It is a common technique for criminals to target gaming applications as a propagation vector for malware distribution. Recently, I observed just such a malicious Android app, which acted as an interesting information stealer and then self-destructed. I took this case to investigate further as an interesting research.
VT Report Statistics
Analysis Report: https://www.virustotal.com/en/file/922741596dde5081760706c653a7b2bd4634c832b648cd3d06f7edca8ea8d1b7/analysis/1380705085/
Figure 1: VT Statistics
The application was successfully installed into an emulator for performing behavioral analysis.
Figure 2: Application Installed in emulator
Figure 3: Emulator Showing Installed Application
The following suspicious activities were observed from the dynamic analysis.
- The application access user details such as recent call histories, browser cached URLs, messages and contact details
- The application uploads user details into remote server http://gi60s.com/upload.php along with a randomly generated token.
- Once the uploading is done, the application asks for un-installation and gets destroyed by itself.
Figure 4: Application Running in the Emulator
Figure 5: Wireshark Captured the Spying HTTP Traffic
I loaded my emulator with test user details such as SMS, browser cache, contacts etc., and observed the pattern of upload data as follows.
Figure 6: Simulating Incoming SMS
Figure 7: Encoded POST Request
Figure 8: Decoded POST Request
I converted the APK file into ZIP archive and extracted the file contents. The extracted files contain following items.
These files are certificates, resources, permission manifest file, and DalvikEXecutable(DEX) used in the application.
The AndroidManifest.xml file shows suspicious file permission granted to the application.
Figure 9: Suspicious Permission Observed
I de-compiled the application (APK) file into Java Archive file (JAR) for further code analysis
Figure 10: De-compiling DEX Code
The major class structure looks like follows:
Figure 11: Extracted Java Class Structure
MyService class file contains functions to extract contacts, messages, call histories, browser URLs etc.
Figure 12: MyService class extracting user data
gone60 class deals with functions to confirm the extraction of user details, uploading the stolen details into the remote web server, and self-distraction of the application.
Figure 13: gone60 self destraction code
json_class class file upload the user data into the remote server using HTTP calls.
Figure 14: json_class is Uploading to Remote HTTP Server
The application will extract user information such as contacts, recent call histories, messages, and browser caches. It uninstalls itself after it has successfully uploaded the extracted user data into a remote web server – www.gi60s.com. Symantec classifies this malware as Android.Gonesixty and the detailed reference is given here.
Figure 15: gi60s.com information from http://distst.com/domain/gi60s.com
His work mainly focuses on conducting security training, consistently do security researches, incident detection and response, VAPT assessments for web application, networks, servers and mobile applications for NII’s premier clients.
He has consistently impressed clients with his ability to think out of the box, and creatively attack systems and applications.
He is well versed with the security standard such as OWASP, WASC, OSSTMM, ISO 27001, PCI DSS etc.
His technical abilities span a very wide range of technologies across networks, operating systems, databases, web servers, and applications; however his specialization is in scripting security tools(automating), reverse engineering & malware analysis, wireless and mobile security etc.
Latest posts by Sanoop Thomas (see all)
- Analysis of Malware: Detecting Behavior & Anti-Reversing Techniques - April 17, 2014
- Gone in 60s Malware Analysis Report - October 5, 2013
- Russian FruitNinja Backdoor Analysis - October 9, 2012