This month, we evaluated apps on GooglePlay. 10,029 apps are collected from China, America, Russia and Turkey regions. Among these apps, we found 22 apps in total are malwares or graywares (termed as PHA by Google), they are:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 |
dfb182f6d277acc54a63a629794e4e2cba42dabc de50aa590dc5725dd5a7f05c10bd7da60e43fafc d0b54ea39666fa861419af19504d61268ddb1fb3 53478be46d7a6277f4622d6e6c543a650ed3178d 5079a73d9bfe2aab2a724c07cda046fc996b8f44 211ff7a732ad23874543480a80fef3f896133a4a 0c682a35ab3e19d8b1b15ea55603e94788f6eaf0 5592679ec134e755cb29000656afe5fecf6ffa46 7af5062e3290cdc62fba8efd64b85a1a437bce89 9685c0469755f9e58e7a58ec57f5dafb8428e66e 5e7322607a7d0575d4bee48115aaec4c700a9274 2ea95471a4f490b12afa138ab1ffe228a528d112 283df15e52e26f39241f2abfb438dcf8316ad9c4 e9a2786a318968184fabdc21244dae7ef1058de9 e43c8b292c0e1388d79637eec54ea21dfde802fc b2423caebbf7fc83b9f10aa960caf1b1e1ba6630 4702c888dfc41fedc27f55e9f5978804d3887dbf d3eec415c2986ef35a96d6a218ff74eee13d13a9 bd49f1e52fd68eb49bc737236c5f0ec7f0b3a01f c91e1f8bdc175b438acfea8ea2fcd18bcedaa772 aebd9a6d918c88844066e0aea48ee08a6fca43df d76224d80a99af9869644093de094b7e34532fc6 |
(GooglePlay has removed some of these apps, but all of them can be accessed via Janus)
1. Most of the PHAs are Adwares.
2. Tricky SMS fraud apps take a variety of techniques to bypass the vetting process of GooglePlay, e.g.,e9a2786a318968184fabdc21244dae7ef1058de9
sends SMS under the control of C&C server, dfb182f6d277acc54a63a629794e4e2cba42dabc
sends SMS if it is lunched via AD network.
3. “Your are the winner, but you should pay for the delivery in advance”. The fraudulent story in web is now migrating to app, and 2ea95471a4f490b12afa138ab1ffe228a528d112
, which targets the Russia user, is an instance.
4. End-users are enticed to pay, after that, they found they are fooled. 5e7322607a7d0575d4bee48115aaec4c700a9274
is the case.
In 2014, Pangu Team (@panguteam) founded PWNZEN InfoTech Co., LTD, a startup company at Shanghai, China, and expanded its research team to the Pangu Lab, with more general research interests from iOS jailbreaking, to IoT security, App security auditing, Android security, etc.
A few days ago, we found a toll fraud app on GooglePlay. This is a brief description for the toll fraud app.
How the toll fraud app works. The initial spotted app can be accessed via Janus. The app is tricky, that is, if the app is started by luncher, it works normally. But if the app is started via deeplink, the app changes the view and starts the subscription process.
I
Tips for analyzing include:
Upgrade to premium
button in the menu).Find more fraud apps in GooglePlay. We explore Janus by taking the signature of the subscription library, then we find 2 additional toll fraud apps on GooglePlay and 3 apps in Baidu App Market. Summary of these apps:
Hash of the toll apps:
Advices for GooglePlay: