ESET researchers uncover a new version of Android spyware used by the APT-C-23 threat group against targets in the Middle East
We have discovered a previously unreported version of Android spyware used by APT-C-23, a threat group also known as Two-tailed Scorpion and mainly targeting the Middle East. ESET products detect the malware as Android/SpyC23.A.
The APT-C-23 group is known to have used both Windows and Android components in its operations, with the Android components first described in 2017. In the same year, multiple analyses of APT-C-23’s mobile malware were published.
Compared to the versions documented in 2017, Android/SpyC23.A has extended spying functionality, including reading notifications from messaging apps, call recording and screen recording, and new stealth features, such as dismissing notifications from built-in Android security apps. One of the ways the spyware is distributed is via a fake Android app store, using well-known apps as a lure.
Timeline and discovery
The group’s activities were first described by Qihoo 360 Technology in March 2017 under the name Two-tailed Scorpion. In the same year, Palo Alto Networks, Lookout and Trend Micro described other versions of the mobile malware, naming them VAMP, FrozenCell and GnatSpy, respectively. Lookout published an analysis of another version of the malware, named Desert Scorpion, in April 2018, and at the beginning of 2020, Check Point Research reported new mobile malware attacks attributed to the APT-C-23 group.
In April 2020, @malwrhunterteam tweeted about a new Android malware sample. According to the VirusTotal service, no security vendor besides ESET detected the sample at the time. In cooperation with @malwrhunterteam, we recognized the malware to be part of the APT-C-23 arsenal.
In June, 2020, @malwrhunterteam tweeted about another little-detected Android malware sample, which turned out to be connected to the sample from April. A deeper analysis showed that both the April and June discoveries were both variants of the same new Android malware used by the APT-C-23 group.
Figure 2 shows the timeline of these events.
Thanks to information from @malwrhunterteam, we identified a fake Android app store used to distribute the malware. At the time of analysis, the “DigitalApps” store, pictured in Figure 3, contained both malicious and clean items. The non-malicious items would redirect users to another unofficial Android app store, serving legitimate apps. The malware was hidden in apps posing as AndroidUpdate, Threema and Telegram. The latter two of these lures also downloaded the impersonated apps with full functionality along with the malware. This mechanism is described in detail in the Functionality section.
Interestingly, the downloads were limited by needing to enter a six-digit coupon code, as seen in Figure 4. This may be a way to prevent those not targeted by the group from installing the malware, and hence keep a lower profile. Although we didn’t have a coupon code, downloading the app wasn’t such a problem – all that was needed was to append “/download” to the URL.
This fake app store is likely just one of the distribution methods used by the threat group. Our telemetry from 2020 showed samples impersonating apps that were not a part of this fake app store.
ESET telemetry data
According to ESET telemetry and VirusTotal data, Android/SpyC23.A has been in the wild since May 2019.
In June 2020, ESET systems blocked this spyware on client devices in Israel. The detected malware samples were disguised as the messaging app “WeMessage”, shown in Figure 5.
While there is a legitimate messaging app called weMessage on Google Play, as seen in Figure 6, the malicious app uses entirely different graphics and doesn’t seem to impersonate the legitimate app other than by appropriating its name. In our research, we haven’t found another app using the same or similar interface as the malicious WeMessage app, so it’s possible that the attackers created custom graphics.
We don’t know how this particular version of the spyware was distributed – the malicious WeMessage app wasn’t offered in the aforementioned fake app store.
Based on our research, the malware mainly impersonates messaging apps. The attackers might have chosen this guise to justify the various permissions requested by the malware.
Installation and permissions
Before installation, Android/SpyC23.A requests a number of invasive permissions, including taking pictures and videos, recording audio, reading and modifying contacts, and reading and sending SMS.
After installation, the malware requests a series of additional, sensitive permissions, using social engineering-like techniques to fool technically inexperienced users. These additional permission requests are disguised as security and privacy features:
- Under the guise of “Messages Encryption”, the app requests permission to read the user’s notifications
- Under the guise of “Private Messages”, the app requests permission to turn off Play Protect
- Under the guise of “Private Video Chat”, the app requests permission to record the user’s screen
These steps are shown in the video below.
After the malware is initialized, in most cases, victims are requested to manually install the legitimate app used as a lure (e.g. Threema), which is stored in the malware’s resources. While the legitimate app is being installed, the malware hides its presence on the affected device. This way, the victims end up with a functioning app they intended to download and spyware silently running in the background. In some cases (e.g. WeMessage, AndroidUpdate) the downloaded apps did not have any real functionality, and only served as bait for installing the spyware.
When first launched, the malware starts to communicate with its Command and Control (C&C) server. It registers the new victim and sends the victim’s device information to the C&C.
Based on the commands received, Android/SpyC23.A can perform the following actions:
- Take pictures
- Record audio
- Restart Wi-Fi
- Exfiltrate call logs
- Exfiltrate all SMS messages
- Exfiltrate all contacts
- Download files to device
- Delete files from device
- Steal files with particular extensions (pdf, doc, docx, ppt, pptx, xls, xlsx, txt, text, jpg, jpeg, png)
- Uninstall any app installed on the device
- Steal APK installers of apps installed on device
- Hide its icon
- Get credit balance of SIM on device (it can get a balance by making a call to three different cellular operators: Jawwal, Wataniya, Estisalat)
The following features are new in Android/SpyC23.A compared to the previously documented versions:
- Record screen and take screenshots
- Record incoming and outgoing calls in WhatsApp
- Make a call while creating a black screen overlay activity (to hide call activity)
- Read text of notifications from selected messaging and social media apps: WhatsApp, Facebook, Telegram, Instagram, Skype, Messenger, Viber, imo
- Dismiss notifications from built-in security apps on some Android devices:
- SecurityLogAgent notifications on Samsung devices (package name contains “securitylogagent”)
- Samsung notifications (package name contains “samsung.android”)
- MIUI Security notifications on Xiaomi devices (package name contains “com.miui.securitycenter”)
- Phone Manager on Huawei devices (package name contains “huawei.systemmanager”)
- Dismiss its own notifications (an unusual feature, possibly used in case of errors or warnings displayed by the malware)
Besides spying capabilities, the malware’s C&C communication has also undergone an update. In older versions, the C&C in use was hardcoded and either available in plain text or trivially obfuscated, and thus easier to identify. In the updated version, the C&C is well hidden using various techniques and can be remotely changed by the attacker.
In this section, we will describe how Android/SpyC23.A retrieves its C&C server.
The malware uses a native library with three functions. Two of them return opening and closing HTML tags for the title and the third one returns an encrypted string.
The encrypted string serves two purposes: the first part – before the hyphen (“-”) – is used as part of the password to encrypt files extracted from the affected device. The second part is first decoded (base64) and then decrypted (AES). The decrypted string might, for example, suggest a Facebook profile page for the C&C, but it is still obfuscated.
Some of the substrings in this string are replaced based on a simple substitution table and then the domain part of the apparent URL is replaced.
From this URL, the malware parses the HTML for its title tag.
The last step is to replace the first space for a dash and the second one for a dot. With that, obtaining the C&C is done. Such a process allows the malware operators to change their C&C server dynamically.
The malware’s live C&C servers typically pose as websites under maintenance, all using the same logo, shown in Figure 12.
Our research shows that the APT-C-23 group is still active, enhancing its mobile toolset and running new operations. Android/SpyC32.A – the group’s newest spyware version – features several improvements making it more dangerous to victims.
To prevent falling victim to spyware, we advise Android users to only install apps from the official Google Play Store. In cases where privacy concerns, access issues or other restrictions prevent users from following this advice, users should take extra care when downloading apps from unofficial sources. We recommend scrutinizing the app’s developer, double-checking the permissions requested, and using a trustworthy and up-to-date mobile security solution.
For any inquiries, contact us at firstname.lastname@example.org.
Indicators of Compromise (IoCs)
ESET detection name
MITRE ATT&CK techniques
This table was built using version 7 of the ATT&CK framework.
|Initial Access||T1444||Masquerade as Legitimate Application||Android/SpyC23.A impersonates a legitimate chat application.|
|T1476||Deliver Malicious App via Other Means||SpyC23.A can be downloaded from a malicious alternative app store.|
|Execution||T1575||Native Code||SpyC23.A uses a native method to retrieve an encrypted string to obtain its C&C.|
|Persistence||T1402||Broadcast Receivers||SpyC23.A listens for the BOOT_COMPLETED broadcast, ensuring that the app’s functionality will be activated every time the device starts.|
|Defense Evasion||T1508||Suppress Application Icon||SpyC23.A hides its icon.|
|Discovery||T1418||Application Discovery||SpyC23.A retrieves a list of installed apps.|
|T1420||File and Directory Discovery||SpyC23.A retrieves the content of the external storage directory.|
|T1426||System Information Discovery||SpyC23.A retrieves details about the device.|
|Collection||T1433||Access Call Log||SpyC23.A exfiltrates call log history.|
|T1432||Access Contact List||SpyC23.A exfiltrates the victim’s contact list.|
|T1517||Access Notifications||SpyC23.A exfiltrates messages from messaging and social media apps.|
|T1429||Capture Audio||SpyC23.A can record surroundings and calls.|
|T1512||Capture Camera||SpyC23.A can take pictures from the front or rear cameras.|
|T1412||Capture SMS Messages||SpyC23.A can exfiltrate sent and received SMS messages.|
|T1533||Data from Local System||SpyC23.A steals files with particular extensions from external media.|
|T1513||Screen Capture||SpyC23.A can take screenshots.|
|Command and Control||T1438||Alternative Network Mediums||SpyC23.A can use SMS to receive C&C messages.|
|T1437||Standard Application Layer Protocol||SpyC23.A communicates with C&C using HTTPS and Firebase Cloud Messaging (FCM).|
|T1544||Remote File Copy||SpyC23.A can download attacker-specified files.|
|Exfiltration||T1532||Data Encrypted||Extracted data is transmitted in password-protected ZIP files.|
|Impact||T1447||Delete Device Data||SpyC23.A can delete attacker-specified files from the device.|