{"id":9463,"date":"2013-01-22T00:00:17","date_gmt":"2013-01-22T07:00:17","guid":{"rendered":"http:\/\/blog.webroot.com\/?p=9463"},"modified":"2018-10-05T16:11:56","modified_gmt":"2018-10-05T22:11:56","slug":"android-malware-spreads-through-compromised-legitimate-web-sites","status":"publish","type":"post","link":"https://www.webroot.com/blog/2013\/01\/22\/android-malware-spreads-through-compromised-legitimate-web-sites\/","title":{"rendered":"Android malware spreads through compromised legitimate Web sites"},"content":{"rendered":"<p>Over the past 24 hours, our sensor networks picked up an interesting website infection affecting a popular Bulgarian website for branded watches, which ultimately\u00a0redirects and downloads premium rate SMS Android malware on the\u00a0visiting user\u00a0devices.\u00a0The affected Bulgarian website is only the tip of the iceberg, based\u00a0on the diversified portfolio of malicious domains known to have been launched by the same party that launched the original campaign.<\/p>\n<p>More details:<\/p>\n<p><!--more--><\/p>\n<p><strong>Sample screenshot of the executed Android malware:<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/android_malware_fake_adobe_flash_player_fake_android_browser_fake_google_play_applications.png\"><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-9465\" src=\"http:\/\/webrootblog.files.wordpress.com\/2013\/01\/android_malware_fake_adobe_flash_player_fake_android_browser_fake_google_play_applications.png\" alt=\"Android_Malware_Fake_Adobe_Flash_Player_Fake_Android_Browser_Fake_Google_Play_Applications\" width=\"288\" height=\"480\" \/><\/a><\/p>\n<p>The first variation of the campaign attempts to trick Russian-speaking users into installing a fake version of Adobe&#8217;s Flash Player, followed by a second campaign using a\u00a0fake Android browser as a social engineering theme, and a third campaign which is attempting to trick mobile users into thinking that it&#8217;s a new version of Google Play.<\/p>\n<p><strong>Sample malicious URLs displayed to Android users:<\/strong><br \/>\n<em>hxxp:\/\/adobeflashplayer-up.ru\/?a=RANDOM_CHARACTERS<\/em> &#8211; 93.170.107.184<br \/>\n<em>hxxp:\/\/googleplaynew.ru\/?a=RANDOM_CHARACTERS<\/em> &#8211; 93.170.107.184<br \/>\n<em>hxp:\/\/browsernew-update.ru\/?a=RANDOM_CHARACTERS<\/em> &#8211; 93.170.107.184<\/p>\n<p><strong>Responding to the same IP (93.170.107.184) are also the following domains part of the campaign&#8217;s infrastructure:<\/strong><br \/>\n<em>flashupdate.org<\/em><br \/>\n<em>mobiserver-russia.com<\/em><br \/>\n<em>flash-news-systems1.net<\/em><br \/>\n<em>bruser-2012.net<\/em><br \/>\n<em>erovideo2.net<\/em><br \/>\n<em>file-send09.net<\/em><br \/>\n<em>tankonoid.net<\/em><br \/>\n<em>oneiclick.net<\/em><br \/>\n<em>free3porn.net<\/em><br \/>\n<em>nashe9porevo.net<\/em><br \/>\n<em>filemoozo.net<\/em><br \/>\n<em>flashupdates.net<\/em><br \/>\n<em>yandexfilyes.net<\/em><br \/>\n<em>erovidoos.net<\/em><br \/>\n<em>yandexfiloys.net<\/em><br \/>\n<em>anindord-market.net<\/em><br \/>\n<em>api-md-new.net<\/em><br \/>\n<em>girlsexx.net<\/em><br \/>\n<em>1jan-unilo55.ru<\/em><br \/>\n<em>officemb56.ru<\/em><br \/>\n<em>brwsrupdate.ru<\/em><br \/>\n<em>android-mk.ru<\/em><br \/>\n<em>android-gt.ru<\/em><\/p>\n<p><strong>Detection rate for the malicious .apk files:<\/strong><br \/>\n<em>flash_player_installer.apk<\/em> &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/2076cb718edae12fa641a6b28cc53aee8d9d495518836bcc24e8e8bd1172f892\/analysis\/1358799096\/\"><strong>MD5: 29e8db2c055574e26fd0b47859e78c0e<\/strong><\/a> &#8211; detected by 5 out of 46 antivirus scanners as Android.SmsSend.212.origin.<br \/>\n<em>Android_installer-1.apk<\/em> &#8211; <a href=\"https:\/\/www.virustotal.com\/file\/68991103bd0eb8594f528065fe93c1388de864da3f0e08d358eb7276f28d4f7d\/analysis\/1358799258\/\"><strong>MD5: e6be5815a05c309a81236d82fec631c8<\/strong><\/a> &#8211; detected by 5 out of 46 antivirus scanners as HEUR:Trojan-SMS.AndroidOS.Opfake.bo.<\/p>\n<p><strong>Required\u00a0permissions\u00a0for flash_player_installer.apk:<\/strong><br \/>\n<em>android.permission.ACCESS_NETWORK_STATE<\/em><br \/>\n<em>android.permission.CHANGE_NETWORK_STATE<\/em><br \/>\n<em>com.android.launcher.permission.INSTALL_SHORTCUT<\/em><br \/>\n<em>com.android.launcher.permission.UNINSTALL_SHORTCUT<\/em><br \/>\n<em>android.permission.ACCESS_NETWORK_STATE<\/em><br \/>\n<em>android.permission.RECEIVE_BOOT_COMPLETED<\/em><br \/>\n<em>com.android.alarm.permission.SET_ALARM<\/em><br \/>\n<em>android.permission.SYSTEM_ALERT_WINDOW<\/em><br \/>\n<em>android.permission.WRITE_SETTINGS<\/em><br \/>\n<em>android.permission.WRITE_SECURE_SETTINGS<\/em><br \/>\n<em>android.permission.ACCESS_WIFI_STATE<\/em><br \/>\n<em>android.permission.UPDATE_DEVICE_STATS<\/em><br \/>\n<em>android.permission.CHANGE_WIFI_STATE<\/em><br \/>\n<em>android.permission.WRITE_EXTERNAL_STORAGE<\/em><br \/>\n<em>android.permission.INTERNET<\/em><br \/>\n<em>android.permission.READ_PHONE_STATE<\/em><br \/>\n<em>android.permission.READ_SMS<\/em><br \/>\n<em>android.permission.SEND_SMS<\/em><br \/>\n<em>android.permission.RECEIVE_SMS<\/em><br \/>\n<em>android.permission.READ_CONTACTS<\/em><br \/>\n<em>android.permission.DELETE_PACKAGES<\/em><br \/>\n<em>android.permission.GET_PACKAGE_SIZE<\/em><br \/>\n<em>android.permission.INSTALL_PACKAGES<\/em><br \/>\n<em>android.permission.MANAGE_APP_TOKENS<\/em><br \/>\n<em>android.permission.PERSISTENT_ACTIVITY<\/em><br \/>\n<em>android.permission.GET_ACCOUNTS<\/em><br \/>\n<em>android.permission.WAKE_LOCK<\/em><br \/>\n<em>android.permission.WAKE_LOCK<\/em><\/p>\n<p><strong>Used the following features once executed:<\/strong><br \/>\n<em>android.hardware.wifi<\/em><br \/>\n<em>android.hardware.telephony<\/em><br \/>\n<em>android.hardware.touchscreen<\/em><br \/>\n<em>android.hardware.screen.portrait<\/em><\/p>\n<p>Upon execution, the Android sample phones back to <strong>gaga01.net\/rq.php<\/strong> &#8211; 93.170.107.57 &#8211; Email: mypiupiu1@gmail.com\u00a0transmitting the following information back to the cybercriminals behind the operation:\u00a0<strong>oard=unknown;brand=generic;device=generic;imei=CENSORED;imsi=CENSORED;session_id=1;operator=XXX;sms0=CENSORED;sms1=CENSORED;sms2=CENSORED;time=CENSORED;timezone=CENSORED<\/strong><\/p>\n<p><strong>Required permissions for Android_installer-1.apk:<\/strong><br \/>\n<em>android.permission.ACCESS_NETWORK_STATE<\/em><br \/>\n<em>android.permission.CHANGE_NETWORK_STATE<\/em><br \/>\n<em>com.android.launcher.permission.INSTALL_SHORTCUT<\/em><br \/>\n<em>com.android.launcher.permission.UNINSTALL_SHORTCUT<\/em><br \/>\n<em>android.permission.ACCESS_NETWORK_STATE<\/em><br \/>\n<em>android.permission.RECEIVE_BOOT_COMPLETED<\/em><br \/>\n<em>com.android.alarm.permission.SET_ALARM<\/em><br \/>\n<em>android.permission.SYSTEM_ALERT_WINDOW<\/em><\/p>\n<p><strong>Used the following features once executed:<\/strong><br \/>\n<em>android.hardware.wifi<\/em><br \/>\n<em>android.hardware.telephony<\/em><br \/>\n<em>android.hardware.touchscreen<\/em><br \/>\n<em>android.hardware.screen.portrait<\/em><\/p>\n<p>It also connects back to <strong>gaga01.net\/rq.php<\/strong> &#8211; 93.170.107.57 &#8211; Email: mypiupiu1@gmail.com\u00a0transmitting the following information back to the cybercriminals behind the operation:\u00a0<strong><em id=\"__mceDel\">oard=unknown;brand=generic;device=generic;imei=CENSORED;imsi=CENSORED;session_id=1;operator=XXX;sms0=CENSORED;sms1=CENSORED;sms2=CENSORED;time=CENSORED;timezone=CENSOR<\/em><em id=\"__mceDel\"><\/em><em id=\"__mceDel\"><\/em><em id=\"__mceDel\">ED<\/em><\/strong><\/p>\n<p>Android users of <a href=\"https:\/\/www.webroot.com\/us\/en\/home\/products\/mobile\"><strong>Webroot&#8217;s mobile products<\/strong><\/a> are proactively protected from this threat.<\/p>\n<p><em>You can find more about Dancho Danchev at his\u00a0<a href=\"http:\/\/linkedin.com\/in\/danchodanchev\"><strong>LinkedIn Profile<\/strong><\/a>. You can also\u00a0<a href=\"http:\/\/www.twitter.com\/danchodanchev\"><strong>follow him on \u00a0Twitter<\/strong><\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the past 24 hours, our sensor networks picked up an interesting website infection affecting a popular Bulgarian website for branded watches, which ultimately\u00a0redirects and downloads premium rate SMS Android malware on the\u00a0visiting user\u00a0devices.\u00a0The affected Bulgarian website is only the tip of the iceberg, based\u00a0on the diversified portfolio of malicious domains known to have been [&hellip;]<\/p>\n","protected":false},"author":65,"featured_media":17051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[3005],"tags":[],"yst_prominent_words":[4037,5707,5701,13059,13053,13073,13063,9119,8697,3871,13067,13061,13055,13065,13075,13057,13071,13077,13079,13069],"acf":[],"_links":{"self":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9463"}],"collection":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/users\/65"}],"replies":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/comments?post=9463"}],"version-history":[{"count":2,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9463\/revisions"}],"predecessor-version":[{"id":26117,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/posts\/9463\/revisions\/26117"}],"wp:featuredmedia":[{"embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media\/17051"}],"wp:attachment":[{"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/media?parent=9463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/categories?post=9463"},{"taxonomy":"post_tag","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/tags?post=9463"},{"taxonomy":"yst_prominent_words","embeddable":true,"href":"https://www.webroot.com/blog/wp-json\/wp\/v2\/yst_prominent_words?post=9463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}