ANDROIDOS_KRBOT.HRX
Hacking/Cracking Tool
Android OS

Threat Type: Trojan
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
TECHNICAL DETAILS
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
NOTES:
This malware targeted South Korea users. It hides in popular cracked game apps found in the underground forums and torrent websites. The remote bot server went down, causing the malware inactivity.
In October 2014, new variants are found in Chinese underground forums stored in http://appgame.{BLOCKED}3.com/.
This malware runs as a background service com.google.playstore.AppDataService, which starts on launch or device reboot. It logs in to mail services such as AOL, Gmail, GMX, etc. using predefined mail accounts. It gets mail with control code in the mail box.
The code can be decypted into the socket server androidapp.{BLOCKED}y.com:55555 and the HTTP server http://androidapp.{BLOCKED}y.com:50080/php/download.php. The socket server is used for the bot to listen for command, while the HTTP server is used for downloading or uploading data.
The commands it performs can be any of the following:
- register - register to remote server
- request_call_log - request call log record
- request_contact - request contacts list
- request_file_list - request to list files in device storage
- request_create_new_dir - request to create new folder in device storage
- request_file_upload - request to upload files in device storage
- request_file_download - request to download files into device storage
- request_item_delete - request to delete files in device storage
- request_calendar_event - request to upload calendar events
- request_del_message - request to delete SMS message
- request_send_message - request to upload SMS message
- request_send_all_message request to upload all SMS message
- request_endcontrol - End remote control
SOLUTION
Step 1
Trend Micro Mobile Security Solution
Trend Micro Mobile Security Personal Edition protects Android smartphones and tablets from malicious and Trojanized applications. The App Scanner is free and detects malicious and Trojanized apps as they are downloaded, while SmartSurfing blocks malicious websites using your device's Android browser.
Download and install the Trend Micro Mobile Security App via Google Play.
Step 2
Scan your computer with your Trend Micro product to delete files detected as ANDROIDOS_KRBOT.HRX. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.