Recently, we (Zscaler) came across a piece of Android malware which was neither aย porn appย nor aย battery status app,ย but was instead designed to look like a Microsoft Word document. This malicious appย portrays itself as a document with an icon resembling Microsoft Word.
Due to the ubiquitous nature of mobile devices, its no wonder that PC based malware techniques are appearing in mobile domains. In early Windows malware attacks, attackers would often name the malicious files with eye-catching titles and use common icons to entice victims to open the file. We’re seeing this same practice used for Android based malware.
Overview:
The malware portrays itself as a data file with an icon similar to that used by Microsoft Word documents and is entitled ‘่ตๆ’ (Data). It runs with Administrative access and hence cannot be easily uninstalled. Once installed, the malware scans the device for SMS messages and other personally identifiable information such as the IMEI number, SIM card number, Device ID, victim’s contact information, ย etc. and sends this to the attacker via email.
Technical Details:
Once the malware is installed, it appears on the Android home screen as shown below:
Initiation:
As soon as victim tries to start the app, it shows an explicit error statingย “Installation errors, this software is not compatible with the phone”ย and the icon then disappears from the device screen.
When this error is being displayed, the app executes a few major functions as noted below:
- Sendsย SMSย messages to a hard-coded number.
- Starts an Android service, namedย MyService.
- Starts anย asynchronousย thread (SmsTask) which runs in background.
- Starts another thread namedย MailTask, which also operates in background.
- Callsย phone numbers specified by Attacker.
Sends SMS
Initially malware tries to send the victim’s device IMEI code in a message body to a hardcoded number.
Assets.getInstallFlagย gets the IMEI (or ESN number in case of CDMA devices)
And finally sends the message.ย
MyService Service:
The main task performed by MyService is to collect all the SMS messages from inbox of the victim’s device. ย Once that is done, it stores all the messages in its local logs.
SmsTask Thread:
Apart from logging SMS messages, MyService was not sending these messages anywhere. This functionality is exhibited in the SmsTask thread.
SmsTask will also read the SMS messages and exfiltrates them.
Once the messages are collected, the app then sends them to attacker via email.
A username and password for an email id were found hard-coded in the malware.
MailTask Thread:
MailTask’s main role is to collect contact information from the victim’s device and send it to attacker via the same functionality explained in case of SmsTask.
Sending Mail:
The app sets up an SMTP host on port 465 for sending email.
localMimeMessageย contains the necessary data to be sent to attacker via email. In the case of SmsTask as mentioned above, localMimeMessage’s body contains an SMS message list and in the MailTask instance, it contains contact numbers from victim’s device.
Calling Functionality: The malware was also designed to call phone numbers provided by an attacker via SMS.
It has a broadcast receiver registered to trigger whenever a new SMS is delivered.
The malware reads the SMS received from the attacker and acts accordingly.
In one instance, malware was trying to fetch phone numbers received in SMS messages and then calling them, as shown in screenshot below:
We were able to confirm that the campaign was initiated on October 10, 2015 and almost 300+ users had fallen prey to this malware. The attacker was able to successfully retrieve message details and contact lists from the infected users.
The following screenshots shows the list of emails received by the attacker:
Further, each email titled “Message list” consists of full SMS conversations from the victims phones and email with subject “Contact list” contains a list of all the phone numbers fetched from victims contact diaries.
There were 300+ such emails found in the C&C admin panel. Such malware creates a significant privacy & financial risk as it obtains contact information and private SMS messages.
Prevention:
It is recommended that users download apps only from official Android stores like the Google Play store. If you are infected with malware, you canย follow the stepsย mentionedย here for removing the malicious app.
The editorial team behind Compare the Cloud made up a unique group of IT specialists, digital marketers and cloud specialists. We understand the industry from both the IT managerโs perspective and the perspective of the IT service provider.