Clicky

Tuesday, December 25, 2012

Trojan.Rus.SMS."SystemSecurity" - Toll Fraud / ConnectSMS


Santa, aka DarkK3y, brought a new present.
Please read the malware report below. If you have any comments for the author, please email me and I will send him or get him to contact you.




Download. Email me if you need the password. 
Sample and Research credit: DarkK3y




DarkK3y / dark_k3y
Trojan.Rus.SMS."SystemSecurity"  

=== Summary of the analysis ===

This malware sample was recieved by SMS message with some web link inside. Malware seems to be Toll Fraud malware (according to Lookout Mobile Security classification). Middle-user inter-action required to infect mobile device -- user need to click link and install apk-file downloaded from it. The installation package requires many security permissions to run (see Characteristics section). After installation, "System Service" (com.android.systemsecurity) appears on the device. It loads on boot and make hooks on sms receiver service (with the greatest priority). Also, it uses alarm service to schedule periodic (3 mins and more) runs. Each run (except first) the SMS to the payed service sent. On the first run, information about payed service (SMS number and code) and sms filter (which SMS should be dropped and don't be showed to user) is downloaded from CnC server; OS information, IMEI, IMSI and user contact list is uploaded to CnC server. Possibly, the user contact list phone numbers are used by cnc server for further malware spread, by sending sms'es to them. Currently, malware seems to be undetectable by Norton Mobile Antivirus and some other antimalware mobile tools. It is only detected by heuristic scan methods (possibly, because of requiring too much security priviliges).

Monday, December 24, 2012

Merry Christmas and Happy New Year!



More presents to come, pa rum pum pum pum
    rum pum pum pum, rum pum pum pum

Sunday, December 23, 2012

Android.Tascudap - DDoS trojan


File: apk.apk
Size: 124568
MD5:  3CC7597A183B9A2C91127D18A04A2B26

Research Symantec : Android.Tascudap

Symantec - Android.Tascudap is a Trojan horse for Android devices that uses the compromised device in denial of service attacks.

Email me if you need the password



Monday, December 17, 2012

Sunday, December 16, 2012

Android Carberp


December 2012

File: alfasafe.apk
Size: 270797
MD5:  07D2EE88083F41482A859CD222EC7B76


File: sber.apk
Size: 225905
MD5:  F27D43DFEEDFFAC2EC7E4A069B3C9516




File: vksafe.apk
Size: 226368
MD5:  117D41E18CB3813E48DB8289A40E5350


Sample credit: Pau Oliva Fora

Download. Email me if you need the password scheme


Tuesday, November 13, 2012

Android Uranico - infostealer

Android Enesoluty - Fake Antivirus, Spyware

September 2012

5DD6C326114BAB3A1D253200C2F897A1
SafeSearchActivity


FCA3D59B8F4A982E66DDD585737E3C48
SecureVirusScan




Research: Fake Antivirus App Steals Contact Data on Mobile Devices. Symantec

Download. Password as on contagio. Email me if you need the password

Android Sun Charger - Sumzand, spam sender

September 2012

Research: Sun Charger, the Latest Android.Sumzand Variant, Continues the Massive Spam Campaign, Symantec
Sample credit: Anonymous

File: schgg.apk
Size: 100930
MD5:  60673A78686A6D0FAF2DC9545EB841CC




Android Fakeguard

October 2012

Research: Android FakeGuard - Symantec
Sample credit: Sanjay

The Trojan may arrive as a package with the following characteristics: 

Package name: com.stech.stopphishing 
APK: 
  • com.stech.stopphishing.apk
  • com.stech.spamguard.apk
  • com.stech.stopphishing.apk

File: com.stech.spamguard-6.apk
Size: 210418
MD5:  74089D836A3D6768F766A85422819D21



Download. Same password scheme as contagio. Email me if you need the password.



File: com.cn.smsclient-8.apk
Size: 210430
MD5:  12CBEDC185D82C61150D8C9EE38A9FCB



Download. Same password scheme as contagio. Email me if you need the password.




Friday, October 19, 2012

Thursday, October 18, 2012

Android FinFisher / FinSpy



Size: 144688
MD5:  F59087BFA5A0211AA75C4BE2AF9DEE10


Size: 142822
MD5:  08CFFA8F55BE4BBED2704395876B618F

News:
http://en.wikipedia.org/wiki/FinFisher
http://www.ic3.gov/media/2012/121012.aspx

These are not really new - date back to September. Why they chose this + Loozfon (that is not spread in USA) but not more common types is beyond me.



Download (email me if you need the password) (new link)





Wednesday, October 17, 2012

Android Rogue Bad Piggies Versions -ANDROIDOS_FAKEINST.A

Research:  Malicious Developers Release Rogue Bad Piggies Versions
Files


  1. File: bad_piggies_android_0_installer.apk Size: 304822 MD5: 05DF6D050B84C090E4FCA42791B3BE37 << same is in the article
  2. File: bad_piggies_install (1).apk Size: 3415303 MD5:  83BF06A3CC73D395042A8743C74CB7BF
  3. File: Bad_Piggies_install.apk Size: 201591 MD5:  650D101AC283747DE25B8B32A089EFA6
  4. File: badpiggies_install.apk Size: 297118 MD5:  B16E47F11A0D980DD5F5EB4C32CC6C82





Download the files above (email me if you need the password)
http://contagio.deependresearch.org/files/Mobile/badpiggies-fakeapp_ANDROIDOS_FAKEINSTa.zip



Thursday, September 27, 2012

10 samples of SMSZombie Android SMS Trojan




45099416acd51a4517bd8f6fb994ee0bb9408bdd80dd906183a3cdb4b39c4791.apk            098c9874ca14b2544846b24ab8cea204
5f0dbf2b42bf9f400ea4cc81030de3eacd676e54b671a524259a5ceff938e210.apk            4084939a0864b645f6c6a915586fb1ab
576639b9c12143e558a4ff8866d6b0e1370c0705cf8701dfc296b497a4de20c7.apk            40f3f16742cd8ac8598bf859a23ac290
c9bb707b78a714771ade4c1b4adb1cab8e4e16915f0a022e3f742eba93c3334c.apk            4d13d1bc63026b9c26c7cd4946b1bae0
741684cfcbc861b076bd7561be29f8bd3f1814b9049034a0412601f786f0f0f0.apk            9f972dbe36d4ce709aa21c291d632d31
72f9752c809d8cd12da34b20f202cdf578c338ec956491cb7b5f18c6d4cbc250.apk            a31245022c60fc50b81f7ffc4f4967b2
f391cc4ea5961d649bc62a0466560dc76eaebcf26f0c8452c671c2d2b34361b8.apk            a354baf35efcc57752db8bd6ee7f6115
b48be6fec1c25afcf274c9f8c6ac038015f2b04c87a9b8da6519ee3510ef30a2.apk            b6cacc0cf7bad179d6bde68f5c013e6e
319a962f486080b4a7dbe1896a4f1a345d86c5644ebedb8f28ab2b737cf9deeb.apk            c71740ee94467ae70a71265116d54186
eb84256836a99417b13159ad285430bc879eb52fd755d90caec766b17793a265.apk            cafffdee7479a8816f4551ac8c3a0178

Sample credit Pau Oliva Fora

Download (email me if you need the password / use the contagio password scheme)


Fakelash - Android SMS trojan




Research Android malware distributed by malicious SMS in France


File: FlashPlayer.apk
Size: 2620250
MD5:  BE615D9730C1BBEBF73B2205F7B7D51B


File: flashnew.apk
Size: 2744902
MD5:  7DEC1C9174D0F688667F6C34C0FA66C2

Download (email me if you need the password / use the contagio password scheme)


Thursday, September 13, 2012

Android SimpleTemai - Fraud | Downloader Trojan


Research: Lookout: Security Alert: SimpleTemai
Sample credit: Tim Strazzere


File: com.polarbit.rthunderliteok-SiMPLETEMAi.apk
Size: 3386440
MD5:  DF4403B78CFFA505FDCB309CCF0D0E21


Download
https://contagiomobile.deependresearch.org/files/com.polarbit.rthunderliteok-SiMPLETEMAi.zip
(the password scheme is now the same as contagiodump.blogspot.com scheme, email me if you need, email address is in the profile)


Android Spyware samples


File: power_battery.apk
Size: 560429
MD5:  7ECB7A1FA96E18B85ED10D83537CFD3C


File: smartphone5-1.apk
Size: 285814
MD5:  6BAE149BC65576831AC635A23938BE36

Sample credit: Tushar Verma

Download
http://contagiomobile.deependresearch.org/files/6BAE149BC65576831AC635A23938BE36_smartphone5-1.zip
http://contagiomobile.deependresearch.org/files/7ECB7A1FA96E18B85ED10D83537CFD3C_power_battery.zip

 (the password scheme is now the same as contagiodump.blogspot.com scheme, email me if you need, email address is in the profile)


Thursday, September 6, 2012

Contagio mobile file downloads are not available indefinitely (thanks to Mediafire and LeakID ideas about copyright)

Things are better now
See the last and final update on the main page.
http://contagiodump.blogspot.com/2012/09/contagio-file-downloads-are-not.html

I want to thank everyone who offered support, offered help with legal and hosting, and made public posts about it. I truly appreciate, it helped me sort it out.

Wednesday, September 5, 2012

Plankton related adware samples / Airpush


 
Research  Trend Micro -  More Adware and PLANKTON Variants Seen in App Stores

    0503B2F6C1349F7E1CD7E8B6BF17AC46
    11A7767BFE4926458EC84385214B82C9
    1485F498084F963801ED76013749C9FA
    4A300481411AB1992467959491DF412C
    4B7450406A38B522E69DE1426604BF7F
    5A1FD697C3ECD3D050B3D88D8A8649A1
    66C6A88DF66F0C2CF9194C13809FE05A
    67D85DFE26CDA45402CDAC3456D8A863
    7220C948659F9990040C9C20D5FD04EF
    8C7C8231DF0D799B12274B8B39C882B8
    8D52070201F2A81FB1298E133D74057C
    99E42DFA2C847FF0511F7C442999FFAA
    A4D6033F66DA3BE83CBF80724CA013D1
    AA6655B409B647065E19758AE5D242EA
    B5BCAB6FE08C9B6229F5D053705DEE9B
    B8B434AB21D394DAA0A9A78A515BD517
    BC2EEE6F861843EA6FE5A4A14CB44372
    CFB7E66B2FB605CC94DEBD01238B4995
    DF473E3D789C63BAE99828044DA74500
    E4BE39E5955FD3BD7AC97F58E66EF3E5
    E7F0656486EEBFD9AB236451FD980BD4
    E8063DE12976D371441F15F2C5715627
    F134FC245E50F031ED8B4FAE3F1D4EB0
    F1AA24C1641471F5FBEF08AE56A53FB4
    FEE6F3AB17688600E0E15AED1489D9AE

Download (pass infected) 





Tuesday, September 4, 2012

Loozfon - Japanese Android infostealer


File: AndroidLoozfon
Size: 544646
MD5:  157985FF7FCF1CA30F5B026D1B897F1F

File: Loozfon.apk
Size: 42913
MD5:  04C9E05D0F626CC3F47DC0BC9B65A8CF

Research: Loozfon Malware Targets Female Android Users by Symantec
Sample Credit: Sanjay

Download (password infected)






Monday, August 20, 2012

MSZombie.A - Chinese SMStrojan


Research: New Virus SMSZombie.A Discovered by TrustGo Security Labs
Sample credits: Pr0Zel and Tim Strazzere (Lookout security)
Files
  • 4D13D1BC63026B9C26C7CD4946B1BAE0 com.bntsxdn.pic.apk
  • A31245022C60FC50B81F7FFC4F4967B2 com.hxmv696.pic.apk 
  • cafffdee7479a8816f4551ac8c3a0178 com.lzll.pic
  • c71740ee94467ae70a71265116d54186 com.zqbb1221.pic
  • 4084939a0864b645f6c6a915586fb1ab com.gmdcd.pic
  • b6cacc0cf7bad179d6bde68f5c013e6e com.xqxmn18.pic
  • 40f3f16742cd8ac8598bf859a23ac290 com.ldh.no1  
dropped:
  • 9F972DBE36D4CE709AA21C291D632D31 a33.jpg.apk

Download (password infected)