SpyEye targets android devices with Spitmo.A

September 13, 2011

SonicWALL UTM Research team received reports of a new SpyEye banking Trojan variant targeting the android platform. This variant uses MitB(Man-in-the-Browser) techniques when visiting banking websites in order to direct the user to download an android application. The android application is professed to generate the authentication code required to login to the banking website but once installed, it intercepts and uploads your messages to a remote server in the background.

When the rogue application is downloaded and the installer is launched, it requests for the following permissions:

screenshot

It performs the following activities when installed:

  • Once installed, it does not show up on the devices list of installed applications but runs silently in the background as "System":
      screenshot
  • It displays a fake authentication code for logging in to the banking website when a call is placed to "325000":
      screenshot
  • It displays the fake code on the home screen as seen below:
      screenshot
  • It contacts the following domains which are no longer active:
      screenshot
  • The remote URLs are hidden in the "Settings.xml" file of the android application:
      screenshot
  • It intercepts messages and constructs data to be sent to a remote server:
      screenshot

      ...

      screenshot
  • It uploads intercepted messages to a remote server
      screenshot

SonicWALL Gateway AntiVirus provides protection against this threat with the following signature:

  • GAV: AndroidOS.Spitmo.A (Trojan)