In these days of particular sacrifices due to the spread of the COVID-19 pandemic, cyber criminals do not seem to save anyone and on the contrary, taking advantage of the emotional involvement that many people have towards this topic, they have continued and in many cases increased their hostile activities not only against normal users but also towards the health and pharmaceutical research sector.
In the late evening of yesterday, within the COVID-19 CTI League, a group of about 400 experts gathered together to combat cyber threats related to the exploit of Covid-19 themed campaigns, a potentially malicious application emerged aimed at Italian users. A few moments later the same malicious application was also reported by Twitter users malwarehunterteam and ESET Research.
Indeed, to deal with the coronavirus emergency, several organizations and enterprises in the biotech sector have released different tools to help track and estimate the number of the COVID-19 positive people. One of these tools is “SMCovid19”. It’s an Android app developed by SoftMining, a company from South Italy specialized in pharmaceutical research. The app allows the user to report his symptoms and to consult useful information and statistics about the CoronaVirus spread. The app was directly downloadable as APK package from SoftMining official website. The following is an image showing it at first run:
Exploiting the importance of this app in the current emergency scenario, criminals have repackaged the software with malicious code to spying and obtain information from unaware users. Telsy TRT have pivoted into five different versions of the trojanized app that share the same code with different classes names and command-and-control servers.
Comparing the Manifest file of the legit one, the first suspicious indicator we can see is the list of the permissions requested by the application. As visible in the following figure, in the injected version the attacker inserted many permission requests which have little to do with the app purpose, such as “READ_CALL_LOG” and “READ_SMS”.
During the manipulation, some vendor-related permissions are also removed (i.e. “OPPO_COMPONENT_SAFE”), as illustrated in the yellow rows of the image above.
From the manifest comparison, it’s possible to extract also some components that are included only in the modified version, such as a receiver named “Bamhv” (the name changes in the other versions of the malicious app) and a service named “Dgmhk”, belonging to the same package of the receiver.
This package seems to be the only added to the package list of the legit app, as shown in the following figure:
Inspecting the added code to understand the functionalities embedded by cyber criminals, we can observe that the receiver, when triggered, is used only to start the service which in turn invokes the main contained in the class “Xpkde”. This class seems to be the core of the malicious package.
Indeed, it statically declares a huge array which is subsequently used by the various methods. Taking a look to the bytes inserted into this array, it is possible to extract the address of the command and control, in this case “tcp://184.108.40.206:24079”.
The code uses a TCP socket to interact with its server. As visible in the following snippet, the malware supports also HTTP/HTTPS connection, indicating the code does not change depending on protocol used by the server. After retrieved the server response and created the “DataInputStream” object, the method “a()” is invoked, passing the object as parameter.
Viewing the following code snippet, it is easy to understand the purpose of this last method. Starting from the object received, it is able to load and run a new class from a file “.class” or a “.dex” one.
In all versions under analysis, the package don’t seem to have other classes or functionalities. So, any other capability is added at runtime depending on what the attackers want his creation do.
Indicators of Compromise
For more related articles, check our blog.