SpiCall_Artemide_Exodus

Reversing of the C2C SpiCall | Artemide | Spartacus | initiator of Exodus Android Spyware Campaign

View on GitHub

SpiCall | Artemide | Spartacus : Possible initiator of Exodus Android and iOS Spyware Campaign

Reversing of the C2C SpiCall | Artemide | Spartacus | Possible initiator of Exodus Android and iOS Spyware Campaign

Preamble

This a project created for Malware Analysis and Research purpose, and is the last step of a standard procedure aimed to research threat techniques and develop defenses.

This Mass Surveillance Spyware campaing is named “SpiCall | Artemide | Spartacus” from the details present into the extracted electronic certificate (please refer to images at page bottom).

This repository was (somehow) linked to the Exodus mobile malware campaing because:

Unexpectedly

At the moment of the update of this README file (11 APR 2019), another spy-app with the same package name (“it.nv.wat”), same fingerprints but (of course) different MD5 checkusum (e0d5e0b626183e13c97d2719383c5dd7) it’s again available at the following address (hopefully it will be removed soon): hXXps://play.google.com/store/apps/details?id=it.nv.wat

Legitimate question

Why this (spy)App and similar ones are still / again available as a public resource?

Did the developer(s) publish it again after the so called “Exodus” wave?

Stated that, we think that those repositories are meaningful because everyone can understand how a privacy leak works:

Discover it yourself

Truncated for Privacy

Some piece of the code are truncated to avoid enticing unauthorized or unethical actions, but in any case the understanding of the code remains unchanged.

Public Domain

The contents included into this repository have been released into the public domain since the original working application has been deliberately made public without restrictions (as a method of mass infection) through app stores.

General Consideration

The code is a potpourri of already known instruction sets*, but has exposed both the producer and the victim to very high privacy risks.

(*) The App reversed into this repo looks very similar to another one we analyzed (wondering why a stock viewer App needs to record your voice): hXXps://play.google.com/store/apps/details?id=com.accadia.android but with part of the instruction set well localized in Italian language.

Peculiarity

The MQTT protocol to manage the C2C operations

For Governments

It would be enough to backtrack or simply use:

At present many C2C servers are still up togheter with several stolen data repositories (some of those shows TCP activity on port TCP 60129 - Darktrack RAT / Dropbear SSHd)

Conclusion

Cyber criminals play tricks creating confusion over expired and promptly renewed domain names, app names, etc..

Exodus was just a clumsy and miserably failed attempt to copy the “Multilevel Business Model of Mass Surveillance Market” explained here:

Where they failed at point 3 of the workflow, while playing the role of the actor that within intelligence investigations is called “The Mule”.

That’s it.



https://presidentwarfield.github.io/SpiCall_Artemide_Exodus/