Recently, Baidu security lab found a new "UkyadPay" virus that has been infected with a large number of popular applications, such as quickplay, super white point, and Lori guard. After the virus is started, the background secretly accesses the remote server to obtain the command and executes the following malicious behaviors according to the server command:
1. Access the paid video through cmwap in the background and complete the deduction process automatically. (This virus only applies to China Mobile users)
2. Automatically click daoyoudao in the background and access ads from the AD Alliance to automatically download applications. Trick advertising platforms to get promotion fees. It consumes a large amount of data traffic.
From malicious behaviors, it can be seen that there are two ways to profit from malware developers: SP splitting and AD Alliance promotion splitting.
The following is a simple analysis of the virus sample:
1. The virus is broadcast frequently in the AndroidManifest. xml file registration system, so that malicious components can run smoothly.
2. Malicious Code tree structure:
3. Operating Mechanism of malicious components:
After Reverse Analysis of the virus sample code, the operating principle of the virus has basically surfaced, registering Android components for malware and calling relationships between them.
The following are key malicious code:
(1) Automated On-Demand paid videos.
(2) automatically access Daoyoudao advertisements and download promotional applications.
(3) automatically access the "yisearch" advertisement and simulate clicks.
This virus does not attract the attention of users and mobile operators in order to charge fees. The maximum number of fee deductions per day and month is limited. When the upper limit is reached, the deduction logic is no longer promoted.
Article: http://blog.csdn.net/jiazhijun/article/details/11935911
By Jack_Jia mail: 309zhijun@163.com