New Variant of XLoader Targets Japanese Telcos And Banks For Phishing
We got a new variant of XLoader
via a link http://wrssa[.]xyz
from scam SMS message in mid-March 2020. It is a new version of XLoader
using Blogspot and Pinterest to deliver C&C address and phishing sites.
Cover Photo by Rami Al-zayat on Unsplash
This article is published on Talent-Jump Technologies, Inc. simultaneously.
Back in 2018, Trend Micro published the first report about a new Android Spyware named XLoader
. Since then, there are many variants of the XLoader
sample that have been detected and labeled.
The sample we got (d9adfdd2908fe30eeecb5443787d33d2dc9c4fe5c201665058261c6330af8c98
) seems like a new variant of XLoader
. These are the things we found different from the old version.
Payload Encoding
In this sample, it skips the first 4 bytes in /assets/1a6ddg0/1ua96mi
and uses the fifth byte as a key to XOR the remaining bytes. Then decompress and Base64 decode its content to evade detection.
Targeted Phishing In Japan
Unlike other old versions of XLoader
, this sample has some phishing sites majorly targeted on Japanese users.
Like other Xloader
samples, it hides further payload on normal websites. This time is Pinterest. There are 3 Pinterest users containing phishing site’s URL, each one of them targeted on different carriers’ users in Japan.
|URL |Description |Carrier |Alert Message |Alert Message (EN) |
|— |— |— |— |— |
|https://www.pinterest.com/posylloyd4136/ |http://au-hha[.]com
|kddi |お客様がご利用のキャリア決済が異常ログインの可能性がございます。本人認証設定で危険表示解除お願いします。 |There is a possibility that the carrier billing used by the customer is abnormal login. Please cancel the danger display in the personal authentication settings. |
|https://www.pinterest.com/amicenorton4874/ |http://nttdocomo-hha[.]com
|docomo or ntt |お客様がキャリア決済にご登録のクレジットカードが外部によるアクセスを検知しました、セキュリティ強化更新手続きをお願いいたします。 |The credit card registered by the customer for carrier billing has detected an external access. Please update your security procedure. |
|https://www.pinterest.com/ashlynfrancis7577/ |http:// |softbank |お客様がキャリア決済にご登録のクレジットカードが外部によるアクセスを検知しました、セキュリティ強化更新手続きをお願いいたします。 |The credit card registered by the customer for carrier billing has detected an external access. Please update your security procedure. |
Furthermore, there are 8 Pinterest users are used to deliver different phishing site’s URL depends on what APPs installed on the user’s device.
|URL |Description |APP Package ID |
|— |— |— |
|https://www.pinterest.com/emeraldquinn4090/ |http://smbc.bk-securityo[.]com/
|jp.co.smbc.direct |
|https://www.pinterest.com/kelliemarshall9518/ | |jp.co.rakuten_bank.rakutenbank |
|https://www.pinterest.com/shonabutler10541/ | |jp.mufg.bk.applisp.app |
|https://www.pinterest.com/norahspencer9/ | |jp.co.japannetbank.smtapp.balance |
|https://www.pinterest.com/singletonabigail/ | |jp.co.netbk.smartkey.SSNBSmartkey |
|https://www.pinterest.com/felicitynewman8858/ | |jp.japanpost.jp_bank.FIDOapp |
|https://www.pinterest.com/abigailn674/ | |jp.co.jibunbank.jibunmain |
|https://www.pinterest.com/gh6855786/ | |jp.co.sevenbank.AppPassbook |
At the time of our research, these links had been reported as phishing sites and not available to access. We end up searching online to see if there was some historical data or not.
We found these Pastebin uploaded on Feb 29th, 2020 at 23:34 (UTC-4), they are whois info about au-hha[.]com
and nttdocomo-hha[.]com
.
Both domains are registered at the same time at 2020-03-01T03:07:55Z
with the same registrant email [email protected][.]jp
and phone number +86.15263254125
from China.
For smbc.bk-securityo[.]com
, there is a report on urlscan.io with a screenshot submitted on Jan 5th, 2020.
Abuse of New Social Media Accounts
In the previous versions, XLoader
has used many social media to hide its C&C address. In this sample, it used Blogspot to deliver the encoded C&C address in the username.
These 3 Blogspot users can be used by different locale’s user. But currently, they all have the same encoded C&C address: 7OlknUJ8RECnMJ0O65Ah8tZJNVjStSHG
.
|URL |Used By Locale |
|— |— |
|https://tuyolh.blogspot.com/?m=1 |Japanese |
|https://ajlkhadsflg.blogspot.com/?m=1 |Korean |
|https://tyhdaou.blogspot.com/?m=1 |Other |
Once it got the encoded C&C address from Blogspot, it will first be doing the Base64 decode then decrypt by DES algorithm (DES/CBC/PKCS5Padding) with hardcoded key Ab5d1Q32
. In the end, creating a WebSocket connection to the C&C address.
Although this sample gets a C&C address from Blogspot by default, there are other sites can be used to deliver the C&C address we discovered in reversed code.
Here is the list of these sources:
|Source |URL |Regular Expression |
|— |— |— |
|vk |https://m.vk.com/%s?act=info
|</dt><dd>([\\w_-]+?)</dd></dl></div></div></div>
|
|youtube |https://m.youtube.com/channel/%s/about
|\\{\"description\":\\{\"runs\":\\[\\{\"text\":\"([\\w_-]+?)\"\\}
|
|ins |https://www.instagram.com/%s/
|biography\":\"([\\w_-]+?)\"
|
|GoogleDoc |https://docs.google.com/document/d/%s/mobilebasic
|<title>([\\w_-]+?)<
|
|GoogleDoc2 |https://docs.google.com/document/d/%s/mobilebasic
|<title>([\\w_-]+?)/
|
|blogger |https://www.blogger.com/profile/%s
|title=\"([\\w_-]+?)&
|
|blogspot |https://%s.blogspot.com/?m=1
|author nofollow'>\\n(.+?)\\n
|
Conclusion
Since XLoader
was named in 2018, it has continuously evolved its hidden methods and continued phishing attacks against different users. Users must be cautious, pay attention to the legality of URL links before entering sensitive information, or confirm whether relevant announcements have been posted on the company’s website. Avoid downloading and installing APPs from unknown sources.
IoCs
Sample
|SHA256 |Package |Label |
|— |— |— |
|d9adfdd2908fe30eeecb5443787d33d2dc9c4fe5c201665058261c6330af8c98
|com.njyi.tvwb |Chrome |
Malicious Accounts
|URL |
|— |
|https://www.pinterest.com/posylloyd4136/ |
|https://www.pinterest.com/amicenorton4874/ |
|https://www.pinterest.com/ashlynfrancis7577/ |
|https://www.pinterest.com/emeraldquinn4090/ |
|https://www.pinterest.com/kelliemarshall9518/ |
|https://www.pinterest.com/shonabutler10541/ |
|https://www.pinterest.com/norahspencer9/ |
|https://www.pinterest.com/singletonabigail/ |
|https://www.pinterest.com/felicitynewman8858/ |
|https://www.pinterest.com/abigailn674/ |
|https://www.pinterest.com/gh6855786/ |
|https://tuyolh.blogspot.com/?m=1 |
|https://ajlkhadsflg.blogspot.com/?m=1 |
|https://tyhdaou.blogspot.com/?m=1 |
C&C address
| Protocal | IP |
|— |— |
| http:// | wrssa[.]xyz
|
| ws:// or wss:// | 128.1.223[.]222:38876
|