{"id":3822,"date":"2013-09-05T13:01:35","date_gmt":"2013-09-05T20:01:35","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=3822"},"modified":"2013-09-05T13:02:16","modified_gmt":"2013-09-05T20:02:16","slug":"dplug-android-malware-discovered-by-wildfire","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2013\/09\/dplug-android-malware-discovered-by-wildfire\/","title":{"rendered":"Dplug Android malware discovered by WildFire"},"content":{"rendered":"<p style=\"text-align: left\" align=\"center\">In July 2013, WildFire detected a new kind of Android Package File (APK) malware named <i>Dplug<\/i>. This malware poses as a system tool app for memory cleaning. Dplug uses SMS to hijack the device\u2019s unique identifiers, subscribe to premium services and hide this behavior from the user by blocking the premium service notifications.<\/p>\n<p style=\"text-align: left\">By reviewing its behaviors in our WildFire APK sandbox, we observed the following features of this malware.<!--more--> The package name of this detected malware sample is <i>com.dlwx.clean_mc.mactivity<\/i>, and its package signer is <i>IadPush<\/i>. After installation Dplug will send the device\u2019s IMEI and IMSI number to a designated phone number through SMS. It then intercepts all incoming SMS and saves the intercepted SMS messages in a hidden folder on the device\u2019s storage card. Further, it blocks incoming SMS messages from two specific premium service numbers belonging to ChinaMobile: 10086 and 1065889955. Another interesting feature is that it provides an auto-confirmation function to premium services that require subscription and SMS confirmation. Besides premium service subscription, the Dplug malware can also push ads to the screen and send customized notifications which are downloaded from remote attack website.<\/p>\n<p style=\"text-align: left\">In a typical attack scenario, the attacker first lures the user to install the Dplug malware on the Android device. This is most likely accomplished through the in-app market of the <i>TTpod<\/i> Chinese music player app, found on Google Play. After installation, the malware will fetch a phone number from attacker website and send the device\u2019s IMEI and IMSI number to this phone number via SMS messages. With the device information, the attacker can impersonate the victim device to subscribe premium services. For services requiring SMS confirmation, the attacker will deliver the confirmation SMS schema to the malware. When the SMS confirmation message is intercepted, the malware will auto-reply the confirmation code to complete the service subscription. All of the attack behaviors occur in the background. The user will sense nothing related to the service subscription until receiving the monthly bill.<\/p>\n<p style=\"text-align: left\">An overview of the reversed malware sample is shown in (Fig 1). The host app part performs the legitimate functions it claims. The attack code is in the <i>dplug<\/i> package.\u00a0 In this Dplug malware sample, a mobile ad library from \u201chttp:\/\/www.91zan.com\u201d is downloaded from http:\/\/cdn.91zan.com\/sdk\/pi.jar. This ad library also aggressively collects the phone\u2019s unique identifiers and uploads the collected information to\u00a0 http:\/\/service.91zan.com.<\/p>\n<p style=\"text-align: left\">\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:75.22%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3823 lozad\" alt=\"dplug1\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1-230x173.png\" width=\"230\" height=\"173\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1-230x173.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1-500x378.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1-396x300.png 396w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1-52x40.png 52w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug1.png 533w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\">Fig 1. An overview of reversed Dplug malware sample.<\/p>\n<p style=\"text-align: left\"><b><span style=\"text-decoration: underline\"><br \/>\nTechnical Details<\/span><\/b><\/p>\n<p style=\"text-align: left\"><b>Intercept and block incoming SMS messages<\/b><\/p>\n<p style=\"text-align: left\">The malware claims the highest priority of receiving intent <i>android.provider.Telephony.SMS_RECEIVED<\/i> so that when an incoming SMS message arrives, the malware will intercept the message before other apps. (Fig 2)<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:20.43%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3824 lozad\" alt=\"dplug2\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2-230x47.png\" width=\"230\" height=\"47\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2-230x47.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2-500x102.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2-510x104.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2-194x40.png 194w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug2.png 619w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig 2. Broadcast receiver com.dplug.ptest.DlwxReceiver claims the highest priority for receiving four types of intents in AndroidManifest.xml file<\/i><\/p>\n<p style=\"text-align: left\">The intercepted SMS messages are then examined by the <i>isPinBi()<\/i> function in the file <i>com.dplug.sms.SMSTool.java<\/i>. \u201cPinBi\u201d means \u201cshield<i>\u201d<\/i> in Chinese. In this function, the malware intercepts SMS coming from two numbers, one is 10086 (a hotline number of China Mobile Communication) and the other is 1065889955 (a notorious malicious premium service subscription number widely used by mobile malware in China). These two numbers are hardcoded in the file <i>com.dplug.tools.Constant.java<\/i> (Fig 3).<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug3.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:22.17%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3825 lozad\" alt=\"dplug3\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug3-230x51.png\" width=\"230\" height=\"51\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug3-230x51.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug3-179x40.png 179w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug3.png 391w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig 3. The hardcoded numbers<\/i><\/p>\n<p style=\"text-align: left\">If an incoming SMS message is from either number, the malware will block the message from being inserted into the inbox. The purpose is to block the premium service notices sent from carrier such as the premium service subscription notice, service subscription confirmation notice, and billing notices. The victim will not notice the premium services the attacker subscribed to using their phone\u2019s identity.<\/p>\n<p style=\"text-align: left\">The malware will save the intercepted messages in a \u201clog.txt\u201d file. For each message, the malware will log receive time, sender phone number and the message body (Fig 4).<\/p>\n<p style=\"text-align: left\">\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:7.39%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3826 lozad\" alt=\"dplug4\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4-230x17.png\" width=\"230\" height=\"17\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4-230x17.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4-500x37.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4-510x38.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4-240x18.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug4.png 1189w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig 4.\u00a0 Examples of intercepted SMS messages in the \u201clog.txt\u201d file<\/i><\/p>\n<p style=\"text-align: left\">To hide the logs from being detected, the malware creates a hidden folder in the path <i>\u201c\/mnt\/sdcard\/Android\/.system\/.dplug<\/i>\u201d and saves the logs there. The file path for \u201clog.txt\u201d is <i>\u201c\/mnt\/sdcard\/Android\/.system\/.dplug\/log.txt<\/i>\u201d.<\/p>\n<p style=\"text-align: left\"><b>Send IMEI and IMSI number of device to remote attacker via SMS<\/b><\/p>\n<p style=\"text-align: left\">Dplug collects the IMEI and IMSI numbers from the device. The two numbers are sent via SMS to a designated phone number and then retrieved by contacting the URL <a href=\"http:\/\/www.android-3.com:8008\/getPhoneNo.do?arg=0&amp;m=get\" rel=\"nofollow,noopener\" >http:\/\/www.android-3.com:8008\/getPhoneNo.do?arg=0&amp;m=get<\/a> (Fig 5)<\/p>\n<p style=\"text-align: left\">\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:20.87%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3827 lozad\" alt=\"dplug5\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5-230x48.png\" width=\"230\" height=\"48\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5-230x48.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5-500x106.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5-510x108.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5-187x40.png 187w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug5.png 526w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig 5. Retrieve the receiver phone number via www.android-3.com:8008<\/i><\/p>\n<p style=\"text-align: left\">With the retrieved number the malware will construct a SMS message and sent out in the background (Fig 6).<\/p>\n<p style=\"text-align: left\">\u00a0<a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:8.26%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3828 lozad\" alt=\"dplug6\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6-230x19.png\" width=\"230\" height=\"19\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6-230x19.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6-500x41.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6-510x42.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6-240x20.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug6.png 862w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig 6. The SMS message sent with IMEI and IMSI number<\/i><\/p>\n<p style=\"text-align: left\">With the IMEI, IMSI and phone number, the attacker will impersonate the phone owner and subscribe to premium services. The attacker profits through those premium services.<\/p>\n<p style=\"text-align: left\"><b>Premium service subscription auto-confirmation<\/b><\/p>\n<p style=\"text-align: left\">To avoid unnoticed premium service subscription, the carrier will send confirmation SMS messages to the subscriber\u2019s phone. This message usually contains the subscription information and a random confirmation number. The user needs to replay this confirmation number in order to confirm the subscription.<\/p>\n<p style=\"text-align: left\">To deal with the confirmation requirement, the Dplug malware first downloads an SMS configuration file from the url http:\/\/117.135.131.19:8008\/sms.do. The configuration file is parsed by the <i>ParseTool.parseSMSConfig()<\/i> function and the parsed information is saved in a <i>SMSCustom<\/i> object. Related source code is shown in (Fig 7).<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug7.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:20.43%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3829 lozad\" alt=\"dplug7\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug7-230x47.png\" width=\"230\" height=\"47\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug7-230x47.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug7-195x40.png 195w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug7.png 450w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig. 7 A configuration file downloaded in the doSMS() function of com.dplug.sms.SMSAdapter.java file<\/i><\/p>\n<p style=\"text-align: left\">The most important information in the configuration file is the <i>Forward<\/i> information that is described in the <i>com.dplug.sms.Forward.java<\/i> file. \u00a0It includes the <i>key<\/i> string that is used to identify the confirmation code, and the format of confirmation SMS messages.<\/p>\n<p style=\"text-align: left\">The auto confirmation procedure is done in the <i>com.dplug.sms.SMSTool.java<\/i> file. When an incoming SMS containing the <i>key<\/i> string is intercepted, the malware will use the <i>Forward<\/i> information to extract the confirmation code from the incoming message, and then automatically reply to the confirmation SMS sender with the confirmation code extracted (Fig. 8). The confirmation SMS message will also be blocked from being delivered to the inbox.<\/p>\n<p style=\"text-align: left\"><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8.png\"><div style=\"max-width:100%\" data-width=\"230\"><span class=\"ar-custom\" style=\"padding-bottom:9.13%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"alignnone size-medium wp-image-3830 lozad\" alt=\"dplug8\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8-230x21.png\" width=\"230\" height=\"21\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8-230x21.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8-500x45.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8-510x46.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8-240x22.png 240w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2013\/09\/dplug8.png 1088w\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" \/><\/span><\/div><\/a><\/p>\n<p style=\"text-align: left\" align=\"center\"><i>Fig 8. Auto confirmation with extracted confirmation code<\/i><\/p>\n<p style=\"text-align: left\">The malware logs all communications between itself and the remote attack servers in the <i>log.txt<\/i> file which is saved in the hidden folder <i>\u201c\/mnt\/sdcard\/Android\/.system\/.dplug\/ASK\/log.txt\u201d<\/i>.<\/p>\n<p style=\"text-align: left\"><b>Additional observations<\/b><\/p>\n<p style=\"text-align: left\">The observed network communications include:<\/p>\n<table class=\"alignleft\" border=\"1\" cellspacing=\"0\" cellpadding=\"0\">\n<tbody>\n<tr>\n<td valign=\"top\" width=\"275\">URL<\/td>\n<td valign=\"top\" width=\"275\">Returned results<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"275\">http:\/\/www.android-3.com:8008\/getPhoneNo.do?arg=0&amp;m=url<\/td>\n<td valign=\"top\" width=\"275\">\u201chttp:\/\/218.206.176.241:8084\/0901?http:\/\/42.121.144.223:88\/wyt.jsp\u201d<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"275\">http:\/\/www.android-3.com:8008\/getPhoneNo.do?arg=0&amp;m=get<\/td>\n<td valign=\"top\" width=\"275\">\u201cget:13241586871\u201d<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"275\">http:\/\/www.android-3.com:8008\/3.php?arg=0?cancel=1<\/td>\n<td valign=\"top\" width=\"275\">\u201cerror\u201d<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"275\">http:\/\/www.android-3.com:8008\/3.php?arg=0?cancel=0<\/td>\n<td valign=\"top\" width=\"275\">\u201cerror\u201d<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"275\">http:\/\/www.smqgame.com:888\/new.jsp?arg=0?cancel=1<\/td>\n<td valign=\"top\" width=\"275\">\u201cOK\u201d<\/td>\n<\/tr>\n<tr>\n<td valign=\"top\" width=\"275\">http:\/\/117.135.131.19:8008\/sms.do<\/td>\n<td valign=\"top\" width=\"275\">The confirmation message format. IP is still alive. The service is down.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: left\"><b>\u00a0<\/b><\/p>\n<p style=\"text-align: left\">The Dplug malware requires many permission types including:<\/p>\n<ul style=\"text-align: left\">\n<li>android.permission.WRITE_EXTERNAL_STORAGE<\/li>\n<li>android.permission.ACCESS_NETWORK_STATE<\/li>\n<li>android.permission.INTERNET<\/li>\n<li>android.permission.KILL_BACKGROUND_PROCESSES<\/li>\n<li>android.permission.FORCE_STOP_PACKAGES<\/li>\n<li>com.android.launcher.permission.INSTALL_SHORTCUT<\/li>\n<li>com.android.launcher.permission.UNINSTALL_SHORTCUT<\/li>\n<li>com.android.launcher.permission.READ_SETTINGS<\/li>\n<li>android.permission.WRITE_EXTERNAL_STORAGE<\/li>\n<li>android.permission.INSTALL_PACKAGES<\/li>\n<li>android.permission.DELETE_PACKAGES<\/li>\n<li>android.permission.RECEIVE_BOOT_COMPLETED<\/li>\n<li>android.permission.RECEIVE_USER_PRESENT<\/li>\n<li>android.permission.RECEIVE_SMS<\/li>\n<li>android.permission.RECEIVE_USER_PRESENT<\/li>\n<li>android.permission.RECEIVE_SMS<\/li>\n<li>android.permission.SEND_SMS<\/li>\n<li>android.permission.INTERNET<\/li>\n<li>android.permission.WRITE_EXTERNAL_STORAGE<\/li>\n<li>android.permission.GET_TASKS<\/li>\n<li>android.permission.ACCESS_WIFI_STATE<\/li>\n<li>android.permission.CHANGE_WIFI_STATE<\/li>\n<li>android.permission.ACCESS_NETWORK_STATE<\/li>\n<li>android.permission.WRITE_APN_SETTINGS<\/li>\n<li>android.permission.READ_PHONE_STATE<\/li>\n<li>android.permission.CHANGE_NETWORK_STATE<\/li>\n<li>android.permission.ACCESS_NETWORK_STATE<\/li>\n<li>android.permission.INTERNET<\/li>\n<li>android.permission.SYSTEM_ALERT_WINDOW<\/li>\n<li>android.permission.INTERNET<\/li>\n<li>android.permission.WRITE_EXTERNAL_STORAGE<\/li>\n<li>android.permission.READ_PHONE_STATE<\/li>\n<li>android.permission.ACCESS_NETWORK_STATE<\/li>\n<li>android.permission.SYSTEM_ALERT_WINDOW<\/li>\n<li>android.permission.GET_TASKS<\/li>\n<\/ul>\n<p style=\"text-align: left\">Dplug listens to the broadcast of following intents:<\/p>\n<ul style=\"text-align: left\">\n<li>android.intent.action.MAIN<\/li>\n<li>android.intent.action.PACKAGE_ADDED<\/li>\n<li>android.intent.action.PACKAGE_CHANGED<\/li>\n<li>android.intent.action.PACKAGE_REMOVED<\/li>\n<li>android.intent.action.PACKAGE_REPLACED<\/li>\n<li>android.intent.action.PACKAGE_RESTARTED<\/li>\n<li>android.intent.action.PACKAGE_INSTALL<\/li>\n<li>android.intent.action.BOOT_COMPLETED<\/li>\n<li>android.intent.action.USER_PRESENT<\/li>\n<li>android.provider.Telephony.SMS_RECEIVED<\/li>\n<li>android.intent.action.PHONE_STATE<\/li>\n<li>com.dplug.ptest.DlwxService2<\/li>\n<li>android.intent.action.PACKAGE_ADDED<\/li>\n<li>android.intent.action.PACKAGE_REMOVED<\/li>\n<li>android.net.conn.CONNECTIVITY_CHANGE<\/li>\n<li>com.zan.action.ALARM_ACTION<\/li>\n<li>android.intent.action.USER_PRESENT<\/li>\n<\/ul>\n<p style=\"text-align: left\"><b>Malware sample availability<\/b><\/p>\n<p style=\"text-align: left\">SHA256 value of the detected malicious APK file is:<\/p>\n<p style=\"text-align: left\">c87fe742831f52834fe5dcdae6aa96006b129f93cb71b406a68973675d74f62c.<\/p>\n<p style=\"text-align: left\">The APK file URL (valid at time of publication) is:<\/p>\n<p style=\"text-align: left\">http:\/\/d1.ttpod.com\/market-file\/2013\/07\/05\/and_cs_nck\/new_80030004.apk<\/p>\n<p style=\"text-align: left\"><i>Ttpod.com<\/i> is a Chinese music player app. The player app is available at Google Play store with name <i>TTPod<\/i> ( https:\/\/play.google.com\/store\/apps\/details?id=com.sds.android.ttpod). It is highly likely that this malware sample was downloaded through the in-app market of <i>TTPod<\/i> app.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In July 2013, WildFire detected a new kind of Android Package File (APK) malware named Dplug. This malware poses as a system tool app for memory cleaning. Dplug uses SMS to hijack &hellip;<\/p>\n","protected":false},"author":35,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[131,76,7,1],"tags":[],"coauthors":[],"class_list":["post-3822","post","type-post","status-publish","format-standard","hentry","category-malware-2","category-mobility","category-threat-advisory-analysis","category-uncategorized"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=3822"}],"version-history":[{"count":5,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3822\/revisions"}],"predecessor-version":[{"id":3835,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/3822\/revisions\/3835"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=3822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=3822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=3822"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=3822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}