3.1 Start malicious service and listen to a large number of system broadcasts

0 24
Introduction: The occurrence of major events such asRecently, in the daily monit...

Introduction: The occurrence of major events such as

Recently, in the daily monitoring, the Shadow Mobile Security Laboratory found a spyware called 'Feireton Mohiri' with a Chinese name. The researchers analyzed and found that the software is specifically developed for Iran and its main purpose is to steal intelligence. After the sample is started, there is no effect, but it silently monitors user behavior in the background, such as recording videos, recording call processes, taking photos, etc., and collects user contact lists, short messages, accurate location, browser records, accounts and other information, and uploads the collected information to the specified server.

Figure 1: Installation icon of 'Feireton Mohiri'

One: Basic Information

Sample MD5: 43BD113A0952172BCBA57055F5A707BB

Installation name: فریدونمشیری

Chinese name: Feireton Mohiri

Sample package name: air.com.arsnetworks.poems.moshiri

Two: Running Principle

This sample wakes up the malicious service AMService through the battery change broadcast, then listens to a large number of system broadcasts (such as network change broadcast, SMS broadcast, phone dialing broadcast, phone shutdown broadcast) in the AMService service, listens to database changes (such as SMS database, browser bookmark database), activates various malicious behaviors. Its running process is mainly divided into two steps. The first step is to listen to the user's mobile dynamics through various system broadcasts to ensure that the malicious program runs continuously in the background. It records user call records, collects user contact lists, received SMS, browser records, contacts, accounts, installed applications and other information; then uploads it to the specified server. The second step is to obtain a large number of control instructions from the remote server, then execute the collection of user information according to the control instructions, monitor user behavior through video recording and photo shooting, upload continuously collected intelligence, and delete specified files, etc.

Image1.pngFigure 2: Sample running process diagram

Three: Code Analysis

3.1 Start malicious service and listen to a large number of system broadcasts

Start the malicious service AMService, listen to changes in the user's phone SMS database, browser bookmark database changes, base station information changes, registered network change broadcasts, receive SMS broadcasts, and intercept phone dialing broadcasts.

Image1.pngFigure 3: Listening to system broadcasts

3.2 Steal user privacy data

Register to receive SMS broadcasts, listen to changes in the SMS database, whether receiving SMS, sending SMS, or editing SMS, the SMS database will change. When the SMS database changes or the user receives an SMS, the program collects the user's phone number and SMS content, and saves the content to the log file.

Image2.pngFigure 4: Monitor SMS Changes, Collect SMS Numbers and Content

Image3.pngFigure 5: Collect User Received SMS Numbers and Content

Register a phone dialing broadcast. When the phone is in the incoming call state, match the last digits of the incoming number. If the number matches and the user has answered the call (this shows that the attacker is purposefully attacking specific numbers.), start recording the call process.

Image4.pngFigure 6: Record the User's Call Process

Monitor changes in the browser bookmarks database and obtain user web browsing records.

Image5.pngFigure 7: Obtain User Web Browsing Records

Monitor changes in base station information and save base station latitude and longitude information.

Image6.pngFigure 8: Obtain Base Station Latitude and Longitude Information

Obtain all SMS information, contact information, call records information, account information, and Google browser bookmarks information of the user.

Image1.pngFigure 9: Obtain SMS, Contact Information, Call Records, Account, Browser Bookmarks, and Other Information

Encrypt all obtained information using AES algorithm and save it to a file with the suffix log.

Image2.pngFigure 10: Save User Information to a Specified File (Suffix .log)

Obtain all files with the suffix .log and upload them to the server.

http://www.*****.com/mmh/upload-log.php

Image3.pngFigure 11: Upload and Save the File Obtaining Information

Image4.pngFigure 12: Captured Data Packets

3.3 Remote Control Behavior

This sample obtains control commands issued by the control end from the specified server, with dual control through primary and secondary commands.

Server URL:http://www.****/mmh/get-function.php?uuid=14768afcde85653d

Image5.pngFigure 13: Load Remote Server

Mind Map of Control Commands:

Image6.pngFigure 14: Mind Map of Control Commands

Detailed Analysis of Remote Control Commands:

Primary command "Get", modify configuration file.

Image1.pngFigure 15: Modify Configuration File

Primary command "Get", secondary command "AllLog", export .log file.

Image2.pngFigure 16: Export .log File

Primary command "Get", secondary command "AllContact", obtain all contact information.

Image3.pngFigure 17: Obtain All Contact Information

Primary command "Get", secondary command "AllFile", obtain all files.

Image4.pngFigure 18: Obtain All Files

Primary command "Get", secondary command "AllSms", obtain all SMS messages.

Image5.pngFigure 19: Obtain All SMS Messages

Primary command "Get", secondary command "AllCall", obtain all contact information.

Image6.pngFigure 20: Obtain All Contact Information

Primary command "Get", secondary command "AllApp", obtain information of installed apps on mobile phone.

Image1.pngFigure 21: Obtain Information of Installed Apps on Mobile Phone

Primary command "Get", secondary command "AllBrowser", obtain user browser records.

Image2.pngFigure 22: Obtain User Browser Records

Primary Command "Get", Secondary Command "AllAccount", get all user accounts.

Image3.pngFigure 23 Get All User Accounts

Primary Command "Get", Secondary Command "AllSetting", get setting information.

Image4.pngFigure 24 Get Setting Information

Primary Command "Get", Secondary Command "Location", get exact location information.

Image5.pngFigure 25 Get Exact Location Information

Primary Command "Get", Secondary Command "HardwareInfo", get device hardware information.

Image6.pngFigure 26 Get Device Hardware Information

Primary Command "Get", Secondary Command "File", update the content of the specified file obtained from the control end and send it to the server.

Image1.pngFigure 27 Update the Content of the Specified File Obtained from the Control End

Primary Command "Take", Secondary Command "Audio", record audio and save it to the directory /sdcard/Android/data/com.android.browser/files.

Image2.pngFigure 28 Record Audio

Primary Command "Take", Secondary Command "Audio", record a video and save it to the directory /sdcard/Android/data/com.android.browser/files.

Image3.pngFigure 29 Record Video

Primary Command "Take", Secondary Command "Photo", take a photo and save it to the directory /sdcard/Android/data/com.android.browser/files.

Image4.pngFigure 30 Take a Photo

Primary Command "Delete", Secondary Command "SMS", delete text messages.

Image5.pngFigure 31 Delete Text Messages

Primary Command "Delete", Secondary Command "Call", delete the address book.

Image6.pngFigure 32 Delete Address Book

Primary Command "Delete", Secondary Command "File", delete the files specified by the control end.

Image1.pngFigure 33 Delete Files Specified by the Control End

Primary Command "Reset", Secondary Command "AllCommand", upload all saved information files to the server after saving them, and then delete all files.

Image2.pngFigure 34 Delete All Saved Information Files

4. Same-Origin Analysis

Through the analysis of the Fareedun Mohri application samples, we have found a batch of family samples with the same file framework as the sample. Their attack targets are all in Iran, and they deceive users into installing and using applications with names related to local Iranian culture, thereby remotely monitoring user behavior in the background and stealing user privacy data. The following is a part of the information of the same-origin samples.

Table 4-1 Information of Same-Origin Samples

MD5Installation NamePackage Name
4567824a45a818bc389d7eeae3c7b678Jihad in Islamjehaddareslam.sunnibook.net
CC88F21406EAEED70A890F53E57C98B6Photos of Ramadan citycom.ramadan.kareem.app
FBD0AFE5BD3D0D61FEB21680B304D7AECall of truth in Urducom.nidayehaq
86da3a7378e17b51ba83ba3333e86a32Command by the will of Allahir.hukmi.moanzalalloh
155316526FF476698494E90EFC1127BCIranian Woman Ninjacom.coolwallpapers
AC32FFAA379AED78DCC11EA74FBDFCFEKurosh the Greatir.korosh.kabir
D199C202BEB4380E2F675E93C36CF0F4Sohrab Sepheriair.com.arsnetworks.poems.sohrab
f05d8588cf2e8be9fa6ccac39a0f7311Kurosh the Great!ir.cheshmac.CyrustheGreat
3c0011dd7f6c9474cda5ffd52415d4a8Toxic messages of joy and happinessgemy.saadaa
05eaa04bc27db3af51215d68a1d32d05Exotic Flowerscom.majorityapps.exoticflowers

C&C Server Address:

http://www.****.com/mmh/upload-log.php

http://www.****.com/mmh/answer.php

http://www.****.com/mmh/get-function.php?uuid=de39361c255e9af2

V. Security Recommendations

The advent of the information age has elevated the war between countries from a weapons war to a cyber war. Therefore, the security of personal information is not only related to personal safety but also to national security. It is recommended to be cautious when providing personal information to the outside and cautious when downloading application software from other unsafe channels.

你可能想看:

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

b) It should have a login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal login attempts, and automatically logging out w

Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines

2.8 Continue to click the getTomcatWebServer method, find the initialize () method, and you can see the tomcat.start () method to start the Tomcat service.

04/7 The systematic security risks of outsourcing and crowdsourcing are no different from those of formal employees

2021-Digital China Innovation Competition-Huifu Cybersecurity Track-Final-Web-hatenum and source code analysis and payload script analysis

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

b) It should have the login failure handling function, and should configure and enable measures such as ending the session, limiting the number of illegal logins, and automatically exiting when the lo

最后修改时间:
admin
上一篇 2025年03月25日 22:13
下一篇 2025年03月25日 22:36

评论已关闭