BACK

A Look into the Connection Between XLoader and FakeSpy, and Their Possible Ties With the Yanbian Gang

A Look into the Connection Between XLoader and FakeSpy, and Their Possible Ties With the Yanbian GangBy Lorin Wu and Ecular Xu  XLoader and FakeSpy are two of the most prevalent malware families that emerged from the mobile threat landscape recently. We first reported about XLoader in April 2018 when it used Domain Name System …

  • 26 Nov 2018
5 min read
A Look into the Connection Between XLoader and FakeSpy, and Their Possible Ties With the Yanbian Gang
By Lorin Wu and Ecular Xu  XLoader and FakeSpy are two of the most prevalent malware families that emerged from the mobile threat landscape recently. We first reported about XLoader in April 2018 when it used Domain Name System (DNS) cache poisoning/DNS spoofing to victimize users with malicious Android apps that steal PII and financial data and install additional apps. Meanwhile, we released our findings on FakeSpy in June after it infected Android users via SMS phishing or SMiShing to launch info-stealing attacks. As of October, there have been a total of 384,748 victims from XLoader and FakeSpy attacks globally, with the majority of victims coming from South Korea and Japan. Figure 1. Monthly infection count for XLoader and FakeSpy attacks this year When we released our initial findings on XLoader and FakeSpy, they appeared to have nothing to do with each other. However, our new research uncovered clues that could indicate that they are either being operated by the same threat actor group or that their operators are affiliated with each other. XLoader and FakeSpy posed as legitimate apps of a Japanese home delivery service company The first clue that led to the discovery of the connection between XLoader and FakeSpy is when the former was observed disguising as a legitimate app of a major Japanese home delivery service company in June. Interestingly, almost all FakeSpy variants posed as the abovementioned Japanese apps to steal sensitive information from users. Digging deeper into the activities of XLoader and FakeSpy, we learned that they use the same ecosystem to deploy malware. We used VirusTotal to search for an XLoader sample (bf0ad39d8a19b9bc385fb629e3227dec4012e1f5a316e8a30c932202624e8e0e) in July and learned that the sample was downloaded from a malicious domain posing under the name of the said home delivery service company. When we analyzed a FakeSpy sample (ba5b85a4dd70b96f4a43bda5eb66e546facc4e3523f78a91fc01c768c6de5c24) over a month later, we discovered that it was downloaded from the same malicious domain. Figure 2. VirusTotal showing details of an XLoader sample coming from the abovementioned domain Figure 3. A FakeSpy sample was found to have been downloaded from the same domain Multiple XLoader and FakeSpy samples also showed the same results. As of this writing, we identified 126 domains that XLoader and FakeSpy shared for deploying malware (see complete IoC list in the research paper). In addition, we saw similarities in XLoader and FakeSpy’s methods involving their C&C addresses. Some of their variants abuse social media user profiles to hide their real C&C addresses. Figure 4. XLoader hiding its real C&C address in a social media user profile. Note: Through active cooperation with vendors that own the involved domains mentioned in this research, the user profile pages and accounts have been blocked. Figure 5. The IP address is written on social media profiles, always starting with ^^ and ends with $$. When the app is launched, it will access the page and parse contents to get the real C&C address. The Yanbian Gang connection Analyzing the code structure and behavior of
Source: TrendLabs Security Intelligence BlogPublished on 2018-11-26
Blog Details
  • 26 Nov 2018

Newest Articles.

View all
  • 04 Mar 16

    Top 5 Recent Cyber-attacks/hacks and How They Could Relate to your Business.

    Read Article logo
  • 13 Mar 16

    Data leaks, how can they affect Sales and Business Integrity?

    Read Article logo
  • 20 Apr 16

    Common Cyber Security Threats Faced by Businesses and The Impacts

    Read Article logo
  • 11 May 16

    Regular Vulnerability Scans Assessments: Keeping You Safe

    Read Article logo

Get a Quote

Click below and we’ll send you a quote as soon as possible.

quote-form-pattern
  • This field is for validation purposes and should be left unchanged.

Contact Us

Click below and we’ll send you a quote as soon as possible.

quote-form-pattern
  • This field is for validation purposes and should be left unchanged.

Step 1 of 4 - Let’s get started

25%
  • Thanks for your interest in working with us. Please complete the details below and we’ll get back to you as soon as possible.

Buy Cyber Essentials

price-popup-pattern