ESET researchers have investigated a targeted mobile espionage campaign against the Kurdish ethnic group, and that has been active since at least March 2020.
ESET researchers have investigated a targeted mobile espionage campaign against the Kurdish ethnic group. This campaign has been active since at least March 2020, distributing (via dedicated Facebook profiles) two Android backdoors known as 888 RAT and SpyNote, disguised as legitimate apps. These profiles appeared to be providing Android news in Kurdish, and news for the Kurds’ supporters. Some of the profiles deliberately spread additional spying apps to Facebook public groups with pro-Kurd content. Data from a download site indicates at least 1,481 downloads from URLs promoted in just a few Facebook posts.
The newly discovered Android 888 RAT has been used by the Kasablanka group and by BladeHawk. Both of them used alternative names to refer to the same Android RAT – LodaRAT and Gaza007 respectively.
BladeHawk Android espionage
The espionage activity reported here is directly connected to two publicly disclosed cases published in 2020. QiAnXin Threat Intelligence Center named the group behind these attacks BladeHawk, which we have adopted. Both campaigns were distributed via Facebook, using malware that was built with commercial, automated tools (888 RAT and SpyNote), with all samples of the malware using the same C&C servers.
We identified six Facebook profiles as part of this BladeHawk campaign, sharing these Android spying apps. We reported these profiles to Facebook and they have all been taken down. Two of the profiles were aimed at tech users while the other four posed as Kurd supporters. All these profiles were created in 2020 and shortly after creation they started posting these fake apps. These accounts, except for one, have not posted any other content besides Android RATs masquerading as legitimate apps.
These profiles are also responsible for sharing espionage apps to Facebook public groups, most of which were supporters of Masoud Barzani, former President of the Kurdistan Region; an example can be seen in Figure 1. Altogether, the targeted groups have over 11,000 followers.
In one case, we spotted an attempt (Figure 2) to capture Snapchat credentials via a phishing website (Figure 3).
We identified 28 unique posts as part of this BladeHawk campaign. Each of these posts contained fake app descriptions and links to download an app, and we were able to download 17 unique APKs from these links. Some of the APK web links pointed directly to the malicious app, whereas others pointed to the third-party upload service top4top.io, which tracks the number of file downloads (see Figure 4). Because of that, we obtained the total number of downloads from top4top.io for those eight apps. These eight apps were downloaded altogether 1,481 times, from July 20, 2020 until June 28, 2021.
To our knowledge, this campaign targeted only Android users, with the threat actors focused on two commercial Android RAT tools – 888 RAT and SpyNote. We found only one sample of the latter during our research. As it was built using an old, already analyzed SpyNote builder, here we include only the analysis of the 888 RAT samples.
Android 888 RAT
This commercial, multiplatform RAT was originally only published for the Windows ecosystem for $80. In June 2018, it was extended in the Pro version with the additional capability to build Android RATs ($150). Later, the Extreme version could create Linux payloads as well ($200).
It was sold via the developer’s website at 888-tools[.]com (see Figure 5).
In 2019 the Pro version (Windows and Android) was found cracked (see Figure 6) and available on a few websites for free.
888 RAT has not been directly identified with any organized campaigns before; this is the first time this RAT has been assigned as an indicator of a cyberespionage group.
Android 888 RAT is capable of executing 42 commands received from its C&C server, as seen in Table 1.
In short, it can steal and delete files from a device, take screenshots, get device location, phish Facebook credentials, get a list of installed apps, steal user photos, take photos, record surrounding audio and phone calls, make calls, steal SMS messages, steal the device’s contact list, send text messages, etc.
The builder is also used as the C&C to control all the compromised devices since it uses dynamic DNS to be reached by them.
Table 1. List of supported commands
|Unistxcr||Display app details of specified app|
|dowsizetr||Upload file to server from /sdcard/DCIM/.dat/|
|DOWdeletx||Delete file from /sdcard/DCIM/.dat/|
|Xr7aou||Upload binary file to server from /sdcard/DCIM/.dat/|
|Caspylistx||List files from /sdcard/DCIM/.dat/|
|spxcheck||Check whether call recording service is running|
|S8p8y0||Stop call recording service|
|Sxpxy1||Enable call recording service|
|screXmex||Take screenshot and upload to server|
|Batrxiops||Get battery level|
|L4oclOCMAWS||Get device location|
|FdelSRRT||Delete file /sdcard/DCIM/.fdat (phished Facebook credentials)|
|chkstzeaw||Check whether Facebook app is installed|
|IODBSSUEEZ||Upload Facebook credentials to C&C from /sdcard/DCIM/.fdat|
|GUIFXB||Launch Facebook phishing activity|
|osEEs||Get requested permissions of the specified application|
|LUNAPXER||Launch specific application|
|Gapxplister||Get list of applications installed on the device|
|DOTRall8xxe||Compress files in /sdcard/DCIM/.dat/ directory and upload them to C&C|
|Acouxacour||Get all device accounts|
|Fimxmiisx||Take photo from camera and upload it to C&C|
|Scxreexcv4||Get information about device cameras|
|micmokmi8x||Record surrounding audio for the specified time|
|DTXXTEGE3||Delete specific file from /sdcard directory|
|ODDSEe||Open specific URL in default browser|
|Yufsssp||Get Exif information from specific media file|
|getsssspo||Get info about whether a specific file exists on device|
|DXCXIXM||Get names of all photos stored in /sdcard/DCIM/|
|f5iledowqqww||Upload specific file from /sdcard/ directory|
|GExCaalsss7||Get call logs from device|
|SDgex8se||List files from specific directory from /sdcard|
|PHOCAs7||Make call to specified number|
|Gxextsxms||Get SMS inbox|
|Msppossag||Send SMS message to specified number|
|Rinxgosa||Play ringtone for six seconds|
|Shetermix||Execute shell command|
|bithsssp64||Execute shell script|
|Deldatall8||Cleanup, remove all /sdcard/DCIM/.dat files|
|pvvvoze||Get IP address|
|paltexw||Get TTL from PING command|
|M0xSSw9||Display specific Toast message to user|
An important factor when identifying 888 RAT is the package name of the payload. The package name of every build of an Android payload is not custom or random; it always uses the com.example.dat.a8andoserverx package ID. Because of this, it is easy to identify such samples as 888 RAT.
In later versions of the 888 RAT (not the cracked RAT builder), we noticed that the builder was capable of obfuscating strings (command strings, C&C, and other plain text strings) by encrypting them using AES with a hardcoded key; however, the package name still remained the same.
888 RAT uses a custom IP protocol and port (it doesn’t have to be standard ports). Compromised devices are controlled directly from the builder GUI.
When this functionality is triggered, 888 RAT will deploy phishing activity that appears to be coming from the legitimate Facebook app. When the user taps on the recent apps button, this activity will seem legitimate, as seen in Figure 7. However, after a long press on this app’s icon, as in Figure 8, the true app name responsible for the Facebook login request is disclosed.
Since 2018, ESET products have identified hundreds of instances of Android devices where the 888 RAT was deployed. Figure 9 presents the country distribution of this detection data.
This espionage campaign has been active since March 2020 aiming only at Android devices. It targeted the Kurdish ethnic group through at least 28 malicious Facebook posts that would lead potential victims to download Android 888 RAT or SpyNote. Most of the malicious Facebook posts led to downloads of the commercial, multiplatform 888 RAT, which has been available on the black market since 2018. In 2019, a cracked copy of the Pro version of the 888 RAT builder was made available from a few websites, and since then, we detected hundreds of cases all around the world using the Android 888 RAT.
Files and ESET detection names
MITRE ATT&CK techniques
This table only covers TTPs for 888 RAT, and was built using version 9 of the ATT&CK framework.
|Initial Access||T1444||Masquerade as Legitimate Application||The 888 RAT impersonates legitimate applications.|
|Persistence||T1402||Broadcast Receivers||The 888 RAT listens for the BOOT_COMPLETED broadcast, ensuring that the app’s functionality will be activated every time the device starts.|
|Defense Evasion||T1508||Suppress Application Icon||The 888 RAT hides its icon.|
|T1447||Delete Device Data||The 888 RAT can delete gathered and temporary stored files and any other specific file.|
|Credential Access||T1411||Input Prompt||The 888 RAT tries to phish Facebook credentials.|
|Discovery||T1418||Application Discovery||The 888 RAT obtains a list of installed apps.|
|T1420||File and Directory Discovery||The 888 RAT identifies content of specific directories.|
|Collection||T1433||Access Call Log||The 888 RAT exfiltrates call log history.|
|T1430||Location Tracking||The 888 RAT retrieves device location.|
|T1432||Access Contact List||The 888 RAT exfiltrates the victim’s contact list.|
|T1429||Capture Audio||The 888 RAT can record audio from surroundings and calls.|
|T1512||Capture Camera||The 888 RAT can take pictures from the front or rear cameras.|
|T1412||Capture SMS Messages||The 888 RAT can exfiltrate sent and received SMS messages.|
|T1533||Data from Local System||The 888 RAT exfiltrates files with particular extensions from external media.|
|T1513||Screen Capture||The 888 RAT can take screenshots.|
|Command And Control||T1509||Uncommonly Used Port||The 888 RAT communicates with its C&C over port 4000.|
|Impact||T1582||SMS Control||The 888 RAT adversary can send SMS messages.|
|T1447||Delete Device Data||The 888 RAT can delete attacker-specified files from the device.|
- first time
- Google Play
- march 2020
- threat actors
- threat intelligence