Medium
A number of malicious code attacks that were targeted at Android users in South Korea. The attacker induced the victim to install and use the malicious Android application by disguising it as a common mobile application in South Korea. After analysis, it was found that the attack activity is consistent with the KONNI Android Trojan disclosed by ESTsecurity, both in terms of attack methods and Trojan horse framework.
Fake download page of GooglePlay
After the APK Trojan is executed, it will request “http: // [C2] /manager/files/To_[IMEI].txt ” every 3 seconds , and then execute the instructions issued by the attacker based on the returned data, and then execute the The result is transmitted back to the server through the upload interface; when the Trojan starts, it will upload the phone information, SDCard file directory, and the list of installed applications to the C2 server.
Exposure of sensitive information
MD5