How to check for a root access in three ways (plus a C&C demo!)

Recently I have found a sample of DroidJack, which is somehow the same as Sandrorat described previously. Well, it is probably created by the same author or at least on the same code base. What leads me to that conclusion? Well, see it for yourself in the screenshot below.



How does the DroidJack C&C look like? I've found this little GIF demo in one of the DroidJack ads (if you haven't seen it already this means that you don't follow me on Twitter and you should):


So, the pretty much standard stuff for the more complex Android malware: you can do everything and get a "binder" i.e. program that lets you add DroidJack "features" to the benign apps. What else did the author of DroidJack and Sandrorat made? This app available in Play Store that is a kind of Sandrorat in reverse - you can use a mobile phone to "control" your computer.

Checking for root in three ways

Enough about the authors, let's go to the main point of this post. I find a way that DroidJack checks for the root permissions on the device rather interesting. Important note is that this malware does not depend on the root permissions, it just checks if it has them. And, as you probably know, if you have rooted your phone and you have given root permissions to any suspicious app, you're most certainly fucked.

First way of checking if the phone is rooted is the usual checking of the su availability using which command. Nothing too fancy, as you can see on a screenshot below.


Next up is a not-so-common checking for the Superuser.apk application. Pictured in the screenshot below.

Finally, something that I see for the first time. Checking if the build is signed with test-keys. This is a popular way of signing custom ROMs and, presumably, if you have a custom ROM, you most likely also rooted your phone. While this may be a kind of bet, it's fair to say that it's a safe one.


I'll try to look at this DroidJack sample a little more. Meanwhile, let's play "The Price is Right"! What do you think this piece of malware cost? $20? $50? Surely not over a $100, right? Have a look at the illustrated answer below.


And for that little price it stays with you for the eternity...

Comments

Popular posts from this blog

Having fun with AndroidManifest.xml

Android malware based on SMS encryption and with KitKat support

Sandroid RAT analysis: Part I - synthetic communication