Research: Baidu Security Labs http://blog.csdn.net/androidsecurity/article/details/18816557
Sample Credit: Tom:Pan
Size: 203000
MD5: CCC01FD6D875B95E2AF5F270AAF8E842
Download. Email me if you need the password.
C:\Program Files\Capture\logs\deleted_files\C\WINDOWS\CrainingApkConfig\DWORD.sn
C:\WINDOWS\system32\flashmx32.xtl
C:\WINDOWS\CrainingApkConfig\down.log
C:\WINDOWS\CrainingApkConfig\iconfig.txt
C:\WINDOWS\CrainingApkConfig\您正在搜索的页面可能已经删除、更名或暂时不可用。(translates: The page you are looking for might have been removed, renamed or is temporarily unavailable.)
GET /iconfig.txt HTTP/1.1User-Agent: Mozilla/4.0 (compatible)Host: xia2.dyndns-web.comCache-Control: no-cache
HTTP/1.1 404 Not FoundContent-Length: 1308Content-Type: text/htmlServer: Microsoft-IIS/6.0X-Powered-By: ASP.NETDate: Tue, 28 Jan 2014 12:55:25 GMT
xia2.dyndns-web.com
WHOIS Source: APNIC
IP Address: 103.242.134.136Country: Hong Kong
Network Name: HJEATC-CN
Owner Name: No.9-F, CaiFuDaSha, No.396 Heping Road
From IP: 103.242.132.0
To IP: 103.242.135.255
Allocated: Yes
Contact Name: Hebei Jiateng Electronics and Technology CoLtd
Address: No.9-F, CaiFuDaSha, No.396 Heping Road, Hanshan District, Handan Hebei 056001
Email: abuse@hostshare.cn
Abuse Email: abuse@hostshare.cn
Phone: +86 18973306525
Fax: +86 18973306525
“imei_chk” is the main executable file under /sbin;
“_bootinfo” is the /sbin/.bootinfo config file which is needed for imei_chk’s running;
“GoogleKernel.apk" and “libgooglekernel.so” are two files dropped by the imei_chk;
“com.qq.assistant.apk” is the first variant, while “com.android.googledalvik.apk” is the second variant.
By manually adding imei_chk and .bootinfo to the /sbin directory in boot partition and modify init.rc, analyst could restore the whole attack.