Assassin’s Creed is a popular, open-world series of adventure games available in various iterations on the XBOX, PlayStation, PC and other gaming platforms. There is also a premium Assassin’s Creed application for Android. However, users seeking to download a pirated free version of that application may find their Android devices quietly infected with a piece of mobile banking malware.
The Trojanized variety of the Assassin’s Creed application has the potential to be quite potent, because when a user downloads it, what he or she is actually downloading is malware. The malware in turn downloads a fully functional, pirated version of the actual application. The gaming app works as advertised, so the standard mobile gamer is going to have a tough time realizing that the package they’ve downloaded is malicious.
The attack is particularly timely during this holiday shopping season because a number of retailers are bundling the latest, XBOX One edition of the series with Microsoft’s newest gaming console. The XBOX One is likely one the most popular gifts this season, particularly among consoles, as reports began surfacing last night that the Microsoft gaming console outsold Sony’s PS4 in November.
The malware has the ability to send multipart text messages, harvest texts from victim devices and send stolen data to a remote command and control server.
The target C&C servers are hard-coded into the applications as bnk7ihekqxp[.]net and googleapiserver[.]net.
During our daily research, we recently came across Android malware disguising itself as an Assassins Creed app, which is a popular paid gaming application. The malware in question will install a pirated version of the Assassins Creed game that functions normally, making end user oblivious to the malicious activities it performs in background.
- File MD5 : 3E076979644672A0EF750A4C3226F553
- File Size : 3.25 MB
- File Name : assassins_creed.apk
- Package Name : com.dsifakf.aoakmnq
The malicious application is capable of sending multi-part text messages, harvesting text messages from a victim’s device, and sending stolen information to a remote Command & Control (C2) server. We were able to locate phone numbers belonging to Russian bank “Volga-Vyatka Bank of Sberbank of Russia” in the malicious application code for which SMS messages are being intercepted to steal sensitive information. Another interesting feature we saw is the usage of AES encryption for all the C2 communication. It also harvests the mobile number and Subscriber ID information from the victim device for tracking purposes.
The screenshot below shows the AES crypto library configurations. All the sensitive harvested data and C2 communication is encrypted and decrypted using this configuration.
Code snippet showing the string containing the Russian Bank phone numbers:
Command and Control server information in encrypted and decrypted form:
We saw the following two command and control servers hardcoded in the malicious application:
The screenshot above shows the usage of AES for C2 communication. A sample call back request from the infected device will be of the following format:
The code snippet below shows the SMS and Subscriber ID information harvesting feature:
It sends the harvested information via a POST request as seen below:
Code snippet showing the SMS sending feature:
Code snippet showing the SMS interception and storage arrays:
The intercepted SMS data, Subscriber ID, and phone number information are then sent to the C2 server in an encrypted form.
Here is a sample request:
The malicious app performs the activity of harvesting sensitive information and sending it to the remote server on a regular interval by setting up an alarm as seen below:
Upon installation, the user will see the game icon on the screen, that disappears shortly thereafter with the malicious process still running in the background.
Cybercriminals often lure users with pirated versions of popular paid mobile applications that are Trojanized to steal sensitive information. It is strongly recommended that users stay away from such offers and download mobile app only from the trusted sources like the Google Play store