[UPDATE]
Meanwhile I found the same or a very similar version of this Trojan dropper and banker without obfuscation and protection by DexProtector. The dropping method and functionality is preserved. For those interested, I added hashes of infected files at the bottom.
Nowadays malware is trying to hide wherever it is possible, to get under the radar of anti-virus companies. Lately, I found Trojan dropper carrying a malicious payload, encoded by base64, embedded inside an image file. It’s nothing special these days but it is a very rare dropping technique. In most cases, malware authors are lazy enough to not even encrypt the payload file.
Analysis
At the time of writing this blog post this Trojan dropper is still available to unduh from attacker server (hxxp://jackdojacksgot.ru/img/Update.apk). Based on VirusTotal the detection for this Trojan dropper is very poor.
Figure 1 VirusTotal detection |
This malicious application masquerades itself as Adobe Flash Player. Based on alternative names I found in application resources, the malware name can be different in the other versions such as: Viber New, App4porno, CommBank, My Online Security, Viber or Whatsapp.
Figure 2 Possible Trojan dropper names |
After launch, Trojan will immediately drop and request the user to install Adobe Flash Player. But first let’s take a look at the dropping technique.
In app assets there is nothing else to drop other than the image file.
Figure 3 Trojan dropper assets |
There is only one image of dices stored in assets, but it size is more than 3.6 MB and that’s bit suspicious.
After inspecting the code, the application wasn’t dropping this PNG file. The Trojan dropper at first opens this image file and searches for the delimiter string, in this case "12345678901234567890". Right after this delimiter, another application encoded by base64 is stored.
![]() |
Figure 4 Dropping embedded malware |
Figure 5 Binary view of PNG file |
Decoded data are then stored on external storage as “prefix.apk” and demand to be installed. Decoded application, prefix.apk, is a heavily obfuscated Android banker, stealing user credentials.
After installation it requests the user to activate Administrator rights for application. This is the simplest method which prevents to uninstalation of this Trojan.
![]() |
Figure 6 Banker install and device direktur request |
If user tries to deactivate Administrator rights then he is repeatedly asked to activate it again. There are two ways how to get rid of this nasty banker. Either by going to safe mode of your device and deactivating Administrator rights and uninstall it or by using Android Debug Bridge (adb) and uninstall it from your computer.
Both apps Trojan dropper and dropped banker are the most probably obfuscated and protected by DexProtector. It’s very complicated to analyze it statically without any dynamical intervention.
Figure 7 Code obfuscation |
Banker can steal user login credentials or credit card information with phishing technique. When user opens his mobile banking application or just Google Play Store, malicious activity will be displayed on the top of the official application. This way, the user can be easily fooled and insert sensitive information to the banker pop-up window.
![]() |
Figure 8 Bankers phishing windows |
User credentials are immediately sent to remote server.
Figure 9 Send stolen credentials for Gmail app |
Figure 10 Send stolen credentials for CommBank app |
Figure 11 Send stolen credentials for PayPal app |
This banker is very popular. Lately I tweeted about the same banker, but stored on a different server.
Android banker active sample https://t.co/ObJSLZwQ7A https://t.co/nZhEMx7sXk #Android #Malware pic.twitter.com/fMcItKMHzm — Lukas Stefanko (@LukasStefanko) November 18, 2015
More information
HASH dropper: 1F41BA0781D51751971EE705DFA307D2
HASH dropped: 90886B56372F5191A78A20DCB3F9FE6E
Unduh link: http://jackdojacksgot.ru/img/Update.apk
Remote server: 75jng75ufnf.ru:2080
Not obfuscated samples by DexProtect:
HASH dropper: E3CCAA1EF68CC472AB8983419BE15A49
HASH dropper: D4FAA81ABA663A825BB13F17E3CE3D07
HASH PNG: BEDC1B7A2ED127C5A7E5261F043CAFE4
HASH dropped: 41C9ADD2BE9F4B04047AB232EB08058F
HASH dropped: 1B1ACD068461A074BE1A49DF02B10B09
Komentar
Posting Komentar