"Brush the list"--mobile phone Trojan Google Play malicious brush list

Source: Internet
Author: User

    At present, with the explosive growth of application in the market, app marketing and promotion is becoming more and more difficult, and the brush list is widely regarded as the best shortcut for application promotion, which can greatly increase the amount of downloads and users in the short term, and increase the exposure rate of the application. The increase in exposure has led to a spike in downloads, and the surge in downloads will guarantee a top-ranked growth. Domestic app Brush list market is gradually growing, and derived as a complete gray industrial chain: application developers, brush list service providers have formed a tight structure.
    Recently, Baidu Security Laboratory found a dedicated to the list of malicious brushes "brush the list of guest" mobile Zombie Trojan. The Trojan is embedded in the normal application, and when the user installs such an application, the user device becomes the "brush the leaderboard" zombie. The workflow of "swipe the guest" mobile Trojan is as follows:
 

 
1, "swipe the Guest" request control server to get Google account, password login information. The control server returns the Google login account name and password.
2, "swipe the guest" to get a login Google account and password, using the obtained account information, through the simulation of Google Play protocol to obtain login authorization.
3, after obtaining the Google sign-in authorization, "Brush the list Guest" requests the control server obtains the brush list instruction.
4, "Brush the list of customers" according to the brush list instructions, through Google Play download the specified application, to brush the list.
 
infected with "Brush the list" mobile Trojan users, will be "brush List Party" remote control implementation of malicious brush list, the process will consume a lot of data flow. From the control server information, the mobile Trojan was developed by domestic developers, due to domestic network restrictions, the Trojan is not targeted at Chinese users.

One, the control server related function analysis:

Access Command control server, you can go directly to the server management interface. The server provides a list of features as follows:




1, access to the "Delete and change the user Data" page, you can view, modify, delete the server's existing Google account information. Currently the server has tens of thousands of Google accounts, passwords used for the malicious brush list.



2, enter the "Add and delete to search task data" page, you can create a new brush list task.



3, into the "Import account" page, can be based on the country, the volume of Google accounts, password information upload.



Second, "Brush the list of customers" mobile Trojan analysis

1. Malicious code structure diagram


2. Malicious Code Analysis

Click on the icon to enter the program, call Task.init immediately start the relevant brush list code:



Task.inti Start Taskservice Service



Taskservice call dmaintask.dowork Invoke specific brush list logic



Dmaintask.dowork Complete Google account access, sign in to Google Play, get the swipe list instructions and download Google Play specific apps based on instructions. The brush list logic is as follows:



The normal app download request flow for Google play is described below:
(HTTPS://GITHUB.COM/EGIRAULT/GOOGLEPLAY-API/ISSUES/30)


"Brush the list of customers" mobile Trojan is through the Code protocol simulation of the above download process to achieve Google Play malicious brush list.

"Brush the list"--mobile phone Trojan Google Play malicious brush list

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.