APT33's new malicious remote control software 'LittleLooter'

0 19
1. OverviewAPT33 (Charming Kitten) is an Iranian hacker group (also known as Cha...

1. Overview

APT33 (Charming Kitten) is an Iranian hacker group (also known as Charming Kitten, the charming kitten), phishing attacks are one of the most common methods used by this hacker group, and the malicious software related to APT organizations has always been the focus of monitoring and tracking by the Shadow Mobile Security Laboratory.

Recently, we have monitored a fake social software named ‘WhatsApp.apk’ which is actually a malicious spyware. It deceives users to download it, remotely controls the user's mobile phone, and steals the user's privacy data. The research team found that it is a new remote control software of the APT33 organization and named it ‘LittleLooter’ based on its malicious behavior.

APT33's new malicious remote control software 'LittleLooter'

1640922034_61ce7bb2cfd681364cede.png!small?1640922036001

‘WhatsApp’ is a globally renowned communication social software, but this application is mainly for users in foreign countries and has not been listed on the domestic application market. After the user successfully installs the fake ‘WhatsApp’, it cannot be opened. The malicious software will delete its own interface icon and prompt ‘This application is not installed’. However, this malicious software has not been deleted and still exists in the background.

1640922043_61ce7bbb09f950507d8a8.png!small?1640922043632

The malicious software will continue to monitor in the background, collecting the privacy information of mobile phone users, including the user's contact list, text messages, communication records, files stored on the mobile phone, user location, network information, device information, browser history, photos, voice recordings, and videos, and the list of applications installed by the user. At the same time, it can remotely control the user's mobile phone to send text messages, make phone calls, record voice, upload files, and other malicious operations.

2. Sample information

Application installation name

WhatsApp

Application MD5

A04C2C3388DA643EF67504EF8C6907FB

Version

1.0

Installation icon

1640922049_61ce7bc10430ebf9242f7.png!small?1640922049365

3. Program flowchart

1640922053_61ce7bc5606794db706f2.png!small?1640922053855

Figure 3-1 Flowchart of LittleLooter program

4. Protective measures

This application uses dex dynamic loading to avoid the scanning of anti-virus software. It can be seen from the protective measures that the application is still in the development stage and has not encrypted and obfuscated the dex files. This makes the analysis for our security personnel much simpler.

4.1 Dynamic loading of dex

After the malicious software is started, the application will load the classes.dex file embedded in the assets file path, as shown in Figure 4-1-1. This loading method makes it convenient for hackers to remotely update the malicious code module.

1640922060_61ce7bcc43dd4cbb3c115.png!small?1640922060730

Figure 4-1-1 Path of dex file

Firstly, execute the custom Application class, and then dynamically load the classes.dex file under the assets file path using the loadClass method of DexClassLoader, as shown in Figure 4-1-2.

1640922075_61ce7bdb55a8e0f8de8f4.png!small?1640922076054

Figure 4-1-2 Process of dynamically loading classes.dex file

Malicious code modules are mainly concentrated in the classes.dex files under the assets file path. Fortunately, the classes.dex is not encrypted, but only uses simple obfuscation. Security personnel have located the malicious code that steal secrets through analysis, as shown in Figure 4-1-3.

1640922108_61ce7bfcedda300192ed8.png!small?1640922109713

Figure 4-1-3 classes.dex Malicious Code

By looking at the methods loaded by the class, it is not difficult to see the functions of each module of the malicious code. The parameters of the loading class method directly indicate the functions of this malicious software.

4.2 Automatically Activate Permissions

Such trojans, after installation, will automatically activate all permissions without the user's consent, and when the user clicks to open the application for the first time, it will actively delete the installed icon on the phone interface and prompt the user that the application is not installed.

1640922122_61ce7c0a6f32ceabc8fd8.png!small?1640922123041

Figure 4-2-1 Phone Screenshot

In reality, the application is not deleted, and it will obtain user data in the background and upload it to the server.

There are two entry methods in manifest.xml. The second entry method is not set with LAUNCHER, and it will be displayed without an icon.

1640922136_61ce7c1808a7027aeea45.png!small?1640922136397Figure 4-2-2 Entry Method

5. Core Function

The core function of this sample mainly includes three parts: device listening, spying function, and remote control function, which will be introduced in detail below.

5.1 Device Listening

Through the analysis of the security officer's code, it was found that LittleLooter listens to user phone behavior through registration broadcasts, as shown in the figure below: In this method, broadcasts are registered, including screen on/off, battery power, network status, phone status, storage device, receive/dial calls, and receive SMS broadcast listening. Therefore, all user activities will be exposed to the eyes of hackers, which is very terrifying for users.

1640922292_61ce7cb46cd8b9ec9fbc1.png!small?1640922293044

Figure 5-1-1 Boot-up Registration Broadcast Listening to User Phone Status

1640922300_61ce7cbcca16b40ff55e3.png!small?1640922301260

Figure 5-1-2 SMS Monitoring Details

5.2 Spying Function

After the virus is installed, it will first actively call the method to obtain the user's private information, store it in the phone file, and then communicate with the server to upload the private information.

The C2 server host is: hxxp://d***-a***.xyz/

1640922310_61ce7cc66c5b1e24a7833.png!small?1640922310895

Figure 5-2 Retrieving the user's phone storage contact list

5.2.1 Contact List

Malware retrieves user communications, which is not just retrieving the contact list stored in the phone's memory, but also retrieving the contact list stored on the SIM card. As shown in the h() and i() methods in the figure below:

1640922314_61ce7ccade17c70877040.png!small?1640922315328

Figure 5-2-1 Retrieving the user's phone storage contact list

1640922327_61ce7cd7c61f68610a5bc.png!small?1640922328238

Figure 5-2-2 Retrieving the user's phone storage contact list

1640922338_61ce7ce21f45c53d0991d.png!small?1640922338594

Figure 5-2-3 Retrieving the user's SIM card contact list

After retrieving the user's contact list, it will be stored in the user's phone's database file, and other information retrieved in this way will also be stored in this manner, making it convenient to collect and upload the retrieved information.

1640922349_61ce7cedb8390454310ec.png!small?1640922350324

Figure 5-2-4 Storing the retrieved contact list

5.2.2 SMS

LittleLooter malware retrieves the user's text messages, including the inbox, sent box, and draft box. As shown in the a() method in the figure below, in addition to this, we can also see the method h() for sending SMS remotely.

1640922357_61ce7cf5c48ce1cc4fafb.png!small?1640922358269

Figure 5-2-5 Obtain User's SMS

1640922364_61ce7cfcb9d0e3dbcd415.png!small?1640922365184

Figure 5-2-6 Read SMS

Obtaining text messages is a very dangerous behavior, which is common in banking trojans. By intercepting banking verification messages, obtaining the verification code from the content of the text messages, and using it to log in to the user's banking app account, it causes the user to suffer financial losses.

5.2.3 Communication Records

LittleLooter malicious software will also obtain the user's communication records. This includes obtaining the user's call records for receiving, dialing, and hanging up, and, like obtaining text messages, we also found the method to dial calls in this method.

1640922374_61ce7d06187b1f50e229d.png!small?1640922374564

Figure 5-2-7 Obtain Communication Records

5.2.4 Phone Files

After installing the malicious software, the phone will obtain the user's file list. Here, there are also other operations on the phone files, including uploading and deleting files. The malicious software can arbitrarily operate the files stored on the user's phone, including photos, videos, and recording files.

1640922381_61ce7d0d5d4ce9ef95e67.png!small?1640922381821

Figure 5-2-8 Obtain User's Files

5.2.5 Geographical Location

This malicious software can also obtain the user's latitude and longitude, locate the user's location at any time, and conveniently record the user's life轨迹.

1640922388_61ce7d145ba1b2ccf1289.png!small?1640922388868

Figure 5-2-9 Obtain User's Geographical Location

5.2.6 Browser History

Whatever the user looks at or searches for using the browser, this malicious software will record it.

1640922395_61ce7d1be3f6a7efe16ae.png!small?1640922396533

Figure 5-2-10 Obtain User's Geographical Location

5.2.7 Device Information

Like most malicious software, LittleLooter will also obtain the user's device information, including the user's SIM card information and other phone status information (network, camera, WiFi, screen, ringer, and Bluetooth status). These statuses are used by hackers to understand the status of the compromised phone and to perform the next remote control operation.

1640922405_61ce7d25f3058d2beed7d.png!small?1640922406498

Figure 5-2-11 Obtain SIM Card Information

5.2.8 List of Installed Applications

The malicious application obtains the list of installed applications on the phone. Hackers can use this information to understand the user's phone and, based on the installed applications on the phone, accurately deliver malicious scripts or malicious applications for attacks.

1640922427_61ce7d3b878746a4c3794.png!small?1640922428065

Figure 5-2-12 Obtain List of Installed Applications

5.3 Remote Control Function

Through the analysis of security personnel from the Shadow Laboratory, it was found that the remote control function of LittleLooter is also very rich. The remote control instructions are issued by the C2 server. The first step of the application is to visit the malicious C2 server; the second step is for the malicious software to obtain the data returned by the server, parse the information in the data to obtain remote control operations; the third step is to execute the remote control operations. The C2 server is as follows, with the server address being: hxxp://d***-a***.xyz/.

1640922434_61ce7d42dbf3b616445e1.png!small?1640922435308

Figure 5-3-1 C2 Server Address1640922443_61ce7d4b550f56b2d30de.png!small?1640922443797

1640922492_61ce7d7cea7b943313717.png!small?16409224934801640922448_61ce7d50240c7ce4092d0.png!small?1640922448585

Figure 5-3-2 Obtain the First Layer of Remote Control Instructions

The above is the first layer of remote control instruction analysis. According to the analysis of the conmand instruction, specific instructions are obtained:

1640922508_61ce7d8ce09b026bf6cac.png!small?1640922509481

Figure 5-3-3 Obtain Remote Control Instructions

The remote control commands are as listed in Table 4-4 Remote Control Command List:

Remote Control Commands

Function

video_recorder

Record Video

call_number

Dial Number

file_upload/file_download/file_delete

Upload/Download/Delete Files

sound_recorder

Record Sound

calls_recorder

Record Voice Calls

location_gps/location_gsm

Collect Location Based on GPS or GSM

device_info

Change Device Ringtone Mode

network_activity

Show Network Activity

browser_history

Send Browser History

on_wifi/off_wifi

Turn On/Off Wi-Fi

on_bluetooth/off_bluetooth

Turn On/Off Bluetooth

on_data/off_data

Turn On/Off Mobile Data

picture_take

Taking Photos

sms_send

Sending SMS

call_number

Making a Call

Table 4-4 Remote Control Command List

Next, we will briefly introduce three types of important remote control commands.

5.3.1 Audio and Video

Remote control functions for recording, video recording, taking photos, and call recording can monitor the user's surrounding environment and the details of the user's calls at any time, as shown in the figure below. This behavior of monitoring users is terrifying.

1640922520_61ce7d987bacaeb1e945d.png!small?1640922520943

Figure 4-4-1-1 Taking Photos

1640922527_61ce7d9f0ea1ba1096ffd.png!small?1640922527470

Figure 4-4-1-2 Audio Recording

1640922533_61ce7da512fa631e01e40.png!small?1640922533559

Figure 4-4-1-3 Video Recording

1640922541_61ce7dad7ee77d6a30ba4.png!small?1640922542095

Figure 4-4-1-2 Call Recording

5.3.2 SMS and Phone

Sending SMS is a common means of remote control operation. Hackers can use it to consume users' mobile fees, transmit obtained information, obtain bank verification information, and more.

1640922550_61ce7db6d55414db1b669.png!small?1640922551327

Figure 4-4-2-1 Sending SMS

The remote control operation of making calls is mainly used for eavesdropping on the user's surroundings, which is relatively common in APT organization samples. Hackers can make calls through the user's phone without their knowledge to eavesdrop on the surrounding sounds.

1640922557_61ce7dbd7421ba49502bc.png!small?1640922557935

Figure 4-4-2-2 Making a Call

5.3.3 File-Related

The chapter on窃密功能的手机文件 mentions three functions for handling files. Here, let's talk about the download function.

1640922563_61ce7dc3e8e4df08d5967.png!small?1640922564404

Figure 4-4-3 Downloading Files

Hackers can control users' phones to download files via remote control commands. These files can be APKs or malicious scripts, allowing hackers to carry out a second targeted attack on users.

6. Server C2 Features

The communication between malicious programs and C&C uses HTTP protocol. Below is the DNS resolution information:

1640922572_61ce7dcc54143e3f33bbb.png!small?1640922572673

Figure 6-1 NDS Resolution

Server Address

Domain Name Resolution

Distribution Area

D***-a***.xyz

8*.9*.1*.1*

Germany (Saxony Free State, Falkenstein)

Table 6-2 Server Address

Message characteristics:

method

http_client_body

Function

POST

sk=...&cs=...

Online

gs=...&sk=...&di=...&t=...&st=...&dt=...

Device information

s=...&gfu=...

Uploading private information

s=...&gd=&v=5

Obtaining remote control instructions

Table 6-3 Network Traffic Characteristics

In summary, the network feature “&gd=&v=5” in the http_client_body part of the remote control command request is an important identifier for identifying the mobile malicious software of this APT organization.

7. Summary

The harm of this kind of APT Trojan is very serious. Its goal is to turn the user's mobile phone into a real-time monitored zombie device. Not only will all the user's information be obtained, but it will also monitor the user's life in real time, with functions such as recording, video recording, and eavesdropping, which are so numerous that it makes people's hair stand on end. Although LittleLooter currently targets European users, this server address can also be accessed domestically. The user data obtained after installation by domestic users will also be uploaded to the server, so everyone should be cautious about foreign social software and not download and install blindly. If the application is infected, there is no need to panic. Users do not need to reset the factory settings to recover, and can directly uninstall the application from the application information in settings.

The APP全景态势与案件情报溯源挖掘系统 has monitored this APT malicious software and its network communication characteristics.

1640922584_61ce7dd8a29cca08db405.png!small?1640922585064

For mobile APT attack events at home and abroad, the system can block and deal with malicious traffic in a timely manner according to its network communication characteristics, effectively blocking the attack behavior of hackers.

1640922588_61ce7ddc87102171b7a44.png!small?1640922588943

Heng'an Jiaxin Shadow Mobile Security Lab reminds all users not to easily trust strangers, not to click on links sent by strangers, not to download unsafe applications, and not to install APPs from irregular channels.

你可能想看:

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

0x06 Fileless malicious software attack Shiro-tomcat memory horse

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

How to use SystemInformer to monitor system resources, debug software, and detect malware

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

About the related technologies and implementations associated with tracing the source of posts by PDD employees

04/7 The systematic security risks of outsourcing and crowdsourcing are no different from those of formal employees

最后修改时间:
admin
上一篇 2025年03月27日 07:10
下一篇 2025年03月27日 07:32

评论已关闭