www.lookout.com
Open in
urlscan Pro
2600:9000:26e8:aa00:8:1c11:1200:93a1
Public Scan
URL:
https://www.lookout.com/threat-intelligence/article/wyrmspy-dragonegg-surveillanceware-apt41
Submission: On November 25 via api from IN — Scanned from DE
Submission: On November 25 via api from IN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Lookout ResearchThreat GuidancesThreat DataResourcesAbout Us Contact Us Android Lookout Spyware WyrmSpy and DragonEgg APT41 In-Depth Analysis July 19, 2023 LOOKOUT ATTRIBUTES ADVANCED ANDROID SURVEILLANCEWARE TO CHINESE ESPIONAGE GROUP APT41 SUMMARY * Lookout attributes WyrmSpy and DragonEgg to infamous Chinese espionage group APT41, which has not slowed down since recent indictments by the U.S. government. * APT41 is known to target a wide range of public and private sector organizations, including nation-state governments, software development companies, computer hardware manufacturers, telecommunications providers, social media companies, and video game companies. * An established threat actor like APT41 turning their focus to mobile devices shows that mobile endpoints are high-value targets with coveted data. * WyrmSpy and DragonEgg use modules to hide their malicious intentions and avoid detection. * WyrmSpy and DragonEgg were first reported to Lookout Threat Intelligence Services subscribers in October 2020 and January 2021 respectively in full write-ups that included IOCs, YARA rules, and additional threat analysis. * Contact us if you have been targeted or would like to consult with our research team on mobile threats. WHAT ARE WYRMSPY AND DRAGONEGG SURVEILLANCEWARE? WyrmSpy and DragonEgg are two advanced Android surveillanceware that Lookout attributes to high-profile Chinese threat group APT41, also known as Double Dragon, BARIUM, and Winnti. While APT41 is mostly known for exploiting web-facing applications and infiltrating traditional endpoint devices, these malware are rare reported instances of the group exploiting mobile platforms. Lookout Threat Lab researchers have been actively tracking both spyware and providing coverage to Lookout Mobile Endpoint Security customers. We provided the first detailed write-up of WyrmSpy to our Threat Intelligence Services subscribers in October 2020. The Lookout Security Graph first ingested samples of WyrmSpy in 2017, while DragonEgg was first detected in early 2021 and our latest example dates to April 2023. Both surveillanceware appear to have sophisticated data collection and exfiltration capabilities and hide those functions in additional modules that are downloaded after they are installed. WyrmSpy primarily masquerades as a default operating system app, while DragonEgg pretends to be third-party keyboard or messaging apps. WHAT IS THE APT41 ESPIONAGE GROUP? APT41 is a state-sponsored APT espionage group based in the People’s Republic of China that has been active since 2012. Unlike many nation-state-backed APT groups, APT41 has a track record of compromising both government organizations for espionage, as well as different private enterprises for financial gain. According to U.S. grand jury indictments from 2019 and 2020, the group was involved in compromising over 100 public and private organizations, and individuals in the United States and around the world, including Australia, Japan, India, South Korea, Singapore, and Taiwan. These companies include software development companies, computer hardware manufacturers, telecommunications providers, social media companies, video game companies, universities, think tanks, and foreign governments, as well as pro-democracy politicians and activists in Hong Kong. The U.S Department of Justice’s indictment named five individuals associated with APT41, three of whom — Jiang Lizhi (蒋立志), Qian Chuan (钱川), and Fu Qiang (付强) — are publicly listed in leadership positions of Chinese company Chengdu 404 Network Technology Co., Ltd., a.k.a “Chengdu 404.” The indictment charges the men with conspiracy, racketeering, money laundering, fraud, identity theft, access device fraud, unauthorized access to protected computers and wire fraud in association with Chengdu 404. The FBI notice poster with images of the individuals charged in connection to APT41’s cyber espionage activities. A Chinese business directory listing for Chengdu 404 lists Qian Chuan as “Managing Director” and Jiang Lizhi as “Manager.” Chengdu 404 is described as “a network technology company.” APT41’S CONNECTION WITH WYRMSPY AND DRAGONEGG DragonEgg and WyrmSpy are connected to each other through their use of overlapping Android signing certificates. Some versions of WyrmSpy introduced unique signing certificates that were later observed in use by DragonEgg developers. It was through WyrmSpy that Lookout was able to attribute the two malware to APT41 due to a link between the command-and-control (C2) infrastructure hard-coded into the malware’s source code and Chengdu 404. Early samples use IP address “121.42.149[.]52” as part its C2 infrastructure, which was the resolving IP for a subdomain, “vpn2.umisen[.]com,” a part of the hacking infrastructure APT41 used between May 2014 until August 2020, as revealed in the U.S. Department of Justice’s indictment. WyrmSpy includes a hard-coded C2 IP address, “121.42.149[.]52”, used as a resolving IP for a known APT41 domain. “Vpn2.umisen[.]com” is a subdomain of umisen[.]com, which itself resolved only to 121.42.149[.]52 from the end of 2015 through late 2017. A total of 14 samples that Lookout researchers analyzed that communicated with this IP address, which appeared to have been packaged between March and July 2017. The IP address found in earlier WyrmSpy samples was the resolving IP for “umisen[.]com” between December 2015 and August 2017, when malware samples containing this C2 were created and distributed. A WHOIS record for “umisen[.]com” from 2015 and 2016 lists one of the individuals named in the indictment, Jiang Lizhi, as the registrant for the domain. The email listed in the WHOIS record, “huliwahaha@gmail[.]com,” resembles a password ”wahaha@20170”, which is also mentioned in the indictment. The IP address found in earlier WyrmSpy samples was the resolving IP for “umisen[.]com” between December 2015 and August 2017, when malware samples containing this C2 were created and distributed. HOW ARE WYRMSPY AND DRAGONEGG DEPLOYED It appears that the targeting of WyrmSpy and DragonEgg varies greatly. WyrmSpy primarily masquerades as a default Android system app used for displaying notifications to the user. Later variants package the malware into apps masquerading as adult video content, “Baidu Waimai” food delivery platform, and Adobe Flash. DragonEgg has been observed in apps purporting to be third-party Android keyboards and messaging apps like Telegram. Lookout researchers have not yet encountered samples in the wild and assess with moderate confidence that they are distributed to victims through social engineering campaigns. Google confirmed that based on current detection, no apps containing this malware are found to be on Google Play. NOTABLE CAPABILITIES OF WYRMSPY AND DRAGONEGG The two malware request extensive device permissions while relying on modules that are downloaded after the apps are installed to enable data-exfiltration capabilities. WYRMSPY CAPABILITIES After it’s installed and launched, WyrmSpy uses known rooting tools to gain escalated privileges to the device and perform surveillance activities specified by commands received from its C2 servers. These commands include instructing the malware to upload log files, photos stored on the device, and acquire device location using the Baidu Location library. Although we were not able to acquire additional modules from the C2 infrastructure at the time of discovery, we assess with high confidence that a secondary payload is used by the malware to perform additional surveillance functionality. This is based on the permissions that WyrmSpy obtains but does not use in the code contained in the app, which indicates abilities to exfiltrate additional data, such as SMS and audio recordings. Configuration files used by the malware to execute instructions received by the C2 further support this hypothesis, with references to “AudioRecord” and “Files” set to true or false based on received commands. POTENTIAL DATA THAT WYRMSPY COLLECTS * Log files * Photos * Device location * SMS messages (read and write) * Audio recording DRAGONEGG CAPABILITIES Similar to WyrmSpy, DragonEgg appears to rely on additional payloads to implement the full scale of its surveillance functionality. At launch, the malware acquires — either from C2 infrastructure or a bundled file within the APK — a payload often named “smallmload.jar” which attempts to acquire and launch additional functionality. Like WyrmSpy, the DragonEgg samples request extensive permissions for services that are not directly exploited in the core app. We suspect that by trojanizing legitimate chat apps like Telegram, APT41 is trying to remain inconspicuous while requesting access to extensive device data. Messaging apps typically request access to sensitive device data, and by hiding its surveillance functionality within a large, fully-functional app, the threat actor is better able to remain inconspicuous while the app is running on the device or statically analyzed by a researcher. POTENTIAL DATA THAT DRAGONEGG COLLECTS * Device contacts * SMS messages * External device storage files * Device location * Audio recording * Camera photos WYRMSPY TECHNICAL ANALYSIS COMMUNICATIONS WITH C2 AND CONFIGURATION FILES WyrmSpy relies on commands received from C2, as well as configuration files to determine the actions it takes against the compromised device and the data it exfiltrates. As server-side code is not accessible from the C2, it is not yet clear whether a threat actor has automated the commands sent to the malware client, or whether direct human interaction is required. The configuration files are created and populated by WyrmSpy on startup and form the basis of the behavior on an infected device. As the malware interacts with the device and receives instructions from its C2, it modifies the configuration files accordingly. Additional configuration files contain information about the C2, metadata and identifiers that were initially collected about the infected device. A file named “ManifestFile.json” is acquired from the C2 and specifies C2 beaconing intervals, lists of files for upload and download, and a list of shell commands to execute on the device. WyrmSpy relies on commands received from its C2, as well as configuration files to determine the actions it takes against the compromised device and the data it exfiltrates. ROOTING THE DEVICE WyrmSpy leverages well known rooting tools such as KingRoot11 and IovyRoot/IvyRoot12. It’s also able to disable SELinux on appropriate versions of Android, an action attackers sometimes take in order to access data they might not otherwise be able to. If the packaged rooting tool does not work or does not exist, and if the device is not already rooted, the malware queries the C2 infrastructure with the model and kernel version of the infected device. It then receives a response containing a file name which the malware uses to download additional rooting binaries from C2 infrastructure if one exists for the specified device. The malware attempts to acquire an additional rooting tool to gain root privileges if the bundled tools, like KingRoot, are unsuccessful. DRAGONEGG TECHNICAL ANALYSIS Similar to WyrmSpy, DragonEgg relies on a secondary payload often named “smallmload.jar” to load a tertiary module. DragonEgg relies on a secondary payload that’s often named “smallmload.jar.” In DragonEgg’s logging messages, the developers refer to the tertiary module acquired by the “smallmload” class files as “forensics program (T1 version)”. Naming surveillance tools as “forensics program” is common amongst Chinese-speaking defense or software development firms. This is in contrast to the use of “trojan” or other malware-related moniker that independent developers of surveillance tools would use. By the time we analyzed DragonEgg, its C2 infrastructure was already offline, which prevented Lookout researchers from acquiring this “T1” forensics tool loaded by the core application. DragonEgg developers refer to the tertiary payload as the “forensics program (T1 version)”. INDICATORS OF COMPROMISE WYRMSPY SHA1 92ddbe438c8c8c1ef82fa5bb02e526db10829736 0b4a9a3f167178054ef9f9a97463cbe31f078c2f d713b8b0f3764157cc18d5dc1cb0f9c558067728 589d88093dad377d46f34415a7f9df11d65b81ed ab560af6bafff8f58ea5bc53c0391501415aed14 5891fa6a3a8232192ebd57a171bad29f53c7598c 4405af38c4a6b6130fcf242a11b0ce7963a1be28 5c16637848d6f1eb4aa6c5b2a4928a1144cd2113 2fbd56b1f3859c6d03dec47f8fcee7e37dc303a1 085191fb59d3933f8447610126600754b35697d4 d634a548973c7931e224a41201be0a273d561cff 971f4cd569ad9f84e654b62bffdba3a4aa21d4e9 331acbdd270acecfa80bc7b4e37629611593de0a 215847e4c41144365b94cb924d969dbc5e69052b cc351ffbe748b1db43de6dcd40934fe23986e753 85ca8cd21d70668bd2aab9c53163f5e03a0e1a8b 6dd20f7b9ccbd961d155fff78452303a54714841 d02f548d354adff645318de6edc45dff23170241 2438069c43771f0011da2f22b57b8336aaa7562c 5c2fc57609ee28753b78a0f33ba7519fc9fbb6f8 53c745956c3501d1daf232aeea5edfb52168c6b4 dfff9ae245cc0beed8fdf409c00ec758d7d2678f 517ec909bc9e308b44d59dfd144188d1e23f57bc 232b868e36f064b4151e4386835642fc8bf07e0b 92ddbe438c8c8c1ef82fa5bb02e526db10829736 9b6297825a6c00b3af16748684d4de551cc7be75 0b4a9a3f167178054ef9f9a97463cbe31f078c2f d713b8b0f3764157cc18d5dc1cb0f9c558067728 589d88093dad377d46f34415a7f9df11d65b81ed ab560af6bafff8f58ea5bc53c0391501415aed14 5891fa6a3a8232192ebd57a171bad29f53c7598c e514042565ffb2811f780227fee5ed5683925d49 4405af38c4a6b6130fcf242a11b0ce7963a1be28 17e6bbed5e43ec5b8d2821e0145da7ee32a58ea6 5c16637848d6f1eb4aa6c5b2a4928a1144cd2113 2fbd56b1f3859c6d03dec47f8fcee7e37dc303a1 085191fb59d3933f8447610126600754b35697d4 d634a548973c7931e224a41201be0a273d561cff 971f4cd569ad9f84e654b62bffdba3a4aa21d4e9 331acbdd270acecfa80bc7b4e37629611593de0a 58cda5e4607557d79bc5e36764b577f17e77af49 a9d2f59b8457c6998b654054084b102adfcf3306 215847e4c41144365b94cb924d969dbc5e69052b cc351ffbe748b1db43de6dcd40934fe23986e753 85ca8cd21d70668bd2aab9c53163f5e03a0e1a8b 6dd20f7b9ccbd961d155fff78452303a54714841 d02f548d354adff645318de6edc45dff23170241 2438069c43771f0011da2f22b57b8336aaa7562c 5c2fc57609ee28753b78a0f33ba7519fc9fbb6f8 53c745956c3501d1daf232aeea5edfb52168c6b4 INFRASTRUCTURE 116.205.4[.]18 dns.win10micros0ft[.]com www.andropwn[.]xyz 121.42.149[.]52 update.umisen[.]com DRAGONEGG SHA1 b456a61a3e0ac6073a716b06293a3295a261de56 209567f4f28c5c8abcbe56d789e558aa64239534 b456a61a3e0ac6073a716b06293a3295a261de56 cab70e99516a36ab0f0d3851375adf0740f4bd5e 81762cfae0bd5585e8c0c86e4fdbbe47d2dd614a fbda76a2c2834f89d642a72c24b1988a1f56e4b8 INFRASTRUCTURE 118.193.39[.]165 121.201.109[.]98 alxc.tbtianyan[.]com yxwasec[.]com smiss.imwork[.]net huaxin-bantian.duckdns[.]org 103.43.17[.]99 Lookout would like to thank former Lookout researcher Apurva Kumar for her extensive contribution to this research. AUTHORS KRISTINA BALAAM Staff Security Intelligence Engineer Kristina is a Staff Security Intelligence Engineer at Lookout where she reverse engineers mobile malware. Prior to Lookout, she worked as an Application Security Engineer at Shopify focusing mostly on Android mobile security. Kristina graduated with a Bachelor of Computer Science from McGill University in 2012, and is currently pursuing a MSc. in Information Security Engineering from the SANS Institute of Technology. She blogs about computer security on Instagram, Twitter and Youtube under the handle @chmodxx.” JUSTIN ALBRECHT Global Director, Mobile Threat Intelligence Justin Albrecht is the Global Director of Mobile Threat Intelligence. He works with his team to uncover new mobile threats, track actors and targets, and provide accurate research and reporting on these issues. Justin has over 20 years of experience tracking cyber threat actors, terrorists, and intelligence activities in both the intelligence community, and more recently as a member of Lookout’s Threat Intelligence Team. Platform(s) Affected Android Discovered By Lookout Threat Type Spyware Threat Name WyrmSpy and DragonEgg Adversary Group APT41 Entry Type In-Depth Analysis Platform(s) Affected Android Lookout Spyware WyrmSpy and DragonEgg APT41 In-Depth Analysis RELATED CONTENT CHROME & FIREFOX VULNERABILTIES Google and Mozilla have both recently disclosed critical vulnerabilities in their respective Chrome and Firefox web browsers. Read Threat Article CVE-2024-36971 Google recently disclosed a new zero-day affecting all devices running its Android operating system. It exists in the Linux kernel’s network route management capabilities. Read Threat Article EVILVIDEO TELEGRAM EXPLOIT Researchers recently disclosed their discovery of a zero-day vulnerability in the Telegram app for Android. Read Threat Article IDENTIFY AND PREVENT THREATS WITH LOOKOUT THREAT ADVISORY STOP CYBERATTACKS BEFORE THEY START WITH INDUSTRY-LEADING THREAT INTELLIGENCE. Lookout Threat Advisory offers advanced mobile threat intelligence, leveraging millions of devices in our global network and top security research insights to protect your organization. Learn More Today Schedule Demo LegalPrivacy PolicyCookie PolicyTransparency Report Do not sell or share my personal information Compliance InfoCompliance Info (Gov)Sitemap © 2024 Lookout, Inc. LOOKOUT®, the Lookout Shield Design®, LOOKOUT with Shield Design® and the Lookout multi-color/multi-shaded Wingspan Design® are registered trademarks of Lookout, Inc. in the United States and other countries. DAY OF SHECURITY®, LOOKOUT MOBILE SECURITY®, and POWERED BY LOOKOUT® are registered trademarks of Lookout, Inc. in the United States. Lookout, Inc. maintains common law trademark rights in EVERYTHING IS OK, PROTECTED BY LOOKOUT, CIPHERCLOUD, and the 4 Bar Shield Design. Lookout Cloud Security Cloud SecurityLookout Secure Cloud AccessLookout Secure Internet AccessLookout Secure Private Access Lookout Endpoint Security Endpoint SecurityLookout Mobile Endpoint SecurityLookout Threat Intelligence Solutions Zero Trust SecurityVPN AlternativesMobile Device SecurityData ComplianceCloud Data ProtectionAdvanced Threat Protection Industries HealthcareEducationFederal GovernmentState & Local GovernmentFinancial ServicesManufacturing Support Enterprise Support LoginEnterprise Support ProgramsProduct Documentation Contact Us How to Reach Us (844) 371-5665 HeaderHeaderHeaderHeaderCellCellCellCellCellCellCellCellCellCellCellCellCellCellCellCell By clicking “Accept All Cookies”, you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts. Accept All Cookies Reject All Cookies Settings PRIVACY PREFERENCE CENTER When you visit any website, it may store or retrieve information on your browser, mostly in the form of cookies. This information might be about you, your preferences or your device and is mostly used to make the site work as you expect it to. The information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies. Click on the different category headings to find out more and change our default settings. However, blocking some types of cookies may impact your experience of the site and the services we are able to offer. More information Allow All MANAGE CONSENT PREFERENCES STRICTLY NECESSARY COOKIES Always Active Strictly necessary cookies are classified as cookies that must be present for the website to provide the basic functions of the website. They are essential to be able to access features of the website and could include signing in, adding items to a cart, or e-billing. PERFORMANCE COOKIES Performance Cookies Performance cookies are cookies used specifically for gathering data on how visitors use a website, which pages of a website are visited most often, or if they get error messages on web pages. These cookies monitor only the performance of the site as the user interacts with it. These cookies don’t collect identifiable information on visitors, which means all the data collected is anonymous and only used to improve the functionality of a website. FUNCTIONAL COOKIES Functional Cookies Functional cookies allow websites to remember the user’s site preferences and choices they make on the site including username, region, and language. This allows the website to provide personalized features like local news stories and weather if you share your location. They are anonymous and don’t track browsing activity across other websites. DO NOT SELL OR SHARE MY PERSONAL INFORMATION Do not sell or share my personal information You have the right to opt-out of the sale of your personal information to third parties. These cookies collect information for analytics and to personalize your experience with targeted ads. You may exercise your right to opt out of the sale of personal information by using this toggle switch. If you opt out we will not be able to offer you personalised ads and will not hand over your personal information to any third parties. Additionally, you may contact our legal department for further clarification about your rights as a California consumer by using this Exercise My Rights link. If you have enabled privacy controls on your browser (such as a plugin), we have to take that as a valid request to opt-out. Therefore we would not be able to track your activity through the web. This may affect our ability to personalize ads according to your preferences. * TARGETING COOKIES Switch Label label Targeting cookies are specifically designed to gather information from you on your device to display advertisements to you based on relevant topics that interest you. Advertisers will place these cookies on a website with the website operator’s permission. The information the cookies gather on you can be shared with other advertisers to measure the performance of their advertisements. Additionally, another purpose of targeting and advertising cookies is to build user profiles from visitors to the website to gather statistics on the performance of the advertisements that can carry across many websites. Back Button BACK Search Icon Filter Icon Clear checkbox label label Apply Cancel Consent Leg.Interest checkbox label label checkbox label label checkbox label label Reject All Confirm My Choices