Zscalerのブログ

Zscalerの最新ブログ情報を受信

購読する
Super Mario Run Malware #2 – DroidJack RAT
Security Research

Super Mario Run Malware #2 – DroidJack RAT

image
VIRAL GANDHI
January 12, 2017 - 2 分で読了

A few days back, we wrote about an Android Marcher trojan variant posing as the Super Mario Run game for Android. We have found another instance of malware posing as the Super Mario Run Android app, and this time it has taken the form of DroidJack RAT (remote access trojan). Proofpoint wrote about the DroidJack RAT side-loaded with the Pokemon GO app back in July 2016; the difference here is that there is no game included in the malicious package. The authors are trying to latch onto the popularity of the Super Mario Run game to target eagerly waiting Android users.

Details:

Technical Analysis:

The malicious package claims to be the Super Mario Run game, as shown in the permissions screenshot below, but in reality this is a malicious RAT called DroidJack (also known as SandroRAT) that is getting installed.  

Image

Figure 1: Permissions.

Once installed, the RAT registers the infected device as shown below.

Image

Figure 2: Infected device registration.

DroidJack RAT starts capturing sensitive information like call data, SMS data, videos, photos, etc. Observe below the code routine for call recording. 

Image

Figure 3: Call recording.

This RAT records all the calls and stores the recording to an “.amr” file.

The following is the code routine for video capturing.

Image

Figure 4: Video capturing.

Here, the RAT stores all the captured videos in a “video.3gp” file.

It also harvests call details and SMS logs as shown below.

Image

Figure 5: SMS Logs

Image
Figure 6: Call logs.

Upon further inspection, we have observed that this RAT extracts WhatsApp data too.

Image

Figure 7:Whatsapp data.

The RAT stores all the data in a database (DB) in order to send it to the Command & Control (C&C) server. The following are the DBs created and maintained by the RAT.

Image

Figure 8: Databases.

We saw the following hardcoded C&C server location in the RAT package:

Image

Figure 9: Hardcoded C&C.

Conclusion:

The DroidJack RAT is another example of a growing trend in which malware authors seek to exploit public interest as a way to spread malware. In this case, like others before, the event of a popular game release became an opportunity to trick unsuspecting users into downloading the RAT. As a reminder, it is always a good practice to download apps only from trusted app stores such as Google Play. This practice can be enforced by unchecking the "Unknown Sources" option under the "Security" settings of your device.

Zscaler ThreatLabZ is actively monitoring this malware to ensure that Zscaler customers are protected from infection.

form submtited
お読みいただきありがとうございました

このブログは役に立ちましたか?

免責事項:このブログは、Zscalerが情報提供のみを目的として作成したものであり、「現状のまま」提供されています。記載された内容の正確性、完全性、信頼性については一切保証されません。Zscalerは、ブログ内の情報の誤りや欠如、またはその情報に基づいて行われるいかなる行為に関して一切の責任を負いません。また、ブログ内でリンクされているサードパーティーのWebサイトおよびリソースは、利便性のみを目的として提供されており、その内容や運用についても一切の責任を負いません。すべての内容は予告なく変更される場合があります。このブログにアクセスすることで、これらの条件に同意し、情報の確認および使用は自己責任で行うことを理解したものとみなされます。

Zscalerの最新ブログ情報を受信

このフォームを送信することで、Zscalerのプライバシー ポリシーに同意したものとみなされます。