Mobile Malware Evolution Flashcards

1
Q

Growth of mobile malware was slow up until 2010, despite the industry constantly predicting it would increase. What change in 2010-2012 saw an explosion in malware?

A

Android was released

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

For mobile worms – name 3 main ways that they can spread from device to device

A
  • Bluetooth
  • MMS
  • other vulnerable protocol (e.g. SSH) on the provider netblock
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Apart from “normal” spyware features that are common between Windows and Mobile malware (infostealing of passwords) – name 3 features that are generally unique to mobile malware

A

Anything with SMS, or Phone Calls, Geolocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Briefly (1-2 lines) explain how a Banking Mobile Trojan tends to work

A

They are normally designed to intercept 2 factor – by intercepting SMS or a proprietary protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

You have found an Android malware sample that you believe to be exfiltrating data to a number starting with +353. Give a general overview of how to do Android malware analysis by treating it as Java code (as opposed to Dalvik assembly). In your description list:

  • The main tools you would use
  • 1-2 lines to describe the major steps you would carry out in order to analyse the sample and identify where the code sending the message is located
A
  • Tools: Winzip, Dex2Jar, JD-GUI
  • Desc of using these 3 tools in order, and then searching in the decompiled Java for +353.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Name ways how a malicious APK file can make its way onto a target phone?

A
  • 3rd Party App Stores
  • Official Android PlayStore
  • Driven By Downloads
  • Phising
  • QR codes
  • Mobile Worm
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are three common malware motives?

A
  • Worms (just spread for the sake of spreading)
  • Malicious destructive Trojans
  • Financially motivated malware
    • Banking trojans like Zitmo
    • Ransomware
    • SMS Trojans to high cost numbers
    • SPAM Trojans
    • Spyware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How is an APK being created?

A
  1. Programmer write code in Java
  2. Compiler compiles files into Class files
  3. Class files gets converted to dex files (Bytecode for Dalvik VM)
  4. Classes.dex + AndroidManifest.xml + Resources (media files) = APK file
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can you analyse Android Malware?

A
  1. WinZip: Extract content => Manifest + DEX file
  2. Dex2Jar: Convert classes.dex into JAR
  3. JD-GUI: Use Java Decompiler to analyse code inside JAR.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why increased malware on Android that much?

A
  • A Platform / OS with enough market share to make good business sense to attack
  • Good development support
  • Relatively poor lack of security protection
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the AndroidManifest.xml?

A

The XML file AndroidManifest.xml describes the application (e.g. The permissions needed). These are the same permissions that are presented to a user when they wish to install an app

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name some other Android analysis tools?

A
  • AndroGuard
  • Joes Sandbox
  • APK-Analyzer.net
  • Genymotion
  • AppUse
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What can you do if the some parts are coded directly in the Dalvik language?

A

Use SMALI / BAKSMALI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly