Android malware

A previously unknown Android malware has been linked to the Turla hacking group after discovering the app used infrastructure previously attributed to the threat actors.

Turla is a Russian state-supported hacking group known for using custom malware to target European and American systems, primarily for espionage.

The threat actors have recently been linked to the Sunburst backdoor used in the SolarWinds supply-chain attack in December 2020.

Turla Android spyware?

Researchers from Lab52 identified a malicious APK [VirusTotal] named “Process Manager” that acts as Android spyware, uploading information to the threat actors.

While it is not clear how the spyware is distributed, once installed, Process Manager attempts to hide on an Android device using a gear-shaped icon, pretending to be a system component.

Upon its first launch, the app prompts the user to allow it to use the following 18 permissions:

  • Access coarse location
  • Access fine location
  • Access network state
  • Access WiFi state
  • Camera
  • Foreground service
  • Internet
  • Modify audio settings
  • Read call log
  • Read contacts
  • Read external storage
  • Write external storage
  • Read phone state
  • Read SMS
  • Receive boot completed
  • Record audio
  • Send SMS
  • Wake log

These permissions are a serious risk to privacy as it allows the app to get a device’s location, send and read texts, access storage, take pictures with the camera, and record audio.

It is unclear if the malware abuses the Android Accessibility service to grant itself permissions or if it’s tricking the user into approving a request.

After receiving the permissions, the spyware removes its icon and runs in the background with only a permanent notification indicating its presence.

The permanent notification posing as a system service
The permanent notification posing as a system service
(Lab52)

This aspect is quite strange for spyware that should usually strive to remain hidden from the victim, especially if this is the work of a sophisticated APT (advanced persistent threat) group.

The information collected by the device, including lists, logs, SMS, recordings, and event notifications, are sent in JSON format to the command and control server at 82.146.35[.]240.

Sending the stolen data to the C2
Establishing C2 connection to send the stolen data (Lab52)

The method of distribution for the APK is unknown, but if it is Turla,  they commonly use social engineering, phishing, watering hole attacks, etc., so it could be anything.

Strange case of abuse for profit

While researching the app, the Lab52 team also found that it downloads additional payloads to the device and found a case of an app fetched directly from the Play Store.

The app is named “Roz Dhan: Earn Wallet cash,” and it’s a popular (10,000,000 downloads) app featuring a money-generating referral system.

Abused application on the Play Store
Abused application on the Play Store

The spyware reportedly downloads the APK via the app’s referral system, likely to earn a commission, which is somewhat strange given that the particular actor is focused on cyber espionage.

This, in addition to the seemingly unsophisticated implementation of the Android spyware, leads us to believe that the C2 analyzed by Lab52 may be part of a shared infrastructure.

State actors are known for following this tactic, even if rarely, as it helps them obscure their trace and confuse analysts.

Keep malware out

Users of Android devices are advised to review the app permissions they have granted, which should be fairly easy on versions from Android 10 and later, and revoke those that appear overly risky.

Also, starting from Android 12, the OS pushes indications when the camera or microphone is active, so if these appear orphaned, spyware is hiding in your device.

These tools are particularly dangerous when nesting inside IoTs that run older Android versions, generating money for their remote operators for prolonged periods without anyone realizing the compromise.

Source: www.bleepingcomputer.com