Library
My library

Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Android.Clipper.31

Added to the Dr.Web virus database: 2024-12-03

Virus description added:

SHA1:

  • aeeaf0f9b21f8c9adedc5a72d7d4d1ce360d0150

Description

Malicious Android software module that implements clipper functionality. It is distributed as a pre-installed WhatsApp application, that is trojanized as part of a supply chain attack.

Operating routine

When the host application is launched, the LSPatch framework loads the module alongside it from the com.whatsHook.apk file. The com.whatsHook.HookMessage class allows changing the messenger behavior as follows:

  1. On first run, it performs a POST request to <С2_name>/api/index/install, sending device information

    {"type":"android","userid":"1","device":"ХХХХХХ","channel":"5003","deviceInfo":"{\"DeviceManufacturer\":\"Xiaomi\",\"DeviceProduct\":\"tissot\",\"DeviceBrand\":\"xiaomi\",\"DeviceModel\":\"Mi A1\",\"DeviceDevice\":\"tissot_sprout\",\"DeviceUser\":\"builder\",\"DeviceAndroidVersion\":\"9\",\"DeviceDefaultLanguage\":\"ru\"}","happName":"whatsapp"}
  2. The module replaces a legitimate application update link with the one provided by the attackers. It does this by searching for the A03 method, which provides a link to download updates for the WhatsApp application.

    #drweb

    Then it calls the о{} class that substitutes a legitimate update link for a URL provided by the scammers.

    #drweb

  3. Intercepts outgoing and incoming WhatsApp messages. Searches for and spoofs TRX and ETH wallet addresses in WhatsApp messages. The spoofed addresses are either provided by the C2 server or the trojan uses values embedded in its code: TN7pfenJ1ePpjoPFaeu46pxjT9rhYDqW66 and 0x673dB7Ed16A13Aa137d39401a085892D5e1f0fCA. Sends all messages to the attacker's server.

  4. Searches for.jpg, .png, and .jpeg files in the following directories and sends them to the attackers:

    Environment.DIRECTORY_DCIM,

    Environment.DIRECTORY_PICTURES,

    Environment.DIRECTORY_ALARMS,

    Environment.DIRECTORY_DOWNLOADS,

    Environment.DIRECTORY_DOCUMENTS,

    Environment.DIRECTORY_SCREENSHOTS

The clipper has been detected in devices whose names have been chosen to resemble model names of well-known brands. Some of the devices are manufactured under the SHOWJI brand name.

SHOWJI S19 Pro Note 30i Camon 20
SHOWJI Note 13 Pro S23 Ultra P70 Ultra
SHOWJI X100S Pro S18 Pro M14 Ultra
SHOWJI Reno12 Pro 6 Pro S24 Ultra

MITRE matrix

Stage Technique
Initial access Compromise Software Supply Chain (T1474.003)
Execution Native API (T1575)
Persistence Compromise Application Executable (T1577)
Collection Clipboard Data (T1414)
Command and Control

Application Layer Protocol (T1437)

Web Protocols (T1437.001)

Encrypted Channel (T1521)

Exfiltration Exfiltration Over C2 Channel (T1646)
Impact Data Manipulation (T1641)

Curing recommendations


Android

  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android