Why O Did O Chinese O Spyware O Linger O in O U.S O . O Phones O ? O November O 16 O , O 2016 O In O what O 's O being O chalked O up O as O an O apparent O mistake O , O more O than O 120,000 O Android B-System phones O sold O in O the O U.S. O were O shipped O with O spying O code O that O sent O text O messages O , O call O logs O and O other O sensitive O data O to O a O server O in O Shanghai O . O The O New B-Organization York I-Organization Times I-Organization reported O on O Nov. O 15 O that O Kryptowire B-Organization , O a O mobile O enterprise O security O company O , O discovered O the O code O on O a O lower-end O smartphone O made O by O BLU B-Organization Products O of O Doral O , O Fla O . O The O phones O are O sold O at O Best B-Organization Buy I-Organization and O Amazon.com B-Organization , O among O other O retail O outlets O . O Kryptowire B-Organization says O the O code O , O which O it O found O on O a O BLU B-Organization R1 O HD O devices O , O transmitted O fine-grained O location O information O and O allowed O for O the O remote O installation O of O other O apps O . O Text O message O and O call O logs O were O transmitted O every O 72 O hours O to O the O Shanghai O server O , O and O once O a O day O for O other O personally O identifiable O data O , O the O company O says O . O It O turns O out O , O however O , O that O other O security O researchers O noticed O suspicious O and O faulty O code O on O BLU B-Organization devices O as O early O as O March O 2015 O , O and O it O has O taken O nearly O that O long O to O remove O it O from O the O company O 's O devices O . O The O finding O , O in O part O , O shows O the O risk O that O can O come O in O opting O for O less O expensive O smartphones O , O whose O manufacturers O may O not O diligently O fix O security B-Vulnerability vulnerabilities I-Vulnerability . O It O 's O also O raising O eyebrows O because O of O the O connection O with O China O , O which O has O frequently O sparred O with O the O U.S. O over O cyber O espionage O . O BLU B-Organization Products O has O now O updated O its O phones O to O remove O the O spying O code O , O which O most O likely O would O have O never O been O detected O by O regular O users O . O The O code O never O informed O phone O users O that O it O was O collecting O that O data O , O a O behavior O uniformly O viewed O by O many O as O a O serious O security O concern O . O The O developer O of O the O code O , O Shanghai B-Organization Adups I-Organization Technology I-Organization Co. I-Organization , O has O apologized O , O contending O that O the O code O was O intended O for O another O one O of O its O clients O who O requested O better O blocking O of O junk O text O messages O and O marketing O calls O . O Vulnerabilities O Reported O BLU O Products O , O founded O in O 2009 O , O makes O lower-end O Android-powered B-System smartphones O that O sell O for O as O little O as O $ O 50 O on O Amazon B-Organization . O Like O many O original O equipment O manufacturers O , O it O uses O software O components O from O other O developers O . O The O company O uses O a O type O of O software O from O Adups B-Organization that O 's O nicknamed O FOTA B-System , O short O for O firmware O over-the-air O . O The O software O manages O the O delivery O of O firmware O updates O over-the-air O , O the O term O used O for O transmission O via O a O mobile O network O . O Firmware O is O low-level O code O deep O in O an O operating O system O that O often O has O high O access O privileges O , O so O it O 's O critical O that O it O 's O verified O and O contains O no O software O vulnerabilities O . O Long O before O Kryptowire B-Organization 's O announcement O , O Tim O Strazzere O , O a O mobile O security O researcher O with O RedNaga B-Organization Security I-Organization , O contacted O BLU O Products O in O March O 2015 O after O he O found O two O vulnerabilities O that O could O be O traced O to O Adup B-Organization 's O code O . O Those O vulnerabilities O could O have O enabled O someone O to O gain O broad O access O to O an O Android B-System device O . O Strazzere O 's O colleague O , O Jon O Sawyer O , O suggested O on O Twitter B-Organization that O the O vulnerabilities O might O have O not O been O there O by O mistake O , O but O rather O included O as O intentionally O coded O backdoors O . O He O posted O a O tweet O to O The O New B-Organization York I-Organization Times I-Organization report O , O sarcastically O writing O , O " O If O only O two O people O had O called O this O company O out O for O their O backdoors O several O times O over O the O last O few O years O . O '' O Strazzere O 's O experience O in O trying O to O contact O both O vendors O last O year O is O typical O of O the O frustrations O frequently O faced O by O security O researchers O . O " O I O tried O reaching O out O to O Adups B-Organization and O never O heard O back O , O '' O Strazzere O tells O Information B-Organization Security I-Organization Media I-Organization Group I-Organization . O " O BLU B-Organization said O they O had O no O security O department O when O I O emailed O them O . O '' O Strazzere O says O he O also O failed O to O reach O MediaTek B-Organization , O a O Taiwanese O fabless O semiconductor O manufacturer O whose O chipsets O that O powered O BLU B-Organization phones O also O contained O Adups B-Organization software O . O To O their O credit O , O both O Google B-Organization and O Amazon B-Organization appear O to O have O put O pressure O on O device O manufacturers O to O fix O their O devices O when O flaws O are O found O , O Strazzere O says O . O For O Google B-Organization , O Android O security O issues O - O even O if O not O in O the O core O operating O code O - O are O a O reputation O threat O , O and O for O Amazon B-Organization , O a O product O quality O issue O . O But O devices O sold O outside O of O Amazon B-Organization " O might O not O have O ever O seen O fixes O , O '' O he O says O . O Officials O at O BLU B-Organization could O n't O be O immediately O reached O for O comment O . O Attitude O Change O The O disinterest O in O the O issues O appears O to O have O changed O with O The O New B-Organization York I-Organization Times I-Organization report O , O which O lit O a O fire O underneath O Adups B-Organization and O BLU B-Organization . O Adups B-Organization addressed O the O issue O in O a O Nov. O 16 O news O release O , O writing O that O some O products O made O by O BLU B-Organization were O updated O in O June O with O a O version O of O its O FOTA B-System that O had O actually O been O intended O for O other O clients O who O had O requested O an O ability O to O stop O text O spam O . O That O version O flags O messages O " O containing O certain O language O associated O with O junk O texts O and O flags O numbers O associated O with O junk O calls O and O not O in O a O user O 's O contacts O , O '' O the O company O says O . O Manufacturers O should O be O keeping O close O tabs O on O what O software O ends O up O on O their O devices O . O But O it O would O appear O that O BLU B-Organization only O took O action O after O Kryptowire B-Organization notified O it O along O with O Google B-Organization , O Adups B-Organization and O Amazon B-Organization . O " O When O BLU B-Organization raised O objections O , O Adups B-Organization took O immediate O measures O to O disable O that O functionality O on O BLU B-Organization phones O , O '' O Adups I-Organization says O . O The O greater O worry O is O that O these O situations O may O sometimes O not O be O simple O mistakes O . O Security O experts O have O long O warned O of O the O ability O of O advanced O adversaries O to O subvert O hardware O and O software O supply O chains O . O Also O , O the O software B-Vulnerability vulnerabilities I-Vulnerability pointed O out O in O the O FOTA B-System software O by O Strazzere O in O 2015 O could O have O been O taken O advantage O of O by O cybercriminals O looking O to O steal O bank O account O details O or O execute O other O frauds O . O Strazzere O advises O that O consumers O should O look O at O the O pedigree O of O mobile O manufacturers O and O take O a O close O look O at O their O security O track O record O before O making O a O decision O on O what O device O to O buy O . O " O In O the O end O , O the O consumer O needs O to O vote O with O their O wallet O , O '' O he O says O . O Skygofree B-Malware : O Following O in O the O footsteps O of O HackingTeam B-Organization 16 O JAN O 2018 O At O the O beginning O of O October O 2017 O , O we O discovered O new O Android B-System spyware O with O several O features O previously O unseen O in O the O wild O . O In O the O course O of O further O research O , O we O found O a O number O of O related O samples O that O point O to O a O long-term O development O process O . O We O believe O the O initial O versions O of O this O malware O were O created O at O least O three O years O ago O – O at O the O end O of O 2014 O . O Since O then O , O the O implant O ’ O s O functionality O has O been O improving O and O remarkable O new O features O implemented O , O such O as O the O ability O to O record O audio O surroundings O via O the O microphone O when O an O infected O device O is O in O a O specified O location O ; O the O stealing O of O WhatsApp B-System messages O via O Accessibility O Services O ; O and O the O ability O to O connect O an O infected O device O to O Wi-Fi O networks O controlled O by O cybercriminals O . O We O observed O many O web O landing O pages O that O mimic O the O sites O of O mobile O operators O and O which O are O used O to O spread O the O Android B-System implants O . O These O domains O have O been O registered O by O the O attackers O since O 2015 O . O According O to O our O telemetry O , O that O was O the O year O the O distribution O campaign O was O at O its O most O active O . O The O activities O continue O : O the O most O recently O observed O domain O was O registered O on O October O 31 O , O 2017 O . O Based O on O our O KSN O statistics O , O there O are O several O infected O individuals O , O exclusively O in O Italy O . O Moreover O , O as O we O dived O deeper O into O the O investigation O , O we O discovered O several O spyware O tools O for O Windows B-System that O form O an O implant O for O exfiltrating O sensitive O data O on O a O targeted O machine O . O The O version O we O found O was O built O at O the O beginning O of O 2017 O , O and O at O the O moment O we O are O not O sure O whether O this O implant O has O been O used O in O the O wild O . O We O named O the O malware O Skygofree B-Malware , O because O we O found O the O word O in O one O of O the O domains O * O . O Malware O Features O Android B-System According O to O the O observed O samples O and O their O signatures O , O early O versions O of O this O Android B-System malware O were O developed O by O the O end O of O 2014 O and O the O campaign O has O remained O active O ever O since O . O The O code O and O functionality O have O changed O numerous O times O ; O from O simple O unobfuscated O malware O at O the O beginning O to O sophisticated O multi-stage O spyware O that O gives O attackers O full O remote O control O of O the O infected O device O . O We O have O examined O all O the O detected O versions O , O including O the O latest O one O that O is O signed O by O a O certificate O valid O from O September O 14 O , O 2017 O . O The O implant O provides O the O ability O to O grab O a O lot O of O exfiltrated O data O , O like O call O records O , O text O messages O , O geolocation O , O surrounding O audio O , O calendar O events O , O and O other O memory O information O stored O on O the O device O . O After O manual O launch O , O it O shows O a O fake O welcome O notification O to O the O user O : O Dear O Customer O , O we O ’ O re O updating O your O configuration O and O it O will O be O ready O as O soon O as O possible O . O At O the O same O time O , O it O hides O an O icon O and O starts O background O services O to O hide O further O actions O from O the O user O . O Service O Name O Purpose O AndroidAlarmManager O Uploading O last O recorded O .amr O audio O AndroidSystemService O Audio O recording O AndroidSystemQueues O Location O tracking O with O movement O detection O ClearSystems O GSM B-System tracking O ( O CID O , O LAC O , O PSC O ) O ClipService O Clipboard O stealing O AndroidFileManager O Uploading O all O exfiltrated O data O AndroidPush O XMPP O С O & O C O protocol O ( O url.plus:5223 B-Indicator ) O RegistrationService O Registration O on O C O & O C O via O HTTP O ( O url.plus/app/pro/ B-Indicator ) O Interestingly O , O a O self-protection O feature O was O implemented O in O almost O every O service O . O Since O in O Android B-System 8.0 I-System ( O SDK O API O 26 O ) O the O system O is O able O to O kill O idle O services O , O this O code O raises O a O fake O update O notification O to O prevent O it O : O Cybercriminals O have O the O ability O to O control O the O implant O via O HTTP O , O XMPP O , O binary O SMS O and O FirebaseCloudMessaging O ( O or O GoogleCloudMessaging O in O older O versions O ) O protocols O . O Such O a O diversity O of O protocols O gives O the O attackers O more O flexible O control O . O In O the O latest O implant O versions O there O are O 48 O different O commands O . O You O can O find O a O full O list O with O short O descriptions O in O the O Appendix O . O Here O are O some O of O the O most O notable O : O ‘ O geofence O ’ O – O this O command O adds O a O specified O location O to O the O implant O ’ O s O internal O database O and O when O it O matches O a O device O ’ O s O current O location O the O malware O triggers O and O begins O to O record O surrounding O audio O . O ” O social O ” O – O this O command O that O starts O the O ‘ O AndroidMDMSupport O ’ O service O – O this O allows O the O files O of O any O other O installed O application O to O be O grabbed O . O The O service O name O makes O it O clear O that O by O applications O the O attackers O mean O MDM O solutions O that O are O business-specific O tools O . O The O operator O can O specify O a O path O with O the O database O of O any O targeted O application O and O server-side O PHP O script O name O for O uploading O . O Several O hardcoded O applications O targeted O by O the O MDM-grabbing O command O ‘ O wifi O ’ O – O this O command O creates O a O new O Wi-Fi O connection O with O specified O configurations O from O the O command O and O enable O Wi-Fi O if O it O is O disabled O . O So O , O when O a O device O connects O to O the O established O network O , O this O process O will O be O in O silent O and O automatic O mode O . O This O command O is O used O to O connect O the O victim O to O a O Wi-Fi O network O controlled O by O the O cybercriminals O to O perform O traffic O sniffing O and O man-in-the-middle O ( O MitM O ) O attacks O . O addWifiConfig O method O code O fragments O ‘ O camera O ’ O – O this O command O records O a O video/capture O a O photo O using O the O front-facing O camera O when O someone O next O unlocks O the O device O . O Some O versions O of O the O Skygofree B-Malware feature O the O self-protection O ability O exclusively O for O Huawei B-Organization devices O . O There O is O a O ‘ O protected O apps O ’ O list O in O this O brand O ’ O s O smartphones O , O related O to O a O battery-saving O concept O . O Apps O not O selected O as O protected O apps O stop O working O once O the O screen O is O off O and O await O re-activation O , O so O the O implant O is O able O to O determine O that O it O is O running O on O a O Huawei B-Organization device O and O add O itself O to O this O list O . O Due O to O this O feature O , O it O is O clear O that O the O developers O paid O special O attention O to O the O work O of O the O implant O on O Huawei B-Organization devices O . O Also O , O we O found O a O debug O version O of O the O implant O ( O 70a937b2504b3ad6c623581424c7e53d B-Indicator ) O that O contains O interesting O constants O , O including O the O version O of O the O spyware O . O Debug O BuildConfig O with O the O version O After O a O deep O analysis O of O all O discovered O versions O of O Skygofree B-Malware , O we O made O an O approximate O timeline O of O the O implant O ’ O s O evolution O . O Mobile O implant O evolution O timeline O However O , O some O facts O indicate O that O the O APK O samples O from O stage O two O can O also O be O used O separately O as O the O first O step O of O the O infection O . O Below O is O a O list O of O the O payloads O used O by O the O Skygofree B-Malware implant O in O the O second O and O third O stages O . O Reverse O shell O payload O The O reverse O shell O module O is O an O external O ELF O file O compiled O by O the O attackers O to O run O on O Android B-System . O The O choice O of O a O particular O payload O is O determined O by O the O implant O ’ O s O version O , O and O it O can O be O downloaded O from O the O command O and O control O ( O C O & O C O ) O server O soon O after O the O implant O starts O , O or O after O a O specific O command O . O In O the O most O recent O case O , O the O choice O of O the O payload O zip O file O depends O on O the O device O process O architecture O . O For O now O , O we O observe O only O one O payload O version O for O following O the O ARM B-System CPUs O : O arm64-v8a B-System , O armeabi B-System , O armeabi-v7a B-System . O Note O that O in O almost O all O cases O , O this O payload O file O , O contained O in O zip O archives O , O is O named O ‘ O setting B-Indicator ’ O or O ‘ O setting.o B-Indicator ’ O . O The O main O purpose O of O this O module O is O providing O reverse O shell O features O on O the O device O by O connecting O with O the O C O & O C O server O ’ O s O socket O . O Reverse O shell O payload O The O payload O is O started O by O the O main O module O with O a O specified O host O and O port O as O a O parameter O that O is O hardcoded O to O ‘ O 54.67.109.199 B-Indicator ’ O and O ‘ O 30010 B-Indicator ’ O in O some O versions O : O Alternatively O , O they O could O be O hardcoded O directly O into O the O payload O code O : O We O also O observed O variants O that O were O equipped O with O similar O reverse O shell O payloads O directly O in O the O main O APK O /lib/ O path O . O Equipped O reverse O shell O payload O with O specific O string O After O an O in-depth O look O , O we O found O that O some O versions O of O the O reverse O shell O payload O code O share O similarities O with O PRISM B-Malware – O a O stealth O reverse O shell O backdoor O that O is O available O on O Github B-Organization . O Reverse O shell O payload O from O update_dev.zip B-Indicator Exploit O payload O At O the O same O time O , O we O found O an O important O payload O binary O that O is O trying O to O exploit O several O known O vulnerabilities O and O escalate O privileges O . O According O to O several O timestamps O , O this O payload O is O used O by O implant O versions O created O since O 2016 O . O It O can O also O be O downloaded O by O a O specific O command O . O The O exploit O payload O contains O following O file O components O : O Component O name O Description O run_root_shell/arrs_put_user.o/arrs_put_user/poc B-Indicator Exploit O ELF O db O Sqlite3 O tool O ELF O device.db B-Indicator Sqlite3 O database O with O supported O devices O and O their O constants O needed O for O privilege O escalation O ‘ O device.db B-Indicator ’ O is O a O database O used O by O the O exploit O . O It O contains O two O tables O – O ‘ O supported_devices O ’ O and O ‘ O device_address O ’ O . O The O first O table O contains O 205 O devices O with O some O Linux B-System properties O ; O the O second O contains O the O specific O memory O addresses O associated O with O them O that O are O needed O for O successful O exploitation O . O You O can O find O a O full O list O of O targeted O models O in O the O Appendix O . O Fragment O of O the O database O with O targeted O devices O and O specific O memory O addresses O If O the O infected O device O is O not O listed O in O this O database O , O the O exploit O tries O to O discover O these O addresses O programmatically O . O After O downloading O and O unpacking O , O the O main O module O executes O the O exploit O binary O file O . O Once O executed O , O the O module O attempts O to O get O root O privileges O on O the O device O by O exploiting O the O following O vulnerabilities O : O CVE-2013-2094 B-Vulnerability CVE-2013-2595 B-Vulnerability CVE-2013-6282 B-Vulnerability CVE-2014-3153 B-Vulnerability ( O futex B-Vulnerability aka O TowelRoot B-Vulnerability ) O CVE-2015-3636 B-Vulnerability Exploitation O process O After O an O in-depth O look O , O we O found O that O the O exploit O payload O code O shares O several O similarities O with O the O public O project O android-rooting-tools O . O Decompiled O exploit O function O code O fragment O run_with_mmap O function O from O the O android-rooting-tools B-System project O As O can O be O seen O from O the O comparison O , O there O are O similar O strings O and O also O a O unique O comment O in O Italian O , O so O it O looks O like O the O attackers O created O this O exploit O payload O based O on O android-rooting-tools B-System project O source O code O . O Busybox O payload O Busybox O is O public O software O that O provides O several O Linux O tools O in O a O single O ELF O file O . O In O earlier O versions O , O it O operated O with O shell O commands O like O this O : O Stealing O WhatsApp O encryption O key O with O Busybox B-Malware Social I-Malware payload I-Malware Actually O , O this O is O not O a O standalone O payload O file O – O in O all O the O observed O versions O its O code O was O compiled O with O exploit O payload O in O one O file O ( O ‘ O poc_perm O ’ O , O ‘ O arrs_put_user O ’ O , O ‘ O arrs_put_user.o O ’ O ) O . O This O is O due O to O the O fact O that O the O implant O needs O to O escalate O privileges O before O performing O social O payload O actions O . O This O payload O is O also O used O by O the O earlier O versions O of O the O implant O . O It O has O similar O functionality O to O the O ‘ O AndroidMDMSupport O ’ O command O from O the O current O versions O – O stealing O data O belonging O to O other O installed O applications O . O The O payload O will O execute O shell O code O to O steal O data O from O various O applications O . O The O example O below O steals O Facebook B-System data O : O All O the O other O hardcoded O applications O targeted O by O the O payload O : O Package O name O Name O jp.naver.line.android B-Indicator LINE B-System : I-System Free I-System Calls I-System & I-System Messages I-System com.facebook.orca B-Indicator Facebook B-System messenger I-System com.facebook.katana B-Indicator Facebook B-System com.whatsapp B-Indicator WhatsApp B-System com.viber.voip B-Indicator Viber B-System Parser O payload O Upon O receiving O a O specific O command O , O the O implant O can O download O a O special O payload O to O grab O sensitive O information O from O external O applications O . O The O case O where O we O observed O this O involved O WhatsApp B-System . O In O the O examined O version O , O it O was O downloaded O from O : O hxxp B-Indicator : I-Indicator //url I-Indicator [ I-Indicator . I-Indicator ] I-Indicator plus/Updates/tt/parser.apk I-Indicator The O payload O can O be O a O .dex O or O .apk O file O which O is O a O Java-compiled O Android B-System executable O . O After O downloading O , O it O will O be O loaded O by O the O main O module O via O DexClassLoader O api O : O As O mentioned O , O we O observed O a O payload O that O exclusively O targets O the O WhatsApp B-System messenger I-System and O it O does O so O in O an O original O way O . O The O payload O uses O the O Android B-System Accessibility O Service O to O get O information O directly O from O the O displayed O elements O on O the O screen O , O so O it O waits O for O the O targeted O application O to O be O launched O and O then O parses O all O nodes O to O find O text O messages O : O Note O that O the O implant O needs O special O permission O to O use O the O Accessibility O Service O API O , O but O there O is O a O command O that O performs O a O request O with O a O phishing O text O displayed O to O the O user O to O obtain O such O permission O . O Windows B-System We O have O found O multiple O components O that O form O an O entire O spyware O system O for O the O Windows B-System platform O . O Name O MD5 O Purpose O msconf.exe B-Indicator 55fb01048b6287eadcbd9a0f86d21adf B-Indicator Main O module O , O reverse O shell O network.exe B-Indicator f673bb1d519138ced7659484c0b66c5b B-Indicator Sending O exfiltrated O data O system.exe B-Indicator d3baa45ed342fbc5a56d974d36d5f73f B-Indicator Surrounding O sound O recording O by O mic O update.exe B-Indicator 395f9f87df728134b5e3c1ca4d48e9fa B-Indicator Keylogging O wow.exe B-Indicator 16311b16fd48c1c87c6476a455093e7a B-Indicator Screenshot O capturing O skype_sync2.exe B-Indicator 6bcc3559d7405f25ea403317353d905f B-Indicator Skype B-System call O recording O to O MP3 O All O modules O , O except O skype_sync2.exe B-Indicator , O are O written O in O Python B-System and O packed O to O binary O files O via O the O Py2exe B-System tool O . O This O sort O of O conversion O allows O Python B-System code O to O be O run O in O a O Windows B-System environment O without O pre-installed O Python B-System binaries O . O msconf.exe B-Indicator is O the O main O module O that O provides O control O of O the O implant O and O reverse O shell O feature O . O It O opens O a O socket O on O the O victim O ’ O s O machine O and O connects O with O a O server-side O component O of O the O implant O located O at O 54.67.109.199:6500 B-Indicator . O Before O connecting O with O the O socket O , O it O creates O a O malware O environment O in O ‘ O APPDATA/myupd B-Indicator ’ O and O creates O a O sqlite3 O database O there O – O ‘ O myupd_tmp\\mng.db B-Indicator ’ O : O CREATE O TABLE O MANAGE O ( O ID O INT O PRIMARY O KEY O NOT O NULL O , O Send O INT O NOT O NULL O , O Keylogg O INT O NOT O NULL O , O Screenshot O INT O NOT O NULL O , O Audio O INT O NOT O NULL O ) O ; O INSERT O INTO O MANAGE O ( O ID O , O Send O , O Keylogg O , O Screenshot O , O Audio O ) O VALUES O ( O 1 O , O 1 O , O 1 O , O 1 O , O 0 O ) O Finally O , O the O malware O modifies O the O ‘ O Software\Microsoft\Windows\CurrentVersion\Run B-Indicator ’ O registry O key O to O enable O autostart O of O the O main O module O . O The O code O contains O multiple O comments O in O Italian O , O here O is O the O most O noteworthy O example O : O “ O Receive O commands O from O the O remote O server O , O here O you O can O set O the O key O commands O to O command O the O virus O ” O Here O are O the O available O commands O : O Name O Description O cd O Change O current O directory O to O specified O quit O Close O the O socket O nggexe O Execute O received O command O via O Python B-System ’ O s O subprocess.Popen O ( O ) O without O outputs O ngguploads O Upload O specified O file O to O the O specified O URL O nggdownloads O Download O content O from O the O specified O URLs O and O save O to O specified O file O nggfilesystem O Dump O file O structure O of O the O C O : O path O , O save O it O to O the O file O in O json O format O and O zip O it O nggstart_screen O nggstop_screen O Enable/disable O screenshot O module O . O When O enabled O , O it O makes O a O screenshot O every O 25 O seconds O nggstart_key O nggstop_key O Enable/disable O keylogging O module O nggstart_rec O nggstop_rec O Enable/disable O surrounding O sounds O recording O module O ngg_status O Send O components O status O to O the O C O & O C O socket O * O any O other O * O Execute O received O command O via O Python B-System ’ O s O subprocess.Popen O ( O ) O , O output O result O will O be O sent O to O the O C O & O C O socket O . O All O modules O set O hidden O attributes O to O their O files O : O Module O Paths O Exfiltrated O data O format O msconf.exe B-Indicator % B-Indicator APPDATA I-Indicator % I-Indicator /myupd/gen/ I-Indicator % I-Indicator Y I-Indicator % I-Indicator m I-Indicator % I-Indicator d- I-Indicator % I-Indicator H I-Indicator % I-Indicator M I-Indicator % I-Indicator S_filesystem.zip I-Indicator ( I-Indicator file I-Indicator structure I-Indicator dump I-Indicator ) I-Indicator system.exe I-Indicator % I-Indicator APPDATA I-Indicator % I-Indicator /myupd/aud/ I-Indicator % I-Indicator d I-Indicator % I-Indicator m I-Indicator % I-Indicator Y I-Indicator % I-Indicator H I-Indicator % I-Indicator M I-Indicator % I-Indicator S.wav I-Indicator ( I-Indicator surrounding I-Indicator sounds I-Indicator ) I-Indicator update.exe I-Indicator % I-Indicator APPDATA I-Indicator % I-Indicator /myupd_tmp/txt/ I-Indicator % I-Indicator APPDATA I-Indicator % I-Indicator /myupd/txt/ I-Indicator % I-Indicator Y I-Indicator % I-Indicator m I-Indicator % I-Indicator d- I-Indicator % I-Indicator H I-Indicator % I-Indicator M I-Indicator % I-Indicator S.txt I-Indicator ( I-Indicator keylogging I-Indicator ) I-Indicator wow.exe I-Indicator % I-Indicator APPDATA I-Indicator % I-Indicator /myupd/scr/ I-Indicator % I-Indicator Y I-Indicator % I-Indicator m I-Indicator % I-Indicator d- I-Indicator % I-Indicator H I-Indicator % I-Indicator M I-Indicator % I-Indicator S.jpg I-Indicator ( I-Indicator screenshots I-Indicator ) I-Indicator skype_sync2.exe I-Indicator % I-Indicator APPDATA I-Indicator % I-Indicator /myupd_tmp/skype/ I-Indicator % I-Indicator APPDATA I-Indicator % I-Indicator /myupd/skype/ I-Indicator yyyyMMddHHmmss_in.mp3 I-Indicator yyyyMMddHHmmss_out.mp3 B-Indicator ( O skype O calls O records O ) O Moreover O , O we O found O one O module O written O in O .Net B-System – O skype_sync2.exe B-Indicator . O The O main O purpose O of O this O module O is O to O exfiltrate O Skype B-System call O recordings O . O Just O like O the O previous O modules O , O it O contains O multiple O strings O in O Italian O . O After O launch O , O it O downloads O a O codec O for O MP3 O encoding O directly O from O the O C O & O C O server O : O http B-Indicator : I-Indicator //54.67.109.199/skype_resource/libmp3lame.dll I-Indicator The O skype_sync2.exe B-Indicator module O has O a O compilation O timestamp O – O Feb O 06 O 2017 O and O the O following O PDB O string O : O \\vmware-host\Shared B-Indicator Folders\dati\Backup\Projects\REcodin_2\REcodin_2\obj\x86\Release\REcodin_2.pdb B-Indicator network.exe B-Indicator is O a O module O for O submitting O all O exfiltrated O data O to O the O server O . O In O the O observed O version O of O the O implant O it O doesn O ’ O t O have O an O interface O to O work O with O the O skype_sync2.exe B-Indicator module O . O network.exe B-Indicator submitting O to O the O server O code O snippet O Code O similarities O We O found O some O code O similarities O between O the O implant O for O Windows B-System and O other O public O accessible O projects O . O https B-Indicator : I-Indicator //github.com/El3ct71k/Keylogger/ I-Indicator It O appears O the O developers O have O copied O the O functional O part O of O the O keylogger O module O from O this O project O . O update.exe B-Indicator module O and O Keylogger O by O ‘ O El3ct71k O ’ O code O comparison O Xenotix B-System Python I-System Keylogger I-System including O specified O mutex O ‘ O mutex_var_xboz O ’ O . O update.exe B-Indicator module O and O Xenotix B-System Python I-System Keylogger I-System code O comparison O ‘ O addStartup O ’ O method O from O msconf.exe B-Indicator module O ‘ O addStartup O ’ O method O from O Xenotix B-System Python I-System Keylogger I-System Distribution O We O found O several O landing O pages O that O spread O the O Android B-System implants O . O Malicious O URL O Referrer O Dates O http B-Indicator : I-Indicator //217.194.13.133/tre/internet/Configuratore_3.apk I-Indicator http B-Indicator : I-Indicator //217.194.13.133/tre/internet/ I-Indicator 2015-02-04 O to O present O time O http B-Indicator : I-Indicator //217.194.13.133/appPro_AC.apk I-Indicator – O 2015-07-01 O http B-Indicator : I-Indicator //217.194.13.133/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator % I-Indicator 20Configuratore I-Indicator % I-Indicator 20v5_4_2.apk I-Indicator http B-Indicator : I-Indicator //217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator 2015-01-20 O to O present O time O http B-Indicator : I-Indicator //217.194.13.133/190/configurazione/vodafone/smartphone/Vodafone I-Indicator % I-Indicator 20Configuratore.apk I-Indicator http B-Indicator : I-Indicator //217.194.13.133/190/configurazione/vodafone/smartphone/index.html I-Indicator currently O active O http B-Indicator : I-Indicator //vodafoneinfinity.sytes.net/tim/internet/Configuratore_TIM.apk I-Indicator http B-Indicator : I-Indicator //vodafoneinfinity.sytes.net/tim/internet/ I-Indicator 2015-03-04 O http B-Indicator : I-Indicator //vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/VODAFONE I-Indicator % I-Indicator 20Configuratore I-Indicator % I-Indicator 20v5_4_2.apk I-Indicator http B-Indicator : I-Indicator //vodafoneinfinity.sytes.net/190/configurazione/vodafone/smartphone/ I-Indicator 2015-01-14 O http B-Indicator : I-Indicator //windupdate.serveftp.com/wind/LTE/WIND I-Indicator % I-Indicator 20Configuratore I-Indicator % I-Indicator 20v5_4_2.apk I-Indicator http B-Indicator : I-Indicator //windupdate.serveftp.com/wind/LTE/ I-Indicator 2015-03-31 O http B-Indicator : I-Indicator //119.network/lte/Internet-TIM-4G-LTE.apk I-Indicator http B-Indicator : I-Indicator //119.network/lte/download.html I-Indicator 2015-02-04 O 2015-07-20 O http B-Indicator : I-Indicator //119.network/lte/Configuratore_TIM.apk I-Indicator 2015-07-08 O Many O of O these O domains O are O outdated O , O but O almost O all O ( O except O one O – O appPro_AC.apk B-Indicator ) O samples O located O on O the O 217.194.13.133 B-Indicator server O are O still O accessible O . O All O the O observed O landing O pages O mimic O the O mobile O operators O ’ O web O pages O through O their O domain O name O and O web O page O content O as O well O . O Further O research O of O the O attacker O ’ O s O infrastructure O revealed O more O related O mimicking O domains O . O Unfortunately O , O for O now O we O can O ’ O t O say O in O what O environment O these O landing O pages O were O used O in O the O wild O , O but O according O to O all O the O information O at O our O dsiposal O , O we O can O assume O that O they O are O perfect O for O exploitation O using O malicious O redirects O or O man-in-the-middle O attacks O . O For O example O , O this O could O be O when O the O victim O ’ O s O device O connects O to O a O Wi-Fi O access O point O that O is O infected O or O controlled O by O the O attackers O . O Artifacts O During O the O research O , O we O found O plenty O of O traces O of O the O developers O and O those O doing O the O maintaining O . O As O already O stated O in O the O ‘ O malware O features O ’ O part O , O there O are O multiple O giveaways O in O the O code O . O Here O are O just O some O of O them O : O ngglobal O – O FirebaseCloudMessaging O topic O name O Issuer O : O CN O = O negg O – O from O several O certificates O negg.ddns B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator , O negg1.ddns B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator , O negg2.ddns B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator – O C O & O C O servers O NG O SuperShell O – O string O from O the O reverse O shell O payload O ngg O – O prefix O in O commands O names O of O the O implant O for O Windows B-System Signature O with O specific O issuer O Whois O records O and O IP O relationships O provide O many O interesting O insights O as O well O . O There O are O a O lot O of O other O ‘ O Negg O ’ O mentions O in O Whois O records O and O references O to O it O . O For O example O : O Conclusions O The O Skygofree B-Malware Android B-System implant O is O one O of O the O most O powerful O spyware O tools O that O we O have O ever O seen O for O this O platform O . O As O a O result O of O the O long-term O development O process O , O there O are O multiple O , O exceptional O capabilities O : O usage O of O multiple O exploits O for O gaining O root O privileges O , O a O complex O payload O structure O , O never-before-seen O surveillance O features O such O as O recording O surrounding O audio O in O specified O locations O . O Given O the O many O artifacts O we O discovered O in O the O malware O code O , O as O well O as O infrastructure O analysis O , O we O are O pretty O confident O that O the O developer O of O the O Skygofree B-Malware implants O is O an O Italian O IT O company O that O works O on O surveillance O solutions O , O just O like O HackingTeam B-Organization . O HenBox B-Malware : O The O Chickens O Come O Home O to O Roost O March O 13 O , O 2018 O at O 5:00 O AM O Unit O 42 O recently O discovered O a O new O Android B-System malware O family O we O named O “ O HenBox B-Malware ” O masquerading O as O a O variety O of O legitimate O Android B-System apps O . O We O chose O the O name O “ O HenBox B-Malware ” O based O on O metadata O found O in O most O of O the O malicious O apps O such O as O package O names O and O signer O detail O . O HenBox B-Malware masquerades O as O apps O such O as O VPN O and O Android B-System system O apps O and O often O installs O legitimate O versions O of O these O apps O along O with O HenBox B-Malware to O trick O users O into O thinking O they O downloaded O the O legitimate O app O . O While O some O of O the O legitimate O apps O HenBox B-Malware use O as O decoys O can O be O found O on O Google B-System Play I-System , O HenBox B-Malware apps O themselves O have O only O been O found O on O third-party O ( O non-Google O Play B-System ) O app O stores O . O HenBox B-Malware appears O to O primarily O target O the O Uyghurs O – O a O minority O Turkic O ethnic O group O that O is O primarily O Muslim O and O lives O mainly O in O the O Xinjiang O Uyghur O Autonomous O Region O in O North O West O China O . O It O also O targets O devices O made O by O Chinese O manufacturer O Xiaomi B-Organization and O those O running O MIUI B-System , O an O operating O system O based O on O Google B-System Android I-System made O by O Xiaomi B-Organization . O Smartphones O are O the O dominant O form O of O internet O access O in O the O region O and O Xinjiang O was O recently O above O the O national O average O of O internet O users O in O China O . O The O result O is O a O large O online O population O who O have O been O the O subject O of O numerous O cyber-attacks O in O the O past O . O Once O installed O , O HenBox B-Malware steals O information O from O the O devices O from O a O myriad O of O sources O , O including O many O mainstream O chat O , O communication O , O and O social O media O apps O . O The O stolen O information O includes O personal O and O device O information O . O Of O note O , O in O addition O to O tracking O the O compromised O device O ’ O s O location O , O HenBox B-Malware also O harvests O all O outgoing O phone O numbers O with O an O “ O 86 O ” O prefix O , O which O is O the O country O code O for O the O People O ’ O s O Republic O of O China O ( O PRC O ) O . O It O can O also O access O the O phone O ’ O s O cameras O and O microphone O . O HenBox B-Malware has O ties O to O infrastructure O used O in O targeted O attacks O with O a O focus O on O politics O in O South O East O Asia O . O These O attackers O have O used O additional O malware O families O in O previous O activity O dating O to O at O least O 2015 O that O include O PlugX B-Malware , O Zupdax B-Malware , O 9002 B-Malware , O and O Poison B-Malware Ivy I-Malware . O This O also O aligns O with O HenBox B-Malware ’ O s O timeline O , O as O in O total O we O have O identified O almost O 200 O HenBox B-Malware samples O , O with O the O oldest O dating O to O 2015 O . O Most O of O the O samples O we O found O date O from O the O last O half O of O 2017 O , O fewer O samples O date O from O 2016 O , O and O a O handful O date O back O to O 2015 O . O In O 2018 O , O we O have O already O observed O a O small O but O consistent O number O of O samples O . O We O believe O this O indicates O a O fairly O sustained O campaign O that O has O gained O momentum O over O recent O months O . O HenBox B-Malware Enters O the O Uyghur B-System App I-System Store I-System In O May O 2016 O , O a O HenBox B-Malware app O was O downloaded O from O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator . O Specifically O , O the O app O was O an O Android B-System Package I-System ( O APK O ) O file O that O will O be O discussed O in O more O detail O shortly O . O The O domain O name O , O language O of O the O site O and O app O content O hosted O suggest O this O site O is O a O third-party O app O store O for O whom O the O intended O users O are O the O Uyghurs O . O Such O app O stores O are O so-called O because O they O are O not O officially O supported O by O Android B-System , O nor O are O they O provided O by O Google B-Organization , O unlike O the O Play B-System Store I-System . O Third-party O app O stores O are O ubiquitous O in O China O for O a O number O of O reasons O including O : O evermore O powerful O Chinese B-Organization Original I-Organization Equipment I-Organization Manufacturers I-Organization ( I-Organization OEM I-Organization ) I-Organization , O a O lack O of O an O official O Chinese O Google B-System Play I-System app O store O , O and O a O growing O smartphone O market O . O The O HenBox B-Malware app O downloaded O in O May O 2016 O was O masquerading O as O the O DroidVPN B-Indicator app O . O At O the O time O of O writing O , O the O content O served O at O the O given O URL O on O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator , O is O now O a O legitimate O version O of O the O DroidVPN B-Indicator app O , O and O looks O as O shown O in O Figure O 1 O below O . O henbox_2 O Figure O 1 O Uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator app O store O showing O the O current O DroidVPN B-Indicator app O Virtual O Private O Network O ( O VPN O ) O tools O allow O connections O to O remote O private O networks O , O increasing O the O security O and O privacy O of O the O user O ’ O s O communications O . O According O to O the O DroidVPN B-Indicator app O description O , O it O “ O helps O bypass O regional O internet O restrictions O , O web O filtering O and O firewalls O by O tunneling O traffic O over O ICMP. O ” O Some O features O may O require O devices O to O be O rooted O to O function O and O according O to O some O 3rd O party O app O stores O , O unconditional O rooting O is O required O , O which O has O additional O security O implications O for O the O device O . O We O have O not O been O able O to O ascertain O how O the O DroidVPN B-Indicator app O on O the O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator app O store O was O replaced O with O the O malicious O HenBox B-Malware app O ; O however O , O some O indicators O point O to O the O server O running O an O outdated O version O of O Apache O Web O Server O on O a O Windows B-System 32-Bit O operating O system O . O In O light O of O this O , O we O believe O an O attack O against O unpatched B-Vulnerability vulnerabilities I-Vulnerability is O a O reasonable O conjecture O for O how O the O server O was O compromised O . O The O HenBox O app O downloaded O in O May O 2016 O , O as O described O in O Table O 1 O below O , O masquerades O as O a O legitimate O version O of O the O DroidVPN B-Indicator app O by O using O the O same O app O name O “ O DroidVPN B-System ” O and O the O same O iconography O used O when O displaying O the O app O in O Android B-System ’ O s O launcher O view O , O as O highlighted O in O Figure O 2 O below O Table O 1 O . O APK O SHA256 O Size O ( O bytes O ) O First O Seen O App O Package O name O App O name O 0589bed1e3b3d6234c30061be3be1cc6685d786ab3a892a8d4dae8e2d7ed92f7 B-Indicator 2,740,860 O May O 2016 O com.android.henbox B-Indicator DroidVPN B-System Table O 1 O Details O of O the O HenBox B-Malware DroidVPN B-System app O on O the O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator app O store O henbox_3 O Figure O 2 O HenBox B-Malware app O installed O , O purporting O to O be O DroidVPN B-Indicator Depending O on O the O language O setting O on O the O device O , O and O for O this O particular O variant O of O HenBox B-Malware , O the O installed O HenBox B-Malware app O may O have O the O name O “ O Backup O ” O but O uses O the O same O DroidVPN B-Indicator logo O . O Other O variants O use O other O names O and O logos O , O as O described O later O . O Given O the O DroidVPN B-Indicator look O and O feel O being O used O by O this O variant O of O HenBox B-Malware , O it O ’ O s O highly O likely O the O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator page O for O DroidVPN B-Indicator remained O identical O when O serving O either O HenBox B-Malware or O DroidVPN B-Indicator apps O , O just O that O the O legitimate O APK O file O had O been O replaced O with O HenBox O for O an O unknown O period O of O time O . O In O addition O to O the O look O and O feel O of O DroidVPN B-Indicator , O this O HenBox B-Malware variant O also O contained O a O legitimate O DroidVPN B-Indicator app O within O its O APK O package O as O an O asset O , O which O could O be O compared O to O a O resource O item O within O a O Windows B-System Portable I-System Executable I-System ( O PE O ) O file O . O Once O the O HenBox B-Malware app O is O installed O and O launched O , O it O launches O an O install O process O for O the O embedded O app O as O a O decoy O to O other O malicious O behaviors O occurring O in O the O background O , O and O to O satisfy O the O victim O with O the O app O they O were O requesting O , O assuming O they O requested O to O download O a O particular O app O , O such O as O DroidVPN B-System . O The O version O of O the O legitimate O DroidVPN B-Indicator embedded O inside O this O HenBox B-Malware variant O is O the O same O version O of O DroidVPN B-Indicator available O for O download O from O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator , O at O the O time O of O writing O . O It O ’ O s O worth O noting O , O newer O versions O of O the O DroidVPN B-System app O are O available O on O Google B-System Play I-System , O as O well O as O in O some O other O third-party O app O stores O , O which O could O indicate O uyghurapps B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator is O not O awfully O well O maintained O or O updated O to O the O latest O apps O available O . O At O the O time O of O writing O , O to O our O knowledge O no O other O third-party O app O stores O , O nor O the O official O Google B-System Play I-System store O , O were O or O are O hosting O this O malicious O HenBox B-Malware variant O masquerading O as O DroidVPN B-Indicator . O The O Right O App O at O the O Right O Time O The O malicious O HenBox B-Malware and O embedded O DroidVPN B-Indicator app O combination O is O one O instance O of O the O type O of O legitimate O apps O the O attackers O choose O to O mimic O to O compromise O their O victims O . O These O threat O actors O frequently O offer O malicious O apps O purporting O to O be O legitimate O apps O that O are O broadly O used O or O important O to O a O targeted O population O . O It O ’ O s O worth O noting O however O , O about O one-third O of O the O HenBox B-Malware apps O contained O embedded O APK O objects O that O did O not O refer O to O legitimate O apps O . O Some O were O only O 3 O bytes O long O , O containing O strings O such O as O “ O ddd O ” O and O “ O 333 O ” O , O or O were O otherwise O corrupted O . O Beyond O the O previously O mentioned O DroidVPN B-Indicator example O , O other O viable O embedded O apps O we O found O include O apps O currently O available O on O Google B-System Play I-System , O as O well O as O many O third-party O app O stores O . O Table O 2 O below O lists O some O of O these O apps O with O their O respective O metadata O . O Sample O 1 O marks O the O first O HenBox B-Malware sample O we O saw O embedding O a O legitimate O app O within O its O assets O to O be O dropped O and O installed O on O the O victim O device O as O a O decoy O . O The O legitimate O app O in O question O was O a O Uyghur O language O keyboard O app O targeted O at O native O speakers O of O the O Uyghur O language O and O their O smartphones O . O Sample O 2 O , O has O the O package O name O cn.android.setting B-Indicator masquerading O as O Android O ’ O s O Settings B-System app I-System , O which O has O a O similar O package O name O ( O com.android.settings B-Indicator ) O . O This O variant O of O HenBox B-Malware also O used O the O common O green O Android B-System figure O as O the O app O logo O and O was O named O 设置 O ( O “ O Backup O ” O in O English O ) O . O This O variant O ’ O s O app O name O , O along O with O many O others O , O is O written O in O Chinese O and O describes O the O app O as O a O backup O tool O . O Please O see O the O IOCs O section O for O all O app O and O package O name O combinations O . O Interestingly O , O the O embedded O app O in O sample O 2 O is O not O a O version O of O the O Android B-System Settings I-System app O but O instead O the O “ O Amaq B-System Agency I-System ” O app O , O which O reports O on O ISIS O related O news O . O Reports O indicate O fake O versions O of O the O Amaq B-System app O exist O , O likely O in O order O to O spy O on O those O that O use O it O . O A O month O after O observing O sample O 2 O , O we O obtained O another O which O used O the O same O package O name O as O sample O 2 O ( O cn.android.setting B-Indicator ) O . O However O , O this O time O the O app O name O for O both O HenBox B-Malware and O the O embedded O app O were O identical O : O Islamawazi B-System . O Islamawazi B-System is O also O known O as O the O Turkistan B-Organization Islamic I-Organization Party I-Organization or O “ O TIP O ” O . O This O organization O was O formerly O known O as O the O East B-Organization Turkestan I-Organization Islamic I-Organization Party I-Organization and O is O purported O to O be O an O Islamic O extremist O separatist O organization O founded O by O Uyghur O jihadists O . O The O embedded O app O appears O to O be O a O media O player O . O These O examples O , O together O with O the O HenBox B-Malware app O placed O on O a O very O specific O third-party O app O store O , O point O clearly O to O at O least O some O of O the O intended O targets O of O these O malicious O apps O being O Uyghurs O , O specifically O those O with O interest O in O or O association O with O terrorist O groups O . O These O threat O actors O appear O to O be O choosing O the O right O apps O – O those O that O could O be O popular O with O locals O in O the O region O , O at O the O right O time O – O while O tensions O grow O in O this O region O of O China O , O to O ensure O a O good O victim O install-base O . O HenBox B-Malware Roosts O HenBox B-Malware has O evolved O over O the O past O three O years O , O and O of O the O almost O two O hundred O HenBox B-Malware apps O in O AutoFocus O , O the O vast O majority O contain O several O native O libraries O as O well O as O other O components O in O order O to O achieve O their O objective O . O Most O components O are O obfuscated O in O some O way O , O whether O it O be O simple O XOR O with O a O single-byte O key O , O or O through O the O use O of O ZIP B-System or O Zlib B-System compression O wrapped O with O RC4 O encryption O . O These O components O are O responsible O for O a O myriad O of O functions O including O handling O decryption O , O network O communications O , O gaining O super-user O privileges O , O monitoring O system O logs O , O loading O additional O Dalvik O code O files O , O tracking O the O device O location O and O more O . O The O remainder O of O this O section O describes O at O a O high-level O what O HenBox O is O capable O of O , O and O how O it O operates O . O The O description O is O based O on O analysis O of O the O sample O described O in O Table O 3 O below O , O which O was O of O interest O given O its O C2 O domain B-Indicator mefound I-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator overlaps O with O PlugX B-Malware , O Zupdax B-Malware , O and O Poison B-Malware Ivy I-Malware malware O families O discussed O in O more O detail O later O . O SHA256 O Package O Name O App O Name O a6c7351b09a733a1b3ff8a0901c5bde B-Indicator fdc3b566bfcedcdf5a338c3a97c9f249b O com.android.henbox B-Indicator 备份 O ( O Backup O ) O Table O 3 O HenBox B-Malware variant O used O in O description O Once O this O variant O of O HenBox B-Malware is O installed O on O the O victim O ’ O s O device O , O the O app O can O be O executed O in O two O different O ways O : O One O method O for O executing O HenBox B-Malware is O for O the O victim O to O launch O the O malicious O app O ( O named O “ O Backup O ” O , O in O this O instance O ) O from O the O launcher O view O on O their O device O , O as O shown O in O Figure O 3 O below O . O This O runs O code O in O the O onCreate O ( O ) O method O of O the O app O ’ O s O MainActivity O class O , O which O in O effect O is O the O program O ’ O s O entry O point O . O This O process O is O defined O in O the O app O ’ O s O AndroidManifest.xml O config O file O , O as O shown O in O the O following O snippet O . O Doing O so O executes O code O checking O if O the O device O is O manufactured O by O Xiaomi B-Organization , O or O if O Xiaomi B-Organization ’ I-Organization s I-Organization fork O of O Android B-System is O running O on O the O device O . O Under O these O conditions O , O the O app O continues O executing O and O the O intent O of O targeting O Xiaomi B-Organization devices O and O users O could O be O inferred O , O however O poorly O written O code O results O in O execution O in O more O environments O than O perhaps O intended O ; O further O checks O are O made O to O ascertain O whether O the O app O is O running O on O an O emulator O , O perhaps O to O evade O researcher O analysis O environments O . O Assuming O these O checks O pass O , O one O of O the O main O ELF O libraries O is O loaded O that O orchestrates O other O components O and O provides O functionality O to O the O app O ’ O s O Dalvik O code O through O the O Java O Native O Interface O ( O JNI O ) O . O HenBox B-Malware checks O whether O this O execution O is O its O first O by O using O Android B-System ’ O s O shared O preferences O feature O to O persist O XML O key-value O pair O data O . O If O it O is O the O first O execution O , O and O if O the O app O ’ O s O path O does O not O contain O “ O /system/app B-Indicator ” O ( O i.e O . O HenBox B-Malware is O not O running O as O a O system O app O ) O , O another O ELF O library O is O loaded O to O aid O with O executing O super-user O commands O . O The O second O method O uses O intents O , O broadcasts O , O and O receivers O to O execute O HenBox O code O . O Providing O the O app O has O registered O an O intent O to O process O particular O events O from O the O system O , O and O one O of O said O events O occurs O , O HenBox O is O effectively O brought O to O life O through O external O stimulus O from O another O app O on O the O system O broadcasting O a O request O , O or O the O system O itself O broadcasting O a O particular O event O has O occurred O . O These O intents O are O typically O defined O statically O in O the O app O ’ O s O AndroidManifest.xml O config O file O ; O some O HenBox B-Malware variants O register O further O intents O from O their O code O at O run-time O . O Once O a O matching O intent O is O triggered O , O the O respective O Receiver O code O will O be O executed O , O leading O to O other O HenBox O behaviors O being O launched O , O which O are O described O later O . O Table O 4 O below O lists O the O intents O that O are O statically O registered O in O this O HenBox B-Malware variant O ’ O s O AndroidManifest.xml O config O file O , O together O with O a O description O of O what O that O intent O does O , O and O when O it O would O be O used O . O Depending O on O the O intent O triggered O , O one O of O two O Receivers O would O be O called O , O in O this O instance O they O are O called O Boot O or O Time O but O the O name O is O somewhat O immaterial O . O Receiver O Intent O Name O Description O BootReceiver O android.intent.action.BOOT_COMPLETED B-Indicator System O notification O that O the O device O has O finished O booting O . O android.intent.action.restart B-Indicator A O legacy O intent O used O to O indicate O a O system O restart O . O android.intent.action.SIM_STATE_CHANGED B-Indicator System O notification O that O the O SIM O card O has O changed O or O been O removed O . O android.intent.action.PACKAGE_INSTALL B-Indicator System O notification O that O the O download O and O eventual O installation O of O an O app O package O is O happening O ( O this O is O deprecated O ) O android.intent.action.PACKAGE_ADDED B-Indicator System O notification O that O a O new O app O package O has O been O installed O on O the O device O , O including O the O name O of O said O package O . O com.xiaomi.smarthome.receive_alarm B-Indicator Received O notifications O from O Xiaomi B-Organization ’ O s O smart O home O IoT O devices O . O TimeReceiver O android.intent.action.ACTION_TIME_CHANGED B-Indicator System O notification O that O the O time O was O set O . O android.intent.action.CONNECTIVITY_CHANGE B-Indicator System O notification O that O a O change O in O network O connectivity O has O occurred O , O either O lost O or O established O . O Since O Android B-System version O 7 O ( O Nougat B-System ) O this O information O is O gathered O using O other O means O , O perhaps O inferring O the O devices O used O by O potential O victim O run O older O versions O of O Android B-System . O Table O 4 O HenBox B-Malware variant O 's O Intents O and O Receivers O Most O of O the O intents O registered O in O the O AndroidManifest.xml O file O , O or O loaded O during O run-time O , O are O commonly O found O in O malicious O Android B-System apps O . O What O ’ O s O more O interesting O , O and O much O less O common O , O is O the O inclusion O of O the O com.xiaomi.smarthome.receive_alarm B-Indicator intent O filter O . O Xiaomi B-Organization , O a O privately O owned O Chinese O electronics O and O software O company O , O is O the O 5th O largest O smart O phone O manufacturer O in O the O world O and O also O manufactures O IoT O devices O for O the O home O . O Most O devices O can O be O controlled O by O Xiaomi B-Organization ’ O s O “ O MiHome B-System ” O Android B-System app O , O which O is O available O on O Google B-System Play I-System with O between O 1,000,000 O and O 5,000,000 O downloads O . O Given O the O nature O of O connected O devices O in O smart O homes O , O it O ’ O s O highly O likely O many O of O these O devices O , O and O indeed O the O controller O app O itself O , O communicate O with O one O another O sending O status O notifications O , O alerts O and O so O on O . O Such O notifications O would O be O received O by O the O MiHome B-System app O or O any O other O , O such O as O HenBox B-Malware , O so O long O as O they O register O their O intent O to O do O so O . O This O could O essentially O allow O for O external O devices O to O act O as O a O trigger O to O execute O the O malicious O HenBox B-Malware code O , O or O perhaps O afford O additional O data O HenBox B-Malware can O collect O and O exfiltrate O . O Either O method O to O load O HenBox B-Malware ultimately O results O in O an O instance O of O a O service O being O launched O . O This O service O hides O the O app O from O plain O sight O and O loads O another O ELF O library O to O gather O environmental O information O about O the O device O , O such O as O running O processes O and O apps O , O and O details O about O device O hardware O , O primarily O through O parsing O system O logs O and O querying O running O processes O . O The O service O continues O by O loading O an O ELF O , O created O by O Baidu B-Organization , O which O is O capable O of O tracking O the O device O location O before O setting O up O a O monitor O to O harvest O phone O numbers O associated O with O outgoing O calls O for O those O numbers O with O a O country O code O “ O +86 O ” O prefix O , O which O relates O to O the O People O ’ O s O Republic O of O China O . O Further O assets O are O decrypted O and O deployed O , O including O another O Dalvik O DEX O code O file O , O which O has O various O capabilities O including O registering O itself O as O the O incoming O SMS O handler O for O the O device O to O intercept O SMS O messages O , O loading O another O ELF O library O that O includes O a O version O of O BusyBox B-System - O a O package O containing O various O stripped-down O Unix O tools O useful O for O administering O such O systems O – O and O , O interestingly O , O is O capable O of O turning O off O the O sound O played O when O the O device O ’ O s O cameras O take O pictures O . O The O Android B-System permissions O requested O by O HenBox B-Malware , O as O defined O in O the O apps O ’ O AndroidManifest.xml O files O , O range O from O accessing O location O and O network O settings O to O messages O , O call O , O and O contact O data O . O HenBox B-Malware can O also O access O sensors O such O as O the O device O camera O ( O s O ) O and O the O microphone O . O Beyond O the O Android B-System app O itself O , O other O components O such O as O the O aforementioned O ELF O libraries O have O additional O data-stealing O capabilities O . O One O ELF O library O , O libloc4d.so B-Indicator , O handles O amongst O other O things O the O loading O of O the O app-decoded O ELF O library O file O “ O sux O ” O , O as O well O as O handling O connectivity O to O the O C2 O . O The O sux O library O appears O to O be O a O customized O super O user O ( O su O ) O tool O that O includes O code O from O the O com.koushikdutta.superuser B-Indicator app O and O carries O the O equivalent O of O a O super O user O ( O su O ) O binary O in O order O to O run O privileged O commands O on O the O system O . O The O primary O goal O of O sux O appears O to O be O steal O messages O and O other O data O from O popular O messaging O and O social O media O apps O specified O within O the O HenBox B-Malware sample O . O A O similar O tool O , O with O the O same O filename O , O has O been O discussed O in O previous O research O but O the O SpyDealer B-Malware malware O appears O unrelated O to O HenBox B-Malware . O More O likely O , O this O is O a O case O of O common O attack O tools O being O re-used O between O different O threat O actor O groups O . O This O particular O HenBox B-Malware variant O , O as O listed O in O Table O 3 O above O , O harvests O data O from O two O popular O messaging O and O social O media O apps O : O Voxer B-System Walkie B-System Talkie I-System Messenger B-System ( O com.rebelvox.voxer B-Indicator ) O and O Tencent B-Organization ’ O s O WeChat B-System ( O com.tencent.mm B-Indicator ) O . O These O types O of O apps O tend O to O store O their O data O in O databases O and O , O as O an O example O , O HenBox B-Malware accesses O Voxer O ’ O s O database O from O the O file O “ O /data/data/com.rebelvox.voxer/databases/rv.db B-Indicator ” O . O Once O opened O , O HenBox B-Malware runs O the O following O query O to O gather O message O information O . O Not O long O after O this O variant O was O public O , O newer O variants O of O HenBox B-Malware were O seen O , O and O some O had O significant O increases O in O the O number O of O targeted O apps O . O Table O 5 O describes O the O latest O variant O seen O in O AutoFocus O . O SHA256 O Package O Name O App O Name O First O Seen O 07994c9f2eeeede199dd6b4e760fce3 B-Indicator 71f03f3cc4307e6551c18d2fbd024a24f B-Indicator com.android.henbox B-Indicator 备份 O ( O Backup O ) O January O 3rd O 2018 O Table O 6 O contains O an O updated O list O of O targeted O apps O from O which O this O newer O variant O of O HenBox B-Malware is O capable O of O harvesting O data O . O Interestingly O , O the O two O communication O apps O described O above O as O being O targeted O by O the O HenBox O variant O listed O in O Table O 3 O do O not O appear O in O this O updated O list O . O Package O Name O App O Name O com.whatsapp B-Indicator WhatsApp B-System Messenger B-System com.pugna.magiccall B-Indicator n/a O org.telegram.messenger B-Indicator Telegram B-System com.facebook.katana B-Indicator Facebook B-System com.twitter.android B-Indicator Twitter B-System jp.naver.line.android B-Indicator LINE B-System : O Free O Calls O & O Messages O com.instanza.cocovoice B-Indicator Coco O com.beetalk B-Indicator BeeTalk B-System com.gtomato.talkbox B-Indicator TalkBox B-System Voice O Messenger B-System - O PTT O com.viber.voip B-Indicator Viber B-System Messenger B-System com.immomo.momo B-Indicator MOMO陌陌 B-System com.facebook.orca B-Indicator Messenger B-System – O Text O and O Video O Chat O for O Free O com.skype.rover B-Indicator Skype B-System ; O 3rd O party O stores O only O Most O of O these O apps O are O well O established O and O available O on O Google B-System Play I-System , O however O , O com.skype.rover B-Indicator appears O to O be O available O only O on O third-party O app O stores O . O The O same O is O likely O to O be O the O case O for O com.pugna.magiccall B-Indicator but O this O is O unknown O currently O . O It O ’ O s O clear O to O see O that O the O capabilities O of O HenBox B-Malware are O very O comprehensive O , O both O in O terms O of O an O Android B-System app O with O its O native O libraries O and O given O the O amount O of O data O it O can O glean O from O a O victim O . O Such O data O includes O contact O and O location O information O , O phone O and O message O activity O , O the O ability O to O record O from O the O microphone O , O camera O , O and O other O sensors O as O well O as O the O capability O to O access O data O from O many O popular O messaging O and O social O media O apps O . O Infrastructure O While O investigating O HenBox B-Malware we O discovered O infrastructure O ties O to O other O malware O families O associated O with O targeted O attacks O against O Windows B-System users O – O notable O overlaps O included O PlugX B-Malware , O Zupdax B-Malware , O 9002 B-Malware , O and O Poison B-Malware Ivy I-Malware . O The O overall O image O of O these O ties O is O below O in O Figure O 5 O and O paints O a O picture O of O an O adversary O with O at O least O 5 O malware O families O in O their O toolbox O dating O back O to O at O least O 2015 O . O The O overlap O between O the O HenBox B-Malware and O 9002 B-Malware malware O families O Unit O 42 O has O seen O involves O three O shared O C2s O between O several O samples O ; O the O first O IP O below O is O used O for O more O than O half O of O the O HenBox B-Malware samples O we O have O seen O to O date O : O 47.90.81 B-Indicator [ I-Indicator . I-Indicator ] I-Indicator 23 I-Indicator 222.139.212 B-Indicator [ I-Indicator . I-Indicator ] I-Indicator 16 I-Indicator lala513.gicp B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator The O overlaps O between O the O Henbox B-Malware , O PlugX B-Malware , O Zupdax B-Malware , O and O Poison B-Malware Ivy I-Malware malware O families O involves O a O web O of O shared O C2s O and O IP O resolutions O centered O around O the O below O : O 59.188.196 B-Indicator [ I-Indicator . I-Indicator ] I-Indicator 172 I-Indicator cdncool B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator ( O and O third-levels O of O this O domain O ) O www3.mefound B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator www5.zyns B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator w3.changeip B-Indicator [ I-Indicator . I-Indicator ] I-Indicator org I-Indicator Ties O to O previous O activity O The O registrant O of O cdncool B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator also O registered O six O other O domains O . O To O date O , O Unit O 42 O has O seen O four O of O the O seven O ( O the O first O three O in O the O list O below O , O along O with O cdncool B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator ) O used O in O malicious O activity O and O it O is O reasonable O to O assume O the O remaining O three O are O or O were O intended O to O serve O the O same O purpose B-Indicator . I-Indicator tcpdo I-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator adminsysteminfo B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator md5c B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator linkdatax B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator csip6 B-Indicator [ I-Indicator . I-Indicator ] I-Indicator biz I-Indicator adminloader B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator Unit O 42 O published O a O blog O in O July O 2016 O about O 9002 B-Malware malware O being O delivered O using O a O combination O of O shortened O links O and O a O file O hosted O on O Google O Drive O . O The O spear O phishing O emails O had O Myanmar O political-themed O lures O and O , O if O the O 9002 B-Malware C2 O server O responded O , O the O Trojan O sent O system O specific O information O along O with O the O string O “ O jackhex O ” O . O “ O jackhex O ” O has O also O been O part O of O a O C2 O for O what O is O likely O related O Poison B-Malware Ivy I-Malware activity O detailed O below O , O along O with O additional O infrastructure O ties O . O The O C2 O for O the O aforementioned O 9002 B-Malware sample O was O logitechwkgame B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator , O which O resolved O to O the O IP O address O 222.239.91 B-Indicator [ I-Indicator . I-Indicator ] I-Indicator 30 I-Indicator . O At O the O same O time O , O the O domain B-Indicator admin.nslookupdns I-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator also O resolved O to O the O same O IP O address O , O suggesting O that O these O two O domains O are O associated O with O the O same O threat O actors O . O In O addition O , O admin.nslookupdns B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator was O a O C2 O for O Poison B-Malware Ivy I-Malware samples O associated O with O attacks O on O Myanmar O and O other O Asian O countries O discussed O in O a O blog O published O by O Arbor B-Organization Networks I-Organization in O April O 2016 O . O Another O tie O between O the O activity O is O the O C2 O jackhex.md5c B-Indicator [ I-Indicator . I-Indicator ] I-Indicator net I-Indicator , O which O was O also O used O as O a O Poison B-Malware Ivy I-Malware C2 O in O the O Arbor B-Organization Networks I-Organization blog O . O “ O jackhex O ” O is O not O a O common O word O or O phrase O and O , O as O noted O above O , O was O also O seen O in O the O beacon O activity O with O the O previously O discussed O 9002 B-Malware sample O . O Finally O , O since O publishing O the O 9002 B-Malware blog O , O Unit O 42 O has O also O seen O the O aforementioned O 9002 B-Malware C2 O used O as O a O Poison B-Malware Ivy I-Malware C2 O with O a O Myanmar O political-themed O lure O . O In O our O 9002 B-Malware blog O we O noted O some O additional O infrastructure O used O either O as O C2s O for O related O Poison B-Malware Ivy I-Malware samples O , O or O domain O registrant O overlap O with O those O C2 O domains O . O When O we O published O that O blog O Unit O 42 O hadn O ’ O t O seen O any O of O the O three O registrants O overlap O domains O used O in O malicious O activity O . O Since O then O , O we O have O seen O Poison B-Malware Ivy I-Malware samples O using O third-levels O of O querlyurl B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator , O lending O further O credence O the O remaining O two O domains O , O gooledriveservice B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator and O appupdatemoremagic B-Indicator [ I-Indicator . I-Indicator ] I-Indicator com I-Indicator are O or O were O intended O for O malicious O use O . O While O we O do O not O have O complete O targeting O , O information O associated O with O these O Poison B-Malware Ivy I-Malware samples O , O several O of O the O decoy O files O were O in O Chinese O and O appear O to O be O part O of O a O 2016 O campaign O targeting O organizations O in O Taiwan O with O political-themed O lures O . O Conclusion O Typically O masquerading O as O legitimate O Android B-Malware system O apps O , O and O sometimes O embedding O legitimate O apps O within O them O , O the O primary O goal O of O the O malicious O HenBox B-Malware appears O to O be O to O spy O on O those O who O install O them O . O Using O similar O traits O , O such O as O copycat O iconography O and O app O or O package O names O , O victims O are O likely O socially O engineered O into O installing O the O malicious O apps O , O especially O when O available O on O so-called O third-party O ( O i.e O . O non-Google O Play B-System ) O app O stores O which O often O have O fewer O security O and O vetting O procedures O for O the O apps O they O host O . O It O ’ O s O possible O , O as O with O other O Android B-System malware O , O that O some O apps O may O also O be O available O on O forums O , O file-sharing O sites O or O even O sent O to O victims O as O email O attachments O , O and O we O were O only O able O to O determine O the O delivery O mechanism O for O a O handful O of O the O apps O we O have O been O able O to O find O . O The O hosting O locations O seen O for O some O HenBox B-Malware samples O , O together O with O the O nature O of O some O embedded O apps O including O : O those O targeted O at O extremist O groups O , O those O who O use O VPN O or O other O privacy-enabling O apps O , O and O those O who O speak O the O Uyghur O language O , O highlights O the O victim O profile O the O threat O actors O were O seeking O to O attack O . O The O targets O and O capabilities O of O HenBox B-Malware , O in O addition O to O the O ties O to O previous O activity O using O four O different O Windows O malware O families O with O political-themed O lures O against O several O different O South O East O Asian O countries O , O indicates O this O activity O likely O represents O an O at O least O three-year-old O espionage O campaign O . O THURSDAY O , O OCTOBER O 11 O , O 2018 O GPlayed B-Malware Trojan O - O .Net O playing O with O Google B-Organization Market O Introduction O In O a O world O where O everything O is O always O connected O , O and O mobile O devices O are O involved O in O individuals O ' O day-to-day O lives O more O and O more O often O , O malicious O actors O are O seeing O increased O opportunities O to O attack O these O devices O . O Cisco B-Organization Talos I-Organization has O identified O the O latest O attempt O to O penetrate O mobile O devices O — O a O new O Android B-System trojan O that O we O have O dubbed O " O GPlayed B-Malware . O '' O This O is O a O trojan O with O many O built-in O capabilities O . O At O the O same O time O , O it O 's O extremely O flexible O , O making O it O a O very O effective O tool O for O malicious O actors O . O The O sample O we O analyzed O uses O an O icon O very O similar O to O Google B-System Apps I-System , O with O the O label O " O Google B-System Play I-System Marketplace I-System '' O to O disguise O itself O . O The O malicious O application O is O on O the O left-hand O side O . O What O makes O this O malware O extremely O powerful O is O the O capability O to O adapt O after O it O 's O deployed O . O In O order O to O achieve O this O adaptability O , O the O operator O has O the O capability O to O remotely O load O plugins O , O inject O scripts O and O even O compile O new O .NET B-System code O that O can O be O executed O . O Our O analysis O indicates O that O this O trojan O is O in O its O testing O stage O but O given O its O potential O , O every O mobile O user O should O be O aware O of O GPlayed B-Malware . O Mobile O developers O have O recently O begun O eschewing O traditional O app O stores O and O instead O want O to O deliver O their O software O directly O through O their O own O means O . O But O GPlayed B-Malware is O an O example O of O where O this O can O go O wrong O , O especially O if O a O mobile O user O is O not O aware O of O how O to O distinguish O a O fake O app O versus O a O real O one O . O Trojan O architecture O and O capabilities O This O malware O is O written O in O .NET B-System using O the O Xamarin B-System environment O for O mobile O applications O . O The O main O DLL O is O called O " O Reznov.DLL B-Indicator . O '' O This O DLL O contains O one O root O class O called O " O eClient O , O '' O which O is O the O core O of O the O trojan O . O The O imports O reveal O the O use O of O a O second O DLL O called O " O eCommon.dll B-Indicator . O '' O We O determined O that O the O " O eCommon O '' O file O contains O support O code O and O structures O that O are O platform O independent O . O The O main O DLL O also O contains O eClient O subclasses O that O implement O some O of O the O native O capabilities O . O The O package O certificate O is O issued O under O the O package O name O , O which O also O resembles O the O name O of O the O main O DLL O name O . O Certificate O information O The O Android B-System package O is O named O " O verReznov.Coampany B-Indicator . O '' O The O application O uses O the O label O " O Installer B-Indicator '' O and O its O name O is O " O android.app.Application B-Indicator . O '' O Package O permissions O The O trojan O declares O numerous O permissions O in O the O manifest O , O from O which O we O should O highlight O the O BIND_DEVICE_ADMIN O , O which O provides O nearly O full O control O of O the O device O to O the O trojan O . O This O trojan O is O highly O evolved O in O its O design O . O It O has O modular O architecture O implemented O in O the O form O of O plugins O , O or O it O can O receive O new O .NET B-System source O code O , O which O will O be O compiled O on O the O device O in O runtime O . O Initialization O of O the O compiler O object O The O plugins O can O be O added O in O runtime O , O or O they O can O be O added O as O a O package O resource O at O packaging O time O . O This O means O that O the O authors O or O the O operators O can O add O capabilities O without O the O need O to O recompile O and O upgrade O the O trojan O package O on O the O device O . O Trojan O native O capabilities O This O is O a O full-fledged O trojan O with O capabilities O ranging O from O those O of O a O banking O trojan O to O a O full O spying O trojan O . O This O means O that O the O malware O can O do O anything O from O harvest O the O user O 's O banking O credentials O , O to O monitoring O the O device O 's O location O . O There O are O several O indicators O ( O see O section O " O trojan O activity O '' O below O ) O that O it O is O in O its O last O stages O of O development O , O but O it O has O the O potential O to O be O a O serious O threat O . O Trojan O details O Upon O boot O , O the O trojan O will O start O by O populating O a O shared O preferences O file O with O the O configuration O it O has O on O its O internal O structures O . O Afterward O , O it O will O start O several O timers O to O execute O different O tasks O . O The O first O timer O will O be O fired O on O the O configured O interval O ( O 20 O seconds O in O this O case O ) O , O pinging O the O command O and O control O ( O C2 O ) O server O . O The O response O can O either O be O a O simple O " O OK O , O '' O or O can O be O a O request O to O perform O some O action O on O the O device O . O The O second O timer O will O run O every O five O seconds O and O it O will O try O to O enable O the O WiFi O if O it O 's O disabled O . O The O third O timer O will O fire O every O 10 O seconds O and O will O attempt O to O register O the O device O into O the O C2 O and O register O wake-up O locks O on O the O system O to O control O the O device O 's O status O . O During O the O trojan O registration O stage O , O the O trojan O exfiltrates O private O information O such O as O the O phone O 's O model O , O IMEI O , O phone O number O and O country O . O It O will O also O report O the O version O of O Android B-System that O the O phone O is O running O and O any O additional O capabilities O . O Device O registration O This O is O the O last O of O the O three O main O timers O that O are O created O . O The O trojan O will O register O the O SMS O handler O , O which O will O forward O the O contents O and O the O sender O of O all O of O the O SMS O messages O on O the O phone O to O the O C2 O . O The O final O step O in O the O trojan O 's O initialization O is O the O escalation O and O maintenance O of O privileges O in O the O device O . O This O is O done O both O by O requesting O admin O privileges O on O the O device O and O asking O the O user O to O allow O the O application O to O access O the O device O 's O settings O . O Privilege O escalation O requests O The O screens O asking O for O the O user O 's O approval O wo O n't O close O unless O the O user O approves O the O privilege O escalation O . O If O the O user O closes O the O windows O , O they O will O appear O again O due O to O the O timer O configuration O . O After O the O installation O of O the O trojan O , O it O will O wait O randomly O between O three O and O five O minutes O to O activate O one O of O the O native O capabilities O — O these O are O implemented O on O the O eClient O subclass O called O " O GoogleCC O . O '' O This O class O will O open O a O WebView O with O a O Google-themed B-Organization page O asking O for O payment O in O order O to O use O the O Google B-Organization services O . O This O will O take O the O user O through O several O steps O until O it O collects O all O the O necessary O credit O card O information O , O which O will O be O checked O online O and O exfiltrated O to O the O C2 O . O During O this O process O , O an O amount O of O money O , O configured O by O the O malicious O operator O , O is O requested O to O the O user O . O Steps O to O request O the O user O 's O credit O card O information O In O our O sample O configuration O , O the O request O for O the O views O above O can O not O be O canceled O or O removed O from O the O screen O — O behaving O just O like O a O screen O lock O that O wo O n't O be O disabled O without O providing O credit O card O information O . O All O communication O with O the O C2 O is O done O over O HTTP O . O It O will O use O either O a O standard O web O request O or O it O will O write O data O into O a O web O socket O if O the O first O method O fails O . O The O C2 O can O also O use O WebSocket O as O a O backup O communication O channel O . O Before O sending O any O data O to O the O C2 O using O the O trojan O attempts O to O disguise O its O data O , O the O data O is O serialized O using O JSON O , O which O is O then O encoded O in O Base64 O . O However O , O the O trojan O replaces O the O '= O ' O by O 'AAAZZZXXX O ' O , O the O '+ O ' O by O '| O ' O and O the O '/ O ' O by O ' O . O ' O to O disguise O the O Base64 O . O Request O encoding O process O The O HTTP O requests O follow O the O format O below O , O while O on O the O WebSocket O only O the O query O data O is O written O . O ? O q= O - O : O As O is O common O with O trojans O , O the O communication O is O always O initiated O by O the O trojan O on O the O device O to O the O C2 O . O The O request O codes O are O actually O replies O to O the O C2 O action O requests O , O which O are O actually O called O " O responses O . O '' O There O are O 27 O response O codes O that O the O C2 O can O use O to O make O requests O to O the O trojan O , O which O pretty O much O match O what O 's O listed O in O the O capabilities O section O . O Error O Registration O Ok O Empty O SendSMS O RequestGoogleCC O Wipe O OpenBrowser O SendUSSD O RequestSMSList O RequestAppList O RequestLocation O ShowNotification O SetLockPassword O LockNow O MuteSound O LoadScript O LoadPlugin O ServerChange O StartApp O CallPhone O SetPingTimer O SMSBroadcast O RequestContacts O AddInject O RemoveInject O Evaluate O Another O feature O of O this O trojan O is O the O ability O to O register O injects O , O which O are O JavaScript O snippets O of O code O . O These O will O be O executed O in O a O WebView O object O created O by O the O trojan O . O This O gives O the O operators O the O capability O to O trick O the O user O into O accessing O any O site O while O stealing O the O user O 's O cookies O or O forging O form O fields O , O like O account O numbers O or O phone O numbers O . O Trojan O activity O At O the O time O of O the O writing O of O this O post O , O all O URLs O ( O see O IOC O section O ) O found O on O the O sample O were O inactive O , O and O it O does O not O seem O to O be O widespread O . O There O are O some O indicators O that O this O sample O is O just O a O test O sample O on O its O final O stages O of O development O . O There O are O several O strings O and O labels O still O mentioning O 'test O ' O or O 'testcc O ' O — O even O the O URL O used O for O the O credit O card O data O exfiltration O is O named O " O testcc.php B-Indicator . O '' O Debug O information O on O logcat O Another O indicator O is O the O amount O of O debugging O information O the O trojan O is O still O generating O — O a O production-level O trojan O would O keep O its O logging O to O a O minimum O . O The O only O sample O was O found O on O public O repositories O and O almost O seemed O to O indicate O a O test O run O to O determine O the O detection O ratio O of O the O sample O . O We O have O observed O this O trojan O being O submitted O to O public O antivirus O testing O platforms O , O once O as O a O package O and O once O for O each O DLL O to O determine O the O detection O ratio O . O The O sample O analyzed O was O targeted O at O Russian-speaking O users O , O as O most O of O the O user O interaction O pages O are O written O in O Russian O . O However O , O given O the O way O the O trojan O is O built O , O it O is O highly O customizable O , O meaning O that O adapting O it O to O a O different O language O would O be O extremely O easy O . O The O wide O range O of O capabilities O does O n't O limit O this O trojan O to O a O specific O malicious O activity O like O a O banking O trojan O or O a O ransomware O . O This O makes O it O impossible O to O create O a O target O profile O . O Conclusion O This O trojan O shows O a O new O path O for O threats O to O evolve O . O Having O the O ability O to O move O code O from O desktops O to O mobile O platforms O with O no O effort O , O like O the O eCommon.DLL B-Indicator demonstrates O that O malicious O actors O can O create O hybrid O threats O faster O and O with O fewer O resources O involved O than O ever O before O . O This O trojan O 's O design O and O implementation O is O of O an O uncommonly O high O level O , O making O it O a O dangerous O threat O . O These O kinds O of O threats O will O become O more O common O , O as O more O and O more O companies O decide O to O publish O their O software O directly O to O consumers O . O There O have O been O several O recent O examples O of O companies O choosing O to O release O their O software O directly O to O consumers O , O bypassing O traditional O storefronts O . O The O average O user O might O not O have O the O necessary O skills O to O distinguish O legitimate O sites O from O malicious O ones O . O We O 've O seen O that O this O has O been O the O case O for O many O years O with O spear-phishing O campaigns O on O desktop O and O mobile O platforms O , O so O , O unfortunately O , O it O does O n't O seem O that O this O will O change O any O time O soon O . O And O this O just O means O attackers O will O continue O to O be O successful O . O Coverage O Additional O ways O our O customers O can O detect O and O block O this O threat O are O listed O below O . O Advanced B-System Malware I-System Protection I-System ( I-System AMP I-System ) I-System is O ideally O suited O to O prevent O the O execution O of O the O malware O used O by O these O threat O actors O . O Cisco B-System Cloud I-System Web I-System Security I-System ( I-System CWS I-System ) I-System or O Web B-System Security I-System Appliance I-System ( I-System WSA I-System ) I-System web O scanning O prevents O access O to O malicious O websites O and O detects O malware O used O in O these O attacks O . O Email O Security O can O block O malicious O emails O sent O by O threat O actors O as O part O of O their O campaign O . O Network O Security O appliances O such O as O Next-Generation B-System Firewall I-System ( I-System NGFW I-System ) I-System , O Next-Generation B-System Intrusion I-System Prevention I-System System I-System ( I-System NGIPS I-System ) I-System , O and O Meraki B-System MX I-System can O detect O malicious O activity O associated O with O this O threat O . O AMP O Threat O Grid O helps O identify O malicious O binaries O and O build O protection O into O all O Cisco B-Organization Security O products O . O Umbrella B-System , O our O secure O internet O gateway O ( O SIG O ) O , O blocks O users O from O connecting O to O malicious O domains O , O IPs O , O and O URLs O , O whether O users O are O on O or O off O the O corporate O network O . O Open O Source O Snort O Subscriber O Rule O Set O customers O can O stay O up O to O date O by O downloading O the O latest O rule O pack O available O for O purchase O on O Snort.org O . O Indicators O of O compromise O ( O IOC O ) O URLs O hxxp B-Indicator : I-Indicator //5.9.33.226:5416 I-Indicator hxxp B-Indicator : I-Indicator //172.110.10.171:85/testcc.php I-Indicator hxxp B-Indicator : I-Indicator //sub1.tdsworker.ru:5555/3ds/ I-Indicator Hash O values O Package.apk B-Indicator - O A342a16082ea53d101f556b50532651cd3e3fdc7d9e0be3aa136680ad9c6a69f B-Indicator eCommon.dl B-Indicator - O 604deb75eedf439766896f05799752de268baf437bf89a7185540627ab4a4bd1 B-Indicator Reznov.dll B-Indicator - O 17b8665cdbbb94482ca970a754d11d6e29c46af6390a2d8e8193d8d6a527dec3 B-Indicator Custom O activity O prefix O com.cact.CAct B-Indicator Cerberus B-Malware - O A O new O banking O Trojan O from O the O underworld O August O 2019 O In O June O 2019 O , O ThreatFabric B-Organization analysts O found O a O new O Android B-System malware O , O dubbed O “ O Cerberus B-Malware ” O , O being O rented O out O on O underground O forums O . O Its O authors O claim O that O it O was O used O for O private O operations O for O two O years O preceding O the O start O of O the O rental O . O They O also O state O that O the O code O is O written O from O scratch O and O is O not O using O parts O of O other O existing O banking O Trojans O unlike O many O other O Trojans O that O are O either O based O completely O on O the O source O of O another O Trojan O ( O such O as O the O leaked O Anubis B-Malware source O code O that O is O now O being O resold O ) O or O at O least O borrow O parts O of O other O Trojans O . O After O thorough O analysis O we O can O confirm O that O Cerberus B-Malware was O indeed O not O based O on O the O Anubis B-Malware source O code O . O One O peculiar O thing O about O the O actor O group O behind O this O banking O malware O is O that O they O have O an O “ O official O ” O twitter B-Organization account O that O they O use O to O post O promotional O content O ( O even O videos O ) O about O the O malware O . O Oddly O enough O they O also O use O it O to O make O fun O of O the O AV O community O , O sharing O detection O screenshots O from O VirusTotal B-Organization ( O thus O leaking O IoC O ) O and O even O engaging O in O discussions O with O malware O researchers O directly O The O following O screenshot O shows O tweets O from O their O advertisement O campaign O : O That O unusual O behavior O could O be O explained O by O the O combination O of O the O need O for O attention O and O a O probable O lack O of O experience O . O What O is O sure O is O that O the O gap O in O the O Android B-System banking O malware O rental O business O left O open O after O the O rental O of O the O Anubis B-Malware 2 I-Malware and O RedAlert B-Malware 2 I-Malware Trojans O ended O provides O a O good O opportunity O for O the O actors O behind O Cerberus B-Malware to O grow O their O business O quickly O . O The O Android B-System banking O Trojan O rental O business O Rental O of O banking O Trojans O is O not O new O . O It O was O an O existing O business O model O when O computer-based O banking O malware O was O the O only O form O of O banking O malware O and O has O shifted O to O the O Android B-System equivalent O a O few O years O later O . O The O life O span O of O Android B-System banking O malware O is O limited O to O either O the O will O of O its O author O ( O s O ) O to O support O it O or O the O arrest O of O those O actors O . O This O malware-life-cycle O has O been O observed O to O reoccur O every O few O years O , O bringing O new O malware O families O into O light O . O Each O time O a O rented O malware O reaches O the O end O of O its O life O it O provides O the O opportunity O for O other O actors O a O to O take O over O the O malware O rental O market-share O . O As O visible O on O following O chart O , O the O lifespan O of O many O well-known O rented O Android B-System bankers O is O usually O no O more O than O one O or O two O years O . O When O the O family O ceases O to O exist O a O new O one O is O already O available O to O fill O the O void O , O proving O that O the O demand O for O such O malware O is O always O present O and O that O therefore O Cerberus B-Malware has O a O good O chance O to O survive O . O After O the O actor O behind O RedAlert B-Malware 2 I-Malware decided O to O quit O the O rental O business O , O we O observed O a O surge O in O Anubis B-Malware samples O in O the O wild O . O After O the O Anubis B-Malware actor O was O allegedly O arrested O and O the O source O code O was O leaked O there O was O also O huge O increase O in O the O number O of O Anubis B-Malware samples O found O in O the O wild O , O but O the O new O actors O using O Anubis B-Malware have O no O support O or O updates O . O Due O to O this O Cerberus B-Malware will O come O in O handy O for O actors O that O want O to O focus O on O performing O fraud O without O having O to O develop O and O maintain O a O botnet O and O C2 O infrastructure O . O Analysis O of O evasion O techniques O Along O with O the O standard O payload O and O string O obfuscation O , O Cerberus B-Malware uses O a O rather O interesting O technique O to O prevent O analysis O of O the O Trojan O . O Using O the O device O accelerometer O sensor O it O implements O a O simple O pedometer O that O is O used O to O measure O movements O of O the O victim O . O The O idea O is O simple O - O if O the O infected O device O belongs O to O a O real O person O , O sooner O or O later O this O person O will O move O around O , O increasing O the O step O counter O . O The O Trojan O uses O this O counter O to O activate O the O bot O - O if O aforementioned O step O counter O hits O the O pre-configured O threshold O it O considers O running O on O the O device O to O be O safe O . O This O simple O measure O prevents O the O Trojan O from O running O and O being O analyzed O in O dynamic O analysis O environments O ( O sandboxes O ) O and O on O the O test O devices O of O malware O analysts O . O The O code O responsible O for O this O verification O is O shown O in O the O following O snippet O : O How O it O works O When O the O malware O is O first O started O on O the O device O it O will O begin O by O hiding O its O icon O from O the O application O drawer O . O Then O it O will O ask O for O the O accessibility O service O privilege O as O visible O in O the O following O screenshot O : O After O the O user O grants O the O requested O privilege O , O Cerberus B-Malware starts O to O abuse O it O by O granting O itself O additional O permissions O , O such O as O permissions O needed O to O send O messages O and O make O calls O , O without O requiring O any O user O interaction O . O It O also O disables O Play B-System Protect I-System ( O Google B-Organization ’ O s O preinstalled O antivirus O solution O ) O to O prevent O its O discovery O and O deletion O in O the O future O . O After O conveniently O granting O itself O additional O privileges O and O securing O its O persistence O on O the O device O , O Cerberus B-Malware registers O the O infected O device O in O the O botnet O and O waits O for O commands O from O the O C2 O server O while O also O being O ready O to O perform O overlay O attacks O . O The O commands O supported O by O the O analyzed O version O of O the O Cerberus B-Malware bot O are O listed O below O . O As O can O be O seen O , O the O possibilities O offered O by O the O bot O are O pretty O common O . O Command O Description O push O Shows O a O push O notification O . O Clicking O on O thenotification O will O result O in O launching O a O specified O app O startApp O Starts O the O specified O application O getInstallApps O Gets O the O list O of O installedapplications O on O the O infected O device O getContacts O Gets O the O contact O names O and O phone O numbers O from O the O addressbook O on O the O infected O device O deleteApplication O Triggers O the O deletion O of O the O specified O application O forwardCall O Enables O call O forwarding O to O the O specified O number O sendSms O Sends O a O text O message O with O specified O text O from O the O infecteddevice O to O the O specified O phone O number O startInject O Triggers O the O overlay O attack O against O the O specified O application O startUssd O Calls O the O specified O USSD O code O openUrl O Opens O the O specified O URL O in O the O WebView O getSMS O Gets O all O text O messages O from O the O infected O device O killMe O Triggers O the O kill O switch O for O the O bot O updateModule O Updates O the O payload O module O Cerberus B-Malware features O Cerberus B-Malware malware O has O the O same O capabilities O as O most O other O Android B-System banking O Trojans O such O as O the O use O of O overlay O attacks O , O SMS O control O and O contact O list O harvesting O . O The O Trojan O can O also O leverage O keylogging O to O broaden O the O attack O scope O . O Overall O , O Cerberus B-Malware has O a O pretty O common O feature O list O and O although O the O malware O seems O to O have O been O written O from O scratch O there O does O not O seem O to O be O any O innovative O functionality O at O this O time O . O For O example O , O some O of O the O more O advanced O banking O Trojans O now O offer O features O such O as O a O back-connect O proxy O , O screen-streaming O and O even O remote O control O . O Cerberus B-Malware embeds O the O following O set O of O features O that O allows O itself O to O remain O under O the O radar O and O successfully O perform O attacks O : O Overlaying O : O Dynamic O ( O Local O injects O obtained O from O C2 O ) O Keylogging O SMS O harvesting O : O SMS O listing O SMS O harvesting O : O SMS O forwarding O Device O info O collection O Contact O list O collection O Application O listing O Location O collection O Overlaying O : O Targets O list O update O SMS O : O Sending O Calls O : O USSD O request O making O Calls O : O Call O forwarding O Remote O actions O : O App O installing O Remote O actions O : O App O starting O Remote O actions O : O App O removal O Remote O actions O : O Showing O arbitrary O web O pages O Remote O actions O : O Screen-locking O Notifications O : O Push O notifications O C2 O Resilience O : O Auxiliary O C2 O list O Self-protection O : O Hiding O the O App O icon O Self-protection O : O Preventing O removal O Self-protection O : O Emulation-detection O Architecture O : O Modular O Overlay O attack O Most O Android O banking O Trojans O use O overlay O attacks O to O trick O the O victim O into O providing O their O personal O information O ( O such O as O but O not O limited O to O : O credit O card O information O , O banking O credentials O , O mail O credentials O ) O and O Cerberus B-Malware is O no O exception O . O In O this O particular O case O , O the O bot O abuses O the O accessibility O service O privilege O to O obtain O the O package O name O of O the O foreground O application O and O determine O whether O or O not O to O show O a O phishing O overlay O window O , O as O shown O in O the O following O code O snippet O : O Targets O Some O examples O of O phishing O overlays O are O shown O below O . O They O exist O in O two O types O : O the O credentials O stealers O ( O first O 2 O screenshots O ) O and O the O credit O card O grabbers O ( O last O screenshot O ) O . O The O only O active O target O list O observed O in O the O wild O is O available O in O the O appendix O and O contains O a O total O of O 30 O unique O targets O . O It O is O interesting O to O observe O that O the O actual O target O list O contains O : O 7 O French O banking O apps O 7 O U.S. O banking O apps O 1 O Japanese O banking O app O 15 O non-banking O apps O This O uncommon O target O list O might O either O be O the O result O of O specific O customer O demand O , O or O due O to O some O actors O having O partially O reused O an O existing O target O list O . O Conclusion O Although O not O yet O mature O enough O to O provide O the O equivalent O of O a O full-blown O set O of O Android B-System banking O malware O features O ( O such O as O RAT O , O RAT O with O ATS O ( O Automated O Transaction O Script O ) O , O back-connect O proxy O , O media O streaming O ) O , O or O providing O an O exhaustive O target O list O , O Cerberus B-Malware should O not O be O taken O lightly O . O Due O to O the O current O absence O of O maintained O and O supported O Android B-Malware banking O Malware-as-a-Service O in O the O underground O community O , O there O is O a O certainly O demand O for O a O new O service O . O Cerberus B-Malware is O already O capable O to O fulfill O this O demand O . O In O addition O to O the O feature O base O it O already O possesses O and O the O money O that O can O be O made O from O the O rental O , O it O could O evolve O to O compete O with O the O mightiest O Android B-System banking O Trojans O . O Next O to O the O features O , O we O expect O the O target O list O to O be O expanded O to O contain O additional O ( O banking O ) O apps O in O the O near O future O . O Knowledge O of O the O threat O landscape O and O implementation O of O the O right O detection O tools O remains O crucial O to O be O able O to O protect O yourself O from O fraud O ; O Cerberus B-Malware is O yet O a O new O Trojan O active O in O the O wild O ! O Appendix O Samples O Some O of O the O latest O Cerberus B-Malware samples O found O in O the O wild O : O App O name O Package O name O SHA O 256 O hash O Flash B-System Player I-System com.uxlgtsvfdc.zipvwntdy B-Indicator 728a6ea44aab94a2d0ebbccbf0c1b4a93fbd9efa8813c19a88d368d6a46b4f4f B-Indicator Flash B-System Player I-System com.ognbsfhszj.hqpquokjdp B-Indicator fe28aba6a942b6713d7142117afdf70f5e731c56eff8956ecdb40cdc28c7c329 B-Indicator Flash B-System Player I-System com.mwmnfwt.arhkrgajn B-Indicator ffa5ac3460998e7b9856fc136ebcd112196c3abf24816ccab1fbae11eae4954c B-Indicator Flash B-System Player I-System com.wogdjywtwq.oiofvpzpxyo B-Indicator 6ac7e7ed83b4b57cc4d28f14308d69d062d29a544bbde0856d5697b0fc50cde4 B-Indicator Flash B-System Player I-System com.hvdnaiujzwo.fovzeukzywfr B-Indicator cfd77ddc5c1ebb8498c899a68ea75d2616c1c92a0e618113d7c9e5fcc650094b B-Indicator Flash B-System Player I-System com.gzhlubw.pmevdiexmn B-Indicator 3f2ed928789c200e21fd0c2095619a346f75d84f76f1e54a8b3153385850ea63 B-Indicator Target O list O The O actual O observed O list O of O mobile O apps O targeted O by O Cerberus B-Malware contains O a O total O of O 30 O unique O applications O . O This O list O is O expected O to O expand O : O Package O name O Application O name O com.android.vending B-Indicator Play B-System Market I-System com.boursorama.android.clients B-Indicator Boursorama I-Indicator Banque B-System com.caisseepargne.android.mobilebanking B-Indicator Banque B-System com.chase.sig.android B-Indicator Chase B-System Mobile I-System com.clairmail.fth B-Indicator Fifth B-System Third I-System Mobile I-System Banking I-System com.connectivityapps.hotmail B-Indicator Connect B-System for I-System Hotmail I-System com.google.android.gm B-Indicator Gmail B-System com.imo.android.imoim B-Indicator imo B-System free O video O calls O and O chat O com.infonow.bofa B-Indicator Bank B-System of I-System America I-System Mobile I-System Banking I-System com.IngDirectAndroid B-Indicator ING O com.instagram.android B-Indicator Instagram I-Indicator com.konylabs.capitalone B-Indicator Capital B-System One® I-System Mobile I-System com.mail.mobile.android.mail B-Indicator mail.com I-Indicator mail B-System com.microsoft.office.outlook B-Indicator Microsoft B-System Outlook I-System com.snapchat.android B-Indicator Snapchat B-System com.tencent.mm B-Indicator WeChat B-System com.twitter.android B-Indicator Twitter B-System com.ubercab B-Indicator Uber B-Organization com.usaa.mobile.android.usaa B-Indicator USAA B-System Mobile I-System com.usbank.mobilebanking B-Indicator U.S. I-Indicator Bank O - O Inspired O by O customers O com.viber.voip B-Indicator Viber B-System com.wf.wellsfargomobile B-Indicator Wells B-System Fargo I-System Mobile I-System com.whatsapp B-Indicator WhatsApp B-System com.yahoo.mobile.client.android.mail B-Indicator Yahoo B-System Mail I-System – O Organized O Email O fr.banquepopulaire.cyberplus B-Indicator Banque B-System Populaire O fr.creditagricole.androidapp B-Indicator Ma B-System Banque I-System jp.co.rakuten_bank.rakutenbank B-Indicator 楽天銀行 O -個人のお客様向けアプリ O mobi.societegenerale.mobile.lappli B-Indicator L O ’ O Appli O Société O Générale O net.bnpparibas.mescomptes B-Indicator Mes O Comptes O BNP O Paribas O org.telegram.messenger B-Indicator Telegram I-Indicator Triout B-Malware - O Spyware O Framework O for O Android B-System with O Extensive O Surveillance O Capabilities O August O 20 O , O 2018 O No O operating O system O is O safe O from O malware O , O as O cyber O criminals O will O always O want O to O steal O , O spy O or O tamper O with O your O data O . O The O proliferation O of O Android B-Malware devices O – O from O smartphones O to O tablets O and O smart O TVs O – O has O opened O up O new O possibilities O for O malware O developers O , O as O all O these O devices O pack O microphones O , O cameras O and O location-tracking O hardware O they O can O turn O into O the O perfect O spy O tools O . O Bitdefender B-Organization researchers O have O identified O a O new O Android B-System spyware O , O dubbed O Triout B-Malware , O which O appears O to O act O as O a O framework O for O building O extensive O surveillance O capabilities O into O seemingly O benign O applications O . O Found O bundled O with O a O repackaged O app O , O the O spyware O ’ O s O surveillance O capabilities O involve O hiding O its O presence O on O the O device O , O recording O phone O calls O , O logging O incoming O text O messages O , O recoding O videos O , O taking O pictures O and O collecting O GPS B-System coordinates O , O then O broadcasting O all O of O that O to O an O attacker-controlled O C O & O C O ( O command O and O control O ) O server O . O It O ’ O s O interesting O that O Triout B-Malware , O which O is O detected O by O Bitdefender B-Organization ’ O s O machine O learning O algorithms O , O was O first O submitted O from O Russia O , O and O most O scans/reports O came O from O Israel O . O The O sample O ’ O s O first O appearance O seems O to O be O May O 15 O , O 2018 O , O when O it O was O uploaded O to O VirusTotal B-Organization , O but O it O ’ O s O unclear O how O the O tainted O sample O is O disseminated O . O Third-party O marketplaces O or O some O other O attacker-controlled O domains O are O likely O used O to O host O the O sample O . O A O subsequent O investigation O revealed O that O the O spyware O has O the O following O capabilities O : O Records O every O phone O call O ( O literally O the O conversation O as O a O media O file O ) O , O then O sends O it O together O with O the O caller O id O to O the O C O & O C O ( O incall3.php B-Indicator and O outcall3.php B-Indicator ) O Logs O every O incoming O SMS O message O ( O SMS O body O and O SMS O sender O ) O to O C O & O C O ( O script3.php B-Indicator ) O Has O capability O to O hide O self O Can O send O all O call O logs O ( O “ O content B-Indicator : I-Indicator //call_log/calls I-Indicator ” O , O info O : O callname O , O callnum O , O calldate O , O calltype O , O callduration O ) O to O C O & O C O ( O calllog.php B-Indicator ) O Whenever O the O user O snaps O a O picture O , O either O with O the O front O or O rear O camera O , O it O gets O sent O to O the O C O & O C O ( O uppc.php B-Indicator , O fi O npic.php B-Indicator orreqpic.php B-Indicator ) O Can O send O GPS B-System coordinates O to O C O & O C O ( O gps3.php B-Indicator ) O The O C O & O C O server O to O which O the O application O seems O to O be O sending O collected O data O appears O to O be O operational O , O as O of O this O writing O , O and O running O since O May O 2018 O . O January O 23 O , O 2017 O SpyNote B-Malware RAT I-Malware posing O as O Netflix B-System app I-System As O users O have O become O more O attached O to O their O mobile O devices O , O they O want O everything O on O those O devices O . O There O ’ O s O an O app O for O just O about O any O facet O of O one O ’ O s O personal O and O professional O life O , O from O booking O travel O and O managing O projects O , O to O buying O groceries O and O binge-watching O the O latest O Netflix B-Organization series O . O The O iOS B-System and O Android B-System apps O for O Netflix B-Organization are O enormously O popular O , O effectively O turning O a O mobile O device O into O a O television O with O which O users O can O stream O full O movies O and O TV O programs O anytime O , O anywhere O . O But O the O apps O , O with O their O many O millions O of O users O , O have O captured O the O attention O of O the O bad O actors O , O too O , O who O are O exploiting O the O popularity O of O Netflix B-Organization to O spread O malware O . O Recently O , O the O ThreatLabZ B-Organization research O team O came O across O a O fake B-System Netflix I-System app I-System , O which O turned O out O to O be O a O new O variant O of O SpyNote B-Malware RAT I-Malware ( O Remote O Access O Trojan O ) O . O SpyNote B-Malware RAT I-Malware is O capable O of O performing O a O variety O of O alarming O functions O that O includes O : O Activating O the O device O ’ O s O microphone O and O listening O to O live O conversations O Executing O commands O on O the O device O Copying O files O from O the O device O to O a O Command O & O Control O ( O C O & O C O ) O center O Recording O screen O captures O Viewing O contacts O Reading O SMS O messages O The O screenshot O below O shows O part O of O the O sandbox O ’ O s O report O on O the O SpyNote B-Malware RAT I-Malware ’ O s O signature O and O detected O functions O : O The O fake O Netflix B-Organization app O we O are O analyzing O in O this O blog O appears O to O be O built O using O an O updated O version O of O SpyNote B-Malware RAT I-Malware builder O , O which O was O leaked O last O year O . O Technical O details O Please O note O that O our O research O is O not O about O the O legitimate O Netflix B-System app I-System on O Google B-System Play I-System . O The O spyware O in O this O analysis O was O portraying O itself O as O the O Netflix B-System app I-System . O Once O installed O , O it O displayed O the O icon O found O in O the O actual O Netflix B-System app I-System on O Google B-System Play I-System . O As O soon O as O the O user O clicks O the O spyware O ’ O s O icon O for O the O first O time O , O nothing O seems O to O happen O and O the O icon O disappears O from O the O home O screen O . O This O is O a O common O trick O played O by O malware O developers O , O making O the O user O think O the O app O may O have O been O removed O . O But O , O behind O the O scenes O , O the O malware O has O not O been O removed O ; O instead O it O starts O preparing O its O onslaught O of O attacks O . O For O contacting O C O & O C O , O the O spyware O was O found O to O be O using O free O DNS B-Indicator services O , O as O shown O in O the O screenshot O below O : O SpyNote B-Malware RAT I-Malware uses O an O unusual O trick O to O make O sure O that O it O remains O up O and O running O and O that O the O spying O does O not O stop O . O It O does O so O using O the O Services O , O Broadcast O Receivers O , O and O Activities O components O of O the O Android B-System platform O . O Services O can O perform O long-running O operations O in O the O background O and O does O not O need O a O user O interface O . O Broadcast O Receivers O are O Android B-System components O that O can O register O themselves O for O particular O events O . O Activities O are O key O building O blocks O , O central O to O an O app O ’ O s O navigation O , O for O example O . O The O SpyNote B-Malware RAT I-Malware registers O a O service O called O AutoStartup O and O a O broadcast O receiver O named O BootComplete O . O MainActivity O registers O BootComplete O with O a O boot O event O , O so O that O whenever O the O device O is O booted O , O BootComplete O gets O triggered O . O BootComplete O starts O the O AutoStartup O service O and O the O AutoStartup O service O makes O sure O that O MainActivity O is O always O running O . O What O follows O are O some O of O the O features O exhibited O by O SpyNote B-Malware RAT I-Malware . O Command O execution O Command O execution O can O create O havoc O for O victim O if O the O malware O developer O decides O to O execute O commands O in O the O victim O ’ O s O device O . O Leveraging O this O feature O , O the O malware O developer O can O root O the O device O using O a O range O of O vulnerabilities O , O well-known O or O zero-day O . O The O following O screenshot O shows O the O command O execution O functionality O in O action O : O The O paramString O parameter O shown O in O the O above O screenshot O can O be O any O command O received O from O C O & O C O . O Screen O capture O and O audio O recording O SpyNote B-Malware RAT I-Malware was O able O to O take O screen O captures O and O , O using O the O device O ’ O s O microphone O , O listen O to O audio O conversations O . O This O capability O was O confirmed O when O the O Android B-System permission O , O called O android.permission.RECORD_AUDIO B-Indicator , O was O being O requested O along O with O code O found O in O the O app O . O SpyNote B-Malware RAT I-Malware captured O the O device O ’ O s O screen O activities O along O with O audio O using O the O MediaProjectionCallback O functionality O ( O available O with O Lollipop B-System , O the O Android B-System 5.0 I-System release O , O and O later O ) O and O saved O the O output O in O a O file O named O " O video.mp4 B-Indicator '' O as O shown O in O the O following O screenshot O SMS O stealing O SpyNote B-Malware RAT I-Malware was O also O observed O stealing O SMS O messages O from O the O affected O devices O , O as O shown O in O screenshot O below O : O Stealing O contacts O The O ability O to O steal O contacts O is O a O favorite O feature O for O spyware O developers O , O as O the O stolen O contacts O can O be O used O to O further O spread O the O spyware O . O The O following O screenshot O shows O the O contacts O being O stolen O and O written O in O a O local O array O , O which O is O then O sent O to O C O & O C O : O Uninstalling O apps O Uninstalling O apps O is O another O function O favored O by O developers O of O Android B-System spyware O and O malware O . O They O tend O to O target O any O antivirus O protections O on O the O device O and O uninstall O them O , O which O increases O the O possibility O of O their O malware O persisting O on O the O device O . O Following O screenshot O shows O this O functionality O in O action O : O Other O functions O In O addition O to O the O functionalities O we O ’ O ve O described O , O the O SpyNote B-Malware RAT I-Malware was O exhibiting O many O other O behaviors O that O make O it O more O robust O than O most O off-the-shelf O malware O . O SpyNote B-Malware RAT I-Malware was O designed O to O function O only O over O Wi-Fi O , O which O is O the O preferable O mode O for O Android B-System malware O to O send O files O to O C O & O C O . O The O screenshot O below O shows O SpyNote B-Malware RAT I-Malware scanning O for O Wi-Fi O and O enabling O it O if O a O known O channel O is O found O : O Additional O features O - O SpyNote B-Malware RAT I-Malware could O click O photos O using O the O device O 's O camera O , O based O on O commands O from O C O & O C O . O - O There O were O two O interesting O sub-classes O found O inside O Main O Activity O : O Receiver O and O Sender O . O Receiver O was O involved O in O receiving O commands O from O the O Server O and O the O main O functionality O of O Sender O was O to O send O all O the O data O collected O to O the O C O & O C O over O Wi-Fi O . O - O SpyNote B-Malware RAT I-Malware was O also O collecting O the O device O ’ O s O location O to O identify O the O exact O location O of O the O victim O . O SpyNote B-Malware RAT I-Malware builder O The O SpyNote B-Malware Remote O Access O Trojan O ( O RAT O ) O builder O is O gaining O popularity O in O the O hacking O community O , O so O we O decided O to O study O its O pervasiveness O . O What O we O found O were O several O other O fake O apps O developed O using O the O SpyNote B-Malware builder O , O which O should O come O as O a O warning O to O Android B-System users O . O Some O of O the O targeted O apps O were O : O Whatsapp B-System YouTube B-System Video I-System Downloader I-System Google B-System Update I-System Instagram B-System Hack B-System Wifi I-System AirDroid B-System WifiHacker B-System Facebook B-System Photoshop B-System SkyTV B-System Hotstar B-System Trump B-System Dash I-System PokemonGo B-System With O many O more O to O come O . O Furthermore O , O we O found O that O in O just O the O first O two O weeks O of O 2017 O , O there O have O been O more O than O 120 O such O spyware O variants O already O built O using O the O same O SpyNote B-Malware Trojan O builder O as O SpyNote B-Malware RAT I-Malware and O roaming O in O the O wild O . O A O complete O list O of O sample O hashes O is O available O here O . O Conclusion O The O days O when O one O needed O in-depth O coding O knowledge O to O develop O malware O are O long O gone O . O Nowadays O , O script O kiddies O can O build O a O piece O of O malware O that O can O create O real O havoc O . O Moreover O , O there O are O many O toolkits O like O the O SpyNote B-Malware Trojan O builder O that O enable O users O to O build O malware O with O ease O and O few O clicks O . O In O particular O , O avoid O side-loading O apps O from O third-party O app O stores O and O avoid O the O temptation O to O play O games O that O are O not O yet O available O on O Android B-System . O Yes O , O we O are O talking O about O SuperMarioRun B-System , O which O was O recently O launched O by O Nintendo B-Organization only O for O iOS B-System users O . O Recent O blogs O by O the O Zscaler B-Organization research O team O explain O how O some O variants O of O Android B-Malware malware O are O exploiting O the O popularity O of O this O game O and O tricking O Android B-System users O into O downloading O a O fake O version O . O ( O Have O a O look O here O and O here O . O ) O You O should O also O avoid O the O temptation O to O play O games O from O sources O other O than O legitimate O app O stores O ; O such O games O are O not O safe O and O may O bring O harm O to O your O reputation O and O your O bank O account O . O FakeSpy B-Malware Masquerades O as O Postal O Service O Apps O Around O the O World O July O 1 O , O 2020 O KEY O FINDINGS O The O Cybereason B-Organization Nocturnus I-Organization team O is O investigating O a O new O campaign O involving O FakeSpy B-Malware , O an O Android B-System mobile O malware O that O emerged O around O October O 2017 O . O FakeSpy B-Malware is O an O information O stealer O used O to O steal O SMS O messages O , O send O SMS O messages O , O steal O financial O data O , O read O account O information O and O contact O lists O , O steal O application O data O , O and O do O much O more O . O FakeSpy B-Malware first O targeted O South O Korean O and O Japanese O speakers O . O However O , O it O has O begun O to O target O users O all O around O the O world O , O especially O users O in O countries O like O China O , O Taiwan O , O France O , O Switzerland O , O Germany O , O United O Kingdom O , O United O States O , O and O others O . O FakeSpy B-Malware masquerades O as O legitimate O postal O service O apps O and O transportation O services O in O order O to O gain O the O users O ' O trust O . O Once O installed O , O the O application O requests O permissions O so O that O it O may O control O SMS O messages O and O steal O sensitive O data O on O the O device O , O as O well O as O proliferate O to O other O devices O in O the O target O device O ’ O s O contact O list O . O Cybereason B-Organization 's O investigation O shows O that O the O threat O actor O behind O the O FakeSpy B-Malware campaign O is O a O Chinese-speaking O group O dubbed O " O Roaming B-Organization Mantis I-Organization '' O , O a I-Organization group O that O has O led O similar O campaigns O . O FakeSpy B-Malware has O been O in O the O wild O since O 2017 O ; O this O latest O campaign O indicates O that O it O has O become O more O powerful O . O Code O improvements O , O new O capabilities O , O anti-emulation O techniques O , O and O new O , O global O targets O all O suggest O that O this O malware O is O well-maintained O by O its O authors O and O continues O to O evolve O . O TABLE O OF O CONTENTS O Key O Findings O Introduction O Threat O Analysis O Fakespy B-Malware Code O Analysis O Dynamic O Library O Loading O Stealing O Sensitive O Information O Anti-Emulator O Techniques O Under O Active O Development O Who O is O Behind O Fakespy B-Malware 's O Smishing O Campaigns O ? O Conclusions O Cybereason B-Organization Mobile I-Organization Detects O and O Stops O FakeSpy B-Malware Indicators O of O Compromise O INTRODUCTION O For O the O past O several O weeks O , O Cybereason B-Organization has O been O investigating O a O new O version O of O Android B-System malware O dubbed O FakeSpy B-Malware , O which O was O first O identified O in O October O 2017 O and O reported O again O in O October O 2018 O . O A O new O campaign O is O up O and O running O using O newly O improved O , O significantly O more O powerful O malware O as O compared O to O previous O versions O . O FakeSpy B-Malware is O under O active O development O and O is O evolving O rapidly O ; O new O versions O are O released O every O week O with O additional O evasion O techniques O and O capabilities O . O Our O analysis O shows O that O the O threat O actor O behind O the O FakeSpy B-Malware malware O is O a O Chinese-speaking O group O , O commonly O referred O to O as O " O Roaming B-Organization Mantis I-Organization '' O , O a I-Organization group O that O is O known O to O have O launched O similar O campaigns O in O the O past O . O FakeSpy B-Malware is O an O information O stealer O that O exfiltrates O and O sends O SMS O messages O , O steals O financial O and O application O data O , O reads O account O information O and O contact O lists O , O and O more O . O The O malware O uses O smishing O , O or O SMS O phishing O , O to O infiltrate O target O devices O , O which O is O a O technique O that O relies O on O social O engineering O . O The O attackers O send O fake O text O messages O to O lure O the O victims O to O click O on O a O malicious O link O . O The O link O directs O them O to O a O malicious O web O page O , O which O prompts O them O to O download O an O Android O application O package O ( O APK O ) O . O This O most O recent O FakeSpy B-Malware campaign O appears O to O target O users O of O postal O services O around O the O world O . O New O versions O of O FakeSpy B-Malware masquerade O as O government O post O office O apps O and O transportation O services O apps O . O Our O analysis O indicates O that O the O threat O actors O are O no O longer O limiting O their O campaigns O to O East O Asian O countries O , O but O are O targeting O additional O countries O around O the O world O . O THREAT O ANALYSIS O Infection O Vector O : O Smishing O Your O Device O Thus O far O , O FakeSpy B-Malware campaigns O are O characterized O by O SMS O phishing O ( O a.k.a O . O smishing O ) O . O These O SMS O messages O masquerade O as O a O message O from O the O local O post O office O and O link O to O the O FakeSpy B-Malware download O . O In O a O previous O campaign O reported O by O JPCERT B-Organization , O mobile O users O were O alerted O by O phishy O messages O containing O “ O delivery O updates O ” O purportedly O from O Sagawa B-Organization Express I-Organization . O Fake O SMS O message O luring O users O to O enter O a O fake O website O , O which O contains O the O malicious O APK O ( O JPCERT B-Organization report O ) O . O Clicking O the O SMS O link O brings O the O user O to O a O fake O website O that O prompts O them O to O download O and O install O the O FakeSpy B-Malware APK O , O which O is O masquerading O as O a O local O postal O service O app O . O Targeting O Postal O and O Transportation O Services O Companies O One O of O the O most O significant O findings O is O that O new O versions O of O FakeSpy B-Malware target O not O only O Korean O and O Japanese O speakers O , O but O also O almost O any O postal O service O company O around O the O world O . O Example O of O more O recent O FakeSpy B-Malware campaigns O targeting O France O . O New O FakeSpy B-Malware campaign O applications O leveraging O fake O postal O services O apps O . O All O recent O FakeSpy B-Malware versions O contain O the O same O code O with O minor O changes O . O The O FakeSpy B-Malware malware O has O been O found O to O masquerade O as O any O of O the O following O companies O : O United B-Organization States I-Organization Postal I-Organization Service I-Organization - O An O independent O agency O of O the O executive O branch O of O the O United O States O federal O government O . O USPS B-Organization is O the O most O well-known O branch O of O the O US O government O and O provides O a O publicly O funded O postal O service O . O Royal B-Organization Mail I-Organization - O British O postal O service O and O courier O company O . O For O most O of O its O history O it O operated O as O a O government O department O or O public O corporation O . O Deutsche B-Organization Post I-Organization - O Deutsche O Post O DHL B-Organization Group I-Organization , O a O German O multinational O package O delivery O and O supply O chain O management O company O headquartered O in O Bonn O . O La B-Organization Poste I-Organization - O La O Poste O is O a O public O limited O postal O service O company O in O France O . O Japan B-Organization Post I-Organization - O A O private O Japanese O post O , O logistics O and O courier O headquartered O in O Tokyo O . O Yamato B-Organization Transport I-Organization - O One O of O Japan O 's O largest O door-to-door O delivery O service O companies O , O also O in O Tokyo O . O Chunghwa B-Organization Post I-Organization - O The O government-owned O corporation O Chunghwa B-Organization is O the O official O postal O service O of O Taiwan O . O Swiss B-Organization Post I-Organization - O The O national O postal O service O of O Switzerland O , O a O fully O state-owned O limited O company O ( O AG O ) O regulated O by O public O law O . O The O fake O applications O are O built O using O WebView B-System , O a O popular O extension O of O Android B-System ’ O s O View O class O that O lets O the O developer O show O a O webpage O . O FakeSpy B-Malware uses O this O view O to O redirect O users O to O the O original O post O office O carrier O webpage O on O launch O of O the O application O , O continuing O the O deception O . O This O allows O the O application O to O appear O legitimate O , O especially O given O these O applications O icons O and O user O interface O . O New O FakeSpy B-Malware applications O masquerading O as O post O office O apps O . O FAKESPY B-Malware CODE O ANALYSIS O Once O the O user O clicks O on O the O malicious O link O from O the O SMS O message O , O the O app O asks O them O to O approve O installation O from O unknown O resources O . O This O configuration O can O be O toggled O on O by O going O to O ‘ O Settings O ’ O - O > O ‘ O Security O ’ O - O > O ‘ O Unknown O Resources O ’ O . O PackageInstaller O shows O the O app O ’ O s O permission O access O and O asks O for O the O user O 's O approval O , O which O then O installs O the O application O . O This O analysis O dissects O FakeSpy B-Malware ’ O s O Chunghwa O Post O app O version O , O which O emerged O in O April O 2020 O . O During O the O installation O , O the O malware O asks O for O the O following O permissions O : O READ_PHONE_STATE O - O Allows O read-only O access O to O the O phone O state O , O including O the O current O cellular O network O information O , O the O status O of O any O ongoing O calls O , O and O a O list O of O any O PhoneAccounts O registered O on O the O device O . O READ_SMS O - O Allows O the O application O to O read O text O messages O . O RECEIVE_SMS O - O Allows O the O application O to O receive O SMS O messages O . O WRITE_SMS O - O Allows O the O application O to O write O to O SMS O messages O stored O on O the O device O or O SIM O card O , O including O y O deleting O messages O . O SEND_SMS O - O Allows O the O application O to O send O SMS O messages O . O INTERNET O - O Allows O the O application O to O open O network O sockets O . O WRITE_EXTERNAL_STORAGE O - O Allows O the O application O to O write O to O external O storage O . O READ_EXTERNAL_STORAGE O - O Allows O the O application O to O read O from O external O storage O . O RECEIVE_BOOT_COMPLETED O - O Allows O the O application O to O receive O a O broadcast O after O the O system O finishes O booting O . O GET_TASKS O - O Allows O the O application O to O get O information O about O current O or O recently O run O tasks O . O ( O deprecated O in O API O level O 21 O ) O SYSTEM_ALERT_WINDOW O - O Allows O the O application O to O create O windows O shown O on O top O of O all O other O apps O . O WAKE_LOCK O - O Allows O the O application O to O use O PowerManager O WakeLocks O to O keep O the O processor O from O sleeping O or O the O screen O from O dimming O . O ACCESS_NETWORK_STATE O - O Allows O the O application O to O access O information O about O networks O . O REQUEST_IGNORE_BATTERY_OPTIMIZATIONS O - O Whitelists O the O application O to O allow O it O to O ignore O battery O optimizations O . O READ_CONTACTS O - O Allows O the O application O to O read O the O user O 's O contacts O data O . O FakeSpy B-Malware package O permissions O . O On O opening O the O app O , O two O pop-up O messages O appear O on O screen O : O Change O SMS O App O : O This O sets O permissions O to O intercept O every O SMS O received O on O the O device O and O send O a O copy O of O these O messages O to O the O C2 O server O . O Ignore O Battery O Optimization O : O This O sets O permissions O to O continue O to O operate O at O full O capacity O while O the O phone O 's O screen O is O turned O off O and O the O phone O locked O . O These O requests O rely O on O the O end O user O accepting O the O permission O changes O and O points O to O the O importance O of O healthy O skepticism O when O giving O applications O permissions O . O FakeSpy B-Malware Chunghwa B-Organization Post I-Organization version O installation O process O and O application O UI O . O DYNAMIC O LIBRARY O LOADING O Once O the O application O has O finished O the O installation O process O , O the O malware O starts O its O real O malicious O activity O . O The O malicious O application O da.hao.pao.bin B-Indicator ( O Chunghwa B-Organization Post I-Organization ) O loads O a O library O file O libmsy.so B-Indicator used O to O execute O the O packed O mycode.jar B-Indicator file I-Indicator . O The O JAR O file O is O the O decrypted O version O of O the O file O tong.luo B-Indicator , O which O is O located O in O the O assets O folder O . O Decompiled O APK O resources O . O By O comparing O the O sizes O of O the O encrypted O asset O file O tong.luo B-Indicator vs O the O decrypted O JAR O file O mycode.jar B-Indicator , O it O is O interesting O to O note O that O it O is O the O same O file O ( O almost O the O same O size O ) O . O Comparing O encrypted O vs O decrypted O asset O file O . O After O libmsy.so B-Indicator decrypts O the O asset O file O tong.luo B-Indicator , O it O loads O mycode.jar B-Indicator dynamically O into O FakeSpy B-Malware ’ O s O process O , O as O is O shown O from O the O output O of O the O “ O adb O logcat O ” O command O . O Logcat O logs O show O FakeSpy B-Malware uses O libmsy.so B-Indicator to O execute O the O malicious O packed O mycode.jar B-Indicator file I-Indicator . O By O analyzing O running O processes O on O the O infected O device O , O it O shows O that O the O malware O creates O a O child O process O of O itself O to O perform O the O multi-process O ptrace O anti-debugging O technique O . O FakeSpy B-Malware uses O an O anti-debugging O technique O by O creating O another O child O process O of O itself O . O By O performing O a O deep O analysis O of O the O malware O , O we O were O able O to O extract O the O unpacked O JAR O file O mycode.jar B-Indicator and O reveal O some O very O interesting O code O . O STEALING O SENSITIVE O INFORMATION O FakeSpy B-Malware has O multiple O built O in O information O stealing O capabilities O . O The O first O function O is O used O for O contact O information O stealing O : O the O function O upCon O steals O all O contacts O in O the O contact O list O and O their O information O . O Then O , O it O sends O it O to O the O C2 O server O using O the O URL O that O ends O with O /servlet/ContactUpload B-Indicator . O The O stolen O data O fields O are O : O Mobile O - O The O infected O device O phone O number O and O contact O ’ O s O phone O number O Contacts O - O A O headline O used O for O the O attacker O to O distinguish O between O the O type O of O stolen O information O he O gets O Name O - O Contact O ’ O s O full O name O ( O Display O name O ) O upCon O ( O upload O contact O ) O function O used O for O stealing O contact O list O information O . O For O testing O purposes O we O inserted O a O fake O contacts O list O to O our O Android B-System Emulator O and O observed O resultant O behavior O . O Exfiltrated O contact O list O data O sent O to O the O C2 O server O . O The O second O stealing O function O is O the O onStartCommand O , O which O steals O infected O device O data O and O additional O information O . O The O stolen O data O is O sent O to O the O C2 O server O using O the O URL O ending O with O /servlet/xx B-Indicator . O The O stolen O data O fields O are O : O Mobile O - O The O infected O device O phone O number O Machine O - O The O device O model O ( O in O our O example O : O Google B-System Pixel I-System 2 I-System ) O Sversion O - O The O OS O version O Bank O - O Checks O if O there O are O any O banking-related O or O cryptocurrency O trading O apps O Provider O - O The O telecommunication O provider O ( O IMSI O value O in O device O settings O ) O npki O - O Checks O if O the O folder O named O NPKI O ( O National O Public O Key O Infrastructure O ) O might O contain O authentication O certificates O related O to O financial O transactions O onStartCommand O function O for O stealing O device O information O and O additional O sensitive O data O . O Exfiltrated O device O information O and O additional O sensitive O data O sent O to O the O C2 O server O . O FakeSpy B-Malware asks O to O be O the O default O SMS O app O because O it O uses O the O function O onReceive O to O intercept O incoming O SMS O messages O . O It O saves O the O messages O ’ O metadata O and O content O , O filters O the O information O by O fields O , O and O sends O them O to O the O C2 O server O using O the O URL O /servlet/SendMassage2 B-Indicator . O The O fields O it O collects O are O : O Mobile O - O The O phone O number O which O sent O the O SMS O Content O - O The O message O body O Sender O - O The O contact O name O who O sent O the O message O Time O - O The O time O the O message O was O received O onReceive O function O used O to O intercept O incoming O SMS O messages O . O The O malware O uses O the O function O sendAll O to O send O messages O that O spread O the O malware O to O other O devices O . O It O sends O a O smishing O message O to O the O entire O contact O list O of O the O infected O device O along O with O the O malicious O link O to O the O FakeSpy B-Malware installation O page O . O sendAll O function O used O to O spread O malicious O messages O to O the O contact O list O . O Another O interesting O feature O in O FakeSpy B-Malware ’ O s O code O is O the O collection O of O the O device O 's O IMEI O ( O International O Mobile O Station O Equipment O Identity O ) O number O and O all O installed O applications O using O the O function O upAppinfos O . O It O sends O all O of O this O data O to O the O C2 O server O using O the O URL O ending O with O /servlet/AppInfos B-Indicator . O upAppinfos O function O used O for O obtaining O the O device O IMEI O and O all O of O its O installed O applications O . O FakeSpy B-Malware is O able O to O check O the O network O connectivity O status O by O using O the O function O isNetworkAvailable O . O What O makes O this O function O more O suspicious O is O the O two O strings O written O in O Chinese O characters O : O ===状态=== O ( O ===Status=== O ) O - O Checks O whether O the O device O is O connected O to O a O network O ===类型=== O ( O ===Type=== O ) O - O Checks O whether O the O device O sees O available O nearby O Wifi O networks O isNetworkAvailable O function O used O for O monitoring O network O connectivity O status O . O ANTI-EMULATOR O TECHNIQUES O FakeSpy B-Malware appears O to O use O multiple O techniques O to O evade O detection O via O the O emulator O . O It O shows O that O the O malware O can O detect O whether O it O ’ O s O running O in O an O emulated O environment O or O a O real O mobile O device O , O and O can O change O its O code O pattern O accordingly O . O The O first O example O of O this O is O in O the O onStart O function O , O where O the O malware O looks O for O the O string O “ O Emulator O ” O and O a O x86 O processor O model O . O Anti-emulator O code O . O In O order O to O simulate O this O technique O , O we O took O two O videos O side O by O side O of O how O FakeSpy B-Malware ( O the O Royal B-Organization Mail I-Organization sample O ) O behaves O differently O on O a O physical O device O versus O an O emulator O . O FakeSpy B-Malware behavior O on O physical O device O vs O emulator O ( O anti-emulator O ) O . O This O simulation O shows O that O FakeSpy B-Malware behaves O differently O on O a O physical O device O versus O an O emulator O . O When O executed O the O second O time O by O clicking O on O the O app O on O the O physical O device O , O FakeSpy B-Malware redirects O to O the O app O settings O . O In O contrast O , O on O the O emulator O , O a O toast O message O is O displayed O that O shows O “ O Install O completed O ” O , O at O which O point O FakeSpy B-Malware removes O its O shortcut O from O the O device O 's O homescreen O . O Another O example O of O FakeSpy B-Malware ’ O s O anti-emulation O techniques O is O how O it O uses O the O getMachine O function O , O which O uses O the O TelephonyManager O class O to O check O for O the O deviceID O , O phone O number O , O IMEI O , O and O IMSI O . O Some O emulators O build O their O phone O number O out O of O the O default O number O created O in O the O emulator O software O and O the O port B-Indicator number I-Indicator : I-Indicator 5554. I-Indicator getMachine O function O using O anti-emulator O technique O . O UNDER O ACTIVE O DEVELOPMENT O An O analysis O of O new O FakeSpy B-Malware samples O to O old O ones O showed O code O discrepancies O and O new O features O . O These O artifacts O indicate O that O FakeSpy B-Malware 's O campaign O is O still O live O and O under O development O . O The O newer O version O of O FakeSpy B-Malware uses O new O URL O addresses O for O malicious O communication O with O FakeSpy B-Malware . O The O function O main O uses O a O DES O encryption O algorithm O to O encode O these O addresses O . O The O examples O below O show O the O plaintext O key O “ O TEST O ” O to O decrypt O encoded O hexadecimal O strings O ( O jUtils.decrypt O ( O ) O ) O . O These O encoded O strings O contain O the O new O URL O addresses O not O seen O in O older O versions O of O FakeSpy B-Malware . O Comparing O strings O from O an O old O FakeSpy B-Malware sample O to O a O new O one O . O WHO O IS O BEHIND O FAKESPY B-Malware ’ O S O SMISHING O CAMPAIGNS O ? O The O Cybereason B-Organization Nocturnus I-Organization team O suspects O that O the O malware O operators O and O authors O are O Chinese O speakers O . O Our O findings O , O along O with O previous O research O , O indicates O that O the O threat O actor O behind O these O recent O campaigns O is O likely O a O Chinese O group O dubbed O “ O Roaming B-Organization Mantis I-Organization ” O . O Roaming B-Organization Mantis I-Organization is O believed O to O be O a O Chinese O threat O actor O group O first O discovered O in O April O 2018 O that O has O continuously O evolved O . O In O the O beginning O , O this O threat O group O mainly O targeted O Asian O countries O . O Now O , O they O are O expanding O their O activity O to O audiences O all O around O the O world O . O As O part O of O their O activities O , O they O are O known O for O hijacking O DNS O settings O on O Japanese O routers O that O redirect O users O to O malicious O IP O addresses O , O creating O disguised O malicious O Android B-System apps O that O appear O as O popular O apps O , O stealing O Apple B-Organization ID O credentials O by O creating O Apple B-Organization phishing O pages O , O as O well O as O performing O web O crypto O mining O on O browsers O . O CONNECTION O TO O CHINA O Chinese O server O infrastructure O : O FakeSpy B-Malware applications O send O stolen O information O to O C2 O domains O with O .club B-Indicator TLDs I-Indicator and O URLs O ending O with O /servlet/ B-Indicator [ I-Indicator C2 I-Indicator Command I-Indicator ] I-Indicator ( O mentioned O above O in O the O “ O Stealing O Sensitive O Information O ” O section O ) O . O All O of O these O domains O are O registered O to O ‘ O Li O Jun O Biao O ’ O on O Bizcn B-Organization , I-Organization Inc I-Organization , O a O Chinese O Internet O application O service O provider O . O Chinese O language O traces O in O the O code O : O During O the O investigation O , O the O Cybereason B-Organization Nocturnus I-Organization team O discovered O code O artifacts O that O may O indicate O Chinese O threat O actors O . O For O example O , O we O found O several O suspicious O strings O written O in O the O Chinese O language O in O a O function O called O isNetworkAvailable O , O previously O discussed O in O this O blog O : O An O almost O identical O function O is O mentioned O in O an O earlier O research O , O that O ties O FakeSpy B-Malware and O other O malware O to O the O Roaming B-Organization Mantis I-Organization group O . O Chinese O APK O names O : O Some O of O FakeSpy B-Malware ’ O s O APK O package O names O contain O anglicized O Chinese O ( O Mandarin O ) O words O that O might O be O related O to O Chinese O songs O and O lyrics O , O food O , O provinces O , O etc O . O CONCLUSIONS O FakeSpy B-Malware was O first O seen O in O October O 2017 O and O until O recently O mainly O targeted O East O Asian O countries O . O Our O research O shows O fresh O developments O in O the O malware O ’ O s O code O and O sophistication O , O as O well O as O an O expansion O to O target O Europe O and O North O America O . O This O mobile O malware O masquerades O as O legitimate O , O trusted O postal O service O applications O so O that O it O can O gain O the O users O trust O . O Once O it O has O been O installed O , O it O requests O permissions O from O the O user O so O that O it O can O steal O sensitive O data O , O manipulate O SMS O messages O , O and O potentially O infect O contacts O of O the O user O . O The O malware O now O targets O more O countries O all O over O the O world O by O masquerading O as O official O post O office O and O transportation O services O apps O . O These O apps O appear O legitimate O due O to O their O app O logo O , O UI O appearance O , O and O redirects O to O the O carrier O webpage O -- O all O luring O end O users O to O believe O it O ’ O s O the O original O one O . O In O this O blog O , O we O showed O that O the O threat O actor O behind O the O recent O FakeSpy B-Malware campaign O is O a O Chinese-speaking O group O called O “ O Roaming B-Organization Mantis I-Organization ” O known O to O operate O mainly O in O Asia O . O It O is O interesting O to O see O that O the O group O has O expanded O their O operation O to O other O regions O , O such O as O the O United O States O and O Europe O . O The O malware O authors O seem O to O be O putting O a O lot O of O effort O into O improving O this O malware O , O bundling O it O with O numerous O new O upgrades O that O make O it O more O sophisticated O , O evasive O , O and O well-equipped O . O These O improvements O render O FakeSpy B-Malware one O of O the O most O powerful O information O stealers O on O the O market O . O We O anticipate O this O malware O to O continue O to O evolve O with O additional O new O features O ; O the O only O question O now O is O when O we O will O see O the O next O wave O . O First O Twitter‑controlled B-System Android B-System botnet O discovered O Detected O by O ESET B-Organization as O Android/Twitoor B-Malware , O this O malware O is O unique O because O of O its O resilience O mechanism O . O Instead O of O being O controlled O by O a O traditional O command-and-control O server O , O it O receives O instructions O via O tweets O . O 24 O Aug O 2016 O - O 02:05PM O Android/Twitoor B-Malware is O a O backdoor O capable O of O downloading O other O malware O onto O an O infected O device O . O It O has O been O active O for O around O one O month O . O This O malicious O app O , O detected O by O ESET B-Organization as O a O variant O of O Android/Twitoor.A B-Malware , O can O ’ O t O be O found O on O any O official O Android B-System app I-System store I-System – O it O probably O spreads O by O SMS O or O via O malicious O URLs O . O It O impersonates O a O porn O player O app O or O MMS O application O but O without O having O their O functionality O . O After O launching O , O it O hides O its O presence O on O the O system O and O checks O the O defined O Twitter B-System account O at O regular O intervals O for O commands O . O Based O on O received O commands O , O it O can O either O download O malicious O apps O or O switch O the O C O & O C O Twitter B-System account O to O another O one O . O “ O Using O Twitter B-System instead O of O command-and-control O ( O C O & O C O ) O servers O is O pretty O innovative O for O an O Android B-System botnet. O ” O “ O Using O Twitter B-Organization instead O of O command-and-control O ( O C O & O C O ) O servers O is O pretty O innovative O for O an O Android B-System botnet O , O ” O says O Lukáš O Štefanko O , O the O ESET B-Organization malware O researcher O who O discovered O the O malicious O app O . O Malware O that O enslaves O devices O to O form O botnets O needs O to O be O able O to O receive O updated O instructions O . O That O communication O is O an O Achilles O heel O for O any O botnet O – O it O may O raise O suspicion O and O , O cutting O the O bots O off O is O always O lethal O to O the O botnet O ’ O s O functioning O . O Additionally O , O should O the O command-and-control O ( O C O & O C O ) O servers O get O seized O by O the O authorities O , O it O would O ultimately O lead O to O disclosing O information O about O the O entire O botnet O . O To O make O the O Twitoor B-Malware botnet O ’ O s O communication O more O resilient O , O botnet O designers O took O various O steps O like O encrypting O their O messages O , O using O complex O topologies O of O the O C O & O C O network O – O or O using O innovative O means O for O communication O , O among O them O the O use O of O social O networks O . O “ O These O communication O channels O are O hard O to O discover O and O even O harder O to O block O entirely O . O On O the O other O hand O , O it O ’ O s O extremely O easy O for O the O crooks O to O re-direct O communications O to O another O freshly O created O account O , O ” O explains O Štefanko O . O In O the O Windows B-System space O , O Twitter B-Organization , O founded O in O 2006 O , O was O first O used O to O control O botnets O as O early O as O in O 2009 O . O Android B-System bots O have O also O already O been O found O being O controlled O via O other O non-traditional O means O – O blogs O or O some O of O the O many O cloud O messaging O systems O like O Google B-Organization ’ O s O or O Baidu B-Organization ’ O s O – O but O Twitoor B-Malware is O the O first O Twitter-based B-System bot O malware O , O according O to O Štefanko O . O “ O In O the O future O , O we O can O expect O that O the O bad O guys O will O try O to O make O use O of O Facebook B-System statuses O or O deploy O LinkedIn B-System and O other O social O networks O ” O , O states O ESET B-Organization ’ O s O researcher O . O Currently O , O the O Twitoor B-Malware trojan O has O been O downloading O several O versions O of O mobile O banking O malware O . O However O , O the O botnet O operators O can O start O distributing O other O malware O , O including O ransomware O , O at O any O time O warns O Štefanko O . O “ O Twitoor B-Malware serves O as O another O example O of O how O cybercriminals O keep O on O innovating O their O business O , O ” O Stefanko O continues O . O “ O The O takeaway O ? O Internet O users O should O keep O on O securing O their O activities O with O good O security O solutions O for O both O computers O and O mobile O devices. O ” O Hashes O : O E5212D4416486AF42E7ED1F58A526AEF77BE89BE B-Indicator A9891222232145581FE8D0D483EDB4B18836BCFC B-Indicator AFF9F39A6CA5D68C599B30012D79DA29E2672C6E B-Indicator Insidious O Android B-System malware O gives O up O all O malicious O features O but O one O to O gain O stealth O ESET B-Organization researchers O detect O a O new O way O of O misusing O Accessibility O Service O , O the O Achilles O ’ O heel O of O Android B-System security O 22 O May O 2020 O - O 03:00PM O ESET B-Organization researchers O have O analyzed O an O extremely O dangerous O Android B-System app O that O can O perform O a O host O of O nefarious O actions O , O notably O wiping O out O the O victim O ’ O s O bank O account O or O cryptocurrency O wallet O and O taking O over O their O email O or O social O media O accounts O . O Called O “ O DEFENSOR B-Malware ID I-Malware ” O , O the O banking O trojan O was O available O on O Google B-System Play I-System at O the O time O of O the O analysis O . O The O app O is O fitted O with O standard O information-stealing O capabilities O ; O however O , O this O banker O is O exceptionally O insidious O in O that O after O installation O it O requires O a O single O action O from O the O victim O – O enable O Android B-System ’ O s O Accessibility O Service O – O to O fully O unleash O the O app O ’ O s O malicious O functionality O . O The O DEFENSOR B-Malware ID I-Malware app O made O it O onto O the O heavily O guarded O Google B-System Play I-System store I-System thanks O to O its O extreme O stealth O . O Its O creators O reduced O the O app O ’ O s O malicious O surface O to O the O bare O minimum O by O removing O all O potentially O malicious O functionalities O but O one O : O abusing O Accessibility O Service O . O Accessibility O Service O is O long O known O to O be O the O Achilles O ’ O heel O of O the O Android B-System operating O system O . O Security O solutions O can O detect O it O in O countless O combinations O with O other O suspicious O permissions O and O functions O , O or O malicious O functionalities O – O but O when O faced O with O no O additional O functionality O nor O permission O , O all O failed O to O trigger O any O alarm O on O DEFENSOR B-Malware ID I-Malware . O By O “ O all O ” O we O mean O all O security O mechanisms O guarding O the O official O Android B-System app I-System store I-System ( O including O the O detection O engines O of O the O members O of O the O App B-Organization Defense I-Organization Alliance I-Organization ) O and O all O security O vendors O participating O in O the O VirusTotal B-Organization program O ( O see O Figure O 1 O ) O . O DEFENSOR B-Malware ID I-Malware was O released O on O Feb O 3 O , O 2020 O and O last O updated O to O v1.4 O on O May O 6 O , O 2020 O . O The O latest O version O is O analyzed O here O ; O we O weren O ’ O t O able O to O determine O if O the O earlier O versions O were O also O malicious O . O According O to O its O profile O at O Google B-System Play I-System ( O see O Figure O 2 O ) O the O app O reached O a O mere O 10+ O downloads O . O We O reported O it O to O Google B-Organization on O May O 16 O , O 2020 O and O since O May O 19 O , O 2020 O the O app O has O no O longer O been O available O on O Google B-System Play I-System . O The O developer O name O used O , O GAS O Brazil O , O suggests O the O criminals O behind O the O app O targeted O Brazilian O users O . O Apart O from O including O the O country O ’ O s O name O , O the O app O ’ O s O name O is O probably O intended O to O imply O a O relationship O with O the O antifraud O solution O named O GAS B-System Tecnologia I-System . O That O security O software O is O commonly O installed O on O computers O in O Brazil O as O several O banks O require O it O to O log O into O their O online O banking O . O However O , O there O is O also O an O English O version O of O the O DEFENSOR B-Malware ID I-Malware app O ( O see O Figure O 3 O ) O besides O the O Portuguese O one O , O and O that O app O has O neither O geographical O nor O language O restrictions O . O Playing O further O off O the O suggested O GAS B-System Tecnologia I-System link O , O the O app O promises O better O security O for O its O users O . O The O description O in O Portuguese O promises O more O protection O for O the O user O ’ O s O applications O , O including O end-to-end O encryption O . O Deceptively O , O the O app O was O listed O in O the O Education O section O . O Functionality O After O starting O , O DEFENSOR B-Malware ID I-Malware requests O the O following O permissions O : O allow O modify O system O settings O permit O drawing O over O other O apps O , O and O activate O accessibility O services O . O If O an O unsuspecting O user O grants O these O permissions O ( O see O Figure O 4 O ) O , O the O trojan O can O read O any O text O displayed O in O any O app O the O user O may O launch O – O and O send O it O to O the O attackers O . O This O means O the O attackers O can O steal O the O victim O ’ O s O credentials O for O logging O into O apps O , O SMS O and O email O messages O , O displayed O cryptocurrency O private O keys O , O and O even O software-generated O 2FA O codes O . O The O fact O the O trojan O can O steal O both O the O victim O ’ O s O credentials O and O also O can O control O their O SMS O messages O and O generated O 2FA O codes O means O DEFENSOR B-Malware ID I-Malware ’ O s O operators O can O bypass O two-factor O authentication O . O This O opens O the O door O to O , O for O example O , O fully O controlling O the O victim O ’ O s O bank O account O . O To O make O sure O the O trojan O survives O a O device O restart O , O it O abuses O already O activated O accessibility O services O that O will O launch O the O trojan O right O after O start O . O Our O analysis O shows O the O DEFENSOR B-Malware ID I-Malware trojan O can O execute O 17 O commands O received O from O the O attacker-controlled O server O such O as O uninstalling O an O app O , O launching O an O app O and O then O performing O any O click/tap O action O controlled O remotely O by O the O attacker O ( O see O Figure O 5 O ) O . O In O 2018 O , O we O saw O similar O behavior O , O but O all O the O click O actions O were O hardcoded O and O suited O only O for O the O app O of O the O attacker O ’ O s O choice O . O In O this O case O , O the O attacker O can O get O the O list O of O all O installed O apps O and O then O remotely O launch O the O victim O ’ O s O app O of O their O choice O to O either O steal O credentials O or O perform O malicious O actions O ( O e.g O . O send O funds O via O a O wire O transfer O ) O . O We O believe O that O this O is O the O reason O the O DEFENSOR B-Malware ID I-Malware trojan O requests O the O user O to O allow O “ O Modify O system O settings O ” O . O Subsequently O , O the O malware O will O change O the O screen O off O time-out O to O 10 O minutes O . O This O means O that O , O unless O victims O lock O their O devices O via O the O hardware O button O , O the O timer O provides O plenty O of O time O for O the O malware O to O remotely O perform O malicious O , O in-app O operations O . O If O the O device O gets O locked O , O the O malware O can O ’ O t O unlock O it O . O Malware O data O leak O When O we O analyzed O the O sample O , O we O realized O that O the O malware O operators O left O the O remote O database O with O some O of O the O victims O ’ O data O freely O accessible O , O without O any O authentication O . O The O database O contained O the O last O activity O performed O on O around O 60 O compromised O devices O . O We O found O no O other O information O stolen O from O the O victims O to O be O accessible O . O Thanks O to O this O data O leak O , O we O were O able O to O confirm O that O the O malware O really O worked O as O designed O : O the O attacker O had O access O to O the O victims O ’ O entered O credentials O , O displayed O or O written O emails O and O messages O , O etc O . O Once O we O reached O the O non-secured O database O , O we O were O able O to O directly O observe O the O app O ’ O s O malicious O behavior O . O To O illustrate O the O level O of O threat O the O DEFENSOR B-Malware ID I-Malware app O posed O , O we O performed O three O tests O . O First O , O we O launched O a O banking O app O and O entered O the O credentials O there O . O The O credentials O were O immediately O available O in O the O leaky O database O – O see O Figure O 6 O . O Figure O 6 O . O The O banking O app O test O : O the O credentials O as O entered O ( O left O ) O and O as O available O in O the O database O ( O right O ) O Second O , O we O wrote O a O test O message O in O an O email O client O . O We O saw O the O message O uploaded O to O the O attackers O ’ O server O within O a O second O – O see O Figure O 7 O . O Figure O 7 O . O The O email O message O test O : O the O message O as O written O ( O left O ) O and O as O available O in O the O database O ( O right O ) O Third O , O we O documented O the O trojan O retrieving O the O Google B-System Authenticator I-System 2FA O code O . O Figure O 8 O . O The O software O generated O 2FA O code O as O it O appeared O on O the O device O ’ O s O display O ( O left O ) O and O as O available O in O the O database O ( O right O ) O Along O with O the O malicious O DEFENSOR O ID O app O , O another O malicious O app O named O Defensor B-Malware Digital I-Malware was O discovered O . O Both O apps O shared O the O same O C O & O C O server O , O but O we O couldn O ’ O t O investigate O the O latter O as O it O had O already O been O removed O from O the O Google B-System Play I-System store I-System . O Indicators O of O Compromise O ( O IoCs O ) O Package O Name O Hash O ESET B-Organization detection O name O com.secure.protect.world B-Indicator F17AEBC741957AA21CFE7C7D7BAEC0900E863F61 B-Indicator Android/Spy.BanBra.A B-Indicator com.brazil.android.free B-Indicator EA069A5C96DC1DB0715923EB68192FD325F3D3CE B-Indicator Android/Spy.BanBra.A B-Indicator MITRE B-Organization ATT O & O CK O techniques O Tactic O ID O Name O Description O Initial O Access O T1475 O Deliver O Malicious O App O via O Authorized O App B-System Store I-System Impersonates O security O app O on O Google B-System Play I-System . O T1444 O Masquerade O as O Legitimate O Application O Impersonates O legitimate O GAS B-System Tecnologia I-System application O . O Discovery O T1418 O Application O Discovery O Sends O list O of O installed O apps O on O device O . O Impact O T1516 O Input O Injection O Can O enter O text O and O perform O clicks O on O behalf O of O user O . O Collection O T1417 O Input O Capture O Records O user O input O data O . O Command O and O Control O T1437 O Standard O Application O Layer O Protocol O Uses O Firebase O Cloud O Messaging O for O C O & O C O . O