Triada Trojan in WhatsApp mod
#1
Bug 
Quote:
[Image: Abstract-technology.jpeg]

WhatsApp users sometimes feel the official app is lacking a useful feature of one sort or another, be it animated themes, self-destructing messages which automatically delete themselves, the option of hiding certain conversations from the main list, automatic translation of messages, or the option of viewing messages that have been deleted by the sender. This is where amateurs step in with modified versions of WhatsApp which offer extra features. These mods can contain ads, usually in the form of various different banners displayed in the app. However, we discovered that the Trojan Triada snook into one of these modified versions of the messenger called FMWhatsapp 16.80.0 together with the advertising software development kit (SDK). This is similar to what happened with APKPure, where the only malicious code that was embedded in the app was a payload downloader.

We detect the Trojan modification as Trojan.AndroidOS.Triada.ef.

How Triada operates

Once the app is launched, the malware gathers unique device identifiers (Device IDs, Subscriber IDs, MAC addresses) and the name of the app package where they’re deployed. The information they collect is sent to a remote server to register the device. It responds by sending a link to a payload which the Trojan downloads, decrypts and launches.

By analyzing the statistics on files downloaded by FMWhatsapp, we identified a number of different types of malware:
  • Trojan.AndroidOS.Subscriber.l (MD5: c3c84173a179fbd40ef9ae325a1efa15) also serves to sign victims up for premium subscriptions.
  • Trojan.AndroidOS.Whatreg.b (MD5: 4020a94de83b273f313468a1fc34f94d) signs in Whatsapp accounts on the victim’s phone. The malware gathers information about the user’s device and mobile operator, then sends it to the command and control server (C&C server). The server responds with an address to request a confirmation code and other information required to sign in. The attackers seem to have done their homework on the protocol WhatsApp uses.
Once the necessary IDs have been collected, the malware requests a verification code.
 
It’s worth highlighting that FMWhatsapp users grant the app permission to read their SMS messages, which means that the Trojan and all the further malicious modules it loads also gain access to them. This allows attackers to automatically sign the victim up for premium subscriptions, even if a confirmation code is required to complete the process.

We don’t recommend using unofficial modifications of apps, especially WhatsApp mods. You may well end up with an unwanted paid subscription, or even loose control of your account altogether, which attackers can hijack to use for their own purposes, such as spreading spam sent in your name.

IOC

MD5

Trojan.AndroidOS.Triada.ef b1aa5d5bf39fee0b1e201d835e4dc8de

C&C
http://t1k22.c8xwor[.]com:13002/
https://dgmxn.c8xwor[.]com:13001/
...
Continue Reading
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
Elon Musk brings new competition for You...
X TV, a new streamin...Nicholas — 09:51
Malwarebytes 5.1.10.127
Malwarebytes 5.1.1...harlan4096 — 06:44
Mozilla Thunderbird 130.0
Mozilla Thunderbir...harlan4096 — 06:43
Free Download Manager 6.24.1.5847
Changes in 6.24.1....harlan4096 — 06:42
Sandboxie-Plus 1.14.7
Sandboxie-Plus 1.1...harlan4096 — 06:41

[-]
Birthdays
Today's Birthdays
avatar (34)emyzowa
avatar (45)JustinPrede
Upcoming Birthdays
avatar (37)fapedDow
avatar (47)pohudidere
avatar (39)obudyg
avatar (47)rarinsWax
avatar (24)DianaBrown
avatar (37)eqiduseb
avatar (46)schedZoorb
avatar (40)bgreorasjunior4824
avatar (44)ThomasLYDAY
avatar (39)upakoExapy
avatar (49)diplomasync
avatar (48)Myronjax
avatar (48)skepwHug
avatar (37)RicardoGoase
avatar (41)Edwardgef
avatar (42)Denpokhew
avatar (34)azidony
avatar (39)maskbSleew

[-]
Online Staff
There are no staff members currently online.

>