Categories: MalwareSecurity

Android Oldboot B, the most dangerous and complex bootkit of ever

Chinese researchers from “360 Mobile Security” detected Android Oldboot.B malware, until today the most complex bootkit which infected millions of devices.

A new sophisticated Android Bootkit has been detected by Chinese Security Researchers from “360 Mobile Security“, its name is Oldboot.B and appears as an evolution of its predecessor Oldboot.A. According the researchers Oldboot.B could be considerable as the most sophisticated Android malware ever detected, it has already infected millions of mobile devices. OldBoot.A was detected early 2014 by the Russian security firm Doctor Web, its principal capability is to re-infect the Smartphone after reboot, even if all its components are deleted by the user. Bootkit is a category of malware which infects the host at start-up and it is able to perform malicious activities, including data stealingdisk encryption, communicate with a remote C&C server and remove the application on the victim’s device. Oldboot.B‘ implements a new advanced evasion techniques to avoid its detection to principal antivirus software and automatic analysis systems.

The Oldboot Trojan family is the most significant demonstration of this trend.Depending on the commands sent from the C&C server, it can do many different things, such as sending fake SMS messages or phishing attacks, and so on. Driven by profit, the Oldboot Trojan family changes very fast to react to any situation.” researchers said.

The principal abilities of Oldboot.B trojan are:

  • It can install malicious apps silently in the background.
  • It can inject malicious modules into system process.
  • Prevent malware apps from uninstalling.
  • Oldboot.B can modify the browser’s homepage.
  • It has ability to uninstall or disable installed Mobile Antivirus softwares.

The Oldboot.B malware, once infected the victim’s Android mobile, waits for the command sent by C&C (located at az.o65.org [IP is 61.160.248.67]), it makes also use of steganography to hide data (executable codes, configuration file) within file exchanged with C&C and installs numerous malicious applications on the mobile.

“But after some analysis, we found that the configuration of meta_chk is hidden in this picture, which contains the command will be executed by meta_chk and other information.” researchers said. The size of this configuration file is 12,508 bytes.

The Oldboot.B malware is composed of 4 principal components that registering itself as services can ensure the persistence to the malicious code.

  1. boot_tst is the component responsible for command reception and execution. It uses a remote injection technique to inoculate an SO file and a JAR file to the ‘system_server’ process of the Android system.
  2. adb_server replaces pm script of the Android system with itself, its main functionality is to avoid malicious code uninstall.
  3. meta_chk silently download and install Android Apps promoted in the background, it is also able to open a backdoor for remote control. The component is able to remove itself leaving injected process in the memory, in this way antivirus software cannot detect it because they are not able to perform a memory scan in the Android platform.
  4. agentsysline runs in background receiving commands from C&C server, within its abilities the possibility to delete the specific files, enable/disable network connection and uninstall anti-virus software.

The principal evasion capabilities that make hard the detection of Oldboot.B are:

  • It adds some meaningless code and trigger some behavior randomly.
  • Check for SIM card availability in the device, and it will not perform certain behavior if there is no SIM card to fool sandbox or emulators.
  • Check for the existence of antivirus software, and may uninstall the anti-virus software before doing anything malicious.

The unique possibility to avoid Oldboot.B malware is to download and install app only from official stores neither use untrusted custom ROMs.

If your mobile is infected by Oldboot.B you can download the free removing tool designed by antivirus firm 360 Mobile Security.

Pierluigi Paganini

(Security Affairs –  Oldboot.B, Android malware)

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Kaiser Permanente data breach may have impacted 13.4 million patients

Healthcare service provider Kaiser Permanente disclosed a security breach that may impact 13.4 million individuals…

4 mins ago

Over 1,400 CrushFTP internet-facing servers vulnerable to CVE-2024-4040 bug

Over 1,400 CrushFTP internet-facing servers are vulnerable to attacks exploiting recently disclosed CVE-2024-4040 vulnerability. Over…

2 hours ago

Sweden’s liquor supply severely impacted by ransomware attack on logistics company

A ransomware attack on a Swedish logistics company Skanlog severely impacted the country's liquor supply. …

5 hours ago

CISA adds Cisco ASA and FTD and CrushFTP VFS flaws to its Known Exploited Vulnerabilities catalog

CISA adds Cisco ASA and FTD and CrushFTP VFS vulnerabilities to its Known Exploited Vulnerabilities…

15 hours ago

CISA adds Microsoft Windows Print Spooler flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA added the Windows Print Spooler flaw CVE-2022-38028 to its Known Exploited Vulnerabilities catalog.…

22 hours ago

DOJ arrested the founders of crypto mixer Samourai for facilitating $2 Billion in illegal transactions

The U.S. Department of Justice (DoJ) announced the arrest of two co-founders of a cryptocurrency mixer…

22 hours ago

This website uses cookies.