11/02/2016
11:33

Bootkit detected on Yashi smartphone "MySmart OS 5.0 YP5009" model.


Following the detection of abnormal behavior in the smartphone of a marked customer Yashi the C.R.A.M. examines the behavior of the malware identified as Bootkit.

C.R.A.M.'s attention (Anti-Malware Research Center of Soft TG) was focused on customer's smartphone that clearly appeared affected by one or more viruses / malware. We found abnormal behavior during the device use, specifically a Yashi MySmart OS 5.0 (YP5009).

The malware presence is highlighted by the appearance of unwanted shortcuts (ie icons that refer to applications installed on the device) and loading of banner ads independently by the user's will.

Clicca per ingrandire immagine Clicca per ingrandire immagine Banner Clicca per ingrandire immagine icone Clicca per ingrandire immagine
[ - The images depict banner ads that open automatically and the app icons that are being automatically installed.- ]

The device has also shown a "physical" stress, derived by malware, that requires a massive use of the memory and processor, causing frequently restarts and stepping into safe mode, resulting unusable by the user. 

In general, the device running slower than normal because of a succession of unwanted screens that have been activated during connection to the network, be it 3G, 4G or Wi-Fi.


[ - The first three images showing the app during their automatic download, while the last one shows the screen when your smartphone goes into protection mode - ]

So the C.R.A.M. (Centro Ricerca Anti-Malware) has conducted tests and analyzed in detail the behavior of this malware to understand origin and type.

During the analysis, intended to restore the normal functioning of the device, we have tried to remove every unwanted apps that have been installed independently. Also has proven inefficient the reset operation, initiated by the safe (recovery) mode available in every Android device bootable pressing a specific key combination (usually home + volume up / volume down).
Using this booting mode the phone restores the original factory configuration, resetting all user data. With Yashi this did not happen, indeed, seemed to clean up but a few seconds after reboot malware reactivates and resumes its malicious actions.

This made us think of a very specific malware type called Bootkit.

Often the majority of malware ends up on Android devices through third-party apps installation (unknown origin) that are not examined by the Google Play Store filter. The bootkit already resides in the ROM of the device and runs at startup of the operating system. These malwares were identified in 2014 as highlighted in the article "Oldboot the first bootkit on Android"  and by Alexander Burris G Data Software in his speech at the 25th Virus Bulletin Conference  held in Prague from 30th september to 2nd october 2015.


[ - Above the images of icons appeared after installation generated by malware - ]

Bootkits infect the boot system file and modifies the "init" script that charge operating system components. When device starts, this script loads the update.jar file (containing the trojan Android.Trj.DownLoader.KA) that extracts is.jar and GoogleSafe.apk files, copying them, respectively, in / system / lib and / system / app.

Some parts of the bootkit are being installed as a system service, by connecting to a remote server, from which they receive various commands, including download, installation and removal of user applications. They do this in loop at every network access.


[ - These three images taken within the system settings, show malicious apps installed and their related services running. - ]

The malware has three key features. First it is installed in the ROM, protected memory, difficult to access without superuser privileges and therefore difficult to detect.
Second feature appears to be the fact that this malware runs as a system service each time you start the smartphone, executing trojans and downloaders. Those components (applications or system services) are loaded and run, without your consent, applications and advertising of various kind.
Third aspect, even more disturbing is that malware has access to all user data, is able to send and receive messages, phone calls, write on the system memory, perform any type of superuser command.

In conclusion, all these features make the bootkit a serious threat to the user and to the integrity of his privacy.

Second part of the analysis on the infected smartphone was conducted using the mobile suite of the antivirus VirIT eXplorer, named VirIT Mobile Security. We have identified, through a memory scan, all bootkit's components, as shown in the image below that reports the results.
After that, connecting to a protected network, we checked some malicious apps in the exact moment when they tried to access the external network in order to download more malware.
One of the most used domains to download this malware appears to be "upaiyun.com". We also noticed the presence of a text file named "FP.txt" containing part of the URLs to which the Bootkit connects.


[ - The images above are part of the screenshots captured during the analysis with our antivirus VirIT Mobile Security - ]

In conclusion, is not possible to remove this malware directly, by uninstalling or deleting the infected apps because is pre-installed on the device and has been activated later.
It is likely therefore that the malware is present in some modified devices (custom ROMs) and redistributed in the market.
Unanswered were also our attempts to contact Yashi company to notify the problem in order to have a confrontation about a possible resolution. So for now customer's smartphone remains unusable.

Below, in the table, the report of the analysis conducted on all apps infected detected in the device. 

APK Name VIRUS Name and MD5
33f564d41261de0b99a77ee26cd888d1.apk Android.Trj.DownLoader.KA
FC8029D8F7F14543484EC5AAF36DCC2E
111228_1_ddl.apk Android.Trj.DownLoader.NE
6C95F4DCA1564E434FD22C175B492FE0
6391638e56fc94bb74f99ee769ada74b.apk Android.Trj.DownLoader.KA
BE7F80F099BFA005ED9935B1CCC872E9
com.andr0id.lauchinmg.apk Android.Trj.DownLoader.KA
FC8029D8F7F14543484EC5AAF36DCC2E
com.as.youtube.downloader.a5.apk Android.Trj.DownLoader.KA
3EC9F295093DCBABC2CDB5F8E570A657
com.as.ytb.a5.apk Android.Trj.DownLoader.KA
8EA2642883EA2C03C3080EA6E9B81C7A
com.config.n.service.apk Android.Trj.DownLoader.FW
AC3B3382D1C8447CB7B90237C8985859
com.example.homeof01111beauty.apk Android.Trj.DownLoader.KA
4885072427DF72A6C7C7B0C44B501998
com.free.all.mptree.music.b.apk Android.Trj.DownLoader.KA
090A449533BB157B8875D5A51F9EC291
com.sms.sys.manager.apk Android.Trj.DownLoader.KA
555921F5D2E8C3793CD019BE5BCA59A3
com.sv.downloader.s1.apk Android.Trj.DownLoader.KA
3EA37C94F291842A2B282E45BFBC21F1
com.system.cap.hm.gupdater.apk Android.Trj.DownLoader.KA
CB7BD086C9E77917B3C8CD7DC63DB24C
com.system.cap.hm.gupdater.apk Android.Trj.DownLoader.KA
CB7BD086C9E77917B3C8CD7DC63DB24C
dd85bd64496b23ba07e5c890e742782b.apk Android.Trj.Triada.A
55CC4C2FDD7F709B599216976D31BDFC
GoogleSafe2016020301.apk Android.Trj.Backdoor.LY
6F34AFEDDFAAF3E6329D1B296691CB48
111228_1_ddl.apk Android.Trj.DownLoader.NE
803FCAFAD57FFA0E760065F8146DF3D7
update.jar Android.Trj.DownLoader.KA
0EE881F2CA0048FD414A5E30FAA1599F
1327.apk Android.Trj.Rootkit.R
B76B0893281896AA7D1BEF56CF421DB6
111234.apk Android.Trj.Rootkit.R
CF112AC831EAEED3A0228CFBE9FB3BD3
SystemUpdate.apk Android.Trj.Triada.A
149F2EB149D56E24682F91D53EA68447
CCleaner.ok.apk Android.Adw.Deng.TVX
3E3A5CF4958910B9A49429A79A4DEAC8



Author: Ruzzante Andrea - C.R.A.M.
TG Soft - VirIT Mobile Security
Any information published on our site may be used and published on other websites, blogs, forums, facebook and/or in any other form both in paper and electronic form as long as the source is always and in any case cited explicitly “Source: CRAM by TG Soft www.tgsoft.it” with a clickable link to the original information and / or web page from which textual content, ideas and / or images have been extrapolated.
It will be appreciated in case of use of the information of C.R.A.M. by TG Soft www.tgsoft.it in the report of summary articles the following acknowledgment/thanks “Thanks to Anti-Malware Research Center C.R.A.M. by TG Soft of which we point out the direct link to the original information: [direct clickable link]”

Vir.IT eXplorer PRO is certified by the biggest international organisation: