Google Play malware points to the SideWinder organization

0 21
Three malicious applications were found in the Google Play store, which will...

Three malicious applications were found in the Google Play store, which will attack the target device and collect user information. One of them is named CAMMO, utilizing the vulnerability number CVE-2019-2215. This is the first known active attack using the use-after-free vulnerability. Further investigation found that these three applications may be part of the SideWinder organization's arsenal.

These three malicious applications are disguised as photography and file management tools. According to the certificate information of one of the applications, it is estimated that these applications have been active since March 2019. Currently, these applications have been removed from Google Play.

Google Play malware points to the SideWinder organization

Installation

SideWinder installs the payload in two stages. It first downloads the DEX files (Android file format) from the C&C server. This group uses application transformation to configure the C&C server address. The address is Base64 encoded and then set as the referer parameter in the malicious software distribution URL.

The downloaded DEX files will download an APK file and install it. All of this is done in a concealed manner. To evade detection, it uses technologies such as blurring, data encryption, and calling dynamic code.

After the applications Camero and FileCrypt manager download additional DEX files from the C&C server, the second-layer dropper calls additional code to download, install, and start the callCam application on the device.

Without the user's knowledge, the load application callCam is deployed on the device, and SideWinder will perform the following operations:

Device root

Completed by Camero application, only applicable to Google (Pixel 2, Pixel 2 XL), Nokia 3 (TA-1032), LG V20 (LG-H990), Oppo F9 (CPH1881), and Redmi 6A devices. The malware retrieves specific attacks from the C&C server based on the index downloaded by the dropper.

During the investigation, 5 vulnerabilities were downloaded from the C&C server. Attackers used vulnerabilities CVE-2019-2215 and MediaTek SU to obtain root permissions.

After obtaining root permissions, the malware installs the callCam application, authorizes and starts it.

Secondly, using auxiliary function permissions

FileCrypt Manager uses this method, which is suitable for most Android phones with Android 1.6 and above. After the application is launched, it will prompt the user to enable auxiliary functions.

Once permission is obtained, the application will display a full-screen window showing the installation steps required further. However, this is just a cover screen displayed on top of all active windows on the device.

At the same time, the application calls code from additional DEX files to install unknown applications and callCam. It grants the installer access permission and starts the program. All of this happens behind the covered screen without the user's knowledge.

CallCam Activity Analysis

After the app is installed and launched, the icon is hidden, some user information is collected and sent back to the c&c server:

Location information, battery status, files, list of installed apps, device information, sensor information, camera information, screen screenshots, accounts, wifi information, and data from various social software and browsers.

The application encrypts all returned data using RSA and AES encryption algorithms. It verifies data integrity using SHA256 and custom encodes the interface. During encryption, it creates a headData data block. This block contains the first 9 bytes of the original data, the length of the original data, a random AES IV, the RSA encrypted AES encryption key, and the SHA256 value of the encrypted original data. Then the header data is encoded through a custom interface. After encoding, it is stored in the header of the final encrypted file, followed by the AES encrypted original data.

SideWinder Association Analysis

The C&C servers used by these applications are suspected to be part of the SideWinder facility. A URL linking to the application's Google Play page was also found on one of the C&C servers.

IOCs

C&C Servers

ms-ethics.net

deb-cn.net

ap1-acl.net

ms-db.net

aws-check.net

reawk.net

*Reference Source:trendmicroCompiled by Kriston, please indicate the source as FreeBuf.COM when转载

你可能想看:

As announced today, Glupteba is a multi-component botnet targeting Windows computers. Google has taken action to disrupt the operation of Glupteba, and we believe this action will have a significant i

2. The International Criminal Police Organization arrests more than 1,000 network criminals from 20 countries, seize 27 million US dollars

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

Fake Google ads target Microsoft ad accounts, and malware attacks are upgraded again

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

(3) Is the national secret OTP simply replacing the SHA series hash algorithms with the SM3 algorithm, and becoming the national secret version of HOTP and TOTP according to the adopted dynamic factor

A Brief Discussion on the Establishment of Special Security Management Organizations for Operators of Key Information Infrastructure

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

d) Adopt identification technologies such as passwords, password technologies, biometric technologies, and combinations of two or more to identify users, and at least one identification technology sho

Announcement regarding the addition of 7 units as technical support units for the Ministry of Industry and Information Technology's mobile Internet APP product security vulnerability database

最后修改时间:
admin
上一篇 2025年03月29日 09:44
下一篇 2025年03月29日 10:06

评论已关闭