India Android & MacOS Users Targets by GravityRAT Spyware

 

India Android & MacOS Users Targets by GravityRAT Spyware

 

    The GravityRAT campaign uses the infection methods — targeted individuals are sent links pointing to malicious apps. The new GravityRAT campaign is multiplatformity. besides Windows, there are now versions for Android and macOS The cybercriminals also started using digital signatures to make the apps look more legitimate. GravityRAT, a spying remote access Trojan (RAT) known to target devices in India, in an attack campaign against Android and macOS devices. Its creators are believed to be Pakistani hacker groups. The spyware’s functions are fairly standard: it sends device data, contact lists, e-mail addresses, and call and text logs of the infected machine to the C&C server. In addition, the Trojan searches for files in the device memory and on connected media with the extensions .jpg, .jpeg, .log, .png, .txt, .pdf, .xml, .doc, .xls, .xlsx, .ppt, .pptx, .docx, and .opus, and sends these to C&C as well.
 

The spyware receives commands from the server, including to:- Get information about the system, search for files on the computer and removable disks with the extensions .doc, .docx, .ppt, .pptx, .xls, .xlsx, .pdf, .odt, .odp, and .ods, and upload them to the server, Get a list of running processes, Intercept keystrokes, Take screenshots, Execute arbitrary shell commands, record audio &  scan ports.

Indicator of Compromise

IOCs

File Hash

df6e86d804af7084c569aa809b2e2134
c92a03ba864ff10b8e1ff7f97dc49f68
b6af1494766fd8d808753c931381a945
7bd970995a1689b0c0333b54dffb49b6
0c26eb2a6672ec9cd5eb76772542eb72
0c103e5d536fbd945d9eddeae4d46c94
cceca8bca9874569e398d5dc8716123c
7bbf0e96c8893805c32aeffaa998ede4
e73b4b2138a67008836cb986ba5cee2f
9d48e9bff90ddcae6952b6539724a8a3
285e6ae12e1c13df3c5d33be2721f5cd
1f484cdf77ac662f982287fba6ed050d
c39ed8c194ccf63aab1db28a4f4a38b9
78506a097d96c630b505bd3d8fa92363
86c865a0f04b1570d8417187c9e23b74
31f64aa248e7be0be97a34587ec50f67
e202b3bbb88b1d32dd034e6c307ceb99
9f6c832fd8ee8d8a78b4c8a75dcbf257
defcd751054227bc2dd3070e368b697d
c0df894f72fd560c94089f17d45c0d88
2b6e5eefc7c14905c5e8371e82648830
ee06cfa7dfb6d986eef8e07fb1e95015
6689ecf015e036ccf142415dd5e42385
3033a1206fcabd439b0d93499d0b57da
f1e79d4c264238ab9ccd4091d1a248c4
ee3f0db517f0bb30080a042d3482ceee
30026aff23b83a69ebfe5b06c3e5e3fd
f8da7aaefce3134970d542b0e4e34f7b
574bd60ab492828fada43e88498e8bd2
df1bf7d30a502e6388e2566ada4fe9c8
092e4e29e784341785c8ed95023fb5ac
c7b8e65e5d04d5ffbc43ed7639a42a5f

URLs


daily.windowsupdates[.]eu
nightly.windowsupdates[.]eu
dailybuild.mozillaupdates[.]com
nightlybuild.mozillaupdates[.]com
u01.msoftserver[.]eu
u02.msoftserver[.]eu
u03.msoftserver[.]eu
u04.msoftserver[.]eu
n1.nortonupdates[.]online
n2.nortonupdates[.]online
n3.nortonupdates[.]online
n4.nortonupdates[.]online
sake.mozillaupdates[.]us
gyzu.mozillaupdates[.]us
chuki.mozillaupdates[.]us
zen.mozillaupdates[.]us
ud01.microsoftupdate[.]in
ud02.microsoftupdate[.]in
ud03.microsoftupdate[.]in
ud04.microsoftupdate[.]in
chat2hire[.]net
wesharex[.]net
click2chat[.]org
x-trust[.]net
bollywoods[.]co[.]in
enigma[.]net[.]in
titaniumx[.]co[.]in
sharify[.]co[.]in
strongbox[.]in
teraspace[.]co[.]in
gozap[.]co[.]in
orangevault[.]net
savitabhabi[.]co[.]in
melodymate[.]co[.]in
cvstyler[.]co[.]in

Comments

Popular posts from this blog

Revil Ransomware Targeted Kaseya

BANDOOK(RAT)

Buer Loader provides malware-as-a-service