|
|

Accessibility Options

Language
Screen Reader
Bigger Text
Line Height
Text Spacing
Highlight Links
Dyslexia Friendly
ADHD Friendly
Hide Images
Invert Color
Dark Mode
BACK

GravityRat Android Malware

Original Issue Date:- August 11, 2023

Virus Type:- Android Malware

Severity:- Medium

It has been reported that a new variant of 'GravityRat’ Android malware is infecting Android OS for malicious operations. GravityRat targets victims through the BingeChat application, aiming to steal their data, including WhatsApp backup files and other sensitive information.

Infection Mechanism :

The GravityRat malware exfiltrates Whatsapp backups and receives commands to delete files. It is distributed through the messaging app called BingeChat, which is not available on the Play Store. Instead, users download it from a website as a free messaging and sharing app in .apk extension.

Fig.1- Website of the malicious BingeChat [Source: eSeT]

Fig.1- Website of the malicious BingeChat [Source: eSeT]

The threat actors identify and target the victims based on factors such as geolocation, IP address, custom URL, etc. and only these victims are given access to download malicious application. While for unintended users, webpage shows the registration error if they try to install that.

Fig.2- access denial to the unintended users [Source: eSeT]

Fig.2- access denial to the unintended users [Source: eSeT]

Once the app is launched on a targeted victim's device, it requests permissions to access various features such as location, SMS, Phone, Call Logs, Storage, etc. Subsequently, the user is prompted to log in or sign up for the app. However, GravityRat initiates interaction with the C2 server, exfiltrating sensitive data and awaiting further instructions from the C2 commands.

Fig.3- Permissions requested by the malicious BingeChat [Source: eSeT]

Fig.3- Permissions requested by the malicious BingeChat [Source: eSeT]

GravityRat steals documents with the following file extensions: pdf, xml, doc, xls, xlsx, ppt, docx, jpg, jpeg, log, png, txt, opus, crypt14, crypt12 and many more. It should be noted that crypt file extensions conform to the Whatsapp messenger backup.

The malware also possesses the ability to execute commands that are received from the C&C server for deleting call logs, files and contacts etc.

Indicator of Compromise:

IP:

  • 75.2.37[dot]224
  • 104.21.12[dot]211
  • 104.21.24[dot]109

SHA 1 Hashes:

  • 2B448233E6C9C4594E385E799CEA9EE8C06923BD
  • 25715A41250D4B9933E3599881CE020DE7FA6DC3
  • 1E03CD512CD75DE896E034289CB2F5A529E4D344

Domains:

  • jre.jdklibraries[dot]com
  • cld.androidadbserver[dot]com
  • adb.androidadbserver[dot]com

For more detailed list of IoC, kindly refer the following URL:

Best Practices and Recommendations: