Ginp Android malware steals sensitive user information
SonicWall Threats Research Team observed reports of a new Android malware on the rounds. This malware spies on the infected device and shows custom overlays over applications to steal credentials.
Among the permissions requested by the app, few permissions can potentially access sensitive data:
- Read sms
- Write sms
- Send sms
- Receive sms
- Request install packages
- Read contacts
- System alert window
- Write external storage
- Receive boot completed
Upon execution, the malware requests for Accessibility Services. It keeps requesting for this permission until the user grants it:
In the background the malware communicates with the server at 188.8.131.52 which is currently not active. As a result only one-sided communication was observed during our analysis where the malware kept sending messages to the server.
This malware informs the server about the functions it executes via POST messages. The function executed is included as a parameter, following are some examples:
- When the malware asks for accessibility permissions:
- The malware is difficult to remove, as it simulates a back button press whenever the user goes to ‘settings’ >’app’. It sends a message to the server whenever the user tries to do so:
- We saw attempts to open a custom overlay screen when we clicked on the Google Play app. Since the server was not active, the actual overlay was not observed getting downloaded. However we were unable to access Google Play app as the malware kept trying to download the overlay screen.
- The malware informs the server with a message in the same format stating ‘Starting CC Injection’, indicating it tries to show Credit Card overlay as observed in a number of such overlay malware:
- At one stage a network packet containing all the functions executed during our analysis session was observed:
Static analysis of this malware is impeded by presence of a large amount of garbage code:
VirusTotal graph shows multiple connected malicious apps that communicate with the same server. These apps have functionality similar to the malicious app being analyzed :
A number of hard-coded functions are visible in the code which can be triggered via remote commands from the server:
Overall this malware attempts to steal sensitive information from the infected device by displaying overlays.
SonicWall Capture Labs provides protection against this threat with the following signature:
Indicators of Compromise: