BOOMSLANG(树蚺)移动欺诈家族分析

0 20
从我们获取的家族样本中进行溯源分析后,发现该家族最早始于 2022 年 9 月进行传播。由于当时疫情等外部因素的影响,该家族在 2022 年 9 月至 2023...

BOOMSLANG(树蚺)移动欺诈家族分析

1701749393_656ea291b9474032a7fa6.jpeg!small?1701749396373

从我们获取的家族样本中进行溯源分析后,发现该家族最早始于 2022 年 9 月进行传播。由于当时疫情等外部因素的影响,该家族在 2022 年 9 月至 2023 年 3 月期间处于欺诈传播的初级阶段。然而,随着社会状况逐渐恢复,该家族开始大规模传播,并推出了多个不同业务类型的版本。值得注意的是,为了适应反欺诈措施,该家族在 2023 年 7 月首次进行了变种,引入了“Domain Over HTTPS(DoH)”技术。随后,在 2023 年 9 月,家族样本再次发生变种,增加了对现有自动化 App 安全检测手段的抵抗能力,具体采用了 NPManager 自带的 StringFrog 混淆技术,以规避基于字符串提取的安全检测。

DoH(DNS over HTTPS)是一种安全协议,用于通过 HTTPS 加密的连接进行 DNS 解析请求和响应。其主要目的是增加隐私和安全性,防止 DNS 请求被窃听或篡改。

Next, we will conduct an in-depth analysis of the original version of the family as well as the version introduced with DoH technology.

Sample overview

Sample identification

  • MD5 Hash: 0a731ace7a01349d8c103ad5dc7fc230

Function and behavior

  1. Login interface: After the sample is started, a login interface is displayed, which requires inputting an invitation code for login.
  2. Chat interface: After logging in successfully, the user will enter a chat interface.
  3. Malicious activity: This sample mainly uses chat functions for fraud or other types of malicious behavior.

1701749386_656ea28a634d1e38f3591.png!small?1701749389342

Analysis details

Sample basic analysis

1701749449_656ea2c9b12bee1bb6c24.jpg!small?1701749452420

1701749454_656ea2ced8bb5c090faf6.png!small?1701749457915

  1. Permission analysis: After opening the sample with the Incinerator tool, multiple high-risk permissions requested by the sample can be observed from the generated Report information.1701765025_656edfa107b8db578218d.jpg!small?17017650285221701765029_656edfa5ab6f46ca4297b.jpg!small?17017650325931701765034_656edfaa1560bcfcb1165.jpg!small?1701765037379
  2. Dynamic detection results:                                                                                                                                      
    • Package name and subdirectory issues: Dynamic detection results show that in im.lpfupkaehn.messengerPackage name under tgnetIn the subdirectory ofNetworkConfig.javaThere are obvious problems in the file.

Next, we will analyze in detail im.lpfupkaehn.messengerThe specific performance and potential risks of package names.

Code similarity

File and directory structure

  • tgnet subdirectory: In im.lpfupkaehn.messengerThere is a clear corresponding directory under tgnetSubdirectory.

Source code comparison

  • GitHub search results: After using the code in this directory for GitHub search, it was found that this part of the code is highly similar to the Telegram Android source code.

1701749480_656ea2e83a6ada6b63903.png!small?1701749483244

Code similarity comparison

  • im.lpfupkaehn.messengerWith org.telegram.messenger

1701749490_656ea2f2ece3ef29f7521.png!small?1701749493578

1701749496_656ea2f8276aafe6e9253.png!small?1701749498912

Multiple class files, such as AccountInstanceetc., after excluding the decompilation factors, it is displayed as 100% identical.

Code difference analysis

Main new part

In this sample, based on the Telegram Android source code, there are mainly three significant new additions:

  1. Dependency libraries:

    • Location: Mainly concentrated in comin the directory.
    • Function and call: These libraries can basically be found by searching for their call locations and are mainly used to handle some smaller functions.
    • Example:com.alibaba.fastjsonThe library is mainly used to handle the protocol for updating user information.
  2. UI directory differences:

    • Comparison:im.lpfupkaehn.uiDirectory with org.telegram.uiCompared to the directory, the former has several more directories.
    • Speculation: These newly added directories may be added to meet the needs of custom UI.

1701749505_656ea301cae8c58bbe120.png!small?1701749508341

  1. tgnet directory differences:

    • Comparison: In im.lpfupkaehn.tgnetand org.telegram.tgnet目录之间进行比较,发现前者多出几个文件。
    • Comparing directories, it was found that the former had several more files.

1701749511_656ea307295c7062d5966.png!small?1701749514070

Speculation: These newly added files may be used to implement specific network communication or functions.

Detailed Analysis of Newly Added Class Files

In this family sample, it is particularly noteworthy that the following class files have been added:

  • Basic network and file operation classes:FCTokenRequestCallback
  • : May be related to Token request.FileLoadOperation
  • : File loading operation.FileLoadOperationDelegate
  • : Proxy for file loading operations.NetBean
  • : Network Configuration Bean.NetworkConfig
  • : Network Configuration.ParamsUtil

: Parameter Tools.

  • : Telegram Backend Communication Expansion (TL Series):TLApiModel
  • : API Model.TLRPCZ
  • : May be related to RPC communication.TLRPCBackup
  • : Backup Related.TLRPCBasic
  • : Basic RPC Function.TLRPCCall
  • : Call Function.TLRPCCdn
  • : CDN Related.: Chat Related.
  • TLRPCContacts: Contact Related.
  • TLRPCFriendsHub: Friends Center.
  • TLRPCHotChannel: Hot Channels.
  • TLRPCLogin: Login Related.
  • TLRPCRedpacket: Red Packet Function.
  • TLRPCWallet: Wallet Function.

These newly added class files mainly involve many aspects such as network operations, file processing, and communication with the Telegram backend. This further highlights the customization and expansion of this family sample compared to the original Telegram code.

Network Behavior Analysis Report

Main Focus:NetworkConfig.java

Based on the results of automated analysisNetworkConfig.javaThere are obvious problems in the file code, so this analysis will focus on this file.

  • Network Configuration Update Mechanism

1701749527_656ea3175932cc6c24abe.png!small?1701749529778

Environmental differentiation: The code differentiates between online and intranet environments. Only the one marked as 1002 is the online environment, which requires updating the network configuration.

1701749532_656ea31cb913865be9913.jpg!small?1701749535186

  • There are two key functions hereinitRemoteConnInfosand selecteRemoteConnInfo

1701749537_656ea321854d0c764554b.png!small?1701749539796

Key Function Analysis:initRemoteConnInfos: Mainly responsible for https://*************.***-**********.********.***/************.***Obtain the target IP and port information.

1701749543_656ea327942aeee4d2d34.jpg!small?1701749546532

selecteRemoteConnInfo: Using Ali Game Shield to convert the target IP and port into a proxy IP and port to achieve the purpose of hiding the actual IP and port.

1701749547_656ea32be4a8dc88d31d0.png!small?1701749550435

1701749553_656ea331cae8ac9215c34.png!small?1701749557075

Ali Game Shield logic

  • Function introduction: Ali Game Shield provides an elastic security network immune to DDoS/CC attacks. Specifically, it generates a dynamically changing proxy IP and port based on the target IP and port provided.
  • Challenges and impacts: For network behavior analysis and malicious program network request interception, the elastic security network of Ali Game Shield constitutes a serious challenge. Because the proxy IP and port can change continuously, this greatly increases the difficulty of network tracking and interception.

This sample uses complex network configurations and third-party security services (Ali Game Shield) to hide its actual network behavior, thereby increasing the difficulty of analysis and tracking. These features further prove the high professionalism and concealment of the malicious sample.

YunCeng.getProxyTcpByDomainThe decompiled code is as follows:

1701749559_656ea337332bf70779324.png!small?1701749561479

1701749563_656ea33b5e5209bc92c3f.png!small?1701749566499

According to the older version of the document on the official website of Ali Game Shield,getProxyTcpByDomainThe first four parameters of the function are as follows:

1701749571_656ea3435b689ecefc86f.png!small?1701749573715function's last two parameters are used to return the proxy IP and port corresponding to the input target IP and port.

After further analysis of the above code, we found that the returned proxy data is eventually passed to ConnectsManager.

1701749576_656ea348af126c76f50da.png!small?1701749579327

1701749580_656ea34c6d622711b6876.png!small?1701749582708

We noticed that this is a nativefunction. Under normal circumstances, we need to perform reverse engineering analysis.soto obtain the corresponding code. However, since we have mentioned earlier that this sample code has a high similarity with Telegram Android, we decided to directly refer to the source code of Telegram Android for analysis.

1701749615_656ea36fc265c6039cf64.png!small?1701749618463

1701749588_656ea354c5aae3b94eb0c.png!small?1701749591283

In this step, the returned IP address and port number are set to the datacenter object of ConnectManager, and the handshake process is then reinitiated to establish a new connection. This operation achieves the server switching of network communication between the sample and the cloud. Up to this point, the malicious sample has successfully established a new communication channel with the remote server through a new IP and port.

Interception methods:

After detailed analysis, we have completed the review of the main network request evasion interception behavior of the sample. The sample cleverly uses anti-DDoS services, effectively avoiding traditional protection methods based on fixed IP request interception by constantly changing the IP address and port of the requests.

To comprehensively block the network requests of this sample, it is necessary to combine static and dynamic analysis to find out how the sample utilizes the Ali Game Shield service and intercept relevant network communication channels accordingly. The specific interception strategy can focus on the following three aspects:

  1. Intercept the sample by requesting the target IP address and port from Ali Game Shield.1701765265_656ee091832b493c75518.jpg!small?1701765268165
  2. If the first interception strategy has not been successfully executed, then it is also necessary to intercept the default IP and port preset in the sample. Specifically, all requests pointing to ****.**.********.***network requests.1701765317_656ee0c5d45ed9d01c75c.jpg!small?1701765320342
  3. 1701765410_656ee122802bf30237579.jpg!small?1701765412995During the灰度测试阶段, if the first two interception strategies have not been successful, then attention should be paid to the third default IP address preset in the sample, namely **.***.***.***. All network requests pointing to this IP should also be intercepted.

1701749650_656ea3928bd3b346f43af.jpg!small?1701749653547

These network requests are cleverly hidden deep in the code and require a comprehensive application of dynamic and static analysis methods to accurately identify them, which undoubtedly adds additional challenges and workload to security countermeasures.

Family variant analysis

During the continuous tracking of such malicious APPs, we found a new variant with an MD5 hash value of 61eea96bae6e53b6806d974cf35877df. This new sample has made a significant change: it no longer relies on Ali Game Shield but has turned to using Qiniu Cloud's DoH (DNS over HTTPS) service. The specific usage method is as follows:

1701749656_656ea3980ce02e25c8aec.png!small?1701749659172

1701749664_656ea3a041280cf4f08fb.jpg!small?1701749667473

In this new variant, the attacker configures the address in the HOST to be the dnsServer of Qiniu Cloud's DnsManager. Then, the DnsManager is responsible for DNS queries. This change not only indicates that the attacker is gradually familiarizing themselves with and exploiting more advanced network services but also increases the complexity of analyzing and intercepting their behavior.

1701749670_656ea3a6417dca89714b1.jpg!small?1701749673474

In this situation, the sample dynamically changes IP addresses through its own controlled dnsserver. This setting allows attackers to use tools similar to Ali Game Shield in the backend to randomly return different proxy IP addresses, thereby hiding the real IP address. If the DNS query fails, the sample will revert to the preset IP and port, further increasing the complexity of counter-analysis. This multi-layered network behavior strategy not only increases the difficulty of analysis work but also creates additional challenges for effective interception.

1701749676_656ea3ac1f7fc674d42b5.jpg!small?1701749678531

Summary

In the comprehensive analysis of this malicious sample, we can see that the sample exhibits complex and stealthy behavior characteristics at multiple levels:

  1. The sample extensively borrowed source code from Telegram Android and made numerous customizations and additions, which increased the complexity of analysis.

  2. Network behavior:

    • Early versions mainly used Ali Game Shield for dynamic IP and port switching to avoid network interception.
    • The new variant has switched to using the Qiniu Cloud's DoH service, further enhancing its stealthiness.
  3. Combination of dynamic and static analysis: Since the sample uses various methods to conceal its network behavior and code structure, both dynamic and static analysis need to be used simultaneously to fully understand its behavior patterns.

  4. Countermeasures: Effective interception of this sample requires a detailed analysis of all communication paths and dependencies used, and interception should be targeted at these specific paths and libraries.

  5. Update and evolution: This sample has a high update frequency and diversity, requiring continuous attention to its variants and updates.

In summary, this malicious sample demonstrates a high degree of complexity and stealthiness, requiring a comprehensive analysis of various methods and continuous tracking of its changes to develop effective protective measures.

IoC

Hash:

0a731ace7a01349d8c103ad5dc7fc230

c0c2c778f447c8e8e007f23fc9884270

f911559ca31a67644839fb3441b4353a

90a214d758e139e7604d2a0ffeea636d

07adcaaba76313bb403e272af0b410fb

cc77e56537f42e9f9929414e0c6ee5fa

3500969225597c6ef74bbcd430db639b

9e2430fbf9fda9d88c64fa21be0397be

cad71847f3d233392858241108379ba9

4c0ef460d9002529e5c4246a01b4bb3b

61ad63ee3527a0386728d7b7fd7327c1

f5e0cb000781595282b08c0c13aa2ccd

aa9b9fa34ecccd73586a75a5c2b472da

1ee643ce7569b8badef4893a06a65529

83769c54646c9b7fb4395e2bd2bbd8ca

340795cd070438dbab4224b39de2bb32

c5381d9b17d4d870f4187bd92fffc4f1

34db2c2aa456d943c0cee500895b6ebb

903a976b8469ffc51f865064c1c99134

e51e972cab85b126aa714367a6b3580d

0e8f47f6fd85f87ec856b8338cb1a58e

5c901f89a693a81a60da1f0314fc8c00

8bf147393b4349e6d30855f5a1994122

0724e81bab5c781229d8a412b078a470

84bad8f49ab890c25ccd33b751d875a1

dbce0d16142d5492ff7c3304ee24c118

cda08dd3ba29229da293efb299a0071b

7870d55613d69067f432bcfced6b9395

e01a68ff450ca8e9e8a148060503aa4d

a248ce6f396c27ebc7f5a660e367eae8

c80a11363e216d7e32e17fa044672369

79bcd908766033491409c62015488049

55e3dfe425fb5372542909a63ed007e5

5bb38f2601937a538d068047dc32937b

a1b5de8df8741deb655c84d3dad536fd

C&C:

47.104.243.76:31537

183.230.11.65:55555

42.193.237.57:30003

175.178.152.90:30003

139.199.224.36:30003

111.230.69.193:30003

36.255.220.245

https://ff119f.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://axvsag103sdvsbd.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://126sand.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://bw36file.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://bw1cloudfile1.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://ff115f.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://bw5file1.oss-cn-hangzhou.aliyuncs.com/andrioddunv.txt

https://80xbdfs.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://bw89file.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://6oiue.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://ma36twegt.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://6fdhgbtreh.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://fdasfewmm26dsafdas.oss-ap-southeast-1.aliyuncs.com/andrioddunv.txt

https://gg81fnew.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://ev10mgmt.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://26qewsdz.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://file100fg.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://jbsa111.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://cxvsdf121gfhe.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://wb25f.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://abhjbw115jks.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://bhjasd183.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://bw39file.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://if90f.oss-accelerate.aliyuncs.com/andrioddunv.txt

https://8.212.47.67/dns-query

https://8.212.102.80/dns-query

https://8.212.1.70/dns-query

https://8.212.101.76/dns-query

https://47.57.138.89/dns-query

https://47.57.2.128/dns-query

Smile.isk5uz.com

Maomi.gz.bw36diannew.com

abab.gz.bibi115s.com

Pulo.gz.bw6nmddk.com

Qiaojiar.gz.bw111uam.com

guo.gz.awwb90.com

ttt.gz.iudjd119.com

Facai.gz.bw26f.com

Sichunge.bj1.mumrsn8i.com

nqo5.hz.sjdnbw81.com

deadf.gz.wknbw25.com

Lvcha.gz.bw183khgftdfgh.com

Wngd.gz.bw121ffu.com

Gsnm.gz.bw115dsvwerfoijsd.com

Xecm.gz.bw6st.com

Huachuanghulian.gz.bw16wcnmader.com

Qingyimianmian.gz.bw39top.com

Zzh.gz.bw126zzhyyds.com

wrty4.gz.az25ru.com

roklw.gz.skmw100.com

Ommm.gz.bw103hgycgi.com

Edko.gz.bw36a.com

Aelo.gz.bw112uuuuuuu.com

Dandan.gz.bw26yidingyaotingzhu.com


Original link:Lian Security

你可能想看:
最后修改时间:
admin
上一篇 2025年03月27日 16:15
下一篇 2025年03月27日 16:38

评论已关闭