IRC bot for Android
0.3
Not so long time ago we found a very interesting piece of malware for
Android. Unfortunately, it is not clear how it was spread but in any
case it’s worth mentioning. The malicious application displays itself as
‘MADDEN NFL 12’ game after the installation.
The file size is over 5+ MB and actually is a Trojan that drops a set
of malware components onto the system: root exploit, SMS Trojan and IRC
bot. The .class file "AndroidBotAcitivity" maintains this dropper
functionality. It creates a ‘/data/data/com.android.bot/files’ directory
and sets ‘777’ permission (read/write/execute for all users). After
that it extracts three files - ‘header01.png’ (root exploit),
‘footer01.png’ (IRC bot), ‘border01.png’ (SMS Trojan) - into this
directory. Then it sets ‘777’ permission on the root exploit file and
executes it. Finally, it displays the text ‘(0x14) Error - Not registred
application’ on the screen.
If the exploit is executed successfully and the device is rooted, it launches the IRC bot ‘footer01.png’.
First of all, the IRC bot will try to delete ‘etc/sent’ using the ‘rm’ command:
After that it will set the owner (‘root’)/group (‘root’) of the
‘border01.png’ file using the ‘chown’ command and will set ‘644’
permission for the ‘border01.png’ file:
Then IRC bot will install ‘border01.png’ (SMS Trojan) using ‘pm install’ and launch it using ‘am start’:
This SMS Trojan is a modification of the Foncy SMS Trojan. We wrote about this malware family not so long ago. The Trojan hasn’t been modified much. It uses the getSimCountryIso
method as well as previous versions in order to retrieve the country of
the SIM card. Here is the list of countries with premium rate numbers:
This is first IRC bot for Android we’ve seen so far. And what is more interesting is that comes together with a root exploit and an SMS Trojan. They work together efficiently and the cybercriminal in this case has full access to an infected smartphone and can do anything he wants.
P.S. We detect all the malicious files as Trojan-Dropper.AndroidOS.Foncy.a, Exploit.Linux.Lotoor.ac, Backdoor.Linux.Foncy.a and Trojan-SMS.AndroidOS.Foncy.a.
Source info: http://www.securelist.com/en/blog/208193332/IRC_bot_for_Android
If the exploit is executed successfully and the device is rooted, it launches the IRC bot ‘footer01.png’.
First of all, the IRC bot will try to delete ‘etc/sent’ using the ‘rm’ command:
- France (81083)
- Belgium (3075)
- Switzerland (543)
- Luxembourg (64747)
- Canada (60999, there is no more mix up of number and SMS text as it was in previous version:-))
- Germany (63000)
- Spain (35024)
- Great Britain (60999)
- Morocco (2052)
- Sierra Leone (7604)
- Romania (1339)
- Norway (2227)
- Sweden (72225)
- United States (23333)
http://46.166.*.*/?={number}///{message_body}
The IRC bot, after launching the SMS Trojan, will try to connect to
IRC server 199.68.*.* (it was unavailable at the time of research) on
channel ‘#andros’ with a random nickname. After that it is able to
receive any shell commands from this server and execute them on an
infected device.This is first IRC bot for Android we’ve seen so far. And what is more interesting is that comes together with a root exploit and an SMS Trojan. They work together efficiently and the cybercriminal in this case has full access to an infected smartphone and can do anything he wants.
P.S. We detect all the malicious files as Trojan-Dropper.AndroidOS.Foncy.a, Exploit.Linux.Lotoor.ac, Backdoor.Linux.Foncy.a and Trojan-SMS.AndroidOS.Foncy.a.
Source info: http://www.securelist.com/en/blog/208193332/IRC_bot_for_Android
+ comments + 1 comments
I enjoy what you guys tend to be up too. This kind of
clever work and coverage! Keep up the amazing works guys I've incorporated you guys to my personal blogroll.
My web page - make quick Money
Post a Comment