Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

5/28/2014
12:00 PM
Felix Leder
Felix Leder
Commentary
Connect Directly
LinkedIn
RSS
E-Mail vvv
50%
50%

Dissecting Dendroid: An In-Depth Look Inside An Android RAT Kit

Dendroid is full of surprises to assist it in subverting traditional security tactics through company-issued Android phones or BYOD.

In March, alarms went off when security researchers discovered the Android malware creation kit Dendroid was being advertised in malware forums for sale to anyone who wanted to automate the distribution process for a mere $300.

Dendroid consists of a web-based administration panel and a builder that can add “Remote Administration Toolkit” (RAT) functionality by repackaging it with existing applications. Researchers disclosed how easy it is to patch Dendroid into existing apps (which is scary enough, given how quick users are to download new apps) but what sets Dendroid apart is the myriad of malicious functionality it possesses to exploit an Android device.

One of the most frightening examples of Dendroid capabilities is that it can secretly record all of your phone calls or silently listen in on your phone’s microphone whenever it wants. The malware can also upload all of your phone’s pictures. Imagine walking into the office, going on an interview, or applying for a bank loan one day and have to face your entire digital personal history on display. Even costlier than personal embarrassment, though, is the potential risk Dendroid poses for businesses using company-issued Android devices or supporting a BYOD policy. Pictures of notes from brainstorming sessions or intellectual property are temptingly at risk of exploitation.

Diverging from the data-loss theme for a moment, Dendroid can also perform “classic” Android malware functions, such as sending SMS messages to premium-rate numbers without making its owner aware until the huge bill arrives.

Even worse is the fact that Dendroid is clever enough that it can hide in plain sight, packaging itself inside an application that appears to be a parental control tool. One area where this can really wreak havoc is with parental control apps that require several of the same privileges as the RAT, such as accessing GPS coordinates or checking installed apps. This allows Dendroid to sneak by defenses, even with manual inspection, while secretly requesting permissions to access a long list of questionable applications and actions including:

  • INTERNET
  • CAMERA
  • READ_SMS
  • WRITE_SMS
  • READ_CONTACTS
  • WAKE_LOCK
  • CALL_PHONE
  • RECORD_AUDIO

Dendroid is full of surprises to assist it in subverting traditional security tactics. In this screenshot, you can see how Dendroid authors use configurations and commands to further their efforts:

Notice the flag called “GPlayBypass,” which stands for “Google Play Bypass.” This functionality is designed to help the malware evade detection by Google Bouncer, a sandboxing tool through which almost every app has to run before it is allowed into the Google Play store. It’s just one of the many tools Dendroid wields in its quest to cause the greatest amount of harm to your Android device.

In the end, of course, it’s all about money for Dendroid. In this malware forum post from October 2013, the author advertises the sale of Dendroid source code for both the panel and the builder (including three months of support). He or she fondly notes in another section of the post that the project took “1.3 years to fully develop”:

Dendroid’s large variety of available commands shows the full threat potential that an infected phone can have. The emulator detection is simple, but it is likely to work in various analysis environments. Since the kit includes components to repackage existing apps, we can expect to see more of Dendroid in the future.

All in all, this is a very interesting piece of malware, and a difficult one to detect. Users of network forensics appliances should look for indications of the traffic patterns, which you can read about in greater detail in my full blog post, Dendroid under the hood.

Felix Leder leads mobile malware research at Blue Coat Systems Norway. He has been instrumental in developing a number of malware analysis solutions, including Cuckoo box, Norman's Malware Analyzer G2, and Blue Coat's MAA. After beginning his career in the mobile space with ... View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
FelixLeder
50%
50%
FelixLeder,
User Rank: Author
5/28/2014 | 5:16:46 PM
Re: based off Androrat
That's a very important point, Robert. Charlie Miller and Jon Oberheide did some research on bouncer: https://jon.oberheide.org/files/summercon12-bouncer.pdf Unfortunatley, we are seeing more and more malware using their findings. Fortunately, this can be used to scan for suspicious candidates.
Robert McDougal
50%
50%
Robert McDougal,
User Rank: Ninja
5/28/2014 | 4:58:08 PM
Re: based off Androrat
One thing I feel is prudent to mention here is that Google only scans apps on the Play store for Malware when they are first uploaded.  An existing app on your phone could be updated with this malware and through the course of a normal update you could be infected.  This was an issue with Chrome extensions a few months back and Google supposedly changed their scanning practice, but I never heard of a change to their Play store scanning practices.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
5/28/2014 | 2:19:47 PM
Re: based off Androrat
Thanks @_g3nuin3 Here is the live link to that 

 
_g3nuin3
50%
50%
_g3nuin3,
User Rank: Apprentice
5/28/2014 | 1:14:01 PM
based off Androrat
It should also be mentioned that a major portion of the code and its overall basis was actually taken from the open source project androrat. https://github.com/DesignativeDave/androrat
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/3/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Browsers to Enforce Shorter Certificate Life Spans: What Businesses Should Know
Kelly Sheridan, Staff Editor, Dark Reading,  7/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17366
PUBLISHED: 2020-08-05
An issue was discovered in NLnet Labs Routinator 0.1.0 through 0.7.1. It allows remote attackers to bypass intended access restrictions or to cause a denial of service on dependent routing systems by strategically withholding RPKI Route Origin Authorisation ".roa" files or X509 Certificate...
CVE-2020-9036
PUBLISHED: 2020-08-05
Jeedom through 4.0.38 allows XSS.
CVE-2020-15127
PUBLISHED: 2020-08-05
In Contour ( Ingress controller for Kubernetes) before version 1.7.0, a bad actor can shut down all instances of Envoy, essentially killing the entire ingress data plane. GET requests to /shutdown on port 8090 of the Envoy pod initiate Envoy's shutdown procedure. The shutdown procedure includes flip...
CVE-2020-15132
PUBLISHED: 2020-08-05
In Sulu before versions 1.6.35, 2.0.10, and 2.1.1, when the "Forget password" feature on the login screen is used, Sulu asks the user for a username or email address. If the given string is not found, a response with a `400` error code is returned, along with a error message saying that th...
CVE-2020-7298
PUBLISHED: 2020-08-05
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.