Android crypto clipper monitors the clipboard of its victims

By

Cryptocurrency mining malware gained prominence in the last few years, we have seen a number of crypto-related infections on the Android platform. The malware writers are not sitting still with just crypto-miners, they have something new that yet again aims at stealing cryptocurrency from the victims and keeping it for themselves.

SonicWall Threats Research team observed reports of a new type of cryptocurrency related Android malware, this sample monitors the clipboard and switches relevant crypto-related content with that of the attacker and ultimately aims as sending crypto to the attacker’s accounts.

Infection Cycle

This malware requests for the following permissions during installation:

  • android.permission.ACCESS_NETWORK_STATE’
  • android.permission.INTERNET’
  • android.permission.WRITE_EXTERNAL_STORAGE’

Upon execution the malware appears to be legitimate but in reality the application performs a dangerous operation in the background.

In the background, this malware monitors the clipboard service on an infected device and copies contents of the clipboard considering the following conditions:

  • If the first character of the data copied to the clipboard is 1 or 3 and the length of the data copied is 34
  • If first two characters of the data copied to the clipboard are 0x and the length of the data copied is 42

 

Interestingly these two criteria match the format for Bitcoin (Btc) and Ethereum (Eth) wallet address formats.

The Switch

Since Cryptocurrency wallet addresses are long alphanumeric characters it is most likely that a user will copy his/her wallet address while using it. In a scenario where the user copies their wallet address to send money to it, the malware will slip the hard-coded address belonging to the attacker and complete the scam.

We tried copying dummy Ethereum and BitCoin wallet addresses on websites online and whenever we copied an address and pasted it later, before pasting it the address changed to the one configured in the malicious app:

Background Communication

Important content entered in the malicious app is copied and sent to the attacker, the image below shows the passwords we used to create a new vault were copied by the malware:

 

The malware communicates with the attacker via Telegram api:

 

Overall this is a sneaky Android malware that cleverly switches the wallet number of the victim with that of an attacker in the background. This continues to show malware writer’s interest in Cryptocurrency and their continued efforts to scam victims and make money for themselves.

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: AndroidOS.CryptoClipper.CPM (Trojan)

Indicators Of Compromise (IOC):

  • com.lemon.metamask – 24d7783aaf34884677a601d487473f88
Security News
The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.