{"id":6253,"date":"2017-01-23T06:10:34","date_gmt":"2017-01-23T14:10:34","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-106\/"},"modified":"2017-01-23T06:10:34","modified_gmt":"2017-01-23T14:10:34","slug":"news-106","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2017\/01\/23\/news-106\/","title":{"rendered":"Mobile Menace Monday: AndroRAT Evolved"},"content":{"rendered":"<p>An increasing amount of mobile malware known as Android\/Trojan.AndroRAT has been seen in the wild lately. \u00a0AndroRAT is a contraction of Android and RAT (Remote Access Tool).\u00a0 This piece of malware is far from new, but has gradually become more evolved over the years.<\/p>\n<h3>AndroRAT History<\/h3>\n<p>As the story goes (according to its <a href=\"https:\/\/github.com\/DesignativeDave\/androrat\" target=\"_blank\">GitHub page<\/a>), the original AndroRAT was created as a proof of concept by a small team of developers for a University project in 2012. \u00a0It has two parts: the AndroRAT server which runs on a PC to control infected mobile devices, and the AndroRAT client which is installed onto a mobile device.<\/p>\n<p>With a little Android development knowledge, the AndroRAT proof of concept could be used as a Trojan by taking an existing legitimate APK, decompiling it, adding the AndroRAT client code into the APK, and recompiling the APK.\u00a0 After installing the infected APK onto a mobile device, it can be controlled via the AndrodRAT server which is a simple GUI interface.<\/p>\n<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-16116\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/1-600x320.jpg\" alt=\"\" width=\"600\" height=\"320\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/1-600x320.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/1-300x160.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/1.jpg 681w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Here are just some of the functionalities of AndroRAT:<\/p>\n<ul>\n<li>Collect contacts<\/li>\n<li>Collect call logs<\/li>\n<li>Collect all messages including SMS<\/li>\n<li>Record calls<\/li>\n<li>Location through GPS<\/li>\n<li>Take a picture from the camera<\/li>\n<li>Send a SMS message<\/li>\n<li>Make outgoing calls<\/li>\n<li>Open an URL in the default browser<\/li>\n<\/ul>\n<h3>AndroRAT Binder<\/h3>\n<p>Soon after the original AndroRAT was uploaded to GitHub, the malware authors took it a step further and created AndroRAT Binder; an APK builder that adds the AndroRAT client code to any APK. \u00a0AndroRAT Binder made building infected APKs so easy, that any script kiddie could use it.<\/p>\n<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-16117\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2.jpg\" alt=\"\" width=\"336\" height=\"497\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2.jpg 336w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/2-203x300.jpg 203w\" sizes=\"auto, (max-width: 336px) 100vw, 336px\" \/><\/p>\n<p>Simply add the IP and port used to connect the AndroidRAT server to the client, provide a\u00a0legitimate APK (most likely from Google PLAY) to repackage with AndroRAT, and build.\u00a0 Once built, the infected APK could be put onto third party markets and\/or file sharing sites for unsuspecting victims to install.\u00a0 Considering we have found around 31k infected APKs that used the default settings of the AndroRAT Binder in our Mobile Intelligence System, it seems it caught on like wild fire.<\/p>\n<h3>AndroRAT Evolved<\/h3>\n<p>The AndroRAT variants we see in the wild today are far from the original open source code uploaded to GitHub back in 2012.\u00a0 Updated coding has improved the functionality, made it more stable, and added\u00a0obfuscation\u00a0to deter against detection by malware scanners.\u00a0 With the recent increase of AndroRAT in the wild, I predict the distribution method has greatly improved as well.\u00a0 The old AndroRAT Binder made building an infected APK easier, but still only built APKs one at a time.\u00a0 Most likely new builders have been developed that are capable of automating the process even further; such as bulk building AndroRAT infected APKs using legitimate apps.<\/p>\n<h3>The RAT is Always Lurking<\/h3>\n<p>AndroRAT client infected APKs run just like the apps they steal, but with added malicious functionality in the background.\u00a0 If an app is popular on Google PLAY, most likely there is an AndroRAT infected version of it somewhere in the wild.\u00a0 For example, here\u2019s some code of an infected Pok\u00e9mon GO app:<\/p>\n<p align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-16118\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/pokemongo-AndroRAT2-600x442.jpg\" alt=\"\" width=\"600\" height=\"442\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/pokemongo-AndroRAT2-600x442.jpg 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/pokemongo-AndroRAT2-300x221.jpg 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/pokemongo-AndroRAT2.jpg 866w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h3>Trapping the RAT<\/h3>\n<p>As usual, it\u2019s a cat and \u201cRAT\u201d game between malware developers and malware researchers.\u00a0 They keep putting\u00a0new variants of AndroRAT out in the\u00a0wild, we keep detecting them as they emerge.\u00a0 The best way to trap this RAT is to have a good malware scanner installed on your mobile device, and to install apps from reputable stores such as Google PLAY.\u00a0 Stay safe out there!<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/mobile-menace-monday-androrat-evolved\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/mobile-menace-monday-androrat-evolved\/' title='Mobile Menace Monday: AndroRAT Evolved'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2017\/01\/photodune-5107985-demonic-mutant-rat-l-Copy-627x640.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>An increasing amount of mobile malware known as Android\/Trojan.AndroRAT has been seen in the wild lately. \u00a0AndroRAT is a contraction of Android and RAT (Remote Access Tool).\u00a0 This piece of malware is far from new, but has gradually become more evolved over the years. AndroRAT History As the story goes (according to its GitHub page),&#8230;<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/\" rel=\"category tag\">Cybercrime<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/cybercrime\/mobile\/\" rel=\"category tag\">Mobile<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/android\/\" rel=\"tag\">Android<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/androrat\/\" rel=\"tag\">AndroRAT<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/malware\/\" rel=\"tag\">malware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile\/\" rel=\"tag\">Mobile<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-menace-monday\/\" rel=\"tag\">mobile menace monday<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mobile-security\/\" rel=\"tag\">mobile security<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/triple-m\/\" rel=\"tag\">triple m<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/01\/mobile-menace-monday-androrat-evolved\/' title='Mobile Menace Monday: AndroRAT Evolved'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10462,10635,4503,3764,10554,10555,10463,10556],"class_list":["post-6253","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-android","tag-androrat","tag-cybercrime","tag-malware","tag-mobile","tag-mobile-menace-monday","tag-mobile-security","tag-triple-m"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6253","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=6253"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/6253\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=6253"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=6253"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=6253"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}