs O
and O
save O
to O
specified O
file O
nggfilesystem O
Dump O
file O
structure O
of O
the O
C O
: O
path O
, O
save O
it O
to O
the O
file O
in O
json O
format O
and O
zip O
it O
nggstart_screen O
nggstop_screen O
Enable/disable O
screenshot O
module O
. O
When O
enabled O
, O
it O
makes O
a O
screenshot O
every O
25 O
seconds O
nggstart_key O
nggstop_key O
Enable/disable O
keylogging O
module O
nggstart_rec O
nggstop_rec O
Enable/disable O
surrounding O
sounds O
recording O
module O
ngg_status O
Send O
components O
status O
to O
the O
C O
& O
C O
socket O
* O
any O
other O
* O
Execute O
received O
command O
via O
Python B-System
’ O
s O
subprocess.Popen O
( O
) O
, O
output O
result O
will O
be O
sent O
to O
the O
C O
& O
C O
socket O
. O
All O
modules O
set O
hidden O
attributes O
to O
their O
files O
: O
Module O
Paths O
Exfiltrated O
data O
format O
msconf.exe B-Indicator
% B-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd/gen/ I-Indicator
% I-Indicator
Y I-Indicator
% I-Indicator
m I-Indicator
% I-Indicator
d- I-Indicator
% I-Indicator
H I-Indicator
% I-Indicator
M I-Indicator
% I-Indicator
S_filesystem.zip I-Indicator
( I-Indicator
file I-Indicator
structure I-Indicator
dump I-Indicator
) I-Indicator
system.exe I-Indicator
% I-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd/aud/ I-Indicator
% I-Indicator
d I-Indicator
% I-Indicator
m I-Indicator
% I-Indicator
Y I-Indicator
% I-Indicator
H I-Indicator
% I-Indicator
M I-Indicator
% I-Indicator
S.wav I-Indicator
( I-Indicator
surrounding I-Indicator
sounds I-Indicator
) I-Indicator
update.exe I-Indicator
% I-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd_tmp/txt/ I-Indicator
% I-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd/txt/ I-Indicator
% I-Indicator
Y I-Indicator
% I-Indicator
m I-Indicator
% I-Indicator
d- I-Indicator
% I-Indicator
H I-Indicator
% I-Indicator
M I-Indicator
% I-Indicator
S.txt I-Indicator
( I-Indicator
keylogging I-Indicator
) I-Indicator
wow.exe I-Indicator
% I-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd/scr/ I-Indicator
% I-Indicator
Y I-Indicator
% I-Indicator
m I-Indicator
% I-Indicator
d- I-Indicator
% I-Indicator
H I-Indicator
% I-Indicator
M I-Indicator
% I-Indicator
S.jpg I-Indicator
( I-Indicator
screenshots I-Indicator
) I-Indicator
skype_sync2.exe I-Indicator
% I-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd_tmp/skype/ I-Indicator
% I-Indicator
APPDATA I-Indicator
% I-Indicator
/myupd/skype/ I-Indicator
yyyyMMddHHmmss_in.mp3 I-Indicator
yyyyMMddHHmmss_out.mp3 B-Indicator
( O
skype O
calls O
records O
) O
Moreover O
, O
we O
found O
one O
module O
written O
in O
.Net B-System
– O
skype_sync2.exe B-Indicator
. O
The O
main O
purpose O
of O
this O
module O
is O
to O
exfiltrate O
Skype B-System
call O
recordings O
. O
Just O
like O
the O
previous O
modules O
, O
it O
contains O
multiple O
strings O
in O
Italian O
. O
After O
launch O
, O
it O
downloads O
a O
codec O
for O
MP3 O
encoding O
directly O
from O
the O
C O
& O
C O
server O
: O
http B-Indicator
: I-Indicator
//54.67.109.199/skype_resource/libmp3lame.dll I-Indicator
The O
skype_sync2.exe B-Indicator
module O
has O
a O
compilation O
timestamp O
– O
Feb O
06 O
2017 O
and O
the O
following O
PDB O
string O
: O
\\vmware-host\Shared B-Indicator
Folders\dati\Backup\Projects\REcodin_2\REcodin_2\obj\x86\Release\REcodin_2.pdb B-Indicator
network.exe B-Indicator
is O
a O
module O
for O
submitting O
all O
exfiltrated O
data O
to O
the O
server O
. O
In O
the O
observed O
version O
of O
the O
implant O
it O
doesn O
’ O
t O
have O
an O
interface O
to O
work O
with O
the O
skype_sync2.exe B-Indicator
module O
. O
network.exe B-Indicator
submitting O
to O
the O
server O
code O
snippet O
Code O
similarities O
We O
found O
some O
code O
similarities O
between O
the O
implant O
for O
Windows B-System
and O
other O
public O
accessible O
projects O
. O
https B-Indicator
: I-Indicator
//github.com/El3ct71k/Keylogger/ I-Indicator
It O
appears O
the O
developers O
have O
copied O
the O
functional O
part O
of O
the O
keylogger O
module O
from O
this O
project O
. O
update.exe B-Indicator
module O
and O
Keylogger O
by O
‘ O
El3ct71k O
’ O
code O
comparison O
Xenotix B-System
Python I-System
Keylogger I-System
including O
specified O
mutex O
‘ O
mutex_var_xboz O
’ O
. O
update.exe B-Indicator
module O
and O
Xenotix B-System
Python I-System
Keylogger I-System
code O
comparison O
‘ O
addStartup O
’ O
method O
from O
msconf.exe B-Indicator
module O
‘ O
addStartup O
’ O
method O
from O
Xenotix B-System
Python I-System
Keylogger I-System
Distribution O
We O
found O
several O
landing O
pages O
that O
spread O
the O
Android B-System
implants O
. O
Malicious O
URL O
Referrer O
Dates O
http B-Indicator
: I-Indicator
//217.194.13.133/tre/internet/Configuratore_3.apk I-Indicator
http B-Indicator
: I-Indicator
//217.194.13.133/tre/internet/ I-Indicator
2015-02-04 O
to O
present O
time O
http B-Indicator
: I-Indicator
//217.194.13.133/appPro_AC.apk I-Indicator
– O
2015-07-01 O
http B-Indicator
: I-Indicator
//217.194.13.133/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator
% I-Indicator
20Configuratore I-Indicator
% I-Indicator
20v5_4_2.apk I-Indicator
http B-Indicator
: I-Indicator
//217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator
2015-01-20 O
to O
present O
time O
http B-Indicator
: I-Indicator
//217.194.13.133/190/configurazione/vodafone/smartphone/Vodafone I-Indicator
% I-Indicator
20Configuratore.apk I-Indicator
http B-Indicator
: I-Indicator
//217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator
currently O
active O
http B-Indicator
: I-Indicator
//vodafoneinfinity.sytes.net/tim/internet/Configuratore_TIM.apk I-Indicator
http B-Indicator
: I-Indicator
//vodafoneinfinity.sytes.net/tim/internet/ I-Indicator
2015-03-04 O
http B-Indicator
: I-Indicator
//vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator
% I-Indicator
20Configuratore I-Indicator
% I-Indicator
20v5_4_2.apk I-Indicator
http B-Indicator
: I-Indicator
//vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/ I-Indicator
2015-01-14 O
http B-Indicator
: I-Indicator
//windupdate.serveftp.com/wind/LTE/WIND I-Indicator
% I-Indicator
20Configuratore I-Indicator
% I-Indicator
20v5_4_2.apk I-Indicator
http B-Indicator
: I-Indicator
//windupdate.serveftp.com/wind/LTE/ I-Indicator
2015-03-31 O
http B-Indicator
: I-Indicator
//119.network/lte/Internet-TIM-4G-LTE.apk I-Indicator
http B-Indicator
: I-Indicator
//119.network/lte/download.html I-Indicator
2015-02-04 O
2015-07-20 O
http B-Indicator
: I-Indicator
//119.network/lte/Configuratore_TIM.apk I-Indicator
2015-07-08 O
Many O
of O
these O
domains O
are O
outdated O
, O
but O
almost O
all O
( O
except O
one O
– O
appPro_AC.apk B-Indicator
) O
samples O
located O
on O
the O
217.194.13.133 B-Indicator
server O
are O
still O
accessible O
. O
All O
the O
observed O
landing O
pages O
mimic O
the O
mobile O
operators O
’ O
web O
pages O
through O
their O
domain O
name O
and O
web O
page O
content O
as O
well O
. O
Further O
research O
of O
the O
attacker O
’ O
s O
infrastructure O
revealed O
more O
related O
mimicking O
domains O
. O
Unfortunately O
, O
for O
now O
we O
can O
’ O
t O
say O
in O
what O
environment O
these O
landing O
pages O
were O
used O
in O
the O
wild O
, O
but O
according O
to O
all O
the O
information O
at O
our O
dsiposal O
, O
we O
can O
assume O
that O
they O
are O
perfect O
for O
exploitation O
using O
malicious O
redirects O
or O
man-in-the-middle O
attacks O
. O
For O
example O
, O
this O
could O
be O
when O
the O
victim O
’ O
s O
device O
connects O
to O
a O
Wi-Fi O
access O
point O
that O
is O
infected O
or O
controlled O
by O
the O
attackers O
. O
Artifacts O
During O
the O
research O
, O
we O
found O
plenty O
of O
traces O
of O
the O
developers O
and O
those O
doing O
the O
maintaining O
. O
As O
already O
stated O
in O
the O
‘ O
malware O
features O
’ O
part O
, O
there O
are O
multiple O
giveaways O
in O
the O
code O
. O
Here O
are O
just O
some O
of O
them O
: O
ngglobal O
– O
FirebaseCloudMessaging O
topic O
name O
Issuer O
: O
CN O
= O
negg O
– O
from O
several O
certificates O
negg.ddns B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
, O
negg1.ddns B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
, O
negg2.ddns B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
– O
C O
& O
C O
servers O
NG O
SuperShell O
– O
string O
from O
the O
reverse O
shell O
payload O
ngg O
– O
prefix O
in O
commands O
names O
of O
the O
implant O
for O
Windows B-System
Signature O
with O
specific O
issuer O
Whois O
records O
and O
IP O
relationships O
provide O
many O
interesting O
insights O
as O
well O
. O
There O
are O
a O
lot O
of O
other O
‘ O
Negg O
’ O
mentions O
in O
Whois O
records O
and O
references O
to O
it O
. O
For O
example O
: O
Conclusions O
The O
Skygofree B-Malware
Android B-System
implant O
is O
one O
of O
the O
most O
powerful O
spyware O
tools O
that O
we O
have O
ever O
seen O
for O
this O
platform O
. O
As O
a O
result O
of O
the O
long-term O
development O
process O
, O
there O
are O
multiple O
, O
exceptional O
capabilities O
: O
usage O
of O
multiple O
exploits O
for O
gaining O
root O
privileges O
, O
a O
complex O
payload O
structure O
, O
never-before-seen O
surveillance O
features O
such O
as O
recording O
surrounding O
audio O
in O
specified O
locations O
. O
Given O
the O
many O
artifacts O
we O
discovered O
in O
the O
malware O
code O
, O
as O
well O
as O
infrastructure O
analysis O
, O
we O
are O
pretty O
confident O
that O
the O
developer O
of O
the O
Skygofree B-Malware
implants O
is O
an O
Italian O
IT O
company O
that O
works O
on O
surveillance O
solutions O
, O
just O
like O
HackingTeam B-Organization
. O
HenBox B-Malware
: O
The O
Chickens O
Come O
Home O
to O
Roost O
March O
13 O
, O
2018 O
at O
5:00 O
AM O
Unit O
42 O
recently O
discovered O
a O
new O
Android B-System
malware O
family O
we O
named O
“ O
HenBox B-Malware
” O
masquerading O
as O
a O
variety O
of O
legitimate O
Android B-System
apps O
. O
We O
chose O
the O
name O
“ O
HenBox B-Malware
” O
based O
on O
metadata O
found O
in O
most O
of O
the O
malicious O
apps O
such O
as O
package O
names O
and O
signer O
detail O
. O
HenBox B-Malware
masquerades O
as O
apps O
such O
as O
VPN O
and O
Android B-System
system O
apps O
and O
often O
installs O
legitimate O
versions O
of O
these O
apps O
along O
with O
HenBox B-Malware
to O
trick O
users O
into O
thinking O
they O
downloaded O
the O
legitimate O
app O
. O
While O
some O
of O
the O
legitimate O
apps O
HenBox B-Malware
use O
as O
decoys O
can O
be O
found O
on O
Google B-System
Play I-System
, O
HenBox B-Malware
apps O
themselves O
have O
only O
been O
found O
on O
third-party O
( O
non-Google O
Play B-System
) O
app O
stores O
. O
HenBox B-Malware
appears O
to O
primarily O
target O
the O
Uyghurs O
– O
a O
minority O
Turkic O
ethnic O
group O
that O
is O
primarily O
Muslim O
and O
lives O
mainly O
in O
the O
Xinjiang O
Uyghur O
Autonomous O
Region O
in O
North O
West O
China O
. O
It O
also O
targets O
devices O
made O
by O
Chinese O
manufacturer O
Xiaomi B-Organization
and O
those O
running O
MIUI B-System
, O
an O
operating O
system O
based O
on O
Google B-System
Android I-System
made O
by O
Xiaomi B-Organization
. O
Smartphones O
are O
the O
dominant O
form O
of O
internet O
access O
in O
the O
region O
and O
Xinjiang O
was O
recently O
above O
the O
national O
average O
of O
internet O
users O
in O
China O
. O
The O
result O
is O
a O
large O
online O
population O
who O
have O
been O
the O
subject O
of O
numerous O
cyber-attacks O
in O
the O
past O
. O
Once O
installed O
, O
HenBox B-Malware
steals O
information O
from O
the O
devices O
from O
a O
myriad O
of O
sources O
, O
including O
many O
mainstream O
chat O
, O
communication O
, O
and O
social O
media O
apps O
. O
The O
stolen O
information O
includes O
personal O
and O
device O
information O
. O
Of O
note O
, O
in O
addition O
to O
tracking O
the O
compromised O
device O
’ O
s O
location O
, O
HenBox B-Malware
also O
harvests O
all O
outgoing O
phone O
numbers O
with O
an O
“ O
86 O
” O
prefix O
, O
which O
is O
the O
country O
code O
for O
the O
People O
’ O
s O
Republic O
of O
China O
( O
PRC O
) O
. O
It O
can O
also O
access O
the O
phone O
’ O
s O
cameras O
and O
microphone O
. O
HenBox B-Malware
has O
ties O
to O
infrastructure O
used O
in O
targeted O
attacks O
with O
a O
focus O
on O
politics O
in O
South O
East O
Asia O
. O
These O
attackers O
have O
used O
additional O
malware O
families O
in O
previous O
activity O
dating O
to O
at O
least O
2015 O
that O
include O
PlugX B-Malware
, O
Zupdax B-Malware
, O
9002 B-Malware
, O
and O
Poison B-Malware
Ivy I-Malware
. O
This O
also O
aligns O
with O
HenBox B-Malware
’ O
s O
timeline O
, O
as O
in O
total O
we O
have O
identified O
almost O
200 O
HenBox B-Malware
samples O
, O
with O
the O
oldest O
dating O
to O
2015 O
. O
Most O
of O
the O
samples O
we O
found O
date O
from O
the O
last O
half O
of O
2017 O
, O
fewer O
samples O
date O
from O
2016 O
, O
and O
a O
handful O
date O
back O
to O
2015 O
. O
In O
2018 O
, O
we O
have O
already O
observed O
a O
small O
but O
consistent O
number O
of O
samples O
. O
We O
believe O
this O
indicates O
a O
fairly O
sustained O
campaign O
that O
has O
gained O
momentum O
over O
recent O
months O
. O
HenBox B-Malware
Enters O
the O
Uyghur B-System
App I-System
Store I-System
In O
May O
2016 O
, O
a O
HenBox B-Malware
app O
was O
downloaded O
from O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
. O
Specifically O
, O
the O
app O
was O
an O
Android B-System
Package I-System
( O
APK O
) O
file O
that O
will O
be O
discussed O
in O
more O
detail O
shortly O
. O
The O
domain O
name O
, O
language O
of O
the O
site O
and O
app O
content O
hosted O
suggest O
this O
site O
is O
a O
third-party O
app O
store O
for O
whom O
the O
intended O
users O
are O
the O
Uyghurs O
. O
Such O
app O
stores O
are O
so-called O
because O
they O
are O
not O
officially O
supported O
by O
Android B-System
, O
nor O
are O
they O
provided O
by O
Google B-Organization
, O
unlike O
the O
Play B-System
Store I-System
. O
Third-party O
app O
stores O
are O
ubiquitous O
in O
China O
for O
a O
number O
of O
reasons O
including O
: O
evermore O
powerful O
Chinese B-Organization
Original I-Organization
Equipment I-Organization
Manufacturers I-Organization
( I-Organization
OEM I-Organization
) I-Organization
, O
a O
lack O
of O
an O
official O
Chinese O
Google B-System
Play I-System
app O
store O
, O
and O
a O
growing O
smartphone O
market O
. O
The O
HenBox B-Malware
app O
downloaded O
in O
May O
2016 O
was O
masquerading O
as O
the O
DroidVPN B-Indicator
app O
. O
At O
the O
time O
of O
writing O
, O
the O
content O
served O
at O
the O
given O
URL O
on O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
, O
is O
now O
a O
legitimate O
version O
of O
the O
DroidVPN B-Indicator
app O
, O
and O
looks O
as O
shown O
in O
Figure O
1 O
below O
. O
henbox_2 O
Figure O
1 O
Uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
app O
store O
showing O
the O
current O
DroidVPN B-Indicator
app O
Virtual O
Private O
Network O
( O
VPN O
) O
tools O
allow O
connections O
to O
remote O
private O
networks O
, O
increasing O
the O
security O
and O
privacy O
of O
the O
user O
’ O
s O
communications O
. O
According O
to O
the O
DroidVPN B-Indicator
app O
description O
, O
it O
“ O
helps O
bypass O
regional O
internet O
restrictions O
, O
web O
filtering O
and O
firewalls O
by O
tunneling O
traffic O
over O
ICMP. O
” O
Some O
features O
may O
require O
devices O
to O
be O
rooted O
to O
function O
and O
according O
to O
some O
3rd O
party O
app O
stores O
, O
unconditional O
rooting O
is O
required O
, O
which O
has O
additional O
security O
implications O
for O
the O
device O
. O
We O
have O
not O
been O
able O
to O
ascertain O
how O
the O
DroidVPN B-Indicator
app O
on O
the O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
app O
store O
was O
replaced O
with O
the O
malicious O
HenBox B-Malware
app O
; O
however O
, O
some O
indicators O
point O
to O
the O
server O
running O
an O
outdated O
version O
of O
Apache O
Web O
Server O
on O
a O
Windows B-System
32-Bit O
operating O
system O
. O
In O
light O
of O
this O
, O
we O
believe O
an O
attack O
against O
unpatched B-Vulnerability
vulnerabilities I-Vulnerability
is O
a O
reasonable O
conjecture O
for O
how O
the O
server O
was O
compromised O
. O
The O
HenBox O
app O
downloaded O
in O
May O
2016 O
, O
as O
described O
in O
Table O
1 O
below O
, O
masquerades O
as O
a O
legitimate O
version O
of O
the O
DroidVPN B-Indicator
app O
by O
using O
the O
same O
app O
name O
“ O
DroidVPN B-System
” O
and O
the O
same O
iconography O
used O
when O
displaying O
the O
app O
in O
Android B-System
’ O
s O
launcher O
view O
, O
as O
highlighted O
in O
Figure O
2 O
below O
Table O
1 O
. O
APK O
SHA256 O
Size O
( O
bytes O
) O
First O
Seen O
App O
Package O
name O
App O
name O
0589bed1e3b3d6234c30061be3be1cc6685d786ab3a892a8d4dae8e2d7ed92f7 B-Indicator
2,740,860 O
May O
2016 O
com.android.henbox B-Indicator
DroidVPN B-System
Table O
1 O
Details O
of O
the O
HenBox B-Malware
DroidVPN B-System
app O
on O
the O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
app O
store O
henbox_3 O
Figure O
2 O
HenBox B-Malware
app O
installed O
, O
purporting O
to O
be O
DroidVPN B-Indicator
Depending O
on O
the O
language O
setting O
on O
the O
device O
, O
and O
for O
this O
particular O
variant O
of O
HenBox B-Malware
, O
the O
installed O
HenBox B-Malware
app O
may O
have O
the O
name O
“ O
Backup O
” O
but O
uses O
the O
same O
DroidVPN B-Indicator
logo O
. O
Other O
variants O
use O
other O
names O
and O
logos O
, O
as O
described O
later O
. O
Given O
the O
DroidVPN B-Indicator
look O
and O
feel O
being O
used O
by O
this O
variant O
of O
HenBox B-Malware
, O
it O
’ O
s O
highly O
likely O
the O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
page O
for O
DroidVPN B-Indicator
remained O
identical O
when O
serving O
either O
HenBox B-Malware
or O
DroidVPN B-Indicator
apps O
, O
just O
that O
the O
legitimate O
APK O
file O
had O
been O
replaced O
with O
HenBox O
for O
an O
unknown O
period O
of O
time O
. O
In O
addition O
to O
the O
look O
and O
feel O
of O
DroidVPN B-Indicator
, O
this O
HenBox B-Malware
variant O
also O
contained O
a O
legitimate O
DroidVPN B-Indicator
app O
within O
its O
APK O
package O
as O
an O
asset O
, O
which O
could O
be O
compared O
to O
a O
resource O
item O
within O
a O
Windows B-System
Portable I-System
Executable I-System
( O
PE O
) O
file O
. O
Once O
the O
HenBox B-Malware
app O
is O
installed O
and O
launched O
, O
it O
launches O
an O
install O
process O
for O
the O
embedded O
app O
as O
a O
decoy O
to O
other O
malicious O
behaviors O
occurring O
in O
the O
background O
, O
and O
to O
satisfy O
the O
victim O
with O
the O
app O
they O
were O
requesting O
, O
assuming O
they O
requested O
to O
download O
a O
particular O
app O
, O
such O
as O
DroidVPN B-System
. O
The O
version O
of O
the O
legitimate O
DroidVPN B-Indicator
embedded O
inside O
this O
HenBox B-Malware
variant O
is O
the O
same O
version O
of O
DroidVPN B-Indicator
available O
for O
download O
from O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
, O
at O
the O
time O
of O
writing O
. O
It O
’ O
s O
worth O
noting O
, O
newer O
versions O
of O
the O
DroidVPN B-System
app O
are O
available O
on O
Google B-System
Play I-System
, O
as O
well O
as O
in O
some O
other O
third-party O
app O
stores O
, O
which O
could O
indicate O
uyghurapps B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
is O
not O
awfully O
well O
maintained O
or O
updated O
to O
the O
latest O
apps O
available O
. O
At O
the O
time O
of O
writing O
, O
to O
our O
knowledge O
no O
other O
third-party O
app O
stores O
, O
nor O
the O
official O
Google B-System
Play I-System
store O
, O
were O
or O
are O
hosting O
this O
malicious O
HenBox B-Malware
variant O
masquerading O
as O
DroidVPN B-Indicator
. O
The O
Right O
App O
at O
the O
Right O
Time O
The O
malicious O
HenBox B-Malware
and O
embedded O
DroidVPN B-Indicator
app O
combination O
is O
one O
instance O
of O
the O
type O
of O
legitimate O
apps O
the O
attackers O
choose O
to O
mimic O
to O
compromise O
their O
victims O
. O
These O
threat O
actors O
frequently O
offer O
malicious O
apps O
purporting O
to O
be O
legitimate O
apps O
that O
are O
broadly O
used O
or O
important O
to O
a O
targeted O
population O
. O
It O
’ O
s O
worth O
noting O
however O
, O
about O
one-third O
of O
the O
HenBox B-Malware
apps O
contained O
embedded O
APK O
objects O
that O
did O
not O
refer O
to O
legitimate O
apps O
. O
Some O
were O
only O
3 O
bytes O
long O
, O
containing O
strings O
such O
as O
“ O
ddd O
” O
and O
“ O
333 O
” O
, O
or O
were O
otherwise O
corrupted O
. O
Beyond O
the O
previously O
mentioned O
DroidVPN B-Indicator
example O
, O
other O
viable O
embedded O
apps O
we O
found O
include O
apps O
currently O
available O
on O
Google B-System
Play I-System
, O
as O
well O
as O
many O
third-party O
app O
stores O
. O
Table O
2 O
below O
lists O
some O
of O
these O
apps O
with O
their O
respective O
metadata O
. O
Sample O
1 O
marks O
the O
first O
HenBox B-Malware
sample O
we O
saw O
embedding O
a O
legitimate O
app O
within O
its O
assets O
to O
be O
dropped O
and O
installed O
on O
the O
victim O
device O
as O
a O
decoy O
. O
The O
legitimate O
app O
in O
question O
was O
a O
Uyghur O
language O
keyboard O
app O
targeted O
at O
native O
speakers O
of O
the O
Uyghur O
language O
and O
their O
smartphones O
. O
Sample O
2 O
, O
has O
the O
package O
name O
cn.android.setting B-Indicator
masquerading O
as O
Android O
’ O
s O
Settings B-System
app I-System
, O
which O
has O
a O
similar O
package O
name O
( O
com.android.settings B-Indicator
) O
. O
This O
variant O
of O
HenBox B-Malware
also O
used O
the O
common O
green O
Android B-System
figure O
as O
the O
app O
logo O
and O
was O
named O
设置 O
( O
“ O
Backup O
” O
in O
English O
) O
. O
This O
variant O
’ O
s O
app O
name O
, O
along O
with O
many O
others O
, O
is O
written O
in O
Chinese O
and O
describes O
the O
app O
as O
a O
backup O
tool O
. O
Please O
see O
the O
IOCs O
section O
for O
all O
app O
and O
package O
name O
combinations O
. O
Interestingly O
, O
the O
embedded O
app O
in O
sample O
2 O
is O
not O
a O
version O
of O
the O
Android B-System
Settings I-System
app O
but O
instead O
the O
“ O
Amaq B-System
Agency I-System
” O
app O
, O
which O
reports O
on O
ISIS O
related O
news O
. O
Reports O
indicate O
fake O
versions O
of O
the O
Amaq B-System
app O
exist O
, O
likely O
in O
order O
to O
spy O
on O
those O
that O
use O
it O
. O
A O
month O
after O
observing O
sample O
2 O
, O
we O
obtained O
another O
which O
used O
the O
same O
package O
name O
as O
sample O
2 O
( O
cn.android.setting B-Indicator
) O
. O
However O
, O
this O
time O
the O
app O
name O
for O
both O
HenBox B-Malware
and O
the O
embedded O
app O
were O
identical O
: O
Islamawazi B-System
. O
Islamawazi B-System
is O
also O
known O
as O
the O
Turkistan B-Organization
Islamic I-Organization
Party I-Organization
or O
“ O
TIP O
” O
. O
This O
organization O
was O
formerly O
known O
as O
the O
East B-Organization
Turkestan I-Organization
Islamic I-Organization
Party I-Organization
and O
is O
purported O
to O
be O
an O
Islamic O
extremist O
separatist O
organization O
founded O
by O
Uyghur O
jihadists O
. O
The O
embedded O
app O
appears O
to O
be O
a O
media O
player O
. O
These O
examples O
, O
together O
with O
the O
HenBox B-Malware
app O
placed O
on O
a O
very O
specific O
third-party O
app O
store O
, O
point O
clearly O
to O
at O
least O
some O
of O
the O
intended O
targets O
of O
these O
malicious O
apps O
being O
Uyghurs O
, O
specifically O
those O
with O
interest O
in O
or O
association O
with O
terrorist O
groups O
. O
These O
threat O
actors O
appear O
to O
be O
choosing O
the O
right O
apps O
– O
those O
that O
could O
be O
popular O
with O
locals O
in O
the O
region O
, O
at O
the O
right O
time O
– O
while O
tensions O
grow O
in O
this O
region O
of O
China O
, O
to O
ensure O
a O
good O
victim O
install-base O
. O
HenBox B-Malware
Roosts O
HenBox B-Malware
has O
evolved O
over O
the O
past O
three O
years O
, O
and O
of O
the O
almost O
two O
hundred O
HenBox B-Malware
apps O
in O
AutoFocus O
, O
the O
vast O
majority O
contain O
several O
native O
libraries O
as O
well O
as O
other O
components O
in O
order O
to O
achieve O
their O
objective O
. O
Most O
components O
are O
obfuscated O
in O
some O
way O
, O
whether O
it O
be O
simple O
XOR O
with O
a O
single-byte O
key O
, O
or O
through O
the O
use O
of O
ZIP B-System
or O
Zlib B-System
compression O
wrapped O
with O
RC4 O
encryption O
. O
These O
components O
are O
responsible O
for O
a O
myriad O
of O
functions O
including O
handling O
decryption O
, O
network O
communications O
, O
gaining O
super-user O
privileges O
, O
monitoring O
system O
logs O
, O
loading O
additional O
Dalvik O
code O
files O
, O
tracking O
the O
device O
location O
and O
more O
. O
The O
remainder O
of O
this O
section O
describes O
at O
a O
high-level O
what O
HenBox O
is O
capable O
of O
, O
and O
how O
it O
operates O
. O
The O
description O
is O
based O
on O
analysis O
of O
the O
sample O
described O
in O
Table O
3 O
below O
, O
which O
was O
of O
interest O
given O
its O
C2 O
domain B-Indicator
mefound I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
overlaps O
with O
PlugX B-Malware
, O
Zupdax B-Malware
, O
and O
Poison B-Malware
Ivy I-Malware
malware O
families O
discussed O
in O
more O
detail O
later O
. O
SHA256 O
Package O
Name O
App O
Name O
a6c7351b09a733a1b3ff8a0901c5bde B-Indicator
fdc3b566bfcedcdf5a338c3a97c9f249b O
com.android.henbox B-Indicator
备份 O
( O
Backup O
) O
Table O
3 O
HenBox B-Malware
variant O
used O
in O
description O
Once O
this O
variant O
of O
HenBox B-Malware
is O
installed O
on O
the O
victim O
’ O
s O
device O
, O
the O
app O
can O
be O
executed O
in O
two O
different O
ways O
: O
One O
method O
for O
executing O
HenBox B-Malware
is O
for O
the O
victim O
to O
launch O
the O
malicious O
app O
( O
named O
“ O
Backup O
” O
, O
in O
this O
instance O
) O
from O
the O
launcher O
view O
on O
their O
device O
, O
as O
shown O
in O
Figure O
3 O
below O
. O
This O
runs O
code O
in O
the O
onCreate O
( O
) O
method O
of O
the O
app O
’ O
s O
MainActivity O
class O
, O
which O
in O
effect O
is O
the O
program O
’ O
s O
entry O
point O
. O
This O
process O
is O
defined O
in O
the O
app O
’ O
s O
AndroidManifest.xml O
config O
file O
, O
as O
shown O
in O
the O
following O
snippet O
. O
Doing O
so O
executes O
code O
checking O
if O
the O
device O
is O
manufactured O
by O
Xiaomi B-Organization
, O
or O
if O
Xiaomi B-Organization
’ I-Organization
s I-Organization
fork O
of O
Android B-System
is O
running O
on O
the O
device O
. O
Under O
these O
conditions O
, O
the O
app O
continues O
executing O
and O
the O
intent O
of O
targeting O
Xiaomi B-Organization
devices O
and O
users O
could O
be O
inferred O
, O
however O
poorly O
written O
code O
results O
in O
execution O
in O
more O
environments O
than O
perhaps O
intended O
; O
further O
checks O
are O
made O
to O
ascertain O
whether O
the O
app O
is O
running O
on O
an O
emulator O
, O
perhaps O
to O
evade O
researcher O
analysis O
environments O
. O
Assuming O
these O
checks O
pass O
, O
one O
of O
the O
main O
ELF O
libraries O
is O
loaded O
that O
orchestrates O
other O
components O
and O
provides O
functionality O
to O
the O
app O
’ O
s O
Dalvik O
code O
through O
the O
Java O
Native O
Interface O
( O
JNI O
) O
. O
HenBox B-Malware
checks O
whether O
this O
execution O
is O
its O
first O
by O
using O
Android B-System
’ O
s O
shared O
preferences O
feature O
to O
persist O
XML O
key-value O
pair O
data O
. O
If O
it O
is O
the O
first O
execution O
, O
and O
if O
the O
app O
’ O
s O
path O
does O
not O
contain O
“ O
/system/app B-Indicator
” O
( O
i.e O
. O
HenBox B-Malware
is O
not O
running O
as O
a O
system O
app O
) O
, O
another O
ELF O
library O
is O
loaded O
to O
aid O
with O
executing O
super-user O
commands O
. O
The O
second O
method O
uses O
intents O
, O
broadcasts O
, O
and O
receivers O
to O
execute O
HenBox O
code O
. O
Providing O
the O
app O
has O
registered O
an O
intent O
to O
process O
particular O
events O
from O
the O
system O
, O
and O
one O
of O
said O
events O
occurs O
, O
HenBox O
is O
effectively O
brought O
to O
life O
through O
external O
stimulus O
from O
another O
app O
on O
the O
system O
broadcasting O
a O
request O
, O
or O
the O
system O
itself O
broadcasting O
a O
particular O
event O
has O
occurred O
. O
These O
intents O
are O
typically O
defined O
statically O
in O
the O
app O
’ O
s O
AndroidManifest.xml O
config O
file O
; O
some O
HenBox B-Malware
variants O
register O
further O
intents O
from O
their O
code O
at O
run-time O
. O
Once O
a O
matching O
intent O
is O
triggered O
, O
the O
respective O
Receiver O
code O
will O
be O
executed O
, O
leading O
to O
other O
HenBox O
behaviors O
being O
launched O
, O
which O
are O
described O
later O
. O
Table O
4 O
below O
lists O
the O
intents O
that O
are O
statically O
registered O
in O
this O
HenBox B-Malware
variant O
’ O
s O
AndroidManifest.xml O
config O
file O
, O
together O
with O
a O
description O
of O
what O
that O
intent O
does O
, O
and O
when O
it O
would O
be O
used O
. O
Depending O
on O
the O
intent O
triggered O
, O
one O
of O
two O
Receivers O
would O
be O
called O
, O
in O
this O
instance O
they O
are O
called O
Boot O
or O
Time O
but O
the O
name O
is O
somewhat O
immaterial O
. O
Receiver O
Intent O
Name O
Description O
BootReceiver O
android.intent.action.BOOT_COMPLETED B-Indicator
System O
notification O
that O
the O
device O
has O
finished O
booting O
. O
android.intent.action.restart B-Indicator
A O
legacy O
intent O
used O
to O
indicate O
a O
system O
restart O
. O
android.intent.action.SIM_STATE_CHANGED B-Indicator
System O
notification O
that O
the O
SIM O
card O
has O
changed O
or O
been O
removed O
. O
android.intent.action.PACKAGE_INSTALL B-Indicator
System O
notification O
that O
the O
download O
and O
eventual O
installation O
of O
an O
app O
package O
is O
happening O
( O
this O
is O
deprecated O
) O
android.intent.action.PACKAGE_ADDED B-Indicator
System O
notification O
that O
a O
new O
app O
package O
has O
been O
installed O
on O
the O
device O
, O
including O
the O
name O
of O
said O
package O
. O
com.xiaomi.smarthome.receive_alarm B-Indicator
Received O
notifications O
from O
Xiaomi B-Organization
’ O
s O
smart O
home O
IoT O
devices O
. O
TimeReceiver O
android.intent.action.ACTION_TIME_CHANGED B-Indicator
System O
notification O
that O
the O
time O
was O
set O
. O
android.intent.action.CONNECTIVITY_CHANGE B-Indicator
System O
notification O
that O
a O
change O
in O
network O
connectivity O
has O
occurred O
, O
either O
lost O
or O
established O
. O
Since O
Android B-System
version O
7 O
( O
Nougat B-System
) O
this O
information O
is O
gathered O
using O
other O
means O
, O
perhaps O
inferring O
the O
devices O
used O
by O
potential O
victim O
run O
older O
versions O
of O
Android B-System
. O
Table O
4 O
HenBox B-Malware
variant O
's O
Intents O
and O
Receivers O
Most O
of O
the O
intents O
registered O
in O
the O
AndroidManifest.xml O
file O
, O
or O
loaded O
during O
run-time O
, O
are O
commonly O
found O
in O
malicious O
Android B-System
apps O
. O
What O
’ O
s O
more O
interesting O
, O
and O
much O
less O
common O
, O
is O
the O
inclusion O
of O
the O
com.xiaomi.smarthome.receive_alarm B-Indicator
intent O
filter O
. O
Xiaomi B-Organization
, O
a O
privately O
owned O
Chinese O
electronics O
and O
software O
company O
, O
is O
the O
5th O
largest O
smart O
phone O
manufacturer O
in O
the O
world O
and O
also O
manufactures O
IoT O
devices O
for O
the O
home O
. O
Most O
devices O
can O
be O
controlled O
by O
Xiaomi B-Organization
’ O
s O
“ O
MiHome B-System
” O
Android B-System
app O
, O
which O
is O
available O
on O
Google B-System
Play I-System
with O
between O
1,000,000 O
and O
5,000,000 O
downloads O
. O
Given O
the O
nature O
of O
connected O
devices O
in O
smart O
homes O
, O
it O
’ O
s O
highly O
likely O
many O
of O
these O
devices O
, O
and O
indeed O
the O
controller O
app O
itself O
, O
communicate O
with O
one O
another O
sending O
status O
notifications O
, O
alerts O
and O
so O
on O
. O
Such O
notifications O
would O
be O
received O
by O
the O
MiHome B-System
app O
or O
any O
other O
, O
such O
as O
HenBox B-Malware
, O
so O
long O
as O
they O
register O
their O
intent O
to O
do O
so O
. O
This O
could O
essentially O
allow O
for O
external O
devices O
to O
act O
as O
a O
trigger O
to O
execute O
the O
malicious O
HenBox B-Malware
code O
, O
or O
perhaps O
afford O
additional O
data O
HenBox B-Malware
can O
collect O
and O
exfiltrate O
. O
Either O
method O
to O
load O
HenBox B-Malware
ultimately O
results O
in O
an O
instance O
of O
a O
service O
being O
launched O
. O
This O
service O
hides O
the O
app O
from O
plain O
sight O
and O
loads O
another O
ELF O
library O
to O
gather O
environmental O
information O
about O
the O
device O
, O
such O
as O
running O
processes O
and O
apps O
, O
and O
details O
about O
device O
hardware O
, O
primarily O
through O
parsing O
system O
logs O
and O
querying O
running O
processes O
. O
The O
service O
continues O
by O
loading O
an O
ELF O
, O
created O
by O
Baidu B-Organization
, O
which O
is O
capable O
of O
tracking O
the O
device O
location O
before O
setting O
up O
a O
monitor O
to O
harvest O
phone O
numbers O
associated O
with O
outgoing O
calls O
for O
those O
numbers O
with O
a O
country O
code O
“ O
+86 O
” O
prefix O
, O
which O
relates O
to O
the O
People O
’ O
s O
Republic O
of O
China O
. O
Further O
assets O
are O
decrypted O
and O
deployed O
, O
including O
another O
Dalvik O
DEX O
code O
file O
, O
which O
has O
various O
capabilities O
including O
registering O
itself O
as O
the O
incoming O
SMS O
handler O
for O
the O
device O
to O
intercept O
SMS O
messages O
, O
loading O
another O
ELF O
library O
that O
includes O
a O
version O
of O
BusyBox B-System
- O
a O
package O
containing O
various O
stripped-down O
Unix O
tools O
useful O
for O
administering O
such O
systems O
– O
and O
, O
interestingly O
, O
is O
capable O
of O
turning O
off O
the O
sound O
played O
when O
the O
device O
’ O
s O
cameras O
take O
pictures O
. O
The O
Android B-System
permissions O
requested O
by O
HenBox B-Malware
, O
as O
defined O
in O
the O
apps O
’ O
AndroidManifest.xml O
files O
, O
range O
from O
accessing O
location O
and O
network O
settings O
to O
messages O
, O
call O
, O
and O
contact O
data O
. O
HenBox B-Malware
can O
also O
access O
sensors O
such O
as O
the O
device O
camera O
( O
s O
) O
and O
the O
microphone O
. O
Beyond O
the O
Android B-System
app O
itself O
, O
other O
components O
such O
as O
the O
aforementioned O
ELF O
libraries O
have O
additional O
data-stealing O
capabilities O
. O
One O
ELF O
library O
, O
libloc4d.so B-Indicator
, O
handles O
amongst O
other O
things O
the O
loading O
of O
the O
app-decoded O
ELF O
library O
file O
“ O
sux O
” O
, O
as O
well O
as O
handling O
connectivity O
to O
the O
C2 O
. O
The O
sux O
library O
appears O
to O
be O
a O
customized O
super O
user O
( O
su O
) O
tool O
that O
includes O
code O
from O
the O
com.koushikdutta.superuser B-Indicator
app O
and O
carries O
the O
equivalent O
of O
a O
super O
user O
( O
su O
) O
binary O
in O
order O
to O
run O
privileged O
commands O
on O
the O
system O
. O
The O
primary O
goal O
of O
sux O
appears O
to O
be O
steal O
messages O
and O
other O
data O
from O
popular O
messaging O
and O
social O
media O
apps O
specified O
within O
the O
HenBox B-Malware
sample O
. O
A O
similar O
tool O
, O
with O
the O
same O
filename O
, O
has O
been O
discussed O
in O
previous O
research O
but O
the O
SpyDealer B-Malware
malware O
appears O
unrelated O
to O
HenBox B-Malware
. O
More O
likely O
, O
this O
is O
a O
case O
of O
common O
attack O
tools O
being O
re-used O
between O
different O
threat O
actor O
groups O
. O
This O
particular O
HenBox B-Malware
variant O
, O
as O
listed O
in O
Table O
3 O
above O
, O
harvests O
data O
from O
two O
popular O
messaging O
and O
social O
media O
apps O
: O
Voxer B-System
Walkie B-System
Talkie I-System
Messenger B-System
( O
com.rebelvox.voxer B-Indicator
) O
and O
Tencent B-Organization
’ O
s O
WeChat B-System
( O
com.tencent.mm B-Indicator
) O
. O
These O
types O
of O
apps O
tend O
to O
store O
their O
data O
in O
databases O
and O
, O
as O
an O
example O
, O
HenBox B-Malware
accesses O
Voxer O
’ O
s O
database O
from O
the O
file O
“ O
/data/data/com.rebelvox.voxer/databases/rv.db B-Indicator
” O
. O
Once O
opened O
, O
HenBox B-Malware
runs O
the O
following O
query O
to O
gather O
message O
information O
. O
Not O
long O
after O
this O
variant O
was O
public O
, O
newer O
variants O
of O
HenBox B-Malware
were O
seen O
, O
and O
some O
had O
significant O
increases O
in O
the O
number O
of O
targeted O
apps O
. O
Table O
5 O
describes O
the O
latest O
variant O
seen O
in O
AutoFocus O
. O
SHA256 O
Package O
Name O
App O
Name O
First O
Seen O
07994c9f2eeeede199dd6b4e760fce3 B-Indicator
71f03f3cc4307e6551c18d2fbd024a24f B-Indicator
com.android.henbox B-Indicator
备份 O
( O
Backup O
) O
January O
3rd O
2018 O
Table O
6 O
contains O
an O
updated O
list O
of O
targeted O
apps O
from O
which O
this O
newer O
variant O
of O
HenBox B-Malware
is O
capable O
of O
harvesting O
data O
. O
Interestingly O
, O
the O
two O
communication O
apps O
described O
above O
as O
being O
targeted O
by O
the O
HenBox O
variant O
listed O
in O
Table O
3 O
do O
not O
appear O
in O
this O
updated O
list O
. O
Package O
Name O
App O
Name O
com.whatsapp B-Indicator
WhatsApp B-System
Messenger B-System
com.pugna.magiccall B-Indicator
n/a O
org.telegram.messenger B-Indicator
Telegram B-System
com.facebook.katana B-Indicator
Facebook B-System
com.twitter.android B-Indicator
Twitter B-System
jp.naver.line.android B-Indicator
LINE B-System
: O
Free O
Calls O
& O
Messages O
com.instanza.cocovoice B-Indicator
Coco O
com.beetalk B-Indicator
BeeTalk B-System
com.gtomato.talkbox B-Indicator
TalkBox B-System
Voice O
Messenger B-System
- O
PTT O
com.viber.voip B-Indicator
Viber B-System
Messenger B-System
com.immomo.momo B-Indicator
MOMO陌陌 B-System
com.facebook.orca B-Indicator
Messenger B-System
– O
Text O
and O
Video O
Chat O
for O
Free O
com.skype.rover B-Indicator
Skype B-System
; O
3rd O
party O
stores O
only O
Most O
of O
these O
apps O
are O
well O
established O
and O
available O
on O
Google B-System
Play I-System
, O
however O
, O
com.skype.rover B-Indicator
appears O
to O
be O
available O
only O
on O
third-party O
app O
stores O
. O
The O
same O
is O
likely O
to O
be O
the O
case O
for O
com.pugna.magiccall B-Indicator
but O
this O
is O
unknown O
currently O
. O
It O
’ O
s O
clear O
to O
see O
that O
the O
capabilities O
of O
HenBox B-Malware
are O
very O
comprehensive O
, O
both O
in O
terms O
of O
an O
Android B-System
app O
with O
its O
native O
libraries O
and O
given O
the O
amount O
of O
data O
it O
can O
glean O
from O
a O
victim O
. O
Such O
data O
includes O
contact O
and O
location O
information O
, O
phone O
and O
message O
activity O
, O
the O
ability O
to O
record O
from O
the O
microphone O
, O
camera O
, O
and O
other O
sensors O
as O
well O
as O
the O
capability O
to O
access O
data O
from O
many O
popular O
messaging O
and O
social O
media O
apps O
. O
Infrastructure O
While O
investigating O
HenBox B-Malware
we O
discovered O
infrastructure O
ties O
to O
other O
malware O
families O
associated O
with O
targeted O
attacks O
against O
Windows B-System
users O
– O
notable O
overlaps O
included O
PlugX B-Malware
, O
Zupdax B-Malware
, O
9002 B-Malware
, O
and O
Poison B-Malware
Ivy I-Malware
. O
The O
overall O
image O
of O
these O
ties O
is O
below O
in O
Figure O
5 O
and O
paints O
a O
picture O
of O
an O
adversary O
with O
at O
least O
5 O
malware O
families O
in O
their O
toolbox O
dating O
back O
to O
at O
least O
2015 O
. O
The O
overlap O
between O
the O
HenBox B-Malware
and O
9002 B-Malware
malware O
families O
Unit O
42 O
has O
seen O
involves O
three O
shared O
C2s O
between O
several O
samples O
; O
the O
first O
IP O
below O
is O
used O
for O
more O
than O
half O
of O
the O
HenBox B-Malware
samples O
we O
have O
seen O
to O
date O
: O
47.90.81 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
23 I-Indicator
222.139.212 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
16 I-Indicator
lala513.gicp B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
The O
overlaps O
between O
the O
Henbox B-Malware
, O
PlugX B-Malware
, O
Zupdax B-Malware
, O
and O
Poison B-Malware
Ivy I-Malware
malware O
families O
involves O
a O
web O
of O
shared O
C2s O
and O
IP O
resolutions O
centered O
around O
the O
below O
: O
59.188.196 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
172 I-Indicator
cdncool B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
( O
and O
third-levels O
of O
this O
domain O
) O
www3.mefound B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
www5.zyns B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
w3.changeip B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
org I-Indicator
Ties O
to O
previous O
activity O
The O
registrant O
of O
cdncool B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
also O
registered O
six O
other O
domains O
. O
To O
date O
, O
Unit O
42 O
has O
seen O
four O
of O
the O
seven O
( O
the O
first O
three O
in O
the O
list O
below O
, O
along O
with O
cdncool B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
) O
used O
in O
malicious O
activity O
and O
it O
is O
reasonable O
to O
assume O
the O
remaining O
three O
are O
or O
were O
intended O
to O
serve O
the O
same O
purpose B-Indicator
. I-Indicator
tcpdo I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
adminsysteminfo B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
md5c B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
linkdatax B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
csip6 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
biz I-Indicator
adminloader B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
Unit O
42 O
published O
a O
blog O
in O
July O
2016 O
about O
9002 B-Malware
malware O
being O
delivered O
using O
a O
combination O
of O
shortened O
links O
and O
a O
file O
hosted O
on O
Google O
Drive O
. O
The O
spear O
phishing O
emails O
had O
Myanmar O
political-themed O
lures O
and O
, O
if O
the O
9002 B-Malware
C2 O
server O
responded O
, O
the O
Trojan O
sent O
system O
specific O
information O
along O
with O
the O
string O
“ O
jackhex O
” O
. O
“ O
jackhex O
” O
has O
also O
been O
part O
of O
a O
C2 O
for O
what O
is O
likely O
related O
Poison B-Malware
Ivy I-Malware
activity O
detailed O
below O
, O
along O
with O
additional O
infrastructure O
ties O
. O
The O
C2 O
for O
the O
aforementioned O
9002 B-Malware
sample O
was O
logitechwkgame B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
, O
which O
resolved O
to O
the O
IP O
address O
222.239.91 B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
30 I-Indicator
. O
At O
the O
same O
time O
, O
the O
domain B-Indicator
admin.nslookupdns I-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
also O
resolved O
to O
the O
same O
IP O
address O
, O
suggesting O
that O
these O
two O
domains O
are O
associated O
with O
the O
same O
threat O
actors O
. O
In O
addition O
, O
admin.nslookupdns B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
was O
a O
C2 O
for O
Poison B-Malware
Ivy I-Malware
samples O
associated O
with O
attacks O
on O
Myanmar O
and O
other O
Asian O
countries O
discussed O
in O
a O
blog O
published O
by O
Arbor B-Organization
Networks I-Organization
in O
April O
2016 O
. O
Another O
tie O
between O
the O
activity O
is O
the O
C2 O
jackhex.md5c B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
net I-Indicator
, O
which O
was O
also O
used O
as O
a O
Poison B-Malware
Ivy I-Malware
C2 O
in O
the O
Arbor B-Organization
Networks I-Organization
blog O
. O
“ O
jackhex O
” O
is O
not O
a O
common O
word O
or O
phrase O
and O
, O
as O
noted O
above O
, O
was O
also O
seen O
in O
the O
beacon O
activity O
with O
the O
previously O
discussed O
9002 B-Malware
sample O
. O
Finally O
, O
since O
publishing O
the O
9002 B-Malware
blog O
, O
Unit O
42 O
has O
also O
seen O
the O
aforementioned O
9002 B-Malware
C2 O
used O
as O
a O
Poison B-Malware
Ivy I-Malware
C2 O
with O
a O
Myanmar O
political-themed O
lure O
. O
In O
our O
9002 B-Malware
blog O
we O
noted O
some O
additional O
infrastructure O
used O
either O
as O
C2s O
for O
related O
Poison B-Malware
Ivy I-Malware
samples O
, O
or O
domain O
registrant O
overlap O
with O
those O
C2 O
domains O
. O
When O
we O
published O
that O
blog O
Unit O
42 O
hadn O
’ O
t O
seen O
any O
of O
the O
three O
registrants O
overlap O
domains O
used O
in O
malicious O
activity O
. O
Since O
then O
, O
we O
have O
seen O
Poison B-Malware
Ivy I-Malware
samples O
using O
third-levels O
of O
querlyurl B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
, O
lending O
further O
credence O
the O
remaining O
two O
domains O
, O
gooledriveservice B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
and O
appupdatemoremagic B-Indicator
[ I-Indicator
. I-Indicator
] I-Indicator
com I-Indicator
are O
or O
were O
intended O
for O
malicious O
use O
. O
While O
we O
do O
not O
have O
complete O
targeting O
, O
information O
associated O
with O
these O
Poison B-Malware
Ivy I-Malware
samples O
, O
several O
of O
the O
decoy O
files O
were O
in O
Chinese O
and O
appear O
to O
be O
part O
of O
a O
2016 O
campaign O
targeting O
organizations O
in O
Taiwan O
with O
political-themed O
lures O
. O
Conclusion O
Typically O
masquerading O
as O
legitimate O
Android B-Malware
system O
apps O
, O
and O
sometimes O
embedding O
legitimate O
apps O
within O
them O
, O
the O
primary O
goal O
of O
the O
malicious O
HenBox B-Malware
appears O
to O
be O
to O
spy O
on O
those O
who O
install O
them O
. O
Using O
similar O
traits O
, O
such O
as O
copycat O
iconography O
and O
app O
or O
package O
names O
, O
victims O
are O
likely O
socially O
engineered O
into O
installing O
the O
malicious O
apps O
, O
especially O
when O
available O
on O
so-called O
third-party O
( O
i.e O
. O
non-Google O
Play B-System
) O
app O
stores O
which O
often O
have O
fewer O
security O
and O
vetting O
procedures O
for O
the O
apps O
they O
host O
. O
It O
’ O
s O
possible O
, O
as O
with O
other O
Android B-System
malware O
, O
that O
some O
apps O
may O
also O
be O
available O
on O
forums O
, O
file-sharing O
sites O
or O
even O
sent O
to O
victims O
as O
email O
attachments O
, O
and O
we O
were O
only O
able O
to O
determine O
the O
delivery O
mechanism O
for O
a O
handful O
of O
the O
apps O
we O
have O
been O
able O
to O
find O
. O
The O
hosting O
locations O
seen O
for O
some O
HenBox B-Malware
samples O
, O
together O
with O
the O
nature O
of O
some O
embedded O
apps O
including O
: O
those O
targeted O
at O
extremist O
groups O
, O
those O
who O
use O
VPN O
or O
other O
privacy-enabling O
apps O
, O
and O
those O
who O
speak O
the O
Uyghur O
language O
, O
highlights O
the O
victim O
profile O
the O
threat O
actors O
were O
seeking O
to O
attack O
. O
The O
targets O
and O
capabilities O
of O
HenBox B-Malware
, O
in O
addition O
to O
the O
ties O
to O
previous O
activity O
using O
four O
different O
Windows O
malware O
families O
with O
political-themed O
lures O
against O
several O
different O
South O
East O
Asian O
countries O
, O
indicates O
this O
activity O
likely O
represents O
an O
at O
least O
three-year-old O
espionage O
campaign O
. O
THURSDAY O
, O
OCTOBER O
11 O
, O
2018 O
GPlayed B-Malware
Trojan O
- O
.Net O
playing O
with O
Google B-Organization
Market O
Introduction O
In O
a O
world O
where O
everything O
is O
always O
connected O
, O
and O
mobile O
devices O
are O
involved O
in O
individuals O
' O
day-to-day O
lives O
more O
and O
more O
often O
, O
malicious O
actors O
are O
seeing O
increased O
opportunities O
to O
attack O
these O
devices O
. O
Cisco B-Organization
Talos I-Organization
has O
identified O
the O
latest O
attempt O
to O
penetrate O
mobile O
devices O
— O
a O
new O
Android B-System
trojan O
that O
we O
have O
dubbed O
" O
GPlayed B-Malware
. O
'' O
This O
is O
a O
trojan O
with O
many O
built-in O
capabilities O
. O
At O
the O
same O
time O
, O
it O
's O
extremely O
flexible O
, O
making O
it O
a O
very O
effective O
tool O
for O
malicious O
actors O
. O
The O
sample O
we O
analyzed O
uses O
an O
icon O
very O
similar O
to O
Google B-System
Apps I-System
, O
with O
the O
label O
" O
Google B-System
Play I-System
Marketplace I-System
'' O
to O
disguise O
itself O
. O
The O
malicious O
application O
is O
on O
the O
left-hand O
side O
. O
What O
makes O
this O
malware O
extremely O
powerful O
is O
the O
capability O
to O
adapt O
after O
it O
's O
deployed O
. O
In O
order O
to O
achieve O
this O
adaptability O
, O
the O
operator O
has O
the O
capability O
to O
remotely O
load O
plugins O
, O
inject O
scripts O
and O
even O
compile O
new O
.NET B-System
code O
that O
can O
be O
executed O
. O
Our O
analysis O
indicates O
that O
this O
trojan O
is O
in O
its O
testing O
stage O
but O
given O
its O
potential O
, O
every O
mobile O
user O
should O
be O
aware O
of O
GPlayed B-Malware
. O
Mobile O
developers O
have O
recently O
begun O
eschewing O
traditional O
app O
stores O
and O
instead O
want O
to O
deliver O
their O
software O
directly O
through O
their O
own O
means O
. O
But O
GPlayed B-Malware
is O
an O
example O
of O
where O
this O
can O
go O
wrong O
, O
especially O
if O
a O
mobile O
user O
is O
not O
aware O
of O
how O
to O
distinguish O
a O
fake O
app O
versus O
a O
real O
one O
. O
Trojan O
architecture O
and O
capabilities O
This O
malware O
is O
written O
in O
.NET B-System
using O
the O
Xamarin B-System
environment O
for O
mobile O
applications O
. O
The O
main O
DLL O
is O
called O
" O
Reznov.DLL B-Indicator
. O
'' O
This O
DLL O
contains O
one O
root O
class O
called O
" O
eClient O
, O
'' O
which O
is O
the O
core O
of O
the O
trojan O
. O
The O
imports O
reveal O
the O
use O
of O
a O
second O
DLL O
called O
" O
eCommon.dll B-Indicator
. O
'' O
We O
determined O
that O
the O
" O
eCommon O
'' O
file O
contains O
support O
code O
and O
structures O
that O
are O
platform O
independent O
. O
The O
main O
DLL O
also O
contains O
eClient O
subclasses O
that O
implement O
some O
of O
the O
native O
capabilities O
. O
The O
package O
certificate O
is O
issued O
under O
the O
package O
name O
, O
which O
also O
resembles O
the O
name O
of O
the O
main O
DLL O
name O
. O
Certificate O
information O
The O
Android B-System
package O
is O
named O
" O
verReznov.Coampany B-Indicator
. O
'' O
The O
application O
uses O
the O
label O
" O
Installer B-Indicator
'' O
and O
its O
name O
is O
" O
android.app.Application B-Indicator
. O
'' O
Package O
permissions O
The O
trojan O
declares O
numerous O
permissions O
in O
the O
manifest O
, O
from O
which O
we O
should O
highlight O
the O
BIND_DEVICE_ADMIN O
, O
which O
provides O
nearly O
full O
control O
of O
the O
device O
to O
the O
trojan O
. O
This O
trojan O
is O
highly O
evolved O
in O
its O
design O
. O
It O
has O
modular O
architecture O
implemented O
in O
the O
form O
of O
plugins O
, O
or O
it O
can O
receive O
new O
.NET B-System
source O
code O
, O
which O
will O
be O
compiled O
on O
the O
device O
in O
runtime O
. O
Initialization O
of O
the O
compiler O
object O
The O
plugins O
can O
be O
added O
in O
runtime O
, O
or O
they O
can O
be O
added O
as O
a O
package O
resource O
at O
packaging O
time O
. O
This O
means O
that O
the O
authors O
or O
the O
operators O
can O
add O
capabilities O
without O
the O
need O
to O
recompile O
and O
upgrade O
the O
trojan O
package O
on O
the O
device O
. O
Trojan O
native O
capabilities O
This O
is O
a O
full-fledged O
trojan O
with O
capabilities O
ranging O
from O
those O
of O
a O
banking O
trojan O
to O
a O
full O
spying O
trojan O
. O
This O
means O
that O
the O
malware O
can O
do O
anything O
from O
harvest O
the O
user O
's O
banking O
credentials O
, O
to O
monitoring O
the O
device O
's O
location O
. O
There O
are O
several O
indicators O
( O
see O
section O
" O
trojan O
activity O
'' O
below O
) O
that O
it O
is O
in O
its O
last O
stages O
of O
development O
, O
but O
it O
has O
the O
potential O
to O
be O
a O
serious O
threat O
. O
Trojan O
details O
Upon O
boot O
, O
the O
trojan O
will O
start O
by O
populating O
a O
shared O
preferences O
file O
with O
the O
configuration O
it O
has O
on O
its O
internal O
structures O
. O
Afterward O
, O
it O
will O
start O
several O
timers O
to O
execute O
different O
tasks O
. O
The O
first O
timer O
will O
be O
fired O
on O
the O
configured O
interval O
( O
20 O
seconds O
in O
this O
case O
) O
, O
pinging O
the O
command O
and O
control O
( O
C2 O
) O
server O
. O
The O
response O
can O
either O
be O
a O
simple O
" O
OK O
, O
'' O
or O
can O
be O
a O
request O
to O
perform O
some O
action O
on O
the O
device O
. O
The O
second O
timer O
will O
run O
every O
five O
seconds O
and O
it O
will O
try O
to O
enable O
the O
WiFi O
if O
it O
's O
disabled O
. O
The O
third O
timer O
will O
fire O
every O
10 O
seconds O
and O
will O
attempt O
to O
register O
the O
device O
into O
the O
C2 O
and O
register O
wake-up O
locks O
on O
the O
system O
to O
control O
the O
device O
's O
status O
. O
During O
the O
trojan O
registration O
stage O
, O
the O
trojan O
exfiltrates O
private O
information O
such O
as O
the O
phone O
's O
model O
, O
IMEI O
, O
phone O
number O
and O
country O
. O
It O
will O
also O
report O
the O
version O
of O
Android B-System
that O
the O
phone O
is O
running O
and O
any O
additional O
capabilities O
. O
Device O
registration O
This O
is O
the O
last O
of O
the O
three O
main O
timers O
that O
are O
created O
. O
The O
trojan O
will O
register O
the O
SMS O
handler O
, O
which O
will O
forward O
the O
contents O
and O
the O
sender O
of O
all O
of O
the O
SMS O
messages O
on O
the O
phone O
to O
the O
C2 O
. O
The O
final O
step O
in O
the O
trojan O
's O
initialization O
is O
the O
escalation O
and O
maintenance O
of O
privileges O
in O
the O
device O
. O
This O
is O
done O
both O
by O
requesting O
admin O
privileges O
on O
the O
device O
and O
asking O
the O
user O
to O
allow O
the O
application O
to O
access O
the O
device O
's O
settings O
. O
Privilege O
escalation O
requests O
The O
screens O
asking O
for O
the O
user O
's O
approval O
wo O
n't O
close O
unless O
the O
user O
approves O
the O
privilege O
escalation O
. O
If O
the O
user O
closes O
the O
windows O
, O
they O
will O
appear O
again O
due O
to O
the O
timer O
configuration O
. O
After O
the O
installation O
of O
the O
trojan O
, O
it O
will O
wait O
randomly O
between O
three O
and O
five O
minutes O
to O
activate O
one O
of O
the O
native O
capabilities O
— O
these O
are O
implemented O
on O
the O
eClient O
subclass O
called O
" O
GoogleCC O
. O
'' O
This O
class O
will O
open O
a O
WebView O
with O
a O
Google-themed B-Organization
page O
asking O
for O
payment O
in O
order O
to O
use O
the O
Google B-Organization
services O
. O
This O
will O
take O
the O
user O
through O
several O
steps O
until O
it O
collects O
all O
the O
necessary O
credit O
card O
information O
, O
which O
will O
be O
checked O
online O
and O
exfiltrated O
to O
the O
C2 O
. O
During O
this O
process O
, O
an O
amount O
of O
money O
, O
configured O
by O
the O
malicious O
operator O
, O
is O
requested O
to O
the O
user O
. O
Steps O
to O
request O
the O
user O
's O
credit O
card O
information O
In O
our O
sample O
configuration O
, O
the O
request O
for O
the O
views O
above O
can O
not O
be O
canceled O
or O
removed O
from O
the O
screen O
— O
behaving O
just O
like O
a O
screen O
lock O
that O
wo O
n't O
be O
disabled O
without O
providing O
credit O
card O
information O
. O
All O
communication O
with O
the O
C2 O
is O
done O
over O
HTTP O
. O
It O
will O
use O
either O
a O
standard O
web O
request O
or O
it O
will O
write O
data O
into O
a O
web O
socket O
if O
the O
first O
method O
fails O
. O
The O
C2 O
can O
also O
use O
WebSocket O
as O
a O
backup O
communication O
channel O
. O
Before O
sending O
any O
data O
to O
the O
C2 O
using O
the O
trojan O
attempts O
to O
disguise O
its O
data O
, O
the O
data O
is O
serialized O
using O
JSON O
, O
which O
is O
then O
encoded O
in O
Base64 O
. O
However O
, O
the O
trojan O
replaces O
the O
'= O
' O
by O
'AAAZZZXXX O
' O
, O
the O
'+ O
' O
by O
'| O
' O
and O
the O
'/ O
' O
by O
' O
. O
' O
to O
disguise O
the O
Base64 O
. O
Request O
encoding O
process O
The O
HTTP O
requests O
follow O
the O
format O
below O
, O
while O
on O
the O
WebSocket O
only O
the O
query O
data O
is O
written O
. O
? O
q= O
- O
: O
As O
is O
common O
with O
trojans O
, O
the O
communication O
is O
always O
initiated O
by O
the O
trojan O
on O
the O
device O
to O
the O
C2 O
. O
The O
request O
codes O
are O
actually O
replies O
to O
the O
C2 O
action O
requests O
, O
which O
are O
actually O
called O
" O
responses O
. O
'' O
There O
are O
27 O
response O
codes O
that O
the O
C2 O
can O
use O
to O
make O
requests O
to O
the O
trojan O
, O
which O
pretty O
much O
match O
what O
's O
listed O
in O
the O
capabilities O
section O
. O
Error O
Registration O
Ok O
Empty O
SendSMS O
RequestGoogleCC O
Wipe O
OpenBrowser O
SendUSSD O
RequestSMSList O
RequestAppList O
RequestLocation O
ShowNotification O
SetLockPassword O
LockNow O
MuteSound O
LoadScript O
LoadPlugin O
ServerChange O
StartApp O
CallPhone O
SetPingTimer O
SMSBroadcast O
RequestContacts O
AddInject O
RemoveInject O
Evaluate O
Another O
feature O
of O
this O
trojan O
is O
the O
ability O
to O
register O
injects O
, O
which O
are O
JavaScript O
snippets O
of O
code O
. O
These O
will O
be O
executed O
in O
a O
WebView O
object O
created O
by O
the O
trojan O
. O
This O
gives O
the O
operators O
the O
capability O
to O
trick O
the O
user O
into O
accessing O
any O
site O
while O
stealing O
the O
user O
's O
cookies O
or O
forging O
form O
fields O
, O
like O
account O
numbers O
or O
phone O
numbers O
. O
Trojan O
activity O
At O
the O
time O
of O
the O
writing O
of O
this O
post O
, O
all O
URLs O
( O
see O
IOC O
section O
) O
found O
on O
the O
sample O
were O
inactive O
, O
and O
it O
does O
not O
seem O
to O
be O
widespread O
. O
There O
are O
some O
indicators O
that O
this O
sample O
is O
just O
a O
test O
sample O
on O
its O
final O
stages O
of O
development O
. O
There O
are O
several O
strings O
and O
labels O
still O
mentioning O
'test O
' O
or O
'testcc O
' O
— O
even O
the O
URL O
used O
for O
the O
credit O
card O
data O
exfiltration O
is O
named O
" O
testcc.php B-Indicator
. O
'' O
Debug O
information O
on O
logcat O
Another O
indicator O
is O
the O
amount O
of O
debugging O
information O
the O
trojan O
is O
still O
generating O
— O
a O
production-level O
trojan O
would O
keep O
its O
logging O
to O
a O
minimum O
. O
The O
only O
sample O
was O
found O
on O
public O
repositories O
and O
almost O
seemed O
to O
indicate O
a O
test O
run O
to O
determine O
the O
detection O
ratio O
of O
the O
sample O
. O
We O
have O
observed O
this O
trojan O
being O
submitted O
to O
public O
antivirus O
testing O
platforms O
, O
once O
as O
a O
package O
and O
once O
for O
each O
DLL O
to O
determine O
the O
detection O
ratio O
. O
The O
sample O
analyzed O
was O
targeted O
at O
Russian-speaking O
users O
, O
as O
most O
of O
the O
user O
interaction O
pages O
are O
written O
in O
Russian O
. O
However O
, O
given O
the O
way O
the O
trojan O
is O
built O
, O
it O
is O
highly O
customizable O
, O
meaning O
that O
adapting O
it O
to O
a O
different O
language O
would O
be O
extremely O
easy O
. O
The O
wide O
range O
of O
capabilities O
does O
n't O
limit O
this O
trojan O
to O
a O
specific O
malicious O
activity O
like O
a O
banking O
trojan O
or O
a O
ransomware O
. O
This O
makes O
it O
impossible O
to O
create O
a O
target O
profile O
. O
Conclusion O
This O
trojan O
shows O
a O
new O
path O
for O
threats O
to O
evolve O
. O
Having O
the O
ability O
to O
move O
code O
from O
desktops O
to O
mobile O
platforms O
with O
no O
effort O
, O
like O
the O
eCommon.DLL B-Indicator
demonstrates O
that O
malicious O
actors O
can O
create O
hybrid O
threats O
faster O
and O
with O
fewer O
resources O
involved O
than O
ever O
before O
. O
This O
trojan O
's O
design O
and O
implementation O
is O
of O
an O
uncommonly O
high O
level O
, O
making O
it O
a O
dangerous O
threat O
. O
These O
kinds O
of O
threats O
will O
become O
more O
common O
, O
as O
more O
and O
more O
companies O
decide O
to O
publish O
their O
software O
directly O
to O
consumers O
. O
There O
have O
been O
several O
recent O
examples O
of O
companies O
choosing O
to O
release O
their O
software O
directly O
to O
consumers O
, O
bypassing O
traditional O
storefronts O
. O
The O
average O
user O
might O
not O
have O
the O
necessary O
skills O
to O
distinguish O
legitimate O
sites O
from O
malicious O
ones O
. O
We O
've O
seen O
that O
this O
has O
been O
the O
case O
for O
many O
years O
with O
spear-phishing O
campaigns O
on O
desktop O
and O
mobile O
platforms O
, O
so O
, O
unfortunately O
, O
it O
does O
n't O
seem O
that O
this O
will O
change O
any O
time O
soon O
. O
And O
this O
just O
means O
attackers O
will O
continue O
to O
be O
successful O
. O
Coverage O
Additional O
ways O
our O
customers O
can O
detect O
and O
block O
this O
threat O
are O
listed O
below O
. O
Advanced B-System
Malware I-System
Protection I-System
( I-System
AMP I-System
) I-System
is O
ideally O
suited O
to O
prevent O
the O
execution O
of O
the O
malware O
used O
by O
these O
threat O
actors O
. O
Cisco B-System
Cloud I-System
Web I-System
Security I-System
( I-System
CWS I-System
) I-System
or O
Web B-System
Security I-System
Appliance I-System
( I-System
WSA I-System
) I-System
web O
scanning O
prevents O
access O
to O
malicious O
websites O
and O
detects O
malware O
used O
in O
these O
attacks O
. O
Email O
Security O
can O
block O
malicious O
emails O
sent O
by O
threat O
actors O
as O
part O
of O
their O
campaign O
. O
Network O
Security O
appliances O
such O
as O
Next-Generation B-System
Firewall I-System
( I-System
NGFW I-System
) I-System
, O
Next-Generation B-System
Intrusion I-System
Prevention I-System
System I-System
( I-System
NGIPS I-System
) I-System
, O
and O
Meraki B-System
MX I-System
can O
detect O
malicious O
activity O
associated O
with O
this O
threat O
. O
AMP O
Threat O
Grid O
helps O
identify O
malicious O
binaries O
and O
build O
protection O
into O
all O
Cisco B-Organization
Security O
products O
. O
Umbrella B-System
, O
our O
secure O
internet O
gateway O
( O
SIG O
) O
, O
blocks O
users O
from O
connecting O
to O
malicious O
domains O
, O
IPs O
, O
and O
URLs O
, O
whether O
users O
are O
on O
or O
off O
the O
corporate O
network O
. O
Open O
Source O
Snort O
Subscriber O
Rule O
Set O
customers O
can O
stay O
up O
to O
date O
by O
downloading O
the O
latest O
rule O
pack O
available O
for O
purchase O
on O
Snort.org O
. O
Indicators O
of O
compromise O
( O
IOC O
) O
URLs O
hxxp B-Indicator
: I-Indicator
//5.9.33.226:5416 I-Indicator
hxxp B-Indicator
: I-Indicator
//172.110.10.171:85/testcc.php I-Indicator
hxxp B-Indicator
: I-Indicator
//sub1.tdsworker.ru:5555/3ds/ I-Indicator
Hash O
values O
Package.apk B-Indicator
- O
A342a16082ea53d101f556b50532651cd3e3fdc7d9e0be3aa136680ad9c6a69f B-Indicator
eCommon.dl B-Indicator
- O
604deb75eedf439766896f05799752de268baf437bf89a7185540627ab4a4bd1 B-Indicator
Reznov.dll B-Indicator
- O
17b8665cdbbb94482ca970a754d11d6e29c46af6390a2d8e8193d8d6a527dec3 B-Indicator
Custom O
activity O
prefix O
com.cact.CAct B-Indicator
Cerberus B-Malware
- O
A O
new O
banking O
Trojan O
from O
the O
underworld O
August O
2019 O
In O
June O
2019 O
, O
ThreatFabric B-Organization
analysts O
found O
a O
new O
Android B-System
malware O
, O
dubbed O
“ O
Cerberus B-Malware
” O
, O
being O
rented O
out O
on O
underground O
forums O
. O
Its O
authors O
claim O
that O
it O
was O
used O
for O
private O
operations O
for O
two O
years O
preceding O
the O
start O
of O
the O
rental O
. O
They O
also O
state O
that O
the O
code O
is O
written O
from O
scratch O
and O
is O
not O
using O
parts O
of O
other O
existing O
banking O
Trojans O
unlike O
many O
other O
Trojans O
that O
are O
either O
based O
completely O
on O
the O
source O
of O
another O
Trojan O
( O
such O
as O
the O
leaked O
Anubis B-Malware
source O
code O
that O
is O
now O
being O
resold O
) O
or O
at O
least O
borrow O
parts O
of O
other O
Trojans O
. O
After O
thorough O
analysis O
we O
can O
confirm O
that O
Cerberus B-Malware
was O
indeed O
not O
based O
on O
the O
Anubis B-Malware
source O
code O
. O
One O
peculiar O
thing O
about O
the O
actor O
group O
behind O
this O
banking O
malware O
is O
that O
they O
have O
an O
“ O
official O
” O
twitter B-Organization
account O
that O
they O
use O
to O
post O
promotional O
content O
( O
even O
videos O
) O
about O
the O
malware O
. O
Oddly O
enough O
they O
also O
use O
it O
to O
make O
fun O
of O
the O
AV O
community O
, O
sharing O
detection O
screenshots O
from O
VirusTotal B-Organization
( O
thus O
leaking O
IoC O
) O
and O
even O
engaging O
in O
discussions O
with O
malware O
researchers O
directly O
The O
following O
screenshot O
shows O
tweets O
from O
their O
advertisement O
campaign O
: O
That O
unusual O
behavior O
could O
be O
explained O
by O
the O
combination O
of O
the O
need O
for O
attention O
and O
a O
probable O
lack O
of O
experience O
. O
What O
is O
sure O
is O
that O
the O
gap O
in O
the O
Android B-System
banking O
malware O
rental O
business O
left O
open O
after O
the O
rental O
of O
the O
Anubis B-Malware
2 I-Malware
and O
RedAlert B-Malware
2 I-Malware
Trojans O
ended O
provides O
a O
good O
opportunity O
for O
the O
actors O
behind O
Cerberus B-Malware
to O
grow O
their O
business O
quickly O
. O
The O
Android B-System
banking O
Trojan O
rental O
business O
Rental O
of O
banking O
Trojans O
is O
not O
new O
. O
It O
was O
an O
existing O
business O
model O
when O
computer-based O
banking O
malware O
was O
the O
only O
form O
of O
banking O
malware O
and O
has O
shifted O
to O
the O
Android B-System
equivalent O
a O
few O
years O
later O
. O
The O
life O
span O
of O
Android B-System
banking O
malware O
is O
limited O
to O
either O
the O
will O
of O
its O
author O
( O
s O
) O
to O
support O
it O
or O
the O
arrest O
of O
those O
actors O
. O
This O
malware-life-cycle O
has O
been O
observed O
to O
reoccur O
every O
few O
years O
, O
bringing O
new O
malware O
families O
into O
light O
. O
Each O
time O
a O
rented O
malware O
reaches O
the O
end O
of O
its O
life O
it O
provides O
the O
opportunity O
for O
other O
actors O
a O
to O
take O
over O
the O
malware O
rental O
market-share O
. O
As O
visible O
on O
following O
chart O
, O
the O
lifespan O
of O
many O
well-known O
rented O
Android B-System
bankers O
is O
usually O
no O
more O
than O
one O
or O
two O
years O
. O
When O
the O
family O
ceases O
to O
exist O
a O
new O
one O
is O
already O
available O
to O
fill O
the O
void O
, O
proving O
that O
the O
demand O
for O
such O
malware O
is O
always O
present O
and O
that O
therefore O
Cerberus B-Malware
has O
a O
good O
chance O
to O
survive O
. O
After O
the O
actor O
behind O
RedAlert B-Malware
2 I-Malware
decided O
to O
quit O
the O
rental O
business O
, O
we O
observed O
a O
surge O
in O
Anubis B-Malware
samples O
in O
the O
wild O
. O
After O
the O
Anubis B-Malware
actor O
was O
allegedly O
arrested O
and O
the O
source O
code O
was O
leaked O
there O
was O
also O
huge O
increase O
in O
the O
number O
of O
Anubis B-Malware
samples O
found O
in O
the O
wild O
, O
but O
the O
new O
actors O
using O
Anubis B-Malware
have O
no O
support O
or O
updates O
. O
Due O
to O
this O
Cerberus B-Malware
will O
come O
in O
handy O
for O
actors O
that O
want O
to O
focus O
on O
performing O
fraud O
without O
having O
to O
develop O
and O
maintain O
a O
botnet O
and O
C2 O
infrastructure O
. O
Analysis O
of O
evasion O
techniques O
Along O
with O
the O
standard O
payload O
and O
string O
obfuscation O
, O
Cerberus B-Malware
uses O
a O
rather O
interesting O
technique O
to O
prevent O
analysis O
of O
the O
Trojan O
. O
Using O
the O
device O
accelerometer O
sensor O
it O
implements O
a O
simple O
pedometer O
that O
is O
used O
to O
measure O
movements O
of O
the O
victim O
. O
The O
idea O
is O
simple O
- O
if O
the O
infected O
device O
belongs O
to O
a O
real O
person O
, O
sooner O
or O
later O
this O
person O
will O
move O
around O
, O
increasing O
the O
step O
counter O
. O
The O
Trojan O
uses O
this O
counter O
to O
activate O
the O
bot O
- O
if O
aforementioned O
step O
counter O
hits O
the O
pre-configured O
threshold O
it O
considers O
running O
on O
the O
device O
to O
be O
safe O
. O
This O
simple O
measure O
prevents O
the O
Trojan O
from O
running O
and O
being O
analyzed O
in O
dynamic O
analysis O
environments O
( O
sandboxes O
) O
and O
on O
the O
test O
devices O
of O
malware O
analysts O
. O
The O
code O
responsible O
for O
this O
verification O
is O
shown O
in O
the O
following O
snippet O
: O
How O
it O
works O
When O
the O
malware O
is O
first O
started O
on O
the O
device O
it O
will O
begin O
by O
hiding O
its O
icon O
from O
the O
application O
drawer O
. O
Then O
it O
will O
ask O
for O
the O
accessibility O
service O
privilege O
as O
visible O
in O
the O
following O
screenshot O
: O
After O
the O
user O
grants O
the O
requested O
privilege O
, O
Cerberus B-Malware
starts O
to O
abuse O
it O
by O
granting O
itself O
additional O
permissions O
, O
such O
as O
permissions O
needed O
to O
send O
messages O
and O
make O
calls O
, O
without O
requiring O
any O
user O
interaction O
. O
It O
also O
disables O
Play B-System
Protect I-System
( O
Google B-Organization
’ O
s O
preinstalled O
antivirus O
solution O
) O
to O
prevent O
its O
discovery O
and O
deletion O
in O
the O
future O
. O
After O
conveniently O
granting O
itself O
additional O
privileges O
and O
securing O
its O
persistence O
on O
the O
device O
, O
Cerberus B-Malware
registers O
the O
infected O
device O
in O
the O
botnet O
and O
waits O
for O
commands O
from O
the O
C2 O
server O
while O
also O
being O
ready O
to O
perform O
overlay O
attacks O
. O
The O
commands O
supported O
by O
the O
analyzed O
version O
of O
the O
Cerberus B-Malware
bot O
are O
listed O
below O
. O
As O
can O
be O
seen O
, O
the O
possibilities O
offered O
by O
the O
bot O
are O
pretty O
common O
. O
Command O
Description O
push O
Shows O
a O
push O
notification O
. O
Clicking O
on O
thenotification O
will O
result O
in O
launching O
a O
specified O
app O
startApp O
Starts O
the O
specified O
application O
getInstallApps O
Gets O
the O
list O
of O
installedapplications O
on O
the O
infected O
device O
getContacts O
Gets O
the O
contact O
names O
and O
phone O
numbers O
from O
the O
addressbook O
on O
the O
infected O
device O
deleteApplication O
Triggers O
the O
deletion O
of O
the O
specified O
application O
forwardCall O
Enables O
call O
forwarding O
to O
the O
specified O
number O
sendSms O
Sends O
a O
text O
message O
with O
specified O
text O
from O
the O
infecteddevice O
to O
the O
specified O
phone O
number O
startInject O
Triggers O
the O
overlay O
attack O
against O
the O
specified O
application O
startUssd O
Calls O
the O
specified O
USSD O
code O
openUrl O
Opens O
the O
specified O
URL O
in O
the O
WebView O
getSMS O
Gets O
all O
text O
messages O
from O
the O
infected O
device O
killMe O
Triggers O
the O
kill O
switch O
for O
the O
bot O
updateModule O
Updates O
the O
payload O
module O
Cerberus B-Malware
features O
Cerberus B-Malware
malware O
has O
the O
same O
capabilities O
as O
most O
other O
Android B-System
banking O
Trojans O
such O
as O
the O
use O
of O
overlay O
attacks O
, O
SMS O
control O
and O
contact O
list O
harvesting O
. O
The O
Trojan O
can O
also O
leverage O
keylogging O
to O
broaden O
the O
attack O
scope O
. O
Overall O
, O
Cerberus B-Malware
has O
a O
pretty O
common O
feature O
list O
and O
although O
the O
malware O
seems O
to O
have O
been O
written O
from O
scratch O
there O
does O
not O
seem O
to O
be O
any O
innovative O
functionality O
at O
this O
time O
. O
For O
example O
, O
some O
of O
the O
more O
advanced O
banking O
Trojans O
now O
offer O
features O
such O
as O
a O
back-connect O
proxy O
, O
screen-streaming O
and O
even O
remote O
control O
. O
Cerberus B-Malware
embeds O
the O
following O
set O
of O
features O
that O
allows O
itself O
to O
remain O
under O
the O
radar O
and O
successfully O
perform O
attacks O
: O
Overlaying O
: O
Dynamic O
( O
Local O
injects O
obtained O
from O
C2 O
) O
Keylogging O
SMS O
harvesting O
: O
SMS O
listing O
SMS O
harvesting O
: O
SMS O
forwarding O
Device O
info O
collection O
Contact O
list O
collection O
Application O
listing O
Location O
collection O
Overlaying O
: O
Targets O
list O
update O
SMS O
: O
Sending O
Calls O
: O
USSD O
request O
making O
Calls O
: O
Call O
forwarding O
Remote O
actions O
: O
App O
installing O
Remote O
actions O
: O
App O
starting O
Remote O
actions O
: O
App O
removal O
Remote O
actions O
: O
Showing O
arbitrary O
web O
pages O
Remote O
actions O
: O
Screen-locking O
Notifications O
: O
Push O
notifications O
C2 O
Resilience O
: O
Auxiliary O
C2 O
list O
Self-protection O
: O
Hiding O
the O
App O
icon O
Self-protection O
: O
Preventing O
removal O
Self-protection O
: O
Emulation-detection O
Architecture O
: O
Modular O
Overlay O
attack O
Most O
Android O
banking O
Trojans O
use O
overlay O
attacks O
to O
trick O
the O
victim O
into O
providing O
their O
personal O
information O
( O
such O
as O
but O
not O
limited O
to O
: O
credit O
card O
information O
, O
banking O
credentials O
, O
mail O
credentials O
) O
and O
Cerberus B-Malware
is O
no O
exception O
. O
In O
this O
particular O
case O
, O
the O
bot O
abuses O
the O
accessibility O
service O
privilege O
to O
obtain O
the O
package O
name O
of O
the O
foreground O
application O
and O
determine O
whether O
or O
not O
to O
show O
a O
phishing O
overlay O
window O
, O
as O
shown O
in O
the O
following O
code O
snippet O
: O
Targets O
Some O
examples O
of O
phishing O
overlays O
are O
shown O
below O
. O
They O
exist O
in O
two O
types O
: O
the O
credentials O
stealers O
( O
first O
2 O
screenshots O
) O
and O
the O
credit O
card O
grabbers O
( O
last O
screenshot O
) O
. O
The O
only O
active O
target O
list O
observed O
in O
the O
wild O
is O
available O
in O
the O
appendix O
and O
contains O
a O
total O
of O
30 O
unique O
targets O
. O
It O
is O
interesting O
to O
observe O
that O
the O
actual O
target O
list O
contains O
: O
7 O
French O
banking O
apps O
7 O
U.S. O
banking O
apps O
1 O
Japanese O
banking O
app O
15 O
non-banking O
apps O
This O
uncommon O
target O
list O
might O
either O
be O
the O
result O
of O
specific O
customer O
demand O
, O
or O
due O
to O
some O
actors O
having O
partially O
reused O
an O
existing O
target O
list O
. O
Conclusion O
Although O
not O
yet O
mature O
enough O
to O
provide O
the O
equivalent O
of O
a O
full-blown O
set O
of O
Android B-System
banking O
malware O
features O
( O
such O
as O
RAT O
, O
RAT O
with O
ATS O
( O
Automated O
Transaction O
Script O
) O
, O
back-connect O
proxy O
, O
media O
streaming O
) O
, O
or O
providing O
an O
exhaustive O
target O
list O
, O
Cerberus B-Malware
should O
not O
be O
taken O
lightly O
. O
Due O
to O
the O
current O
absence O
of O
maintained O
and O
supported O
Android B-Malware
banking O
Malware-as-a-Service O
in O
the O
underground O
community O
, O
there O
is O
a O
certainly O
demand O
for O
a O
new O
service O
. O
Cerberus B-Malware
is O
already O
capable O
to O
fulfill O
this O
demand O
. O
In O
addition O
to O
the O
feature O
base O
it O
already O
possesses O
and O
the O
money O
that O
can O
be O
made O
from O
the O
rental O
, O
it O
could O
evolve O
to O
compete O
with O
the O
mightiest O
Android B-System
banking O
Trojans O
. O
Next O
to O
the O
features O
, O
we O
expect O
the O
target O
list O
to O
be O
expanded O
to O
contain O
additional O
( O
banking O
) O
apps O
in O
the O
near O
future O
. O
Knowledge O
of O
the O
threat O
landscape O
and O
implementation O
of O
the O
right O
detection O
tools O
remains O
crucial O
to O
be O
able O
to O
protect O
yourself O
from O
fraud O
; O
Cerberus B-Malware
is O
yet O
a O
new O
Trojan O
active O
in O
the O
wild O
! O
Appendix O
Samples O
Some O
of O
the O
latest O
Cerberus B-Malware
samples O
found O
in O
the O
wild O
: O
App O
name O
Package O
name O
SHA O
256 O
hash O
Flash B-System
Player I-System
com.uxlgtsvfdc.zipvwntdy B-Indicator
728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f B-Indicator
Flash B-System
Player I-System
com.ognbsfhszj.hqpquokjdp B-Indicator
fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329 B-Indicator
Flash B-System
Player I-System
com.mwmnfwt.arhkrgajn B-Indicator
ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c B-Indicator
Flash B-System
Player I-System
com.wogdjywtwq.oiofvpzpxyo B-Indicator
6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4 B-Indicator
Flash B-System
Player I-System
com.hvdnaiujzwo.fovzeukzywfr B-Indicator
cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b B-Indicator
Flash B-System
Player I-System
com.gzhlubw.pmevdiexmn B-Indicator
3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63 B-Indicator
Target O
list O
The O
actual O
observed O
list O
of O
mobile O
apps O
targeted O
by O
Cerberus B-Malware
contains O
a O
total O
of O
30 O
unique O
applications O
. O
This O
list O
is O
expected O
to O
expand O
: O
Package O
name O
Application O
name O
com.android.vending B-Indicator
Play B-System
Market I-System
com.boursorama.android.clients B-Indicator
Boursorama I-Indicator
Banque B-System
com.caisseepargne.android.mobilebanking B-Indicator
Banque B-System
com.chase.sig.android B-Indicator
Chase B-System
Mobile I-System
com.clairmail.fth B-Indicator
Fifth B-System
Third I-System
Mobile I-System
Banking I-System
com.connectivityapps.hotmail B-Indicator
Connect B-System
for I-System
Hotmail I-System
com.google.android.gm B-Indicator
Gmail B-System
com.imo.android.imoim B-Indicator
imo B-System
free O
video O
calls O
and O
chat O
com.infonow.bofa B-Indicator
Bank B-System
of I-System
America I-System
Mobile I-System
Banking I-System
com.IngDirectAndroid B-Indicator
ING O
com.instagram.android B-Indicator
Instagram I-Indicator
com.konylabs.capitalone B-Indicator
Capital B-System
One® I-System
Mobile I-System
com.mail.mobile.android.mail B-Indicator
mail.com I-Indicator
mail B-System
com.microsoft.office.outlook B-Indicator
Microsoft B-System
Outlook I-System
com.snapchat.android B-Indicator
Snapchat B-System
com.tencent.mm B-Indicator
WeChat B-System
com.twitter.android B-Indicator
Twitter B-System
com.ubercab B-Indicator
Uber B-Organization
com.usaa.mobile.android.usaa B-Indicator
USAA B-System
Mobile I-System
com.usbank.mobilebanking B-Indicator
U.S. I-Indicator
Bank O
- O
Inspired O
by O
customers O
com.viber.voip B-Indicator
Viber B-System
com.wf.wellsfargomobile B-Indicator
Wells B-System
Fargo I-System
Mobile I-System
com.whatsapp B-Indicator
WhatsApp B-System
com.yahoo.mobile.client.android.mail B-Indicator
Yahoo B-System
Mail I-System
– O
Organized O
Email O
fr.banquepopulaire.cyberplus B-Indicator
Banque B-System
Populaire O
fr.creditagricole.androidapp B-Indicator
Ma B-System
Banque I-System
jp.co.rakuten_bank.rakutenbank B-Indicator
楽天銀行 O
-個人のお客様向けアプリ O
mobi.societegenerale.mobile.lappli B-Indicator
L O
’ O
Appli O
Société O
Générale O
net.bnpparibas.mescomptes B-Indicator
Mes O
Comptes O
BNP O
Paribas O
org.telegram.messenger B-Indicator
Telegram I-Indicator
Triout B-Malware
- O
Spyware O
Framework O
for O
Android B-System
with O
Extensive O
Surveillance O
Capabilities O
August O
20 O
, O
2018 O
No O
operating O
system O
is O
safe O
from O
malware O
, O
as O
cyber O
criminals O
will O
always O
want O
to O
steal O
, O
spy O
or O
tamper O
with O
your O
data O
. O
The O
proliferation O
of O
Android B-Malware
devices O
– O
from O
smartphones O
to O
tablets O
and O
smart O
TVs O
– O
has O
opened O
up O
new O
possibilities O
for O
malware O
developers O
, O
as O
all O
these O
devices O
pack O
microphones O
, O
cameras O
and O
location-tracking O
hardware O
they O
can O
turn O
into O
the O
perfect O
spy O
tools O
. O
Bitdefender B-Organization
researchers O
have O
identified O
a O
new O
Android B-System
spyware O
, O
dubbed O
Triout B-Malware
, O
which O
appears O
to O
act O
as O
a O
framework O
for O
building O
extensive O
surveillance O
capabilities O
into O
seemingly O
benign O
applications O
. O
Found O
bundled O
with O
a O
repackaged O
app O
, O
the O
spyware O
’ O
s O
surveillance O
capabilities O
involve O
hiding O
its O
presence O
on O
the O
device O
, O
recording O
phone O
calls O
, O
logging O
incoming O
text O
messages O
, O
recoding O
videos O
, O
taking O
pictures O
and O
collecting O
GPS B-System
coordinates O
, O
then O
broadcasting O
all O
of O
that O
to O
an O
attacker-controlled O
C O
& O
C O
( O
command O
and O
control O
) O
server O
. O
It O
’ O
s O
interesting O
that O
Triout B-Malware
, O
which O
is O
detected O
by O
Bitdefender B-Organization
’ O
s O
machine O
learning O
algorithms O
, O
was O
first O
submitted O
from O
Russia O
, O
and O
most O
scans/reports O
came O
from O
Israel O
. O
The O
sample O
’ O
s O
first O
appearance O
seems O
to O
be O
May O
15 O
, O
2018 O
, O
when O
it O
was O
uploaded O
to O
VirusTotal B-Organization
, O
but O
it O
’ O
s O
unclear O
how O
the O
tainted O
sample O
is O
disseminated O
. O
Third-party O
marketplaces O
or O
some O
other O
attacker-controlled O
domains O
are O
likely O
used O
to O
host O
the O
sample O
. O
A O
subsequent O
investigation O
revealed O
that O
the O
spyware O
has O
the O
following O
capabilities O
: O
Records O
every O
phone O
call O
( O
literally O
the O
conversation O
as O
a O
media O
file O
) O
, O
then O
sends O
it O
together O
with O
the O
caller O
id O
to O
the O
C O
& O
C O
( O
incall3.php B-Indicator
and O
outcall3.php B-Indicator
) O
Logs O
every O
incoming O
SMS O
message O
( O
SMS O
body O
and O
SMS O
sender O
) O
to O
C O
& O
C O
( O
script3.php B-Indicator
) O
Has O
capability O
to O
hide O
self O
Can O
send O
all O
call O
logs O
( O
“ O
content B-Indicator
: I-Indicator
//call_log/calls I-Indicator
” O
, O
info O
: O
callname O
, O
callnum O
, O
calldate O
, O
calltype O
, O
callduration O
) O
to O
C O
& O
C O
( O
calllog.php B-Indicator
) O
Whenever O
the O
user O
snaps O
a O
picture O
, O
either O
with O
the O
front O
or O
rear O
camera O
, O
it O
gets O
sent O
to O
the O
C O
& O
C O
( O
uppc.php B-Indicator
, O
fi O
npic.php B-Indicator
orreqpic.php B-Indicator
) O
Can O
send O
GPS B-System
coordinates O
to O
C O
& O
C O
( O
gps3.php B-Indicator
) O
The O
C O
& O
C O
server O
to O
which O
the O
application O
seems O
to O
be O
sending O
collected O
data O
appears O
to O
be O
operational O
, O
as O
of O
this O
writing O
, O
and O
running O
since O
May O
2018 O
. O
January O
23 O
, O
2017 O
SpyNote B-Malware
RAT I-Malware
posing O
as O
Netflix B-System
app I-System
As O
users O
have O
become O
more O
attached O
to O
their O
mobile O
devices O
, O
they O
want O
everything O
on O
those O
devices O
. O
There O
’ O
s O
an O
app O
for O
just O
about O
any O
facet O
of O
one O
’ O
s O
personal O
and O
professional O
life O
, O
from O
booking O
travel O
and O
managing O
projects O
, O
to O
buying O
groceries O
and O
binge-watching O
the O
latest O
Netflix B-Organization
series O
. O
The O
iOS B-System
and O
Android B-System
apps O
for O
Netflix B-Organization
are O
enormously O
popular O
, O
effectively O
turning O
a O
mobile O
device O
into O
a O
television O
with O
which O
users O
can O
stream O
full O
movies O
and O
TV O
programs O
anytime O
, O
anywhere O
. O
But O
the O
apps O
, O
with O
their O
many O
millions O
of O
users O
, O
have O
captured O
the O
attention O
of O
the O
bad O
actors O
, O
too O
, O
who O
are O
exploiting O
the O
popularity O
of O
Netflix B-Organization
to O
spread O
malware O
. O
Recently O
, O
the O
ThreatLabZ B-Organization
research O
team O
came O
across O
a O
fake B-System
Netflix I-System
app I-System
, O
which O
turned O
out O
to O
be O
a O
new O
variant O
of O
SpyNote B-Malware
RAT I-Malware
( O
Remote O
Access O
Trojan O
) O
. O
SpyNote B-Malware
RAT I-Malware
is O
capable O
of O
performing O
a O
variety O
of O
alarming O
functions O
that O
includes O
: O
Activating O
the O
device O
’ O
s O
microphone O
and O
listening O
to O
live O
conversations O
Executing O
commands O
on O
the O
device O
Copying O
files O
from O
the O
device O
to O
a O
Command O
& O
Control O
( O
C O
& O
C O
) O
center O
Recording O
screen O
captures O
Viewing O
contacts O
Reading O
SMS O
messages O
The O
screenshot O
below O
shows O
part O
of O
the O
sandbox O
’ O
s O
report O
on O
the O
SpyNote B-Malware
RAT I-Malware
’ O
s O
signature O
and O
detected O
functions O
: O
The O
fake O
Netflix B-Organization
app O
we O
are O
analyzing O
in O
this O
blog O
appears O
to O
be O
built O
using O
an O
updated O
version O
of O
SpyNote B-Malware
RAT I-Malware
builder O
, O
which O
was O
leaked O
last O
year O
. O
Technical O
details O
Please O
note O
that O
our O
research O
is O
not O
about O
the O
legitimate O
Netflix B-System
app I-System
on O
Google B-System
Play I-System
. O
The O
spyware O
in O
this O
analysis O
was O
portraying O
itself O
as O
the O
Netflix B-System
app I-System
. O
Once O
installed O
, O
it O
displayed O
the O
icon O
found O
in O
the O
actual O
Netflix B-System
app I-System
on O
Google B-System
Play I-System
. O
As O
soon O
as O
the O
user O
clicks O
the O
spyware O
’ O
s O
icon O
for O
the O
first O
time O
, O
nothing O
seems O
to O
happen O
and O
the O
icon O
disappears O
from O
the O
home O
screen O
. O
This O
is O
a O
common O
trick O
played O
by O
malware O
developers O
, O
making O
the O
user O
think O
the O
app O
may O
have O
been O
removed O
. O
But O
, O
behind O
the O
scenes O
, O
the O
malware O
has O
not O
been O
removed O
; O
instead O
it O
starts O
preparing O
its O
onslaught O
of O
attacks O
. O
For O
contacting O
C O
& O
C O
, O
the O
spyware O
was O
found O
to O
be O
using O
free O
DNS B-Indicator
services O
, O
as O
shown O
in O
the O
screenshot O
below O
: O
SpyNote B-Malware
RAT I-Malware
uses O
an O
unusual O
trick O
to O
make O
sure O
that O
it O
remains O
up O
and O
running O
and O
that O
the O
spying O
does O
not O
stop O
. O
It O
does O
so O
using O
the O
Services O
, O
Broadcast O
Receivers O
, O
and O
Activities O
components O
of O
the O
Android B-System
platform O
. O
Services O
can O
perform O
long-running O
operations O
in O
the O
background O
and O
does O
not O
need O
a O
user O
interface O
. O
Broadcast O
Receivers O
are O
Android B-System
components O
that O
can O
register O
themselves O
for O
particular O
events O
. O
Activities O
are O
key O
building O
blocks O
, O
central O
to O
an O
app O
’ O
s O
navigation O
, O
for O
example O
. O
The O
SpyNote B-Malware
RAT I-Malware
registers O
a O
service O
called O
AutoStartup O
and O
a O
broadcast O
receiver O
named O
BootComplete O
. O
MainActivity O
registers O
BootComplete O
with O
a O
boot O
event O
, O
so O
that O
whenever O
the O
device O
is O
booted O
, O
BootComplete O
gets O
triggered O
. O
BootComplete O
starts O
the O
AutoStartup O
service O
and O
the O
AutoStartup O
service O
makes O
sure O
that O
MainActivity O
is O
always O
running O
. O
What O
follows O
are O
some O
of O
the O
features O
exhibited O
by O
SpyNote B-Malware
RAT I-Malware
. O
Command O
execution O
Command O
execution O
can O
create O
havoc O
for O
victim O
if O
the O
malware O
developer O
decides O
to O
execute O
commands O
in O
the O
victim O
’ O
s O
device O
. O
Leveraging O
this O
feature O
, O
the O
malware O
developer O
can O
root O
the O
device O
using O
a O
range O
of O
vulnerabilities O
, O
well-known O
or O
zero-day O
. O
The O
following O
screenshot O
shows O
the O
command O
execution O
functionality O
in O
action O
: O
The O
paramString O
parameter O
shown O
in O
the O
above O
screenshot O
can O
be O
any O
command O
received O
from O
C O
& O
C O
. O
Screen O
capture O
and O
audio O
recording O
SpyNote B-Malware
RAT I-Malware
was O
able O
to O
take O
screen O
captures O
and O
, O
using O
the O
device O
’ O
s O
microphone O
, O
listen O
to O
audio O
conversations O
. O
This O
capability O
was O
confirmed O
when O
the O
Android B-System
permission O
, O
called O
android.permission.RECORD_AUDIO B-Indicator
, O
was O
being O
requested O
along O
with O
code O
found O
in O
the O
app O
. O
SpyNote B-Malware
RAT I-Malware
captured O
the O
device O
’ O
s O
screen O
activities O
along O
with O
audio O
using O
the O
MediaProjectionCallback O
functionality O
( O
available O
with O
Lollipop B-System
, O
the O
Android B-System
5.0 I-System
release O
, O
and O
later O
) O
and O
saved O
the O
output O
in O
a O
file O
named O
" O
video.mp4 B-Indicator
'' O
as O
shown O
in O
the O
following O
screenshot O
SMS O
stealing O
SpyNote B-Malware
RAT I-Malware
was O
also O
observed O
stealing O
SMS O
messages O
from O
the O
affected O
devices O
, O
as O
shown O
in O
screenshot O
below O
: O
Stealing O
contacts O
The O
ability O
to O
steal O
contacts O
is O
a O
favorite O
feature O
for O
spyware O
developers O
, O
as O
the O
stolen O
contacts O
can O
be O
used O
to O
further O
spread O
the O
spyware O
. O
The O
following O
screenshot O
shows O
the O
contacts O
being O
stolen O
and O
written O
in O
a O
local O
array O
, O
which O
is O
then O
sent O
to O
C O
& O
C O
: O
Uninstalling O
apps O
Uninstalling O
apps O
is O
another O
function O
favored O
by O
developers O
of O
Android B-System
spyware O
and O
malware O
. O
They O
tend O
to O
target O
any O
antivirus O
protections O
on O
the O
device O
and O
uninstall O
them O
, O
which O
increases O
the O
possibility O
of O
their O
malware O
persisting O
on O
the O
device O
. O
Following O
screenshot O
shows O
this O
functionality O
in O
action O
: O
Other O
functions O
In O
addition O
to O
the O
functionalities O
we O
’ O
ve O
described O
, O
the O
SpyNote B-Malware
RAT I-Malware
was O
exhibiting O
many O
other O
behaviors O
that O
make O
it O
more O
robust O
than O
most O
off-the-shelf O
malware O
. O
SpyNote B-Malware
RAT I-Malware
was O
designed O
to O
function O
only O
over O
Wi-Fi O
, O
which O
is O
the O
preferable O
mode O
for O
Android B-System
malware O
to O
send O
files O
to O
C O
& O
C O
. O
The O
screenshot O
below O
shows O
SpyNote B-Malware
RAT I-Malware
scanning O
for O
Wi-Fi O
and O
enabling O
it O
if O
a O
known O
channel O
is O
found O
: O
Additional O
features O
- O
SpyNote B-Malware
RAT I-Malware
could O
click O
photos O
using O
the O
device O
's O
camera O
, O
based O
on O
commands O
from O
C O
& O
C O
. O
- O
There O
were O
two O
interesting O
sub-classes O
found O
inside O
Main O
Activity O
: O
Receiver O
and O
Sender O
. O
Receiver O
was O
involved O
in O
receiving O
commands O
from O
the O
Server O
and O
the O
main O
functionality O
of O
Sender O
was O
to O
send O
all O
the O
data O
collected O
to O
the O
C O
& O
C O
over O
Wi-Fi O
. O
- O
SpyNote B-Malware
RAT I-Malware
was O
also O
collecting O
the O
device O
’ O
s O
location O
to O
identify O
the O
exact O
location O
of O
the O
victim O
. O
SpyNote B-Malware
RAT I-Malware
builder O
The O
SpyNote B-Malware
Remote O
Access O
Trojan O
( O
RAT O
) O
builder O
is O
gaining O
popularity O
in O
the O
hacking O
community O
, O
so O
we O
decided O
to O
study O
its O
pervasiveness O
. O
What O
we O
found O
were O
several O
other O
fake O
apps O
developed O
using O
the O
SpyNote B-Malware
builder O
, O
which O
should O
come O
as O
a O
warning O
to O
Android B-System
users O
. O
Some O
of O
the O
targeted O
apps O
were O
: O
Whatsapp B-System
YouTube B-System
Video I-System
Downloader I-System
Google B-System
Update I-System
Instagram B-System
Hack B-System
Wifi I-System
AirDroid B-System
WifiHacker B-System
Facebook B-System
Photoshop B-System
SkyTV B-System
Hotstar B-System
Trump B-System
Dash I-System
PokemonGo B-System
With O
many O
more O
to O
come O
. O
Furthermore O
, O
we O
found O
that O
in O
just O
the O
first O
two O
weeks O
of O
2017 O
, O
there O
have O
been O
more O
than O
120 O
such O
spyware O
variants O
already O
built O
using O
the O
same O
SpyNote B-Malware
Trojan O
builder O
as O
SpyNote B-Malware
RAT I-Malware
and O
roaming O
in O
the O
wild O
. O
A O
complete O
list O
of O
sample O
hashes O
is O
available O
here O
. O
Conclusion O
The O
days O
when O
one O
needed O
in-depth O
coding O
knowledge O
to O
develop O
malware O
are O
long O
gone O
. O
Nowadays O
, O
script O
kiddies O
can O
build O
a O
piece O
of O
malware O
that O
can O
create O
real O
havoc O
. O
Moreover O
, O
there O
are O
many O
toolkits O
like O
the O
SpyNote B-Malware
Trojan O
builder O
that O
enable O
users O
to O
build O
malware O
with O
ease O
and O
few O
clicks O
. O
In O
particular O
, O
avoid O
side-loading O
apps O
from O
third-party O
app O
stores O
and O
avoid O
the O
temptation O
to O
play O
games O
that O
are O
not O
yet O
available O
on O
Android B-System
. O
Yes O
, O
we O
are O
talking O
about O
SuperMarioRun B-System
, O
which O
was O
recently O
launched O
by O
Nintendo B-Organization
only O
for O
iOS B-System
users O
. O
Recent O
blogs O
by O
the O
Zscaler B-Organization
research O
team O
explain O
how O
some O
variants O
of O
Android B-Malware
malware O
are O
exploiting O
the O
popularity O
of O
this O
game O
and O
tricking O
Android B-System
users O
into O
downloading O
a O
fake O
version O
. O
( O
Have O
a O
look O
here O
and O
here O
. O
) O
You O
should O
also O
avoid O
the O
temptation O
to O
play O
games O
from O
sources O
other O
than O
legitimate O
app O
stores O
; O
such O
games O
are O
not O
safe O
and O
may O
bring O
harm O
to O
your O
reputation O
and O
your O
bank O
account O
. O
FakeSpy B-Malware
Masquerades O
as O
Postal O
Service O
Apps O
Around O
the O
World O
July O
1 O
, O
2020 O
KEY O
FINDINGS O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
is O
investigating O
a O
new O
campaign O
involving O
FakeSpy B-Malware
, O
an O
Android B-System
mobile O
malware O
that O
emerged O
around O
October O
2017 O
. O
FakeSpy B-Malware
is O
an O
information O
stealer O
used O
to O
steal O
SMS O
messages O
, O
send O
SMS O
messages O
, O
steal O
financial O
data O
, O
read O
account O
information O
and O
contact O
lists O
, O
steal O
application O
data O
, O
and O
do O
much O
more O
. O
FakeSpy B-Malware
first O
targeted O
South O
Korean O
and O
Japanese O
speakers O
. O
However O
, O
it O
has O
begun O
to O
target O
users O
all O
around O
the O
world O
, O
especially O
users O
in O
countries O
like O
China O
, O
Taiwan O
, O
France O
, O
Switzerland O
, O
Germany O
, O
United O
Kingdom O
, O
United O
States O
, O
and O
others O
. O
FakeSpy B-Malware
masquerades O
as O
legitimate O
postal O
service O
apps O
and O
transportation O
services O
in O
order O
to O
gain O
the O
users O
' O
trust O
. O
Once O
installed O
, O
the O
application O
requests O
permissions O
so O
that O
it O
may O
control O
SMS O
messages O
and O
steal O
sensitive O
data O
on O
the O
device O
, O
as O
well O
as O
proliferate O
to O
other O
devices O
in O
the O
target O
device O
’ O
s O
contact O
list O
. O
Cybereason B-Organization
's O
investigation O
shows O
that O
the O
threat O
actor O
behind O
the O
FakeSpy B-Malware
campaign O
is O
a O
Chinese-speaking O
group O
dubbed O
" O
Roaming B-Organization
Mantis I-Organization
'' O
, O
a I-Organization
group O
that O
has O
led O
similar O
campaigns O
. O
FakeSpy B-Malware
has O
been O
in O
the O
wild O
since O
2017 O
; O
this O
latest O
campaign O
indicates O
that O
it O
has O
become O
more O
powerful O
. O
Code O
improvements O
, O
new O
capabilities O
, O
anti-emulation O
techniques O
, O
and O
new O
, O
global O
targets O
all O
suggest O
that O
this O
malware O
is O
well-maintained O
by O
its O
authors O
and O
continues O
to O
evolve O
. O
TABLE O
OF O
CONTENTS O
Key O
Findings O
Introduction O
Threat O
Analysis O
Fakespy B-Malware
Code O
Analysis O
Dynamic O
Library O
Loading O
Stealing O
Sensitive O
Information O
Anti-Emulator O
Techniques O
Under O
Active O
Development O
Who O
is O
Behind O
Fakespy B-Malware
's O
Smishing O
Campaigns O
? O
Conclusions O
Cybereason B-Organization
Mobile I-Organization
Detects O
and O
Stops O
FakeSpy B-Malware
Indicators O
of O
Compromise O
INTRODUCTION O
For O
the O
past O
several O
weeks O
, O
Cybereason B-Organization
has O
been O
investigating O
a O
new O
version O
of O
Android B-System
malware O
dubbed O
FakeSpy B-Malware
, O
which O
was O
first O
identified O
in O
October O
2017 O
and O
reported O
again O
in O
October O
2018 O
. O
A O
new O
campaign O
is O
up O
and O
running O
using O
newly O
improved O
, O
significantly O
more O
powerful O
malware O
as O
compared O
to O
previous O
versions O
. O
FakeSpy B-Malware
is O
under O
active O
development O
and O
is O
evolving O
rapidly O
; O
new O
versions O
are O
released O
every O
week O
with O
additional O
evasion O
techniques O
and O
capabilities O
. O
Our O
analysis O
shows O
that O
the O
threat O
actor O
behind O
the O
FakeSpy B-Malware
malware O
is O
a O
Chinese-speaking O
group O
, O
commonly O
referred O
to O
as O
" O
Roaming B-Organization
Mantis I-Organization
'' O
, O
a I-Organization
group O
that O
is O
known O
to O
have O
launched O
similar O
campaigns O
in O
the O
past O
. O
FakeSpy B-Malware
is O
an O
information O
stealer O
that O
exfiltrates O
and O
sends O
SMS O
messages O
, O
steals O
financial O
and O
application O
data O
, O
reads O
account O
information O
and O
contact O
lists O
, O
and O
more O
. O
The O
malware O
uses O
smishing O
, O
or O
SMS O
phishing O
, O
to O
infiltrate O
target O
devices O
, O
which O
is O
a O
technique O
that O
relies O
on O
social O
engineering O
. O
The O
attackers O
send O
fake O
text O
messages O
to O
lure O
the O
victims O
to O
click O
on O
a O
malicious O
link O
. O
The O
link O
directs O
them O
to O
a O
malicious O
web O
page O
, O
which O
prompts O
them O
to O
download O
an O
Android O
application O
package O
( O
APK O
) O
. O
This O
most O
recent O
FakeSpy B-Malware
campaign O
appears O
to O
target O
users O
of O
postal O
services O
around O
the O
world O
. O
New O
versions O
of O
FakeSpy B-Malware
masquerade O
as O
government O
post O
office O
apps O
and O
transportation O
services O
apps O
. O
Our O
analysis O
indicates O
that O
the O
threat O
actors O
are O
no O
longer O
limiting O
their O
campaigns O
to O
East O
Asian O
countries O
, O
but O
are O
targeting O
additional O
countries O
around O
the O
world O
. O
THREAT O
ANALYSIS O
Infection O
Vector O
: O
Smishing O
Your O
Device O
Thus O
far O
, O
FakeSpy B-Malware
campaigns O
are O
characterized O
by O
SMS O
phishing O
( O
a.k.a O
. O
smishing O
) O
. O
These O
SMS O
messages O
masquerade O
as O
a O
message O
from O
the O
local O
post O
office O
and O
link O
to O
the O
FakeSpy B-Malware
download O
. O
In O
a O
previous O
campaign O
reported O
by O
JPCERT B-Organization
, O
mobile O
users O
were O
alerted O
by O
phishy O
messages O
containing O
“ O
delivery O
updates O
” O
purportedly O
from O
Sagawa B-Organization
Express I-Organization
. O
Fake O
SMS O
message O
luring O
users O
to O
enter O
a O
fake O
website O
, O
which O
contains O
the O
malicious O
APK O
( O
JPCERT B-Organization
report O
) O
. O
Clicking O
the O
SMS O
link O
brings O
the O
user O
to O
a O
fake O
website O
that O
prompts O
them O
to O
download O
and O
install O
the O
FakeSpy B-Malware
APK O
, O
which O
is O
masquerading O
as O
a O
local O
postal O
service O
app O
. O
Targeting O
Postal O
and O
Transportation O
Services O
Companies O
One O
of O
the O
most O
significant O
findings O
is O
that O
new O
versions O
of O
FakeSpy B-Malware
target O
not O
only O
Korean O
and O
Japanese O
speakers O
, O
but O
also O
almost O
any O
postal O
service O
company O
around O
the O
world O
. O
Example O
of O
more O
recent O
FakeSpy B-Malware
campaigns O
targeting O
France O
. O
New O
FakeSpy B-Malware
campaign O
applications O
leveraging O
fake O
postal O
services O
apps O
. O
All O
recent O
FakeSpy B-Malware
versions O
contain O
the O
same O
code O
with O
minor O
changes O
. O
The O
FakeSpy B-Malware
malware O
has O
been O
found O
to O
masquerade O
as O
any O
of O
the O
following O
companies O
: O
United B-Organization
States I-Organization
Postal I-Organization
Service I-Organization
- O
An O
independent O
agency O
of O
the O
executive O
branch O
of O
the O
United O
States O
federal O
government O
. O
USPS B-Organization
is O
the O
most O
well-known O
branch O
of O
the O
US O
government O
and O
provides O
a O
publicly O
funded O
postal O
service O
. O
Royal B-Organization
Mail I-Organization
- O
British O
postal O
service O
and O
courier O
company O
. O
For O
most O
of O
its O
history O
it O
operated O
as O
a O
government O
department O
or O
public O
corporation O
. O
Deutsche B-Organization
Post I-Organization
- O
Deutsche O
Post O
DHL B-Organization
Group I-Organization
, O
a O
German O
multinational O
package O
delivery O
and O
supply O
chain O
management O
company O
headquartered O
in O
Bonn O
. O
La B-Organization
Poste I-Organization
- O
La O
Poste O
is O
a O
public O
limited O
postal O
service O
company O
in O
France O
. O
Japan B-Organization
Post I-Organization
- O
A O
private O
Japanese O
post O
, O
logistics O
and O
courier O
headquartered O
in O
Tokyo O
. O
Yamato B-Organization
Transport I-Organization
- O
One O
of O
Japan O
's O
largest O
door-to-door O
delivery O
service O
companies O
, O
also O
in O
Tokyo O
. O
Chunghwa B-Organization
Post I-Organization
- O
The O
government-owned O
corporation O
Chunghwa B-Organization
is O
the O
official O
postal O
service O
of O
Taiwan O
. O
Swiss B-Organization
Post I-Organization
- O
The O
national O
postal O
service O
of O
Switzerland O
, O
a O
fully O
state-owned O
limited O
company O
( O
AG O
) O
regulated O
by O
public O
law O
. O
The O
fake O
applications O
are O
built O
using O
WebView B-System
, O
a O
popular O
extension O
of O
Android B-System
’ O
s O
View O
class O
that O
lets O
the O
developer O
show O
a O
webpage O
. O
FakeSpy B-Malware
uses O
this O
view O
to O
redirect O
users O
to O
the O
original O
post O
office O
carrier O
webpage O
on O
launch O
of O
the O
application O
, O
continuing O
the O
deception O
. O
This O
allows O
the O
application O
to O
appear O
legitimate O
, O
especially O
given O
these O
applications O
icons O
and O
user O
interface O
. O
New O
FakeSpy B-Malware
applications O
masquerading O
as O
post O
office O
apps O
. O
FAKESPY B-Malware
CODE O
ANALYSIS O
Once O
the O
user O
clicks O
on O
the O
malicious O
link O
from O
the O
SMS O
message O
, O
the O
app O
asks O
them O
to O
approve O
installation O
from O
unknown O
resources O
. O
This O
configuration O
can O
be O
toggled O
on O
by O
going O
to O
‘ O
Settings O
’ O
- O
> O
‘ O
Security O
’ O
- O
> O
‘ O
Unknown O
Resources O
’ O
. O
PackageInstaller O
shows O
the O
app O
’ O
s O
permission O
access O
and O
asks O
for O
the O
user O
's O
approval O
, O
which O
then O
installs O
the O
application O
. O
This O
analysis O
dissects O
FakeSpy B-Malware
’ O
s O
Chunghwa O
Post O
app O
version O
, O
which O
emerged O
in O
April O
2020 O
. O
During O
the O
installation O
, O
the O
malware O
asks O
for O
the O
following O
permissions O
: O
READ_PHONE_STATE O
- O
Allows O
read-only O
access O
to O
the O
phone O
state O
, O
including O
the O
current O
cellular O
network O
information O
, O
the O
status O
of O
any O
ongoing O
calls O
, O
and O
a O
list O
of O
any O
PhoneAccounts O
registered O
on O
the O
device O
. O
READ_SMS O
- O
Allows O
the O
application O
to O
read O
text O
messages O
. O
RECEIVE_SMS O
- O
Allows O
the O
application O
to O
receive O
SMS O
messages O
. O
WRITE_SMS O
- O
Allows O
the O
application O
to O
write O
to O
SMS O
messages O
stored O
on O
the O
device O
or O
SIM O
card O
, O
including O
y O
deleting O
messages O
. O
SEND_SMS O
- O
Allows O
the O
application O
to O
send O
SMS O
messages O
. O
INTERNET O
- O
Allows O
the O
application O
to O
open O
network O
sockets O
. O
WRITE_EXTERNAL_STORAGE O
- O
Allows O
the O
application O
to O
write O
to O
external O
storage O
. O
READ_EXTERNAL_STORAGE O
- O
Allows O
the O
application O
to O
read O
from O
external O
storage O
. O
RECEIVE_BOOT_COMPLETED O
- O
Allows O
the O
application O
to O
receive O
a O
broadcast O
after O
the O
system O
finishes O
booting O
. O
GET_TASKS O
- O
Allows O
the O
application O
to O
get O
information O
about O
current O
or O
recently O
run O
tasks O
. O
( O
deprecated O
in O
API O
level O
21 O
) O
SYSTEM_ALERT_WINDOW O
- O
Allows O
the O
application O
to O
create O
windows O
shown O
on O
top O
of O
all O
other O
apps O
. O
WAKE_LOCK O
- O
Allows O
the O
application O
to O
use O
PowerManager O
WakeLocks O
to O
keep O
the O
processor O
from O
sleeping O
or O
the O
screen O
from O
dimming O
. O
ACCESS_NETWORK_STATE O
- O
Allows O
the O
application O
to O
access O
information O
about O
networks O
. O
REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O
- O
Whitelists O
the O
application O
to O
allow O
it O
to O
ignore O
battery O
optimizations O
. O
READ_CONTACTS O
- O
Allows O
the O
application O
to O
read O
the O
user O
's O
contacts O
data O
. O
FakeSpy B-Malware
package O
permissions O
. O
On O
opening O
the O
app O
, O
two O
pop-up O
messages O
appear O
on O
screen O
: O
Change O
SMS O
App O
: O
This O
sets O
permissions O
to O
intercept O
every O
SMS O
received O
on O
the O
device O
and O
send O
a O
copy O
of O
these O
messages O
to O
the O
C2 O
server O
. O
Ignore O
Battery O
Optimization O
: O
This O
sets O
permissions O
to O
continue O
to O
operate O
at O
full O
capacity O
while O
the O
phone O
's O
screen O
is O
turned O
off O
and O
the O
phone O
locked O
. O
These O
requests O
rely O
on O
the O
end O
user O
accepting O
the O
permission O
changes O
and O
points O
to O
the O
importance O
of O
healthy O
skepticism O
when O
giving O
applications O
permissions O
. O
FakeSpy B-Malware
Chunghwa B-Organization
Post I-Organization
version O
installation O
process O
and O
application O
UI O
. O
DYNAMIC O
LIBRARY O
LOADING O
Once O
the O
application O
has O
finished O
the O
installation O
process O
, O
the O
malware O
starts O
its O
real O
malicious O
activity O
. O
The O
malicious O
application O
da.hao.pao.bin B-Indicator
( O
Chunghwa B-Organization
Post I-Organization
) O
loads O
a O
library O
file O
libmsy.so B-Indicator
used O
to O
execute O
the O
packed O
mycode.jar B-Indicator
file I-Indicator
. O
The O
JAR O
file O
is O
the O
decrypted O
version O
of O
the O
file O
tong.luo B-Indicator
, O
which O
is O
located O
in O
the O
assets O
folder O
. O
Decompiled O
APK O
resources O
. O
By O
comparing O
the O
sizes O
of O
the O
encrypted O
asset O
file O
tong.luo B-Indicator
vs O
the O
decrypted O
JAR O
file O
mycode.jar B-Indicator
, O
it O
is O
interesting O
to O
note O
that O
it O
is O
the O
same O
file O
( O
almost O
the O
same O
size O
) O
. O
Comparing O
encrypted O
vs O
decrypted O
asset O
file O
. O
After O
libmsy.so B-Indicator
decrypts O
the O
asset O
file O
tong.luo B-Indicator
, O
it O
loads O
mycode.jar B-Indicator
dynamically O
into O
FakeSpy B-Malware
’ O
s O
process O
, O
as O
is O
shown O
from O
the O
output O
of O
the O
“ O
adb O
logcat O
” O
command O
. O
Logcat O
logs O
show O
FakeSpy B-Malware
uses O
libmsy.so B-Indicator
to O
execute O
the O
malicious O
packed O
mycode.jar B-Indicator
file I-Indicator
. O
By O
analyzing O
running O
processes O
on O
the O
infected O
device O
, O
it O
shows O
that O
the O
malware O
creates O
a O
child O
process O
of O
itself O
to O
perform O
the O
multi-process O
ptrace O
anti-debugging O
technique O
. O
FakeSpy B-Malware
uses O
an O
anti-debugging O
technique O
by O
creating O
another O
child O
process O
of O
itself O
. O
By O
performing O
a O
deep O
analysis O
of O
the O
malware O
, O
we O
were O
able O
to O
extract O
the O
unpacked O
JAR O
file O
mycode.jar B-Indicator
and O
reveal O
some O
very O
interesting O
code O
. O
STEALING O
SENSITIVE O
INFORMATION O
FakeSpy B-Malware
has O
multiple O
built O
in O
information O
stealing O
capabilities O
. O
The O
first O
function O
is O
used O
for O
contact O
information O
stealing O
: O
the O
function O
upCon O
steals O
all O
contacts O
in O
the O
contact O
list O
and O
their O
information O
. O
Then O
, O
it O
sends O
it O
to O
the O
C2 O
server O
using O
the O
URL O
that O
ends O
with O
/servlet/ContactUpload B-Indicator
. O
The O
stolen O
data O
fields O
are O
: O
Mobile O
- O
The O
infected O
device O
phone O
number O
and O
contact O
’ O
s O
phone O
number O
Contacts O
- O
A O
headline O
used O
for O
the O
attacker O
to O
distinguish O
between O
the O
type O
of O
stolen O
information O
he O
gets O
Name O
- O
Contact O
’ O
s O
full O
name O
( O
Display O
name O
) O
upCon O
( O
upload O
contact O
) O
function O
used O
for O
stealing O
contact O
list O
information O
. O
For O
testing O
purposes O
we O
inserted O
a O
fake O
contacts O
list O
to O
our O
Android B-System
Emulator O
and O
observed O
resultant O
behavior O
. O
Exfiltrated O
contact O
list O
data O
sent O
to O
the O
C2 O
server O
. O
The O
second O
stealing O
function O
is O
the O
onStartCommand O
, O
which O
steals O
infected O
device O
data O
and O
additional O
information O
. O
The O
stolen O
data O
is O
sent O
to O
the O
C2 O
server O
using O
the O
URL O
ending O
with O
/servlet/xx B-Indicator
. O
The O
stolen O
data O
fields O
are O
: O
Mobile O
- O
The O
infected O
device O
phone O
number O
Machine O
- O
The O
device O
model O
( O
in O
our O
example O
: O
Google B-System
Pixel I-System
2 I-System
) O
Sversion O
- O
The O
OS O
version O
Bank O
- O
Checks O
if O
there O
are O
any O
banking-related O
or O
cryptocurrency O
trading O
apps O
Provider O
- O
The O
telecommunication O
provider O
( O
IMSI O
value O
in O
device O
settings O
) O
npki O
- O
Checks O
if O
the O
folder O
named O
NPKI O
( O
National O
Public O
Key O
Infrastructure O
) O
might O
contain O
authentication O
certificates O
related O
to O
financial O
transactions O
onStartCommand O
function O
for O
stealing O
device O
information O
and O
additional O
sensitive O
data O
. O
Exfiltrated O
device O
information O
and O
additional O
sensitive O
data O
sent O
to O
the O
C2 O
server O
. O
FakeSpy B-Malware
asks O
to O
be O
the O
default O
SMS O
app O
because O
it O
uses O
the O
function O
onReceive O
to O
intercept O
incoming O
SMS O
messages O
. O
It O
saves O
the O
messages O
’ O
metadata O
and O
content O
, O
filters O
the O
information O
by O
fields O
, O
and O
sends O
them O
to O
the O
C2 O
server O
using O
the O
URL O
/servlet/SendMassage2 B-Indicator
. O
The O
fields O
it O
collects O
are O
: O
Mobile O
- O
The O
phone O
number O
which O
sent O
the O
SMS O
Content O
- O
The O
message O
body O
Sender O
- O
The O
contact O
name O
who O
sent O
the O
message O
Time O
- O
The O
time O
the O
message O
was O
received O
onReceive O
function O
used O
to O
intercept O
incoming O
SMS O
messages O
. O
The O
malware O
uses O
the O
function O
sendAll O
to O
send O
messages O
that O
spread O
the O
malware O
to O
other O
devices O
. O
It O
sends O
a O
smishing O
message O
to O
the O
entire O
contact O
list O
of O
the O
infected O
device O
along O
with O
the O
malicious O
link O
to O
the O
FakeSpy B-Malware
installation O
page O
. O
sendAll O
function O
used O
to O
spread O
malicious O
messages O
to O
the O
contact O
list O
. O
Another O
interesting O
feature O
in O
FakeSpy B-Malware
’ O
s O
code O
is O
the O
collection O
of O
the O
device O
's O
IMEI O
( O
International O
Mobile O
Station O
Equipment O
Identity O
) O
number O
and O
all O
installed O
applications O
using O
the O
function O
upAppinfos O
. O
It O
sends O
all O
of O
this O
data O
to O
the O
C2 O
server O
using O
the O
URL O
ending O
with O
/servlet/AppInfos B-Indicator
. O
upAppinfos O
function O
used O
for O
obtaining O
the O
device O
IMEI O
and O
all O
of O
its O
installed O
applications O
. O
FakeSpy B-Malware
is O
able O
to O
check O
the O
network O
connectivity O
status O
by O
using O
the O
function O
isNetworkAvailable O
. O
What O
makes O
this O
function O
more O
suspicious O
is O
the O
two O
strings O
written O
in O
Chinese O
characters O
: O
===状态=== O
( O
===Status=== O
) O
- O
Checks O
whether O
the O
device O
is O
connected O
to O
a O
network O
===类型=== O
( O
===Type=== O
) O
- O
Checks O
whether O
the O
device O
sees O
available O
nearby O
Wifi O
networks O
isNetworkAvailable O
function O
used O
for O
monitoring O
network O
connectivity O
status O
. O
ANTI-EMULATOR O
TECHNIQUES O
FakeSpy B-Malware
appears O
to O
use O
multiple O
techniques O
to O
evade O
detection O
via O
the O
emulator O
. O
It O
shows O
that O
the O
malware O
can O
detect O
whether O
it O
’ O
s O
running O
in O
an O
emulated O
environment O
or O
a O
real O
mobile O
device O
, O
and O
can O
change O
its O
code O
pattern O
accordingly O
. O
The O
first O
example O
of O
this O
is O
in O
the O
onStart O
function O
, O
where O
the O
malware O
looks O
for O
the O
string O
“ O
Emulator O
” O
and O
a O
x86 O
processor O
model O
. O
Anti-emulator O
code O
. O
In O
order O
to O
simulate O
this O
technique O
, O
we O
took O
two O
videos O
side O
by O
side O
of O
how O
FakeSpy B-Malware
( O
the O
Royal B-Organization
Mail I-Organization
sample O
) O
behaves O
differently O
on O
a O
physical O
device O
versus O
an O
emulator O
. O
FakeSpy B-Malware
behavior O
on O
physical O
device O
vs O
emulator O
( O
anti-emulator O
) O
. O
This O
simulation O
shows O
that O
FakeSpy B-Malware
behaves O
differently O
on O
a O
physical O
device O
versus O
an O
emulator O
. O
When O
executed O
the O
second O
time O
by O
clicking O
on O
the O
app O
on O
the O
physical O
device O
, O
FakeSpy B-Malware
redirects O
to O
the O
app O
settings O
. O
In O
contrast O
, O
on O
the O
emulator O
, O
a O
toast O
message O
is O
displayed O
that O
shows O
“ O
Install O
completed O
” O
, O
at O
which O
point O
FakeSpy B-Malware
removes O
its O
shortcut O
from O
the O
device O
's O
homescreen O
. O
Another O
example O
of O
FakeSpy B-Malware
’ O
s O
anti-emulation O
techniques O
is O
how O
it O
uses O
the O
getMachine O
function O
, O
which O
uses O
the O
TelephonyManager O
class O
to O
check O
for O
the O
deviceID O
, O
phone O
number O
, O
IMEI O
, O
and O
IMSI O
. O
Some O
emulators O
build O
their O
phone O
number O
out O
of O
the O
default O
number O
created O
in O
the O
emulator O
software O
and O
the O
port B-Indicator
number I-Indicator
: I-Indicator
5554. I-Indicator
getMachine O
function O
using O
anti-emulator O
technique O
. O
UNDER O
ACTIVE O
DEVELOPMENT O
An O
analysis O
of O
new O
FakeSpy B-Malware
samples O
to O
old O
ones O
showed O
code O
discrepancies O
and O
new O
features O
. O
These O
artifacts O
indicate O
that O
FakeSpy B-Malware
's O
campaign O
is O
still O
live O
and O
under O
development O
. O
The O
newer O
version O
of O
FakeSpy B-Malware
uses O
new O
URL O
addresses O
for O
malicious O
communication O
with O
FakeSpy B-Malware
. O
The O
function O
main O
uses O
a O
DES O
encryption O
algorithm O
to O
encode O
these O
addresses O
. O
The O
examples O
below O
show O
the O
plaintext O
key O
“ O
TEST O
” O
to O
decrypt O
encoded O
hexadecimal O
strings O
( O
jUtils.decrypt O
( O
) O
) O
. O
These O
encoded O
strings O
contain O
the O
new O
URL O
addresses O
not O
seen O
in O
older O
versions O
of O
FakeSpy B-Malware
. O
Comparing O
strings O
from O
an O
old O
FakeSpy B-Malware
sample O
to O
a O
new O
one O
. O
WHO O
IS O
BEHIND O
FAKESPY B-Malware
’ O
S O
SMISHING O
CAMPAIGNS O
? O
The O
Cybereason B-Organization
Nocturnus I-Organization
team O
suspects O
that O
the O
malware O
operators O
and O
authors O
are O
Chinese O
speakers O
. O
Our O
findings O
, O
along O
with O
previous O
research O
, O
indicates O
that O
the O
threat O
actor O
behind O
these O
recent O
campaigns O
is O
likely O
a O
Chinese O
group O
dubbed O
“ O
Roaming B-Organization
Mantis I-Organization
” O
. O
Roaming B-Organization
Mantis I-Organization
is O
believed O
to O
be O
a O
Chinese O
threat O
actor O
group O
first O
discovered O
in O
April O
2018 O
that O
has O
continuously O
evolved O
. O
In O
the O
beginning O
, O
this O
threat O
group O
mainly O
targeted O
Asian O
countries O
. O
Now O
, O
they O
are O
expanding O
their O
activity O
to O
audiences O
all O
around O
the O
world O
. O
As O
part O
of O
their O
activities O
, O
they O
are O
known O
for O
hijacking O
DNS O
settings O
on O
Japanese O
routers O
that O
redirect O
users O
to O
malicious O
IP O
addresses O
, O
creating O
disguised O
malicious O
Android B-System
apps O
that O
appear O
as O
popular O
apps O
, O
stealing O
Apple B-Organization
ID O
credentials O
by O
creating O
Apple B-Organization
phishing O
pages O
, O
as O
well O
as O
performing O
web O
crypto O
mining O
on O
browsers O
. O
CONNECTION O
TO O
CHINA O
Chinese O
server O
infrastructure O
: O
FakeSpy B-Malware
applications O
send O
stolen O
information O
to O
C2 O
domains O
with O
.club B-Indicator
TLDs I-Indicator
and O
URLs O
ending O
with O
/servlet/ B-Indicator
[ I-Indicator
C2 I-Indicator
Command I-Indicator
] I-Indicator
( O
mentioned O
above O
in O
the O
“ O
Stealing O
Sensitive O
Information O
” O
section O
) O
. O
All O
of O
these O
domains O
are O
registered O
to O
‘ O
Li O
Jun O
Biao O
’ O
on O
Bizcn B-Organization
, I-Organization
Inc I-Organization
, O
a O
Chinese O
Internet O
application O
service O
provider O
. O
Chinese O
language O
traces O
in O
the O
code O
: O
During O
the O
investigation O
, O
the O
Cybereason B-Organization
Nocturnus I-Organization
team O
discovered O
code O
artifacts O
that O
may O
indicate O
Chinese O
threat O
actors O
. O
For O
example O
, O
we O
found O
several O
suspicious O
strings O
written O
in O
the O
Chinese O
language O
in O
a O
function O
called O
isNetworkAvailable O
, O
previously O
discussed O
in O
this O
blog O
: O
An O
almost O
identical O
function O
is O
mentioned O
in O
an O
earlier O
research O
, O
that O
ties O
FakeSpy B-Malware
and O
other O
malware O
to O
the O
Roaming B-Organization
Mantis I-Organization
group O
. O
Chinese O
APK O
names O
: O
Some O
of O
FakeSpy B-Malware
’ O
s O
APK O
package O
names O
contain O
anglicized O
Chinese O
( O
Mandarin O
) O
words O
that O
might O
be O
related O
to O
Chinese O
songs O
and O
lyrics O
, O
food O
, O
provinces O
, O
etc O
. O
CONCLUSIONS O
FakeSpy B-Malware
was O
first O
seen O
in O
October O
2017 O
and O
until O
recently O
mainly O
targeted O
East O
Asian O
countries O
. O
Our O
research O
shows O
fresh O
developments O
in O
the O
malware O
’ O
s O
code O
and O
sophistication O
, O
as O
well O
as O
an O
expansion O
to O
target O
Europe O
and O
North O
America O
. O
This O
mobile O
malware O
masquerades O
as O
legitimate O
, O
trusted O
postal O
service O
applications O
so O
that O
it O
can O
gain O
the O
users O
trust O
. O
Once O
it O
has O
been O
installed O
, O
it O
requests O
permissions O
from O
the O
user O
so O
that O
it O
can O
steal O
sensitive O
data O
, O
manipulate O
SMS O
messages O
, O
and O
potentially O
infect O
contacts O
of O
the O
user O
. O
The O
malware O
now O
targets O
more O
countries O
all O
over O
the O
world O
by O
masquerading O
as O
official O
post O
office O
and O
transportation O
services O
apps O
. O
These O
apps O
appear O
legitimate O
due O
to O
their O
app O
logo O
, O
UI O
appearance O
, O
and O
redirects O
to O
the O
carrier O
webpage O
-- O
all O
luring O
end O
users O
to O
believe O
it O
’ O
s O
the O
original O
one O
. O
In O
this O
blog O
, O
we O
showed O
that O
the O
threat O
actor O
behind O
the O
recent O
FakeSpy B-Malware
campaign O
is O
a O
Chinese-speaking O
group O
called O
“ O
Roaming B-Organization
Mantis I-Organization
” O
known O
to O
operate O
mainly O
in O
Asia O
. O
It O
is O
interesting O
to O
see O
that O
the O
group O
has O
expanded O
their O
operation O
to O
other O
regions O
, O
such O
as O
the O
United O
States O
and O
Europe O
. O
The O
malware O
authors O
seem O
to O
be O
putting O
a O
lot O
of O
effort O
into O
improving O
this O
malware O
, O
bundling O
it O
with O
numerous O
new O
upgrades O
that O
make O
it O
more O
sophisticated O
, O
evasive O
, O
and O
well-equipped O
. O
These O
improvements O
render O
FakeSpy B-Malware
one O
of O
the O
most O
powerful O
information O
stealers O
on O
the O
market O
. O
We O
anticipate O
this O
malware O
to O
continue O
to O
evolve O
with O
additional O
new O
features O
; O
the O
only O
question O
now O
is O
when O
we O
will O
see O
the O
next O
wave O
. O
First O
Twitter‑controlled B-System
Android B-System
botnet O
discovered O
Detected O
by O
ESET B-Organization
as O
Android/Twitoor B-Malware
, O
this O
malware O
is O
unique O
because O
of O
its O
resilience O
mechanism O
. O
Instead O
of O
being O
controlled O
by O
a O
traditional O
command-and-control O
server O
, O
it O
receives O
instructions O
via O
tweets O
. O
24 O
Aug O
2016 O
- O
02:05PM O
Android/Twitoor B-Malware
is O
a O
backdoor O
capable O
of O
downloading O
other O
malware O
onto O
an O
infected O
device O
. O
It O
has O
been O
active O
for O
around O
one O
month O
. O
This O
malicious O
app O
, O
detected O
by O
ESET B-Organization
as O
a O
variant O
of O
Android/Twitoor.A B-Malware
, O
can O
’ O
t O
be O
found O
on O
any O
official O
Android B-System
app I-System
store I-System
– O
it O
probably O
spreads O
by O
SMS O
or O
via O
malicious O
URLs O
. O
It O
impersonates O
a O
porn O
player O
app O
or O
MMS O
application O
but O
without O
having O
their O
functionality O
. O
After O
launching O
, O
it O
hides O
its O
presence O
on O
the O
system O
and O
checks O
the O
defined O
Twitter B-System
account O
at O
regular O
intervals O
for O
commands O
. O
Based O
on O
received O
commands O
, O
it O
can O
either O
download O
malicious O
apps O
or O
switch O
the O
C O
& O
C O
Twitter B-System
account O
to O
another O
one O
. O
“ O
Using O
Twitter B-System
instead O
of O
command-and-control O
( O
C O
& O
C O
) O
servers O
is O
pretty O
innovative O
for O
an O
Android B-System
botnet. O
” O
“ O
Using O
Twitter B-Organization
instead O
of O
command-and-control O
( O
C O
& O
C O
) O
servers O
is O
pretty O
innovative O
for O
an O
Android B-System
botnet O
, O
” O
says O
Lukáš O
Štefanko O
, O
the O
ESET B-Organization
malware O
researcher O
who O
discovered O
the O
malicious O
app O
. O
Malware O
that O
enslaves O
devices O
to O
form O
botnets O
needs O
to O
be O
able O
to O
receive O
updated O
instructions O
. O
That O
communication O
is O
an O
Achilles O
heel O
for O
any O
botnet O
– O
it O
may O
raise O
suspicion O
and O
, O
cutting O
the O
bots O
off O
is O
always O
lethal O
to O
the O
botnet O
’ O
s O
functioning O
. O
Additionally O
, O
should O
the O
command-and-control O
( O
C O
& O
C O
) O
servers O
get O
seized O
by O
the O
authorities O
, O
it O
would O
ultimately O
lead O
to O
disclosing O
information O
about O
the O
entire O
botnet O
. O
To O
make O
the O
Twitoor B-Malware
botnet O
’ O
s O
communication O
more O
resilient O
, O
botnet O
designers O
took O
various O
steps O
like O
encrypting O
their O
messages O
, O
using O
complex O
topologies O
of O
the O
C O
& O
C O
network O
– O
or O
using O
innovative O
means O
for O
communication O
, O
among O
them O
the O
use O
of O
social O
networks O
. O
“ O
These O
communication O
channels O
are O
hard O
to O
discover O
and O
even O
harder O
to O
block O
entirely O
. O
On O
the O
other O
hand O
, O
it O
’ O
s O
extremely O
easy O
for O
the O
crooks O
to O
re-direct O
communications O
to O
another O
freshly O
created O
account O
, O
” O
explains O
Štefanko O
. O
In O
the O
Windows B-System
space O
, O
Twitter B-Organization
, O
founded O
in O
2006 O
, O
was O
first O
used O
to O
control O
botnets O
as O
early O
as O
in O
2009 O
. O
Android B-System
bots O
have O
also O
already O
been O
found O
being O
controlled O
via O
other O
non-traditional O
means O
– O
blogs O
or O
some O
of O
the O
many O
cloud O
messaging O
systems O
like O
Google B-Organization
’ O
s O
or O
Baidu B-Organization
’ O
s O
– O
but O
Twitoor B-Malware
is O
the O
first O
Twitter-based B-System
bot O
malware O
, O
according O
to O
Štefanko O
. O
“ O
In O
the O
future O
, O
we O
can O
expect O
that O
the O
bad O
guys O
will O
try O
to O
make O
use O
of O
Facebook B-System
statuses O
or O
deploy O
LinkedIn B-System
and O
other O
social O
networks O
” O
, O
states O
ESET B-Organization
’ O
s O
researcher O
. O
Currently O
, O
the O
Twitoor B-Malware
trojan O
has O
been O
downloading O
several O
versions O
of O
mobile O
banking O
malware O
. O
However O
, O
the O
botnet O
operators O
can O
start O
distributing O
other O
malware O
, O
including O
ransomware O
, O
at O
any O
time O
warns O
Štefanko O
. O
“ O
Twitoor B-Malware
serves O
as O
another O
example O
of O
how O
cybercriminals O
keep O
on O
innovating O
their O
business O
, O
” O
Stefanko O
continues O
. O
“ O
The O
takeaway O
? O
Internet O
users O
should O
keep O
on O
securing O
their O
activities O
with O
good O
security O
solutions O
for O
both O
computers O
and O
mobile O
devices. O
” O
Hashes O
: O
E5212D4416486AF42E7ED1F58A526AEF77BE89BE B-Indicator
A9891222232145581FE8D0D483EDB4B18836BCFC B-Indicator
AFF9F39A6CA5D68C599B30012D79DA29E2672C6E B-Indicator
Insidious O
Android B-System
malware O
gives O
up O
all O
malicious O
features O
but O
one O
to O
gain O
stealth O
ESET B-Organization
researchers O
detect O
a O
new O
way O
of O
misusing O
Accessibility O
Service O
, O
the O
Achilles O
’ O
heel O
of O
Android B-System
security O
22 O
May O
2020 O
- O
03:00PM O
ESET B-Organization
researchers O
have O
analyzed O
an O
extremely O
dangerous O
Android B-System
app O
that O
can O
perform O
a O
host O
of O
nefarious O
actions O
, O
notably O
wiping O
out O
the O
victim O
’ O
s O
bank O
account O
or O
cryptocurrency O
wallet O
and O
taking O
over O
their O
email O
or O
social O
media O
accounts O
. O
Called O
“ O
DEFENSOR B-Malware
ID I-Malware
” O
, O
the O
banking O
trojan O
was O
available O
on O
Google B-System
Play I-System
at O
the O
time O
of O
the O
analysis O
. O
The O
app O
is O
fitted O
with O
standard O
information-stealing O
capabilities O
; O
however O
, O
this O
banker O
is O
exceptionally O
insidious O
in O
that O
after O
installation O
it O
requires O
a O
single O
action O
from O
the O
victim O
– O
enable O
Android B-System
’ O
s O
Accessibility O
Service O
– O
to O
fully O
unleash O
the O
app O
’ O
s O
malicious O
functionality O
. O
The O
DEFENSOR B-Malware
ID I-Malware
app O
made O
it O
onto O
the O
heavily O
guarded O
Google B-System
Play I-System
store I-System
thanks O
to O
its O
extreme O
stealth O
. O
Its O
creators O
reduced O
the O
app O
’ O
s O
malicious O
surface O
to O
the O
bare O
minimum O
by O
removing O
all O
potentially O
malicious O
functionalities O
but O
one O
: O
abusing O
Accessibility O
Service O
. O
Accessibility O
Service O
is O
long O
known O
to O
be O
the O
Achilles O
’ O
heel O
of O
the O
Android B-System
operating O
system O
. O
Security O
solutions O
can O
detect O
it O
in O
countless O
combinations O
with O
other O
suspicious O
permissions O
and O
functions O
, O
or O
malicious O
functionalities O
– O
but O
when O
faced O
with O
no O
additional O
functionality O
nor O
permission O
, O
all O
failed O
to O
trigger O
any O
alarm O
on O
DEFENSOR B-Malware
ID I-Malware
. O
By O
“ O
all O
” O
we O
mean O
all O
security O
mechanisms O
guarding O
the O
official O
Android B-System
app I-System
store I-System
( O
including O
the O
detection O
engines O
of O
the O
members O
of O
the O
App B-Organization
Defense I-Organization
Alliance I-Organization
) O
and O
all O
security O
vendors O
participating O
in O
the O
VirusTotal B-Organization
program O
( O
see O
Figure O
1 O
) O
. O
DEFENSOR B-Malware
ID I-Malware
was O
released O
on O
Feb O
3 O
, O
2020 O
and O
last O
updated O
to O
v1.4 O
on O
May O
6 O
, O
2020 O
. O
The O
latest O
version O
is O
analyzed O
here O
; O
we O
weren O
’ O
t O
able O
to O
determine O
if O
the O
earlier O
versions O
were O
also O
malicious O
. O
According O
to O
its O
profile O
at O
Google B-System
Play I-System
( O
see O
Figure O
2 O
) O
the O
app O
reached O
a O
mere O
10+ O
downloads O
. O
We O
reported O
it O
to O
Google B-Organization
on O
May O
16 O
, O
2020 O
and O
since O
May O
19 O
, O
2020 O
the O
app O
has O
no O
longer O
been O
available O
on O
Google B-System
Play I-System
. O
The O
developer O
name O
used O
, O
GAS O
Brazil O
, O
suggests O
the O
criminals O
behind O
the O
app O
targeted O
Brazilian O
users O
. O
Apart O
from O
including O
the O
country O
’ O
s O
name O
, O
the O
app O
’ O
s O
name O
is O
probably O
intended O
to O
imply O
a O
relationship O
with O
the O
antifraud O
solution O
named O
GAS B-System
Tecnologia I-System
. O
That O
security O
software O
is O
commonly O
installed O
on O
computers O
in O
Brazil O
as O
several O
banks O
require O
it O
to O
log O
into O
their O
online O
banking O
. O
However O
, O
there O
is O
also O
an O
English O
version O
of O
the O
DEFENSOR B-Malware
ID I-Malware
app O
( O
see O
Figure O
3 O
) O
besides O
the O
Portuguese O
one O
, O
and O
that O
app O
has O
neither O
geographical O
nor O
language O
restrictions O
. O
Playing O
further O
off O
the O
suggested O
GAS B-System
Tecnologia I-System
link O
, O
the O
app O
promises O
better O
security O
for O
its O
users O
. O
The O
description O
in O
Portuguese O
promises O
more O
protection O
for O
the O
user O
’ O
s O
applications O
, O
including O
end-to-end O
encryption O
. O
Deceptively O
, O
the O
app O
was O
listed O
in O
the O
Education O
section O
. O
Functionality O
After O
starting O
, O
DEFENSOR B-Malware
ID I-Malware
requests O
the O
following O
permissions O
: O
allow O
modify O
system O
settings O
permit O
drawing O
over O
other O
apps O
, O
and O
activate O
accessibility O
services O
. O
If O
an O
unsuspecting O
user O
grants O
these O
permissions O
( O
see O
Figure O
4 O
) O
, O
the O
trojan O
can O
read O
any O
text O
displayed O
in O
any O
app O
the O
user O
may O
launch O
– O
and O
send O
it O
to O
the O
attackers O
. O
This O
means O
the O
attackers O
can O
steal O
the O
victim O
’ O
s O
credentials O
for O
logging O
into O
apps O
, O
SMS O
and O
email O
messages O
, O
displayed O
cryptocurrency O
private O
keys O
, O
and O
even O
software-generated O
2FA O
codes O
. O
The O
fact O
the O
trojan O
can O
steal O
both O
the O
victim O
’ O
s O
credentials O
and O
also O
can O
control O
their O
SMS O
messages O
and O
generated O
2FA O
codes O
means O
DEFENSOR B-Malware
ID I-Malware
’ O
s O
operators O
can O
bypass O
two-factor O
authentication O
. O
This O
opens O
the O
door O
to O
, O
for O
example O
, O
fully O
controlling O
the O
victim O
’ O
s O
bank O
account O
. O
To O
make O
sure O
the O
trojan O
survives O
a O
device O
restart O
, O
it O
abuses O
already O
activated O
accessibility O
services O
that O
will O
launch O
the O
trojan O
right O
after O
start O
. O
Our O
analysis O
shows O
the O
DEFENSOR B-Malware
ID I-Malware
trojan O
can O
execute O
17 O
commands O
received O
from O
the O
attacker-controlled O
server O
such O
as O
uninstalling O
an O
app O
, O
launching O
an O
app O
and O
then O
performing O
any O
click/tap O
action O
controlled O
remotely O
by O
the O
attacker O
( O
see O
Figure O
5 O
) O
. O
In O
2018 O
, O
we O
saw O
similar O
behavior O
, O
but O
all O
the O
click O
actions O
were O
hardcoded O
and O
suited O
only O
for O
the O
app O
of O
the O
attacker O
’ O
s O
choice O
. O
In O
this O
case O
, O
the O
attacker O
can O
get O
the O
list O
of O
all O
installed O
apps O
and O
then O
remotely O
launch O
the O
victim O
’ O
s O
app O
of O
their O
choice O
to O
either O
steal O
credentials O
or O
perform O
malicious O
actions O
( O
e.g O
. O
send O
funds O
via O
a O
wire O
transfer O
) O
. O
We O
believe O
that O
this O
is O
the O
reason O
the O
DEFENSOR B-Malware
ID I-Malware
trojan O
requests O
the O
user O
to O
allow O
“ O
Modify O
system O
settings O
” O
. O
Subsequently O
, O
the O
malware O
will O
change O
the O
screen O
off O
time-out O
to O
10 O
minutes O
. O
This O
means O
that O
, O
unless O
victims O
lock O
their O
devices O
via O
the O
hardware O
button O
, O
the O
timer O
provides O
plenty O
of O
time O
for O
the O
malware O
to O
remotely O
perform O
malicious O
, O
in-app O
operations O
. O
If O
the O
device O
gets O
locked O
, O
the O
malware O
can O
’ O
t O
unlock O
it O
. O
Malware O
data O
leak O
When O
we O
analyzed O
the O
sample O
, O
we O
realized O
that O
the O
malware O
operators O
left O
the O
remote O
database O
with O
some O
of O
the O
victims O
’ O
data O
freely O
accessible O
, O
without O
any O
authentication O
. O
The O
database O
contained O
the O
last O
activity O
performed O
on O
around O
60 O
compromised O
devices O
. O
We O
found O
no O
other O
information O
stolen O
from O
the O
victims O
to O
be O
accessible O
. O
Thanks O
to O
this O
data O
leak O
, O
we O
were O
able O
to O
confirm O
that O
the O
malware O
really O
worked O
as O
designed O
: O
the O
attacker O
had O
access O
to O
the O
victims O
’ O
entered O
credentials O
, O
displayed O
or O
written O
emails O
and O
messages O
, O
etc O
. O
Once O
we O
reached O
the O
non-secured O
database O
, O
we O
were O
able O
to O
directly O
observe O
the O
app O
’ O
s O
malicious O
behavior O
. O
To O
illustrate O
the O
level O
of O
threat O
the O
DEFENSOR B-Malware
ID I-Malware
app O
posed O
, O
we O
performed O
three O
tests O
. O
First O
, O
we O
launched O
a O
banking O
app O
and O
entered O
the O
credentials O
there O
. O
The O
credentials O
were O
immediately O
available O
in O
the O
leaky O
database O
– O
see O
Figure O
6 O
. O
Figure O
6 O
. O
The O
banking O
app O
test O
: O
the O
credentials O
as O
entered O
( O
left O
) O
and O
as O
available O
in O
the O
database O
( O
right O
) O
Second O
, O
we O
wrote O
a O
test O
message O
in O
an O
email O
client O
. O
We O
saw O
the O
message O
uploaded O
to O
the O
attackers O
’ O
server O
within O
a O
second O
– O
see O
Figure O
7 O
. O
Figure O
7 O
. O
The O
email O
message O
test O
: O
the O
message O
as O
written O
( O
left O
) O
and O
as O
available O
in O
the O
database O
( O
right O
) O
Third O
, O
we O
documented O
the O
trojan O
retrieving O
the O
Google B-System
Authenticator I-System
2FA O
code O
. O
Figure O
8 O
. O
The O
software O
generated O
2FA O
code O
as O
it O
appeared O
on O
the O
device O
’ O
s O
display O
( O
left O
) O
and O
as O
available O
in O
the O
database O
( O
right O
) O
Along O
with O
the O
malicious O
DEFENSOR O
ID O
app O
, O
another O
malicious O
app O
named O
Defensor B-Malware
Digital I-Malware
was O
discovered O
. O
Both O
apps O
shared O
the O
same O
C O
& O
C O
server O
, O
but O
we O
couldn O
’ O
t O
investigate O
the O
latter O
as O
it O
had O
already O
been O
removed O
from O
the O
Google B-System
Play I-System
store I-System
. O
Indicators O
of O
Compromise O
( O
IoCs O
) O
Package O
Name O
Hash O
ESET B-Organization
detection O
name O
com.secure.protect.world B-Indicator
F17AEBC741957AA21CFE7C7D7BAEC0900E863F61 B-Indicator
Android/Spy.BanBra.A B-Indicator
com.brazil.android.free B-Indicator
EA069A5C96DC1DB0715923EB68192FD325F3D3CE B-Indicator
Android/Spy.BanBra.A B-Indicator
MITRE B-Organization
ATT O
& O
CK O
techniques O
Tactic O
ID O
Name O
Description O
Initial O
Access O
T1475 O
Deliver O
Malicious O
App O
via O
Authorized O
App B-System
Store I-System
Impersonates O
security O
app O
on O
Google B-System
Play I-System
. O
T1444 O
Masquerade O
as O
Legitimate O
Application O
Impersonates O
legitimate O
GAS B-System
Tecnologia I-System
application O
. O
Discovery O
T1418 O
Application O
Discovery O
Sends O
list O
of O
installed O
apps O
on O
device O
. O
Impact O
T1516 O
Input O
Injection O
Can O
enter O
text O
and O
perform O
clicks O
on O
behalf O
of O
user O
. O
Collection O
T1417 O
Input O
Capture O
Records O
user O
input O
data O
. O
Command O
and O
Control O
T1437 O
Standard O
Application O
Layer O
Protocol O
Uses O
Firebase O
Cloud O
Messaging O
for O
C O
& O
C O
. O