본문 바로가기
IT 보안소식

안드로이드(Android), 슬금슬금 모습을 드러내는 안드로이드 악성코드 "IRC bot for Android" 에 대한 자료

by 잡다한 처리 2012. 1. 16.
반응형



안드로이드 악성코드가 이제 하늘을 찌르고 승천할 기세다 ㅋㅋ

도청, 녹음, SMS 발송으로도 모자라 이제 Botnet 기능을 하는 악성 어플이 드디어 나왔다.

Kaspersky "Denis"에 의하면 럭비게임(MADDEN NFL 12)으로 위장한 악성어플이, 루트권한(진저브레드)을 획득 하고,
IRC Bot을 실행하여 채널 접속 후 오퍼의 명령을 받을 수 있다고 한다.


Not so long time ago we found a very interesting piece of malware for Android. Unfortunately, it is not clear how it was spread but in any case it’s worth mentioning. The malicious application displays itself as ‘MADDEN NFL 12’ game after the installation.
 


The file size is over 5+ MB and actually is a Trojan that drops a set of malware components onto the system: root exploit, SMS Trojan and IRC bot. The .class file "AndroidBotAcitivity" maintains this dropper functionality. It creates a ‘/data/data/com.android.bot/files’ directory and sets ‘777’ permission (read/write/execute for all users). After that it extracts three files - ‘header01.png’ (root exploit), ‘footer01.png’ (IRC bot), ‘border01.png’ (SMS Trojan) - into this directory. Then it sets ‘777’ permission on the root exploit file and executes it. Finally, it displays the text ‘(0x14) Error - Not registred application’ on the screen.

If the exploit is executed successfully and the device is rooted, it launches the IRC bot ‘footer01.png’.

First of all, the IRC bot will try to delete ‘etc/sent’ using the ‘rm’ command:

 
After that it will set the owner (‘root’)/group (‘root’) of the ‘border01.png’ file using the ‘chown’ command and will set ‘644’ permission for the ‘border01.png’ file:


Then IRC bot will install ‘border01.png’ (SMS Trojan) using ‘pm install’ and launch it using ‘am start’:
 


This SMS Trojan is a modification of the Foncy SMS Trojan. We wrote about this malware family not so long ago. The Trojan hasn’t been modified much. It uses the getSimCountryIso method as well as previous versions in order to retrieve the country of the SIM card. Here is the list of countries with premium rate numbers:

France (81083)
Belgium (3075)
Switzerland (543)
Luxembourg (64747)
Canada (60999, there is no more mix up of number and SMS text as it was in previous version:-))
Germany (63000)
Spain (35024)
Great Britain (60999)
Morocco (2052)
Sierra Leone (7604)
Romania (1339)
Norway (2227)
Sweden (72225)
United States (23333)
And as in previous version Foncy will try to block all incoming messages from the premium rate numbers listed above using the abortBroadcast method. But there is one small difference between this particular version of Foncy and previous ones. This modification will upload all incoming messages from premium rate number to a remote server instead of sending an SMS message to cell phone number in the following format:

http://46.166.*.*/?={number}///{message_body}

The IRC bot, after launching the SMS Trojan, will try to connect to IRC server 199.68.*.* (it was unavailable at the time of research) on channel ‘#andros’ with a random nickname. After that it is able to receive any shell commands from this server and execute them on an infected device.

This is first IRC bot for Android we’ve seen so far. And what is more interesting is that comes together with a root exploit and an SMS Trojan. They work together efficiently and the cybercriminal in this case has full access to an infected smartphone and can do anything he wants.

P.S. We detect all the malicious files as Trojan-Dropper.AndroidOS.Foncy.a, Exploit.Linux.Lotoor.ac, Backdoor.Linux.Foncy.a and Trojan-SMS.AndroidOS.Foncy.a.




댓글