{"id":89119,"date":"2020-05-27T22:54:22","date_gmt":"2020-05-27T17:24:22","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=89119"},"modified":"2020-05-27T22:54:22","modified_gmt":"2020-05-27T17:24:22","slug":"sure-right-aarogya-setu-app-phone","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/sure-right-aarogya-setu-app-phone\/","title":{"rendered":"Are you sure you have the right Aarogya Setu App on your phone?"},"content":{"rendered":"<p>The Government of India launched a mobile application called Aarogya Setu for easy contact tracing of people during the Covid-19 pandemic. It has a record-breaking number of downloads in a very short span of time on Google Play Store. As per government stats, it has more than 10 crore registered users and the number is growing everyday.<\/p>\n<p>Riding on this wave, malware authors are misusing the name \u2018Aarogya Setu\u2019 to plant malicious apps into the end users\u2019 phone. We collected many applications from various sources that impersonate the original Aarogya Setu App. While analyzing these applications, we found some malicious applications that looked exactly like the official app. All the samples that we have are modified versions of previously found malware with few minor changes done to give a look similar to the Aarogya Setu App.<\/p>\n<p>Here is a comparative analysis of a few of these malicious lookalike apps:<\/p>\n<h4><strong>Aarogya setu spyware apps:<\/strong><\/h4>\n<p>All of these samples use Spynote RAT.<\/p>\n<h5><strong>Spynote:<\/strong><\/h5>\n<p>Spynote is a RAT (Remote Administration tool), which allows malware authors to take complete takeover of an infected device. It has different versions that has evolved over time and provides different features for spying on infected devices. These features mainly include stealing SMS messages, contact details etc. Spynote has its own site \u2013 spynote[.]us. The domain is seized by FBI recently.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89120 size-medium\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/05\/fig1-300x158.png\" alt=\"screen-shot of seized spynote site\" width=\"300\" height=\"158\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig1-300x158.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig1-768x405.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig1-650x343.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig1-789x416.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig1.png 1156w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0fig.1 Seized Spynote domain<\/p>\n<p><strong>Here is a comparison of the old malware APK and the recent Aarogya Setu Fake application<\/strong>,<\/p>\n<p>Old Malware sample IOC : 7ab951806650fb865436f03dedc0555b<\/p>\n<p>Aarogya Setu Fake sample IOC : df5698d5aef850b217cbbfa9789bd347<\/p>\n<p>Both these apps carry legitimate application in its &#8220;res\/raw&#8221; directory named as &#8220;google.apk&#8221;. These files are of applications which they want to make as a target. For this Aarogya Setu Fake app it is an apk file of Official Aarogya Setu app. At the time of launch, the malware installs this legitimate application and hides itself. After that it starts its malicious activity silently in the background.<\/p>\n<p>fig.2 (a) is code snippet of message stealing code from implemented <em>onReceive<\/em> method of the <em>BroadcastReceiver<\/em> class C10. In this method malware takes message text and assigns it to variable from C11 service. This service in these applications is responsible for their malicious activity. These two apps have similar code.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-89121 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/05\/fig2a-300x148.png\" alt=\"\" width=\"774\" height=\"382\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2a-300x148.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2a-768x378.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2a-650x320.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2a-789x389.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2a.png 1198w\" sizes=\"(max-width: 774px) 100vw, 774px\" \/><\/p>\n<p style=\"text-align: center\">\u00a0 fig.2(a)\u00a0 Aarogya Setu Fake app code accessing SMS text<\/p>\n<p>As the fake Aarogya Setu app is targeting the official Aarogya Setu application, malware authors have done changes accordingly. They have added Aarogya Setu icon in <em>ic_launcher<\/em>. To set the name of application as Aarogya Setu, they have changed the value of <em>android:label<\/em> in <em>AndroidManifest.xml<\/em> and as per that value is changed in <em>res-&gt;values-&gt;string.xml<\/em>. See in fig.2(b).<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89122 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/05\/fig2b-300x143.png\" alt=\"\" width=\"371\" height=\"177\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2b-300x143.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2b-768x365.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2b-650x309.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2b-789x375.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig2b.png 896w\" sizes=\"(max-width: 371px) 100vw, 371px\" \/>\u00a0fig.2(b) Icon comparison<\/p>\n<p>IoC\u2019s ( Apps which impersonate Aarogya setu app and\/or use similar package name or same icon or both) &#8211;<\/p>\n<p>df5698d5aef850b217cbbfa9789bd347<\/p>\n<p>bbe84ba545d652d9e06635a6e89d48b5<\/p>\n<p>ecaeb619b1226a5e22caed93478fc0ba<\/p>\n<p>5ab7bbba0de6d8a74782f107e7a37cc1<\/p>\n<p>e5e44ac40123023eebd5caf9662f05d1<\/p>\n<p>Bfa19e91bb4b25d34ac10ad7b9fc5df2<\/p>\n<h4><strong>Aarogya Setu patched with Metasploit:<\/strong><\/h4>\n<p>We came across one application which is a patched version of the official Aarogya Setu application version 1.04. The app is created by patching the official app with package name \u201c<em>xrcpryfabq.peotrafpop<\/em>\u201d. This package contains Metasploit code.<\/p>\n<p><strong>What is Metasploit?<\/strong> &#8211; Metasploit is an exploitation framework used for penetration testing. It contains many exploits and payloads. Here this Metasploit has Trojan downloader code. Malware authors just added one line of the code to start activity from Metasploit code without changing the remaining code of the official app.<\/p>\n<p>Fig.3(a) shows that one line added code<em> nwvrhdtun.start()<\/em> in <em>Oncreate<\/em> method of application class to start Metasploit activity , Fig.3(b) shows added Metasploit package<em> xrcpryfabq.peotrafpop<\/em>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89123 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/05\/fig3ab-300x255.png\" alt=\"\" width=\"614\" height=\"522\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3ab-300x255.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3ab-768x653.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3ab-459x390.png 459w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3ab-789x671.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3ab.png 906w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/p>\n<p>Below fig.3(c) shows package from Metasploit payload, which is created using \u201c<em>msfvenom<\/em>\u201d command. Same package is patched in the official Aarogya Setu application to convert this into a malicious application.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89124 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/05\/fig3c-300x202.png\" alt=\"\" width=\"647\" height=\"435\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3c-300x202.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3c-579x390.png 579w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig3c.png 674w\" sizes=\"(max-width: 647px) 100vw, 647px\" \/><\/p>\n<p style=\"text-align: center\">fig.3(c)<\/p>\n<p>Malicious App IoC: 2b67566ecdb6fb9fb625508cc0bafa97<\/p>\n<h4><strong>Android Trojan dropper malware uses fame of Aarogya Setu:-<\/strong><\/h4>\n<p>We got some malicious samples that use the same package name as Aarogya Setu&#8217;s i.e.&#8221;<em>nic.goi.aarogyasetu&#8221;<\/em>. All these samples are trojan dropper malware. The code used is similar to the code used in the infected CamScanner application that surfaced last year.<\/p>\n<p>These samples contain encrypted \u201c<em>mutter.zip<\/em>\u201d file in its asset directory. There is a class named as \u201c<em>Duration<\/em>\u201d which has a code to decrypt this <em>mutter.zip<\/em> file. This <em>mutter.zip<\/em> file contains malicious code for downloading malware files.<\/p>\n<p>Fortunately, these fake Aarogya Setu applications will not get installed on users device, as one of the attribute of application tag in manifest file \u201c<em>android:testOnly<\/em>\u201d is set to true and these apps are not properly signed. Looks like these malwares are in development phase but in future malware authors may come up with improved versions of these.<\/p>\n<p>Below IOC\u2019s are of malicious samples which have similar package name as of Aarogya Setu application:<\/p>\n<p>05d3004cab3626c2d09a45ed5ca9b3fd<\/p>\n<p>0ab6b90d044ba4ca847849617769d563<\/p>\n<p>1627d6bc5b521e20e0a6eb107b6b8102<\/p>\n<p>3f06bc51873f08e89d968546da8264ab<\/p>\n<p>52bb57bbc86d9d3b2125a50efc1f2594<\/p>\n<h4><strong>Spreading vectors:<\/strong><\/h4>\n<p>These applications are not available on Google Play Store, but still malware authors are trying to promote these to unsuspecting users by various ways. How they can do this? This section tries to answer this question.<\/p>\n<h5><strong>1] YouTube and other social media comments:<\/strong><\/h5>\n<p>While searching for Aarogya Setu related videos on YouTube, we came across one video on &#8220;how to download Aarogya Setu app&#8221;. This video is uploaded one month back but still is an example of spreading vector.<\/p>\n<p>In the comment section of this video one person commented a link saying that this is an alternate link to download the Aarogya Setu app. This link opens a page with option to generate link, after clicking on that it redirects to different page each time. In this process, it downloads an apk with name &#8220;setting.apk&#8221; [IOC: da4eca06258b72341abe469c3d022d81] and this is nothing but a trojan dropper app.<\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89125 size-medium\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2020\/05\/fig4-289x300.png\" alt=\"YouTube comment promoting malicious App using the name of Aarogya Setu\" width=\"289\" height=\"300\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig4-289x300.png 289w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig4-376x390.png 376w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2020\/05\/fig4.png 542w\" sizes=\"(max-width: 289px) 100vw, 289px\" \/>\u00a0fig.4 YouTube comment promoting malicious App<\/p>\n<h5><strong>2] WhatsApp and other social media messages:<\/strong><\/h5>\n<p>You may have seen messages offering free data, free subscriptions with some link mentioned. These types of messages are generally used for spreading such malwares. Please check this blog &#8211;\u00a0<a href=\"https:\/\/blogs.quickheal.com\/beware-scams-crucial-time-coronavirus-pandemic\/\">Beware of scams during this crucial time of CoronaVirus pandemic<\/a>\u00a0for more information.<\/p>\n<p><strong>Quick heal mobile security detects all the samples mentioned above.<\/strong><\/p>\n<h4><strong>Tips to stay safe<\/strong><\/h4>\n<ul>\n<li>Download Applications only from trusted sources like Google Play Store.<\/li>\n<li>Do not click on alien links received through messages or any other social media platforms.<\/li>\n<li>Turn off installation from unknown source option.<\/li>\n<li>Check installed application list time to time.<\/li>\n<li>Read the pop-up messages you get from Android system before Accepting\/Allowing any new permissions.<\/li>\n<li>Use a trusted anti-virus like Quick Heal Mobile Security to stay safe from android malwares.<\/li>\n<\/ul>\n<h4><strong>Stay Safe Stay Home!!!<\/strong><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>The Government of India launched a mobile application called Aarogya Setu for easy contact tracing of people during the Covid-19 pandemic. It has a record-breaking number of downloads in a very short span of time on Google Play Store. As per government stats, it has more than 10 crore registered users and the number is [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":89137,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-89119","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89119"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89119"}],"version-history":[{"count":13,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89119\/revisions"}],"predecessor-version":[{"id":89139,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89119\/revisions\/89139"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89137"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}