Using some photo editing apps on Android might infect you with Adware

By

SonicWall Threats Research Team found a few Photo editor applications which were distributed via Google Play Store. Upon analysis, these apps were found to be Adware. These apps are no longer available in the Google Play Store as these have been removed after we reported about these apps to the concerned team.

Reported malicious apps are shown below:

 

All the applications have similar functionality though the developer name is different. The number of downloads of these apps, indicate many users might be affected.

The malicious file is not available on popular threat intelligence portals like the VirusTotal which indicates the uniqueness of the samples:

 

INFECTION CYCLE:

Some of the permissions requested by these apps which could give access to user’s sensitive data are listed below:

  • INTERNET
  • READ SETTINGS
  • ACCESS FINE LOCATION
  • READ PHONE STATE
  • READ EXTERNAL STORAGE
  • WRITE EXTERNAL STORAGE
  • WAKE LOCK

Upon installation, the app appears on the app drawer as shown below:

 

Upon launching the application, an alluring screen is presented to the user to appear a genuine photo editing application. Later, it starts showing full screen Ads with no close button as shown below:

 

NETWORK COMMUNICATION:

While Ads are displayed to the user, the app requests for a resource from malicious web server. The response data contains list of Ad serving URLs in the encrypted form as shown below:

(Code Snippet)

(Request & Response)

UNVEILING RESPONSE DATA:

The key to decrypt the encrypted response data is present in the code itself. The decrypted data contains list of Ad serving URLs, parameters which are used to compute the Ad display time:

 

The ‘egt’ parameter with value 10 when multiplied with 1000 gives the Ad display time in milliseconds. The ‘al2’ and ‘cts’ parameters which contains list of URLs are loaded in the browser:

(code snippet for URL loading)

Ads keep popping up in new tabs whenever web browser is launched as shown in the following image:

 

The app hides its icon from the device which makes it difficult for the user to identify the app responsible for the activity:

 

The user’s device location is traced to display geo-location specific Ads:

 

Like any other Adware application, it not only annoys the user by showing Ads at regular intervals, but also drains the battery, consume bandwidth and other resources:

(code Battery and Bandwidth consumption by the app)

 

Currently these apps are no longer present on the Play Store. However if these apps were installed before they were removed from the Play Store we advise users to uninstall them from their devices.

SonicWall Capture Labs provides protection against this threat with the following signature:

  • AndroidOS.HiddenAds.D (Adware)

Indicators Of Compromise (IOC’s) :

  • 822ae1937a2b9bec931ebfd8da639f05fb308b90c03d5f2cadf66fce7e72b138
  • bbe60005d5104d917f4ce56b1cd145537e84509e9bb7807b7597bddd3a4308a8
  • 4d15fee618798efba7b6cda5575236e761fcde5a58168877b7e7e02bfb9f6439
  • 7f8faa0fff45fa40668cd935c1da632d2707756e7563f0648842dfb4dc76505f
  • 0d6ea8a13bbb87482fee12fc88db958a8b103c952dc05896afc8a552625dcec2
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.