
SonicWall Threats Research Team received reports of an Android malware in the wild that was hosted on an active domain. This malware appears to be a Remote Access Trojan that has a number of capabilities.
Installing the application, the icon is visible without any application name:
The AndroidManifest.xml file can be used to identify how the application starts the execution flow. In this application the main activity is listed as - com.depart.buddy.lz. However looking at the code, this class is not visible in the list of classes:
This indicates that most likely a new dex file might be dropped during execution and this file will contain the class pointed as the main activity. Once executed, a file named kreaslX.json is dropped in the folder below:
Renaming the .json file to .zip and opening it in a disassembler shows us the missing class files:
The file shared preferences file settings.xml can be viewed as the configuration file for this application. A number of capabilities of this malware are listed in this file:
Notable capabilities include:
The application is hosted on hxxps://www.kisa.link/PMmG. VirusTotal graph shows multiple malicious indicators connected with this domain:
A hardcoded admin panel IP was identified in the shared_preferences.xml fille - hxxp://helalolsundayiogli.co.vu. VirusTotal graph for this domain shows multiple apk files connected to this domain:
Overall this application appears to be part of a larger campaign which is being propagated via the links mentioned. The nature of this application is that of a Remote Access Trojan which is capable of accepting commands and executing the in-built functionality.
Sonicwall Capture Labs provides protection against this threat using the signature listed below:
Indicators of Compromise:
Share This Article

An Article By
An Article By
Security News
Security News