(Almost) a FUD: another "Porn App", this time Italian
I like FUDs, because they must show creativity either in packing or in the code. Anyhow, they are almost always interesting to analyze. Recently I came across a "porn" app targeting Italy (md5: 0995aceaeb8e338aff542ab3f1d8dab4). When you run it it displays an ansa.it website, which I guess is a kind of Italian news site. But what it does in the background is really interesting.
Quick look
First off the app is still in the making and let me tell you the author devotes 5 hours a day to make it work! He (or she) is really trying to make it both FUD and powerful and I have to tell you that it starts to shape up with some nifty features. There are still a lot of blanks, which maybe will be filled in in the future. Look at this beautiful icon (remember that it is supposed to be a porn app):
Second up, the strings. They are encrypted using DES encryption in a famous Adobe mode with "Some Key" key. All of the strings seem to be encrypted, even the ones popular in Android apps like "pdus" or "com.android.launcher.action.INSTALL_SHORTCUT" action. And this action is used to create a shortcut on your desktop with the same icon as above.
Some of the telephone info is send to a C&C server located in San Marino (that's new, right?). Below is a list of stolen data.
Now to the interesting parts! It has a kill switch implemented, which activates after some predefined time. Before this time a specified number can send a short message instructing the app to send SMS to another number. This is probably done to facilitate the Premium SMS feature, where the attacker can make money out of paid subscription services. Unfortunately no number was provided in the sample. After the kill switch gets activated the SMS sending features are disabled.
Other interesting functionality is the Hidden Browser. This is an Activity that displays a website in the background using Theme.NoDisplay and excludeFromRecents parameters in the AndroidManifest file, as shown below. As you can see MainActivity uses the same tricks.
This activity can open a website and then, when the page is loaded, open a different URL or execute a piece of JavaScript code by passing the javascript: "protocol" to loadUrl of the WebView. In this, what I believe to be a test sample, executed JavaScript was just a simple redirect. Moreover, at least for now, the executed JavaScript is hardcoded to be a redirect and there is no way to change it other then rebuilding the app.
Hidden Browser is meant to be run using an Intent and has an Extra String called "link" specifying the redirect. The page that is opened up before the redirection was hardcoded to be google.com. Using this Activity you can covertly make the Android visit a specific website.
It also gains persistence using a standard BOOT_COMPLETED Broadcast Receiver.
Summary
Both strings and permissions show that the next implemented feature will be stealing contacts. Let's wait and see how the app will evolve. In the meantime, for all the Blade Runner fans, this is an excerpt from an app certificate:
Issuer
DN: C=IT, ST=Italy, L=Rome, O=Tyrrel Corporation, OU=R&D, CN=Marco Rossi
C: IT
CN: Marco Rossi
L: Rome
O: Tyrrel Corporation
S: Italy
OU: R&D
Comments
Post a Comment