Clicky

Monday, May 13, 2013

Android Perkele / Fake Site


com-fake site source

Please see the list of included files below

Sample and screenshot credits: Anonymous
News: Mobile Malcoders Pay to (Google) Play - Brian Krebs




SMS malware bot for sale, created to look like a security certificate with logos of your company
1 app - $1000. Full kit -$15,000



Download. (Email me if you need the password scheme)




List of included files:


│   .classpath
│   .project
│   AndroidManifest.xml
│   ic_launcher-web.png
│   proguard-project.txt
│   project.properties

├───.settings
│       org.eclipse.core.resources.prefs
│       org.eclipse.jdt.core.prefs

├───assets
├───bin
│   │   AndroidManifest.xml
│   │   classes.dex
│   │   ing.nl.apk   b597850b04140e0e28749e0a11cc0118 https://www.virustotal.com/en/file/B597850B04140E0E28749E0A11CC0118/analysis/1368445857/
│   │   resources.ap_
│   │
│   ├───classes
│   │   └───com
│   │       └───fake
│   │           └───site
│   │               │   BuildConfig.class
│   │               │   MessageReceiver.class
│   │               │   R$attr.class
│   │               │   R$drawable.class
│   │               │   R$id.class
│   │               │   R$layout.class
│   │               │   R$menu.class
│   │               │   R$string.class
│   │               │   R$style.class
│   │               │   R.class
│   │               │   StartActivity.class
│   │               │
│   │               └───sms
│   │                       Sms.class
│   │
│   ├───dexedLibs
│   │       android-support-v4-d31c39caea3f9fffa90e5e04017ae9cb.jar
│   │
│   └───res
│       ├───drawable
│       │       background.png
│       │       bank.png
│       │       bank1.png
│       │       button.png
│       │       emblem.png
│       │       security.png
│       │
│       ├───drawable-hdpi
│       │       bank.png
│       │
│       ├───drawable-ldpi
│       │       bank.png
│       │
│       ├───drawable-mdpi
│       │       bank.png
│       │
│       └───drawable-xhdpi
│               bank.png

├───gen
│   └───com
│       └───fake
│           └───site
│                   BuildConfig.java
│                   R.java

├───libs
│       android-support-v4.jar

├───res
│   ├───drawable
│   │       background.png
│   │       bank.png
│   │       bank1.png
│   │       button.png
│   │       emblem.png
│   │       security.png
│   │
│   ├───drawable-hdpi
│   │       bank.png
│   │
│   ├───drawable-ldpi
│   │       bank.png
│   │
│   ├───drawable-mdpi
│   │       bank.png
│   │
│   ├───drawable-xhdpi
│   │       bank.png
│   │
│   ├───layout
│   │       activity_main.xml
│   │       message_content.xml
│   │
│   ├───menu
│   │       activity_main.xml
│   │
│   └───values
│           strings.xml
│           styles.xml

└───src
    └───com
        └───fake
            └───site
                │   MessageReceiver.java
                │   StartActivity.java
                │
                └───sms
                        Sms.java



Virustotal results:



Antivirus Result Update
Comodo UnclassifiedMalware 20130508
F-Secure Trojan:Android/SmsSend.O 20130508
VIPRE Trojan.AndroidOS.Generic.A 20130508
Ikarus Trojan.AndroidOS.FakeSite 20130508
TrendMicro-HouseCall TROJ_GEN.F47V0505 20130508
Kaspersky HEUR:Trojan-Spy.AndroidOS.Perkel.a 20130508
F-Prot AndroidOS/Perkel.A 20130508
Commtouch AndroidOS/Perkel.A 20130508
Avast Android:FkSite-A [Trj] 20130508
Fortinet Android/Agent.KU!tr 20130508
Emsisoft Android.Trojan.FakeSite.A (B) 20130508
MicroWorld-eScan Android.Trojan.FakeSite.A 20130508
BitDefender Android.Trojan.FakeSite.A 20130508
GData Android.Trojan.FakeSite.A 20130508
DrWeb Android.SmsSpy.20.origin 20130508
Sophos Andr/FkSite-A 20130508
ESET-NOD32 a variant of Android/TrojanSMS.Agent.KU 20130507



 The studied DEX file makes use of API reflection
 Permissions that allow the application to manipulate SMS
 Permissions that allow the application to perform payments
 Permissions that allow the application to access private information
 Other permissions that could be considered as dangerous in certain scenarios
 Required permissions
android.permission.SEND_SMS (send SMS messages)
android.permission.WRITE_EXTERNAL_STORAGE (modify/delete SD card contents)
android.permission.RECEIVE_SMS (receive SMS)
 Permission-related API calls
ACCESS_NETWORK_STATE
Landroid/net/ConnectivityManager;->getNetworkInfo(I)Landroid/net/NetworkInfo; called from Landroid/support/v4/net/ConnectivityManagerCompat;->getNetworkInfoFromBroadcast(Landroid/net/ConnectivityManager; Landroid/content/Intent;)Landroid/net/NetworkInfo;
Landroid/net/ConnectivityManager;->getActiveNetworkInfo()Landroid/net/NetworkInfo; called from Landroid/support/v4/net/ConnectivityManagerCompatGingerbread;->isActiveNetworkMetered(Landroid/net/ConnectivityManager;)Z
Landroid/net/ConnectivityManager;->getActiveNetworkInfo()Landroid/net/NetworkInfo; called from Landroid/support/v4/net/ConnectivityManagerCompatHoneycombMR2;->isActiveNetworkMetered(Landroid/net/ConnectivityManager;)Z
SEND_SMS
Landroid/telephony/SmsManager;->getDefault()Landroid/telephony/SmsManager; called from Lcom/fake/site/StartActivity;->onCreate(Landroid/os/Bundle;)V
Landroid/telephony/SmsManager;->sendTextMessage(Ljava/lang/String; Ljava/lang/String; Ljava/lang/String; Landroid/app/PendingIntent; Landroid/app/PendingIntent;)V called from Lcom/fake/site/StartActivity;->onCreate(Landroid/os/Bundle;)V
Landroid/telephony/SmsManager;->getDefault()Landroid/telephony/SmsManager; called from Lcom/fake/site/sms/Sms;->sendSms(Ljava/lang/String;)V
VIBRATE
 Main Activity
com.fake.site.StartActivity
 Activities
com.fake.site.StartActivity
 Receivers
com.fake.site.MessageReceiver
 Activity-related intent filters
com.fake.site.StartActivity
actions: android.intent.action.MAIN
categories: android.intent.category.LAUNCHER
 Receiver-related intent filters
com.fake.site.MessageReceiver
actions: android.provider.Telephony.SMS_RECEIVED
 Code-related observations
The application does not load any code dynamically
The application contains reflection code
The application does not contain native code
The application does not contain cryptographic code
 Application certificate information

 Application bundle files
AndroidManifest.xml
Android's binary XML
META-INF/CERT.RSA
data
META-INF/CERT.SF
ASCII text, with CRLF line terminators
META-INF/MANIFEST.MF
ASCII text, with CRLF line terminators


 Interesting calls
Calls APIs that manage SMS operations such as sending data, text, and pdu SMS messages.
 SMS sent
Destination number: +3
Ya TuT :)       ---- this translates as "I am here" (mila)


No comments:

Post a Comment