Sopelka Botnet: three banking trojans and one banking panel |
This botnet’s objective was the collection of banking credentials from European entities, mostly banks from Spain and Germany, but also Holland, Italy and Malta. In addition, it made use of different mobile components for Android, BlackBerry and Symbian phones. Symbian was the first operating system where this type of malicious component emerged two years ago.
Campaign
|
Date
|
Trojan
|
Path
|
Countries
|
Sopelka1
|
01/05
30/05
|
Citadel
1.3.4.0
|
/sopelka1/file.php|file=citsp1.exe
/sopelka1/file.php|file=sopelka1_config.bin
|
ES,DE,
NL
|
Sopelka2
|
01/05
30/05
|
Citadel
1.3.4.0
|
/sopelka2/file.php|file=citsp2.exe
/sopelka2/file.php|file=sopelka2_config.bin
|
ES
|
Tatanga
|
15/06
15/07
|
Tatanga
|
/sec/g.php
|
IT, ES,
DE, NL
|
Feodo
|
15/06
15/07
|
Feodo
|
/zb/v_01_a/in/cp.php
|
ES, NL,
DE, IT
|
Sopelka3
|
15/08
27/09
|
Citadel
1.3.4.5 |
/sopelka3/file.php|file=citsp3.exe
/sopelka3/file.php|file=sopelka3_config.bin
|
ES, DE
|
https://domain.com/dir/inject.js
https://domain.com/dir/get.php/campaignDir/?name=inject.js
Finally, the "tatangakatanga" string was found in Citadel configs and another kind of URL was detected that could be used to retrieve external JavaScript and has been related to Tatanga since the start:
https://domain.com/dir/x.php?cmdid=8&gettype=js&id=inyeccion.js&uid=0000
https://212.124.110.18:444/tatangakatanga/x.php?gettype=image&id=loaderfid.gif
In order to get an idea of the botnet size, during the week when data were collected there were more than 16,000 unique IPs connecting to the sinkhole (taking into account that these IPs were not filtered: NAT, researchers, etc.).
The functionality of the application was the same, independent of the target operating system. It was a classic mobile component with the same characteristics that were detected for the first time by S21sec back in September 2010. The aim of the application was to forward messages that arrived at the target telephone. It was able to be administrated through sending SMSs and required no communication by HTTP as in the latest .apk’s.
The list of commands was much reduced from the first versions, it only included these three commands (already mentioned by Kaspersky some months ago):
- "on": the command used to start monitoring and the resending of messages. If the command ended correctly it was sending a message with the word “ONOK” to the number specified as “admin”.
- "off": used to perform the opposite function to the previous command, that is, stop monitoring and forwarding the messages that arrived at the mobile device. If all went well it was sending a message with the word “OFOK” to the selected number.
- "set admin": served to change the administrator telephone, where the commands were received and to which the text messages from the infected terminal were forwarded. If there was no error from performing this action, it was sending “SAOK” to the chosen number.
Also, just after starting up, the malicious application was sending the word “INOK” to the number specified as administrator, while in earlier versions the phrase “App installed ok” was sent. After this, it showed the code "7725486193" to the user, which should be entered in the field created by the HTML inject, and this served to indicate that the application had been installed correctly. In all the applications, the number to which the messages were sent was the same; it was +46769436094, a Swedish virtual number.
As a curiosity, in some of the Citadel binaries a message could be read related to Brian Krebs (well-known technical journalist in the world of cyber-crime) which has already been discussed a few months ago:
As mentioned before, some of the facts provided are the result of information sharing amongst the security community, for which we express our gratitude. A special mention goes to the researchers at Fox-IT, Shadowserver and Abuse.ch.
Note: Originally published on S21sec's blog