A Reverse Engineering Approach

A Reverse Engineering Approach

Iowa State University Capstones, Theses and Graduate Theses and Dissertations Dissertations 2019 Android ransomware trends and case studies: A reverse engineering approach Chenliang Xu Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/etd Part of the Computer Engineering Commons Recommended Citation Xu, Chenliang, "Android ransomware trends and case studies: A reverse engineering approach" (2019). Graduate Theses and Dissertations. 17810. https://lib.dr.iastate.edu/etd/17810 This Thesis is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Graduate Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. Android ransomware trends and case studies: A reverse engineering approach by Chenliang Xu A thesis submitted to the graduate faculty in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Major: Computer Engineering Program of Study Committee: Yong Guan, Major Professor Daji, Qiao Jaeyoun Kim The student author, whose presentation of the scholarship herein was approved by the program of study committee, is solely responsible for the content of this thesis. The Graduate College will ensure this thesis is globally accessible and will not permit alterations after a degree is conferred. Iowa State University Ames, Iowa 2019 Copyright © Chenliang Xu, 2019. All rights reserved. ii TABLE OF CONTENTS Page LIST OF FIGURES ........................................................................................................................................ iii LIST OF TABLES .......................................................................................................................................... iv ACKNOWLEDGMENTS ............................................................................................................................... v ABSTRACT .................................................................................................................................................... vi CHAPTER 1. INTRODUCTION .................................................................................................................... 1 CHAPTER 2. RELATED WORKS ................................................................................................................. 4 Android Defender ....................................................................................................................................... 4 Simplocker .................................................................................................................................................. 4 WannaCry ................................................................................................................................................... 5 CHAPTER 3. TAXONOMY ........................................................................................................................... 7 Types of Android Ransomware .................................................................................................................. 7 Trend of Android Ransomware ................................................................................................................... 7 Techniques of Lock-screen Ransomware ................................................................................................... 8 Unlocking Techniques ................................................................................................................................ 9 Password Generate Techniques ................................................................................................................ 10 CHAPTER 4. CASE ANALYSIS ................................................................................................................. 11 A. SB Modifier .......................................................................................................................................... 11 B. Red Wars .............................................................................................................................................. 14 C. King of Glory - Beta ............................................................................................................................. 18 CHAPTER 5. DISCUSSION ......................................................................................................................... 28 CHAPTER 6. GENERAL SOLUTIONS AND PREVENTIONS ................................................................ 30 General Solutions ...................................................................................................................................... 30 Preventions ................................................................................................................................................ 31 CHAPTER 7. UNPACKING ......................................................................................................................... 32 Introduction to Packing ............................................................................................................................. 32 Case Study: DrizzleDumper ...................................................................................................................... 35 Case Study: Dex2oatHunter ...................................................................................................................... 37 VirtualXposed + FDex2 ............................................................................................................................ 38 CHAPTER 8. RECOVERY ........................................................................................................................... 42 General Steps ............................................................................................................................................ 42 Experiment ................................................................................................................................................ 43 Conclusion ................................................................................................................................................ 45 CHAPTER 9. SUMMARY AND FUTURE WORK .................................................................................... 46 REFERENCES .............................................................................................................................................. 47 iii LIST OF FIGURES Figure 1. Android ransomware chronology ..................................................................................................... 8 Figure 2. void d( ) function ............................................................................................................................ 12 Figure 3. ijm-x86.so ....................................................................................................................................... 13 Figure 4. void onCreate() ............................................................................................................................... 13 Figure 5. Red Wars classes ............................................................................................................................ 15 Figure 6. CharSequence and onDisableRequested() ...................................................................................... 15 Figure 7. class raw ......................................................................................................................................... 16 Figure 8. pin.txt .............................................................................................................................................. 16 Figure 9. String getsss() ................................................................................................................................. 17 Figure 10. Base64 Encoding .......................................................................................................................... 17 Figure 11. Taking Sub-sequence .................................................................................................................... 17 Figure 12. Personal Encryption Algorithm .................................................................................................... 18 Figure 13. Base64 Encoding .......................................................................................................................... 18 Figure 14. King of Glory - Beta, WannaCry Page ......................................................................................... 20 Figure 15. Classes of King of Glory - Beta ................................................................................................... 21 Figure 16. Control Flow Graph of decryptFile() ........................................................................................... 23 Figure 17. Part of decryptFile() ..................................................................................................................... 24 Figure 18. Part of jj() ..................................................................................................................................... 25 Figure 19. Part of onCreate() ........................................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    55 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us