{"id":89800,"date":"2021-04-30T20:07:41","date_gmt":"2021-04-30T14:37:41","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89800"},"modified":"2023-08-08T17:41:55","modified_gmt":"2023-08-08T12:11:55","slug":"alert-wormable-android-malware-is-spreading-through-social-media-applications","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/alert-wormable-android-malware-is-spreading-through-social-media-applications\/","title":{"rendered":"Alert! Wormable Android malware is spreading through social media applications"},"content":{"rendered":"<p>Autoreply is a convenient feature through which users can send a custom message as an automatic reply for unanswered incoming email, SMS, WhatsApp messages, and more. There are many applications on Google Play Store which offers such functionality.<\/p>\n<p>We have recently noticed malicious applications which are abusing this particular functionality.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89801 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig1-650x248.png\" alt=\"\" width=\"650\" height=\"248\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig1-650x248.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig1-300x114.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig1-768x293.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig1-789x301.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig1.png 1100w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig 1. Content used for spreading malware<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>Fig 1 highlights samples of messages used by attackers to lure users into installing <a href=\"https:\/\/blogs.quickheal.com\/quick-heal-reports-29-malicious-apps-10-million-downloads-google-play-store\/\">malicious apps<\/a>. In many cases, these messages come from a trusted contact (who is already infected). As a result, users are likely to consider the message legitimate and follow the mentioned steps. In this case, the message asks users to open a web link and download an application. To lure users further, the website displays lucrative offers such as Free Netflix, watch Free IPL, New feature in WhatsApp. (Refer Fig.2)<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89802 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig2-650x301.png\" alt=\"\" width=\"650\" height=\"301\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig2-650x301.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig2-300x139.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig2-768x356.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig2-1536x712.png 1536w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig2-2048x949.png 2048w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig2-789x366.png 789w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig.2 Application hosting site<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>We recently analyzed two applications that are spreading through this mechanism &#8211; \u201cWhatsApp Pink\u201d and \u201cOnline stream.\u201d<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89803 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig3-650x102.png\" alt=\"\" width=\"650\" height=\"102\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig3-650x102.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig3-300x47.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig3.png 685w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig.3 Icons<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>Once installed, these applications ask for notification access. After getting the permission, the application hides its icon from the users.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89804 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig4-361x390.jpeg\" alt=\"\" width=\"361\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig4-361x390.jpeg 361w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig4-278x300.jpeg 278w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig4-768x830.jpeg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig4-789x853.jpeg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig4.jpeg 1088w\" sizes=\"(max-width: 361px) 100vw, 361px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig.4 Asking Notification access<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>These applications maintain a list they target for auto-replies of apps such as Facebook, Instagram, WhatsApp, Twitter, Telegram, Skype, Viber, etc. Till now, we have seen two variants of lists (refer to Fig.5). These applications have another string array that has text messages with a link to download the applications. One of the message strings is selected at random at runtime.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89805 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig5-650x62.png\" alt=\"\" width=\"650\" height=\"62\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig5-650x62.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig5-300x29.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig5-768x74.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig5-789x76.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig5.png 1178w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig.5 Target List<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>After getting notification access, whenever a new notification is received, the callback function onNotificationPosted gets called. In this method, the package name of the application is checked.<\/p>\n<p>There is an additional check for Android notification direct reply action (The direct reply action, introduced in Android 7.0 (API level 24)), allowing users to enter text directly into the notification.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89806 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig6-650x44.png\" alt=\"\" width=\"650\" height=\"44\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig6-650x44.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig6-300x20.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig6-768x52.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig6-789x53.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig6.png 1153w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig. 6 onNotificationPosted function callback<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>In <em>onNotificationPosted<\/em> by accessing this action, instead of user input, this malware populates an intent with its own text data using<em> RemoteInput.addResultsToIntent <\/em>method.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89807 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig7-650x190.png\" alt=\"\" width=\"650\" height=\"190\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig7-650x190.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig7-300x88.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig7-768x224.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig7-789x230.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig7.png 1120w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig.7 Sending the message<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p><strong>Same actor Behind these two variants:<\/strong><\/p>\n<p><a href=\"https:\/\/www.quickheal.co.in\/\">Quick Heal<\/a> has collected 6 samples of the WhatsApp Pink application and 4 samples of the Online stream application. All these applications are signed with the same certificate. That likely means that the same malware author (or authors) is behind these malicious applications.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89808 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/04\/Fig8-650x110.png\" alt=\"\" width=\"650\" height=\"110\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig8-650x110.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig8-300x51.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig8-768x130.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig8-789x133.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/04\/Fig8.png 1249w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<h6 style=\"text-align: center;\"><strong>Fig. 8 Certificate Information<\/strong><\/h6>\n<p>&nbsp;<\/p>\n<p>For now, these applications have functionalities of hiding icon, monitoring notifications, and autoreply. In future, they may develop a new variant and add more malicious functionality.<\/p>\n<table border=\"1\" width=\"648\" cellpadding=\"15\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"277\"><strong>IOC <\/strong><\/td>\n<td style=\"text-align: center;\" width=\"395\"><strong>Hosting sites<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"277\">a8a687abf84271d181358374666b4f1b<\/td>\n<td width=\"395\">h**p:\/\/pinkapp[.]xyz\/?whatsapp<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">e1870d613d54239e8fb5f09b6a4e880d<\/td>\n<td width=\"395\">h**p:\/\/lookpink[.]xyz\/?whatsapp<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">d13d3eeaf8db5515577cc9b390fefbc9<\/td>\n<td width=\"395\">h**p:\/\/colorpink[.]xyz\/?whatsapp<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">9a902d186c948e72af6b269862c27055<\/td>\n<td width=\"395\">h**p:\/\/pinklook[.]profileviewz[.]com\/WhatsappPink.apk<br \/>\nh**p:\/\/whatsapp[.]profileviewz[.]com\/WhatsappPink.apk<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">90cfcde60b6cd57a2e9b2047cff51fb7<\/td>\n<td width=\"395\">h**p:\/\/whatsapp[.]wwwy[.]xyz\/WhatsappPink.apk<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">2ca849e5913aa3fd47db7b381db6ad24<\/td>\n<td width=\"395\">h**p:\/\/looknew[.]xyz\/?whatsapp<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">00d45a3846a90d7bd0d021447101efb6<br \/>\n3fa23903a9fa6f7d504f99e272c0d997<\/td>\n<td width=\"395\">h**p:\/\/streamapp[.]club\/?netflix<\/td>\n<\/tr>\n<tr>\n<td width=\"277\">2f0b61ef74e87b0aea52871d1bb4efb0<\/td>\n<td width=\"395\">h**p:\/\/mobilestream[.]club\/?netflix<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"277\">E1af660c6c71ad191749755aa057aef7<\/td>\n<td width=\"395\">h**p:\/\/profilelist[.]xyz\/?livestream<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong>Follow the below guidelines to stay safe:<\/strong><\/p>\n<ul>\n<li>Always download applications from legitimate sources like Google Play and App Store as these stores are relatively safe.<\/li>\n<li>Don\u2019t click on unknown links shared on social media platforms, even if shared by your trusted contacts.<\/li>\n<li>If you have clicked on such shared link and installed the application, uninstall it by going to Settings &gt;&gt; Application list &gt;&gt; search for the application name (for these two variants, search Online stream and WhatsApp (Pink icon) and uninstall the application)<\/li>\n<li>Be extremely cautious about what applications you download on your phone.<\/li>\n<li>For enhanced protection of your phone, always use a good antivirus like <a href=\"https:\/\/www.quickheal.co.in\/quick-heal-mobile-security\" target=\"_blank\" rel=\"noopener noreferrer\">Quick Heal Mobile Security<\/a> for Android.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Autoreply is a convenient feature through which users can send a custom message as an automatic reply for unanswered incoming email, SMS, WhatsApp messages, and more. There are many applications on Google Play Store which offers such functionality. We have recently noticed malicious applications which are abusing this particular functionality. Fig 1. Content used for [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":89814,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,24],"tags":[380,534,1212,49,98,254,1803],"class_list":["post-89800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-malware","tag-android-malware","tag-cybersecurity","tag-google-play-store","tag-malware","tag-netflix","tag-whatsapp","tag-wormable-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89800"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89800"}],"version-history":[{"count":12,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89800\/revisions"}],"predecessor-version":[{"id":91480,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89800\/revisions\/91480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89814"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}