Android CoronaVirus Ransomware comes bundled with decryption code

By

With the sudden spike in CoronaVirus related threats it is no surprise that recent ransomware uses the same name. SonicWall Capture Labs Threats Research team observed an Android ransomware that uses scare tactics to make a quick buck.

 

Sample specifics

Application Name: Coronavirus Tracker

Package Name: com.device.security

Md5: d1d417235616e4a05096319bb4875f57

 

The permissions requested by the malware application are chosen to enable/start key functionality of the malware:

  • “Receive boot completed”  has been included to enable the service RebootReceiver
  • “Request ignore battery optimizations” has been included to ensure that the malware is not hibernated into a low power state to conserve battery

Infection Cycle

This ransomware spreads by posing itself as a CoronaVirus Tracker:

Once installed and executed it requests for Accessibility Services and Device Admin permission:

 

After a few minutes we are shown the ransom screen:

 

Behind the scenes

The ransom screen can be intimidating at first viewing, as there are threats to leak images and videos from the device if the ransom is not honored. The ransomware screen is picked from a hardcoded URL in the code which re-directs to a Pastebin page:

Even though this malware appears to be a ransomware, in reality this is just a scareware – a malware that uses scare tactics to coax the victim into paying a ransom. There is no evidence of any sort of file encryption or any way to steal/post the images or videos from the infected device.

The malware author demands payment in exchange of a decryption code. However checking the code revealed the presence of this decryption code in clear text:

On entering this code 4865083501 we saw the message “Congrats. You Phone is Decrypted”.

 

Success Rate

We checked the Bitcoin wallet address mentioned in the ransom note and confirmed that there is not presently significant traffic to this wallet. This indicates that the malware authors have not yet had significant success with this ransomware:

A note of Caution

For anyone who has a device infected by this ransomware, the decryption code is 4865083501. After entering this code the app disappears from the app drawer. This gives the user the impression that the app is no longer on the device. But in reality the app keeps running in the background and can be seen in the list of downloaded apps on the device:

Uninstalling the app is not straightforward because of the Device Admin privilege, and the Uninstall button appear greyed out. The only way to remove the app is to first revoke the Admin rights given to this app via Security ->Device Administration -> Untick Coronavirus Tracker.

 

SonicWall Capture Labs provides protection against this threat with the following signatures:

  • GAV: AndroidOS.Decrypt.RSM (Trojan)
  • GAV: AndroidOS.CoronaTracker.RSM (Trojan)

 

Indicators Of Compromise (IOC):

  • d1d417235616e4a05096319bb4875f57
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.