Protip: don’t install an Android application package file if it’s named “Certificate.apk”.

It’s not legit (obviously).

Trojan:Android/Pincer.A is able to forward SMS messages and perform other actions based on commands it receives from its C&C. When installed, it will appear in the application menu as “Certificate” and will display related bogus messages when run.

Pincer_02 Pincer_01

Previous malicious mobile applications pretending to be certificates have been mobile components of banking trojans aimed at defeating two-factor authentication. The fact Pincer is able to forward SMS messages means it can certainly also be used as such.

The commands Pincer waits for are:

•  start_sms_forwarding
•  start_call_blocking
•  stop_sms_forwarding
•  stop_call_blocking
•  send_sms
•  execute_ussd
•  simple_execute_ussd
•  stop_program
•  show_message
•  delay_change
•  ping

The show_message command enables interesting interactivity as it displays a message to the victim, the message content comes from the C&C at the same time as the command itself is delivered.

The call-home destinations for the trojan are http://198.xxx.xxx.xxx:9081/Xq0jzoPa/g_L8jNgO.php and +4479372xxxxx.

The IMEI of the phone is used as an identifier by the C&C server. Other information sent there includes phone number, device serial number, phone model, carrier, and OS version.

Of note: Pincer checks to see if it’s being run in an emulator by checking the IMEI, phone number, operator, and phone model. (A common “anti-analysis” technique used by Windows malware.)

SHA1: 2157fd7254210ef2e8b09493d0e1be3b70d6ce69

Additional similar samples:

•  9416551d3965d3918eef3788b0377963d7b77032
•  1ebfc6f1f3e15773f23083c9d8d54771e28f5680

And on a final note…

The trojan includes a class called USSDDumbExtendedNetworkService. The URI_AUTHORITY variable is set to [redacted].com — and the redacted word is either associated with a French Canadian concrete company or else it may be the Twitter handle of a young Russian whose Google+ page lists employment as “Android developer”.

We don’t have any “concrete” evidence… but we’re pretty sure Pincer doesn’t have anything to do with Canada.

—————

Technical analysis by — Mikko Suominen

—————

Updated to add:

Here’s two more Pincer samples discovered from data mining:

This one is essentially the same as previous three, but has a different C&C URL (https://xxx-xxxxx.com/android_panel/gate.php) and certificate. It was first seen in VirusTotal a week earlier than the first of the previously discovered samples.

•  ec14ed31a85f37fad7c7d9c8c0d2aad3a60c8b36

This is a more interesting sample, clearly an earlier variant (submitted on March 19th to VirusTotal). This version doesn’t pretend to be certificate. Instead it calls itself “Mobile Security”.

Pincer_03

•  60e1cd1191e0553f8d02289b96804e4ab48953b3

The sample crashed on start, but based on static analysis, it would display the message “Mobile Security System is active now. You are protected.” The icon is the same as in other variants. The name of the package is also different. The other samples use com.security.cert or com.security.certificate, this one is com.[redacted].diverter.

Diverter?

Yeah… that’s a feature you don’t want in your “mobile security”.

Joseph Forbes (691)

Information Technology Consultant. For SMB, SOHO, and Online business. From Computers to Telecommunications this guy has been into it since hippies made it hip. Drone Pilot and Tech Aficionado I get to travel the State of Texas to help businesses succeed.