A set of malicious gaming applications for Android available on the Google Play Store employ obfuscation at multiple levels and antiemulation techniques to avoid detection.
There are six malicious apps in total. They all advertise a different mod for Minecraft, the popular sandbox video game.
A developer with the account name "ValerySoftware" published the apps, each of which has been downloaded up to 500 times. That means as many as 3,000 users might be affected by the applications.
Not surprisingly, the applications don't do anything they say they will. After requesting administrative privileges, they simply load up a couple of HTML resources.
The apps then initiate a series a commands that allow them to download APK files from external sources, leak sensitive information, and (like Android.Spy.305.origin) display or silent access advertisements.
Each app is determined to carry out its malicious activities, which is reflected in its efforts to avoid detection.
Fernando Ruiz, a mobile malware researcher at Intel Security, explains:
"The payload is obfuscated at many levels with a packer, an executable and linkable format (ELF) binary crafted to decrypt the malicious code from a file stored in the asset directory of the APK. The name of the assets.dat files, binary ELF, and classes related to the malware functionality are random to avoid detection. The strings are obfuscated inside the ELF binary and the encrypted malicious .dex files."
Each app also comes equipped with antiemulation techniques that allow it to remain under the radar of automated dynamic test environments.
Given the domain information found in the malware, Ruiz and his fellow mobile malware researchers have attributed the apps to a group of European computer criminals who distribute and host malware.
That's not even the worst part. At this time, all six applications are still available for download on the Google Play Store.
Bad actors will always try to use well known brands like Minecraft to push malicious programs onto unsuspecting users. To protect themselves against that persistent threat, users should always look at an app's reviews, review the list of permissions, and research an application developer who might seem suspicious.
Post a Comment Community Rules
You need to login in order to post a comment
Not a member yet? Register Now