Anubis banking malware imitates TikTok international version in attack activity

0 24
Overview Anubis (Anubis) is a mainly active Android banking Trojan in Eur...

Overview

Anubis (Anubis) is a mainly active Android banking Trojan in Europe, America, and other places. Its attack method mainly involves infiltrating mainstream APPs and APPs with a large number of users, such as financial applications, chat applications, mobile games, shopping applications, software updates, email applications, browser applications, etc., by disguising as some mainstream APPs and APPs with a large number of users. Since its outbreak, Anubis has swept across more than 100 countries around the world, causing considerable trouble to more than 300 financial institutions.

Recently, the Qianxin Virus Response Center has captured a malicious software that counterfeits the international version of Douyin 'TikTok'. After analysis, it was found that this malicious software is a variant of the Anubis Trojan. Douyin has a large number of users in China, even can be said to be extremely popular, for domestic users is not unfamiliar, just the Douyin download volume on the AppGallery platform has reached 550 million times, Douyin international version 'TikTok' is also very popular abroad, and also has a large number of users in the international market.

Anubis banking malware imitates TikTok international version in attack activity

Douyin download volume from AppGallery:

Google Play Douyin related software and download status:

This Anubis spreads through the counterfeit international version of Douyin 'TikTok', which is due to the large number of users of 'TikTok'. Although the counterfeited is the international version of Douyin 'TikTok', because of various reasons, this application will still be tried to install and use by domestic users. The Qianxin Virus Response Center's mobile security team has indeed found that some domestic users were infected with Anubis malware through this channel based on data analysis.

Sample analysis

Although the Anubis banking Trojan has a variety of counterfeits, its core code structure has not changed significantly. The core of the Anubis code is remote control, with phishing, ransomware, and other functions as auxiliary, with the purpose of obtaining users' key information and stealing users' property.

This Anubis Trojan that counterfeits 'TikTok' has made some changes in terms of functionality and added and optimized some functions according to actual needs.

Counterfeit 'TikTok' running interface:

Distribute remote control commands by concatenating URLs:

Remote control command fragment:

Main remote control command and corresponding function:

Main remote control command Command corresponds to the function
state1letsgotxt Settings
ALLSETTINGSGO Configure relevant information
Send_GO_SMS Send text messages
nymBePsG0 Get phone contact list
GetSWSGO Get phone text messages
|telbookgotext= Get phone contact list
getapps Get installed apps
getpermissions Get the corresponding permissions
startaccessibility Apply for accessibility
startpermission Start permissions
=ALERT| Set alarm
=PUSH| Open the fishing page
startAutoPush Pop up different phishing information based on different countries
RequestPermissionInj Request injection permission
RequestPermissionGPS Get location
|ussd= Call a specified number
|sockshost= Connect to server
stopsocks5 Stop socks
|recordsound= Record
|replaceurl= Replace URL
|startapplication= Start application
killBot Kill process
getkeylogger Obtain keyboard recording
|startrat= Obtain new operation instructions
opendir: List all files
downloadfile: Download file
deletefilefolder: Delete file
startscreenVNC Enable remote control
stopscreenVNC Close remote control
startsound Start recording
startforegroundsound Enable foreground sound
stopsound Close recording
startforward= Enable call forwarding
stopforward Close call forwarding
|openbrowser= Open browser
|openactivity= Open URL
|cryptokey= Encrypt file
|decryptokey= Decrypt file
getIP Obtain user IP address

Impact analysis

The domain for sending commands and transmitting data from the trojan: tratata.space, registered on June 26, 2019. Based on the data from the Qianxin Threat Intelligence Center, it was found that most of the victims are from Russia, and there are also some domestic users who have been affected.

Same-origin analysis

Since the outbreak of Anubis, we have been monitoring it. We have found that the main code structure of Anubis has not undergone major changes in recent years, but each new variant will have corresponding changes in functionality, adding or optimizing some features. Its delivery methods and types of imitation have always been prioritized for Google Play, imitating popular applications and financial applications.

Evolution of Anubis code structure:

The code structure after reinforcement treatment:

The imitation code structure of TikTok this time:

The following imitation main icons were found in the Janus mobile security threat information platform of the PanGu team:

Summary

The Anubis banking malware was originally mainly distributed outside of China, but with domestic netizens becoming more familiar with internet technology and attempting to install some applications from foreign sources, this time the imitation of the international version of TikTok led to some domestic users being affected.

Here we remind all users to download mobile applications from official platforms to minimize risks, thereby preventing the risk of personal information and property theft. The Qianxin Virus Response Center's Mobile Security Team will continue to track the latest variants of Anubis, and PC and mobile terminal security products will support timely detection and elimination of such threats.

IOC

940F562DED0DD9**8235FB9EA738F405

http://tratata.space/private/checkPanel.php 

http://tratata.space/private/settings.php

http://tratata.space/private/add_log.php

http://tratata.space/private/set_location.php

http://tratata.space/private/getSettingsAll.php

http://tratata.space/private/setAllSettings.php

http://tratata.space/private/getDataCJ.php

http://tratata.space/private/setDataCJ.php

http://tratata.space/private/add_inj.php

http://tratata.space/private/locker.php

http://tratata.space/private/datakeylogger.php

http://tratata.space/private/sound.php

http://tratata.space/private/playprot.php

http://tratata.space/private/spam.php

Reference

https://ti.qianxin.com/blog/articles/anubis-android-bank-trojan-technical-analysis-and-recent-activities-summary/

*Author of this article:Qianxin Threat Intelligence Center, please indicate the source as FreeBuf.COM when转载

你可能想看:
最后修改时间:
admin
上一篇 2025年03月27日 04:31
下一篇 2025年03月27日 04:53

评论已关闭