dmsSpy

Description

(Trend Micro) Another APK link was disguised as a calendar application for checking the schedule of upcoming political events in Hong Kong. Though the link was also down, we managed to find the original file downloaded from it.

The calendar application shown above requires manysensitive permissions such as READ_CONTACTS, RECEIVE_SMS, READ_SMS, CALL_PHONE, ACCESS_LOCATION, and WRITE/READ EXTERNAL_STORAGE. When launched, it first collects device information such as device ID, brand, model, OS version, physicallocation, and SDcard file list. It then sends the collected information back to the C&C server.

It also steals contact and SMS information stored in the device. Furthermore, it registers a receiver that monitors new incoming SMS messages and syncs messages with the C&C server in real-time.

The appcan perform an update by querying the C&C server to fetch the URL of the latest APK file, then download and install it.

Names

Name
dmsSpy

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Info stealer
  • Exfiltration

Information

Malpedia

Other Information

Uuid

94171b88-29ea-4840-8f84-61096123d0b0

Last Card Change

2021-04-24