Authored by Wenfeng Yu and ZePeng Chen
As smartphones have develop into an integral a part of our every day lives, malicious apps have grown more and more misleading and complicated. Just lately, we uncovered a seemingly innocent app known as “BMI CalculationVsn” on the Amazon App Retailer, which is secretly stealing the package deal identify of put in apps and incoming SMS messages below the guise of a easy well being instrument. McAfee reported the found app to Amazon, which took immediate motion, and the app is now not out there on Amazon Appstore.
Determine 1. Utility revealed on Amazon Appstore
Superficial Performance: Easy BMI Calculation
On the floor, this app seems to be a fundamental instrument, offering a single web page the place customers can enter their weight and top to calculate their BMI. Its interface seems to be fully according to a normal well being utility. Nevertheless, behind this harmless look lies a spread of malicious actions.
Determine 2. Utility MainActivity
Malicious Actions: Stealing Personal Information
Upon additional investigation, we found that this app engages within the following dangerous behaviors:
- Display screen Recording: The app begins a background service to document the display screen and when the consumer clicks the “Calculate” button, the Android system will pop up request display screen recording permission message and begin display screen recording. This performance is prone to seize gesture passwords or delicate information from different apps. Within the evaluation of the most recent current samples, it was discovered that the developer was not prepared for this perform. The code didn’t add the recorded mp4 file to the C2 server, and at the start of the startRecording() methodology, the developer added a code that immediately returns and doesn’t execute observe code.
Determine 3. Display screen Recorder Service Code
When the recording begins, the permission request dialog can be displayed.
Determine 4. Begin Recording Request.
- Put in App Info: The app scans the gadget to retrieve a listing of all put in purposes. This information could possibly be used to establish goal customers or plan extra superior assaults.
Determine 5. Add Person Information
- SMS Messages: It intercepts and collects all SMS messages obtained on the gadget, doubtlessly to seize one-time password (OTP), verification codes and delicate data. The intercepted textual content messages can be added to Firebase (storage bucket: testmlwr-d4dd7.appspot.com).
Malware below growth:
In keeping with our evaluation of historic samples, this malicious app remains to be below growth and testing stage and has not reached a accomplished state. By looking for associated samples on VirusTotal based mostly on the malware’s package deal identify (com.zeeee.recordingappz) revealed its growth historical past. We are able to see that this malware was first developed in October 2024 and initially developed as a display screen recording app, however halfway by way of the app’s icon was modified to the BMI calculator, and the payload to steal SMS messages was added within the newest model.
Determine 6. The Timeline of Utility Growth
The deal with of the Firebase Set up API utilized by this app makes use of the character “testmlwr” which signifies that this app remains to be within the testing section.
App Developer Info:
In keeping with the detailed details about this app product on the Amazon web page, the developer’s identify is: “PT. Visionet Information Internasional”. The malware writer tricked customers by abusing the names of an enterprise IT administration service supplier in Indonesia to distribute this malware on Amazon Appstore. This reality means that the malware writer could also be somebody with information of Indonesia.
Determine 7. Developer Info
Easy methods to Shield Your self
To keep away from falling sufferer to such malicious apps, we suggest the next precautions:
- Set up Trusted Antivirus Apps: Use dependable antivirus software program to detect and stop malicious apps earlier than they’ll trigger hurt.
- Assessment Permission Requests: When putting in an app, rigorously study the permissions it requests. Deny any permissions that appear unrelated to its marketed performance. For example, a BMI calculator has no legit cause to request entry to SMS or display screen recording.
- Keep Alert: Look ahead to uncommon app conduct, resembling lowered gadget efficiency, fast battery drain, or a spike in information utilization, which may point out malicious exercise working within the background.
Conclusion
As cybercrime continues to evolve, it’s essential to stay vigilant in defending our digital lives. Apps like “BMI CalculationVsn” function a stark reminder that even the best instruments can harbor hidden threats. By staying alert and adopting sturdy safety measures, we will safeguard our privateness and information.
IoC
Distribution web site:
- hxxps://www.amazon.com/PT-Visionet-Information-Internasional-CalculationVsn/dp/B0DK1B7ZM5/
C2 servers/Storage buckets:
- hxxps://firebaseinstallations.googleapis.com/v1/tasks/testmlwr-d4dd7
- hxxps://6708c6e38e86a8d9e42ffe93.mockapi.io/
- testmlwr-d4dd7.appspot.com
Pattern Hash:
- 8477891c4631358c9f3ab57b0e795e1dcf468d94a9c6b6621f8e94a5f91a3b6a