
SonicWall Threats Research team came across an Android spyware that steals sensitive user information and sends it to the attacker. The app has a plethora of functionalities that are centered towards stealing information from the device. However a more concerning element of the malware is that all the stolen information is transmitted over an unsecured http channel.
Details of the sample analyzed:
Upon installation the app is visible in the app drawer as follows:
Upon execution the app starts communicating with the attacker using the hardcoded IP 116.193.152.176:7788. The communication happens over http which indicates that any user information sent to the user is done so over an unsecured channel. One of the first things done by the app is creating a unique id for the infected device, this id is saved in the shared_prefs file locally and then shared with the attacker to report the initial infection. This is performed using a POST request to addNewUser as shown below:
The malware then sends the following data from the infected device:
There are additional interesting API requests present in the code that highlight the features and capabilities of this malware:
The malware is capable of communicating with the attacker using webSocket. The malware can execute the following functionality based on the code received via webSockets:
There are additional traces in the code which reveal more functionality of the malware. It is capable of the following:
Attacker server IP:
Gmail credentials:
QQ chat id:
Overall this malware is geared towards stealing sensitive user information from an infected device. The log messages and text present in the code is Korean, additionally the language used on the attacker's server login is Korean as well.
SonicWall Capture Labs provide protection against this threat with the following signature:
Indicators of Compromise (IOC’s):
Share This Article

An Article By
An Article By
Security News
Security News