Spyeye is a type of maliciousCode, Which can bring great harm to users. For more information, see references 3)
The following figure shows the evolution of man in the mobile attacks (mitmo/zitmo:
The following is the analysis of sypeeye by trusteer:
Stage 1: mitb-web injects Module
When the victim accesses the target bank, he will receive an injection message indicating a "new" security measure)
Click "set the application" in the box above. A message is displayed, prompting you to install the application.
Stage 2: Android (malicious) app Installation
If the user downloads the app as prompted and installs it, it will be difficult to find the trace of the app.
To complete the installation, the user is required to call "325000", the malicious code intercepts this call and"Activation code is displayed to the user.
Stage 3: Android secure application is a Trojan
All SMS messages will be intercepted and transferred to the attacker's C & C. When an SMS receives the message, a string will be created for future use:
"? Sender = [sendeeraddress] & Receiver = [reciveraddress] & text = [messagebody]"
These strings will be transmitted as http get request information to attackers. The transmission method is defined in settings. XML, such as SMS or http url.
Stage 4: SMS spy command & Control
After inspection, the domain name "123ffsaf.com" and spyeye have been associated. The following are historical records of the domain name "123ffsaf.com" spyeye Tracker over three days.
You can find the following information:
The sender 15555215556 and receiver 15555215554 are two Android simulators used to simulate attacks.
References:
1) http://blog.eset.com/2011/09/16/android-banking-malware-in-the-wild
2) https://www.trusteer.com/blog/first-spyeye-attack-android-mobile-platform-now-wild
3)Http://www.cnblogs.com/jecray/articles/2123164.html