Crimeware / APT Malware Masquerade as Santa Claus and Christmas Apps

addtext_com_MTcwNzQ3MTQ2NDA3

CloudSek is an artificial intelligence technology-based risk management enterprise, which focuses on customized, intelligent security monitors.

Cloudsek’s SaaS-based products help a client, assess security real-time from the perspective of an attacker 24*7. Our monitors track our client’s various Internet-based resources for potential security risks. Instead of using traditional static threat detection engines and manual verification process our monitors use Machine Learning and Artificial Intelligence to identify threats.

The blog is an analysis of some critical information CloudSek acquired from our data partner.

Overview:

CloudSek monitors were researching the activities of an APT [Advanced persistent threat ] that is targeting software companies globally.What is interesting is this APT appear to conduct widespread intellectual property theft for economic gains, targeted individuals as well as performed intelligence gathering that would be useful for governments. Based on our analysis , the attacker have recently launched campaigns to target Christmas season. Malware masquerades as Santa Claus and many similar Christmas Apps.

Brief Overview :

CloudSek was monitoring an underground hacking team, that was selling a Desktop malware in various underground forums. The desktop malware is specifically designed for jumping air-gapped systems , and given the type of documents the attackers are seeking , it was collecting classified data from software companies and government organisations.

The desktop malware after successful installation proceeds to callback to its controllers located in Germany . The main attraction of this Trojan is the capability to collect data from airgapped systems. The trojan gathers system information and disk information and sends that to the controller. The malware collects two sets of data.

  1. Files
  2. Screenshots

One of the features was a USB module that is capable of collecting data from air-gapped systems [No internet access] . This module copies important data from an infected system to a plugged-in USB device till it reaches an infect machine that has got internet access. The malware was also copying trash folder from infected system into a hidden volume on the connected USB .

CloudSek was able to obtain more information on attackers infrastructure and was able to identify how exfiltrated data was placed on the attacker’s servers . We observed that the data collected  are stored in a folders marked by an infection id on the controllers. Each victim will has an infection id and a folder related to his/her data.

 Screen Shot 2015-12-16 at 1.53.11 AM

Controllers seemed to have almost 120 GB of data as Malwares are constantly collecting critical files from infected machines.  The collected data are kept in their respective folders.

 

Screen Shot 2015-12-16 at 1.41.06 AM

Even though there were folders for keylogging and voice recording no actual code for this was found within the trojan nor any data on the controllers. It is possible the Trojan is still under development.

Based on many artifacts collected from this malwares, controllers as well as passive dns query, its is confirmed that a company based in South Asia is responsible for the development of this malware. This company would be referred as santa-apt from here on.   This company on its website says that they provide software development consultation as well as provides spy softwares to monitor employees. Based on the above, CloudSek monitors were constantly tracking this hacking team and our trackers were able to find the following information.

  1. CloudSek found that Santa-APT is recruiting for Mobile App developers.
  2. Many of the developers who are working for Santa-APT has mobile application background [Iphone and Android ].
  3. We identified Santa-APT Mobile malwares are masquerading as Games and utilities.
  4. And recently attackers started pushing malwares pretending to be Santa Clause games.
  5. We identified many malware controllers used by Santa-APT .
  6. One of the malware controllers managed by Santa-APT belongs to a mobile malware .
  7. The mobile malware controller had nearly 8k infections .

Screenshot of the Android and  IOS Malware used by the team .

Screen Shot 2015-12-16 at 12.54.35 AMScreen Shot 2015-12-16 at 6.04.42 AM

We were able to get more information about the controllers and how collected data was monitored on the controllers. Further in this blog we would explain in detail about the various operations performed by the Mobile malware.

CloudSek monitors were constantly tracking this hacking team and their infrastructure . While checking the contents of many applications owned by Santa-apt, we identified their mobile malwares. The mobile malwares after infection connected back to a C&C server over http. This IP was in the same network range as the desktop malware and was hosted in Germany.  The application is a mobile malware admin interface code named as “top gun”. There were almost 8k infected mobile users on that control panel.

CloudSek was able to collect more data about the internal working of the mobile malwares.

The controller had admin users as well as normal users.

Screen Shot 2015-12-16 at 2.42.35 AM

 

Each infected user data could be viewed by logging in with a username and password on the user panel .

User Data Dashboard:

Screen Shot 2015-12-16 at 2.46.14 AM

The mobile malware had the feature to upload the following data to the control panel.

  1. Contacts
  2. SMS
  3. Call Records
  4. Location Info
  5. Calender
  6. Camera
  7. Cam Shots
  8. Video
  9. Enviornment Recordings
  10. Browser History
  11. Program Info
  12. Change Sim Card
  13. Device Status

That’s pretty much everything on the phone. And like every other android malware , the user has to grant permissions for app, and our Santa request for all the possible permissions. 

Screen Shot 2015-12-16 at 4.54.45 PM

It has  a feature to upload minute-by-minute location of the user.

Screen Shot 2015-12-16 at 2.56.58 AM

Stolen SMS from infected Phones:

Screen Shot 2015-12-16 at 3.06.00 AM

Attacks were capable to play recorded call messages.

View/play call records:

Screen Shot 2015-12-16 at 3.07.26 AM

 

Contacts:

Screen Shot 2015-12-16 at 3.10.36 AM

Uploaded gallery contents video/image  from infected phones:
Screen Shot 2015-12-16 at 3.44.40 AM

Environment recordings:

An interesting feature to the controller was an option to send an alert to attacker if his victims leaves a particular region on map or enters a pre set region. This way attackers could track if his victim has reached office or left office. So if victims enters/leaves a pre set location, then the attackers gets an sms notification. Triggers are also made for calls and sms from a preset individual.

Screen Shot 2015-09-24 at 2.17.17 AM

Triggers could be used to record the environment of the user and upload back to the server.

Screen Shot 2015-12-16 at 3.21.04 AM

Conclusion:

This christmas make sure you think about security before installing an app.Verify the permissions you are granting an application before accepting them. Ensure that an application has enough legitimate reviews . And last but not the least, do not let someone else install any application on your official/personal devices. 

 

About CloudSek:

CloudSek’s SaaS-based solution monitor client’s online assets from the perspective of an attacker 24/7 . Cloudsek monitor leverages modern machine learning technology to detect threats real time and provide actionable intelligence.
The target of this APT are so diverse, ranging from government officials , high profile individuals to engineers from technology companies .  More attribution , victim informations and artifacts about Santa-APT could be provided on request at [theoracle (-@-) cloudsek.com ]

Regards

Rahul Sasi