51
Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia Ministry of Science, Technology & Innovation The Honeynet Project 10 th Annual Workshop ESIEA || PARIS || .FR || 2011-03-21 MAHMUD AB RAHMAN (MyCERT, CyberSecurity Malaysia) Reversing Android Malware

MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

The Honeynet Project 10th Annual Workshop

ESIEA || PARIS || .FR || 2011-03-21

MAHMUD AB RAHMAN

(MyCERT, CyberSecurity Malaysia)

Reversing Android Malware

Page 2: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 2 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

MYSELF

 Mahmud Ab Rahman

 MyCERT, CyberSecurity Malaysia

  Lebahnet(honeynet), Botnet, Malware

Page 3: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 3 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Agenda

  Intro

 Malware and Android

  Reversing Android Malware   Android Malware Cases study:

o SMS.Trojan o Geinimi

o DreamDroid

  Challenge and Issues

 Outro/Conclusion

Page 4: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

INTRO

Intro Reversing Android

Cases Study

Issues

Conclusion Android malware

Page 5: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 5 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Android 101

Page 6: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 6 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Android 101

  Android architecture: o Run on top of Linux kernel

o Use proprietary VM (Dalvik VM) as oppose to Java VM

o Mutiple layers for different purpose - Application layer - Driver layer

- Kernel layer

Page 7: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 7 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Android 101

  Android architecture

Page 8: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 8 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : APK 101

  Android package format o Bundle a few files into a file (.apk)

o Just a zip file o Classes.dex is core file – compiled java classes.

Page 9: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 9 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Dalvik VM 101

  Run userspace Android applications

  Designed by Dan Bornstein

  Register based: o Faster than stack based register

  Run dalvik bytecode instead of Java bytecode   Use “DX” tool to convert Java *.class to Dalvik

bytecode

http://android.git.kernel.org/?p=platform/dalvik.git;a=tree.

Page 10: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 10 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Dalvik VM 101

  Dalvik VM vs Java VM

(Mark schoenefeld,2009)

Page 11: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 11 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : Dalvik VM 101

  Java *.classes to .dex file

Page 12: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 12 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : DEX 101

  Executable format for Android platform

  DEX process flow

DX

Page 13: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 13 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO : DEX 101

  DEX file format

  *.odex o Optimized DEX

Page 14: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 14 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

INTRO :Android Apps Building Process

Page 15: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

ANDROID MALWARE

Intro Reversing Android

Cases Study

Issues

Conclusion Android malware

Page 16: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 16 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Android Malware

Page 17: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 17 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Android Malware

 Malicious piece of codes.

  Infection methods: o Infecting legitimate apps

- Mod app with malicious codes (Geinimi, DreamDroid,ADDR)

- Upload to “Market” or 3rd party hosting

o Exploiting Android’s (core/apps) bugs o Fake apps

- DreamDroid’s removal tool

Page 18: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 18 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Android Malware

  Infection methods (cont): o Remote install?.

- Victim’s gmail credential is required

- Browse “Market” and pass gmail info - “Market” will install app into victim’s phone REMOTELY

http://www.net-security.org/article.php?id=1556

Page 19: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

REVERSING ANDROID MALWARE

Intro Reversing Android

Cases Study

Issues

Conclusion Android malware

Page 20: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 20 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

ANDROID REVERSING

Page 21: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 21 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Source Of Files o APK file

- Can extract .DEX file

- Reversing and interactive debugging is possible –  ADB

o DEX file - Only reversing is possible

- Files for “res” + “asset” + etc are missing.

Page 22: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 22 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Building Process

Page 23: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 23 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Reversing Process

*.dex class *.class (java)

*.java

Disassembler: Baksmali/Dedexer/undx

Decompiler: Jad/Dava

Page 24: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 24 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Tools o Disassembler- to dump Dalvik VM bytecode to

assembly-like syntax - Dedexer - Baksmali

- Undx

- Dexdump – dumping *.dex file (from Android SDK)

o Assembler- to convert to original Dalvik VM bytecode - Smali

Page 25: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 25 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Tools (cont) o Text Editor – viewing the code

- Use a decent one with baksmali/dedexer output highlighter

–  UltraEdit –  Emacs

- Notepad is fine. :-)

o dex2jar - If you prefer Java than assembly-like output - Easy way to avoid complexity of Dalvik VM bytecode

- May have errors interpreting Dalvik VM bytecode

Page 26: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 26 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Check on AndroidManifest.XML o Permission request

o Entry point

  RE is solving a puzzle o Start with “names/strings”

- “NET”

- “CRYPTO”

- “SERVER”

- “IO”

o Check on suspicious Android API - Location API, SMS API, Phone API, Mail API, Network API

Page 27: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 27 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Reversing Android Malware

  Tracing function calls: o Browsing the codes and trace function call chains

(“XREF”)

Page 28: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

CASE STUDY

Intro Reversing Android

Cases Study

Issues

Conclusion Android malware

Page 29: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 29 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE STUDY

ANDROID MALWARE HAPPY FAMILY

Page 30: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 30 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #1: SMS.Trojan

 Oldest android malware (public)

  Very simple (follow HelloWorld Android SDK)

  Social engineering. It’s by nature is malicious app

  Perform toll SMS fraud to Russia (premium shortcode) o Toll charges to enduser o Send to shartcode number “3353” and “3354”

  A good reason for AV on mobile ; )

Page 31: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 31 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi

  Nice way to celebrate new year o Discovered close to new year eve!

 Modus Operandi o Infecting legitimate software

- MonkeyJump2, Sex Positions, etc.etc

  Features: o Encryption- DES

o C&C Servers o Info stealer

o Bot capability o Encrypted communication

Page 32: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 32 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Encryption- DES o Encrypted C&C and Data

o DES with “01020304050608” key

KEY DATA

Page 33: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 33 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Encryption- DES o Encrypted C&C and Data

o DES with “01234568” key

Page 34: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 34 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Reversing DES encryption

Page 35: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 35 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Encryption- DES (result))

DECRYPTED DATA

Page 36: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 36 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Info stealer o Steal info and pass to C&C Server

o Encrypted data o Steal data:

- IMEI,IMSI

- GEOLocation (lat,long) - SMS

- Contacts list

- Installed apps list

Page 37: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 37 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Bot capability o Received commands from C&C server

- dsms – Delete SMS(es)

- Smsrecord – steal sms record and pass to C&C - showurl – Open browser with URL

- Call – make a call to number

- Install – install apps

o State for bot - Start, download,parse, transact,Idle

Page 38: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 38 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Encrypted communication o Every data receive/sent are encrypted

o Embeded into “params” parameter for sending encrypted data

Page 39: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 39 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #2: Geinimi (cont)

  Backdoor o  TCP socket on ports 5432, 4501 or 6543

o Another back door on port 8791 - Send a "hi,xiaolu” response message to listener

- Send a “hi,liqian” response message to request

- Run at loopback interface. ; )

Page 40: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 40 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #3: ADDR

  Tagged Image File Format (abbreviated TIFF)

  file format for storing images

  it is under the control of Ad(0day)be Systems (2009)

 widely supported by image-manipulation application

Page 41: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 41 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #3: DreamDroid

  Latest addition to android malware family

 Modus Operandi o Infecting legitimate software o Hosted at “Market”

o 53 software infected

  Bundled with exploits to “root” the Android o Exploid (CVE-2009-1185) o Rageagaintsthecage (CVE-2010-EASY)

  Bot capability

Page 42: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 42 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #3: DreamDroid (cont)

  Features: o Encrypted communication (XOR)

o Encrypted data o Bot capability

o Two stage payloads - 1st Payload - Infected app

–  Rooted device

–  Install 2nd payload (DownloadProviderManager)

- 2nd Payload - DownloadProviderManager –  Sqllite.db (original filename)

–  Receive instructions from C&C

–  Send info to C&C

–  Silently install itself (copy to /system/app directory)

Page 43: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 43 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #3: DreamDroid (cont)

  Encryption o XOR operation

- KEY=“6^)(9-p35a%3#4S!4S0)$Yt%^&5(j.g^&o(*0)$Yv!#O@6GpG@=+3j.&6^)(0-

=1”.getBytes()

- DATA= “9442938832952138511219112519102302419997621102222611139125244801090511910

011960487794252”

o Revealed C&C server - http://184.105.245.17:8080/GMServer/GMServlet

  Send IMEI,IMSI, Device Model, SDK Version to C&C server

Page 44: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 44 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

CASE #3: DreamDroid (cont)

  Encryption

XOR Operation

Page 45: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

CHALLENGES AND ISSUES

Intro Reversing Android

Cases Study

Issues

Conclusion Android malware

Page 46: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 46 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Challenges and Issues

  Typical Reverse engineering challenges o Code obfuscation

- Obfuscation on data

o Encryption - Make it harder

- Eventually will be broken (as for current sample)

o Code optimizing - Code for device, painful for RE

  Tools is not yet mature o IDA PRO like RE suite

o XREF

Page 47: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 47 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Challenges and Issues

  Spotting the malicious apps o Not RE problem but how do you spot the

malicious app?.

  Remote Install via “Market” would be interesting to observe

Page 48: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

CONCLUSION

Intro Reversing Android

Cases Study

Issues

Conclusion Android malware

Page 49: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Copyright © 2011 CyberSecurity Malaysia 49 Securing Our Cyberspace

Ministry of Science, Technology & Innovation

Conclusion

  Android malware is interesting topic o More complex android malware are expected

o More exploits on Android platform are expected o More powerful hardware will change the

landscape!

  It is possible to reverse engineering Android malware o A lot of free tools to reverse engineering android

apps/malware

o Solving a puzzle. PERIOD

  Reversing tools are there, but yet to mature

Page 50: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

Q&A

Page 51: MyCERT-3-PST-HoneynetConf-Reversing Android Malwareindex-of.co.uk/readings/HPW2011 - Reversing Android... · Backdoor o TCP socket on ports 5432, 4501 or 6543 o Another back door

Securing Our Cyberspace Copyright © 2011 CyberSecurity Malaysia

Ministry of Science, Technology & Innovation

THANKS

Email: [email protected] Web: http://www.cybersecurity.my Web: http://www.mycert.org.my Web: www.cybersafe.my Report Incident: [email protected]