The AVG VirusLab was recently exploring the Chinese Android App market and encountered PC based Malware with an interesting side-effect – it was silently (without any notifications to the user) installing apps to Android devices directly connected to the PC.
With a competitive landscape of over 1.9 Million Android apps in the Google Play store alone, and more in other global marketplaces, it’s not hard to see why such tactics are appealing to developers. Advertising a new app has become increasingly difficult, and costly.
Pre-installation of apps, for example, is one of the most successful ways that developers can get attention and market share, yet it is prohibitively expensive and replies on partnerships with a limited number of handset vendors.
China’s underground black market however appears to be providing a cheaper pre-installation alternative for developers to spread their new apps – through special “alliance” operations such as ones we identified called “cyber café alliance” and “fast step union”.
These alliances offer access to a combination of groups such as hackers, distributors, cyber cafes, phishing websites, servers, etc. They are organized and operated systematically and focus on providing a sales and distribution service.
What we captured and described below, is typical of such “promoting” Trojans – malware designed to assist in the promotion or distribution of software or apps using questionable methods.
This particular malware starts by being downloaded to the computer, but its main purpose has little to do with the PC itself. Using some clever techniques, it will even “help” you install mobile device drivers if you haven’t already.
From then on, once installed on your PC, whenever you connect your mobile device to your computer it will download an “App promotion list” and install those apps silently to your device.
Download the device’s driver from the server:
The server’s response:
{ “platform”:”android”, “service”:”winusb”, “args”:””, “dl”:”http://222.186.60.89:1001/driver/Android/Google/Google64.zip”, “md5″:””, “size”:”” }
Download Adb and other components:
Download the App list:
Below is an example list:
{ "list" : [{
"dl" : "http://222.186.60.128:1501/522/TTAPKYH_ZX_AG_595_20150826_2.0.0.2.a",
"pn" : "org.funcity.runrunner.yh.zx",
"md5" : "9441ce1595fa1d9a4577263d2c30307a"
},
{
"dl" : "http://222.186.60.128:1501/522/MHLS_AG_906_20151109_1.0.0.1.a",
"pn" : "com.ltestany.catmouse",
"md5" : "21b4ba7356f93c4e206455c42a2fc275"
},
{
"dl" : "http://222.186.60.128:1501/512/BDMSN_ch_white308.a",
"pn" : "com.tunimei.p8.bai.bdmsn42",
"md5" : "f732fa12b1754caaf70822fb3dc81dfb"
},
{
"dl" : "http://222.186.60.128:1501/522/BYDR3JJB_AG_375_20150907_1.0.0.9.a",
"pn" : "com.you2game.fish.qy.zx1",
"md5" : "73411890e59a099606122e39fe01c0dc"
},
{
"dl" : "http://222.186.60.128:1501/512/qqbrowser_6.1.2.1715_22411.a",
"pn" : "com.tencent.mtt",
"md5" : "0d8cd219f36e445ef483cf42da5aaca4"
},
{
"dl" : "http://222.186.60.128:1501/522/com.qihoo.gameunion_41611.a",
"pn" : "com.qihoo.gameunion",
"md5" : "dfe5a616507560a49c16831d12b882a0"
},
{
"dl" : "http://222.186.60.128:1501/522/CFQMJS_AG_610_20150811_1.0.0.3.a",
"pn" : "com.aiwan.sniper212.zxcps.zx1",
"md5" : "8446863713d13cb047029f867167f785"
},
{
"dl" : "http://222.186.60.128:1501/512/Sogou_Explorer_1493.a",
"pn" : "sogou.mobile.explorer",
"md5" : "63e3b5c44796ac43fd3eb99d568c6525"
},
{
"dl" : "http://222.186.60.21:1501/522/xiuba-3.3.0-3262-1-TEST1.a",
"pn" : "com.xiu8.android.activity",
"md5" : "721a40131f83bee2874904fb332c8de5"
}]}
Use adb.exe to install the Apps:
Apps in the below snapshot are all installed by this malware.
We have noted that this malware is regularly updated. At the time of our research the latest version is 1.7 and this malware checks with a remote server to get the newest version each time it runs.
Query the server to check the version:
http://222.186.60.89:9023/?action=getVersion&pcid=6C78A9C3_%3CMACHINE_NAME%3E&nowVer=1.1&pid=109&subpid=&runas=exe
And the server responded with:
{ "renew" : "0", "version" : "1.7", "dl" : "http://222.186.60.128:1123/setup/appmain.v1.7.exe" }
We found this malware has been actively developed and improved for some time, and below is a record of some of the versions we have observed. It is possible this malware is developed and maintained by a stable team.
But how is this malware distributed to end users’ computers in the first place? The answer is via the alliance model we mentioned above.
In our research, we looked at two cyber café alliances named in Chinese ‘领跑吧网吧联盟 (Leading runner cyber café alliance)’ and ‘快步网盟 (Fast step net union)’ – and we captured some of their distributing servers and their client’s apps:
[File]
kuaibu8=http://4IG7UpAH.adkuai8.com:7000/iniuser/
szicoad=http://4IG7UpAH.adkuai8.com:7000/ico/
wbzzlm=http://4IG7UpAH.adkuai8.com:7000/wbzzlm/
[update]
Startupdate=yes
kuaibu8=kuaibu8
szicoad=szicoad
wbzzlm=wbzzlm
[server]
01=down01.kuaibu8.com:5505
02=down01.kuaibu8.com:5505
03=down01.kuaibu8.com:5505
04=down01.kuaibu8.com:5505
05=down01.kuaibu8.com:5505
06=down01.kuaibu8.com:5505
07=down01.kuaibu8.com:5505
08=down01.kuaibu8.com:5505
09=down01.kuaibu8.com:5505
10=down01.kuaibu8.com:5505
[dllhost]
yewu01=/updata/adclient/ie/ieadd.dll
yewu02=/updata/adclient/cpu/cpuvod.dll
yewu05=/updata/adclient/desk/tequangame.exe
yewu06=/updata/adclient/desk/desk1.exe
yewu09=/updata/adclient/pcfen/app.dll
yewu10=/updata/adclient/sohu/adpc.exe
yewu98=/updata/adclient/baidu/baidu.dll
yewu100=/updata/adclient/online/ipdong.dll
yewu101=/updata/adclient/online/letvst.exe
[yewu01]
zhuyeid=/updata/adclient/baidu/baidu.dll
daohang=/updata/adclient/baidu/baidu.dll
[MD5]
pc.dll=19F7823A7CFE41AC7391BA1C8C402D4B
ieadd.dll=B72A680F93B3EE939FD5ED7818BB28FB
cpuvod.dll=C98A50E044DE1BC9E3E0ED3B7B334231
baidu.dll=37E8DBBF71D48CE87B6D21362A4E2E69
tequangame.exe=A36BCA657DA769E928FC1F746759E66F
desk1.exe=6438B7830D7B110CDF2CDF017AC6EF69
app.dll=5E782960BB0EABB41E756E58381CB5DA
adpc.exe=ED596AB4CABE52680A97073C29BCAC6D
ipdong.dll=5C6F0FEE74493D76F6EBA01BBC741190
2345ieadd.exe=93E32D9C0D647EC2DA4E456398905947
ieadd360.dll=136E8CA0987C754EEBFBCC7164307E78
letvst.exe=6283F091AE24944D487A67FC0C92DD46
wyvip.exe=689DBD3CED0D2A1404DD5ED1E6B06EB6
bdbrowserSetup-7.6.504.2877-1811_10003289.exe=095D58F8A54AC364836A7BA4AA802D25
In order to help protect you from this type of malware, AVG is already detecting them as “Agent5.ZKR” – just one of the many threats we continue to protect you against, on all your devices.