Stiniter Android Trojan uses new techniques (Mar 28, 2012)

By

SonicWALL UTM Research team received reports of a new sophisticated Trojan targeting the android platform. This Trojan called Stiniter/TGLoader is a modified version of an Android game with an additional malicious service. During our analysis we found that the Trojan was installing multiple modules (ELF and APK), contacting a remote command and control server and sending messages to a premium rate number.

When the rogue application is run, it in turn installs 4 ELF executable modules and 3 android applications. The sequence of events on execution is shown below:

screenshot

The installed android applications use misleading names and were found to be using the following permissions:

  • GoogleService:
    • Modify/delete SD card contents
    • Read phone state and identity
    • Start at boot
  • GoogleSMS:
    • Send SMS messages
    • Read phone state and identity
  • Unlock:
    • Modify/delete SD card contents
    • Read phone state and identity
    • Prevent phone from sleeping
    • Disable keylock

It performs the following activities:

  • It drops the following files and modifies their permission using ‘chmod 777’:
    • /data/data/android.gdwsklzz.com/googleservice.apk
    • /data/data/android.gdwsklzz.com/googlemessage.apk
    • /data/data/android.gdwsklzz.com/unlock.apk
    • /data/data/android.gdwsklzz.com/start
    • /data/data/android.gdwsklzz.com/initr
    • /data/data/android.gdwsklzz.com/keeper
    • /data/data/android.gdwsklzz.com/ts
  • It disables keyguard and prevents the processor from going to sleep.
  • It remounts the /system/ folder on the device with write privileges.
  • It sends device information to a remote server:
      screenshot
  • It has the ability to send touchscreen events.
  • It downloads the configuration file containing the number for premium rate messaging from a remote server:
      screenshot
  • It send sms messages to the premium rate number in the configuration file.

SonicWALL Gateway AntiVirus provides protection against this threat with the following signature:

  • GAV: AndroidOS.Stiniter.B (Trojan)
  • Security News
    The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.