Bibliothèque
Ma bibliothèque

+ Ajouter à la bibliothèque

Contacter-nous !
Support 24/24 | Rules regarding submitting

Nous téléphoner

0 825 300 230

Forum

Vos requêtes

  • Toutes : -
  • Non clôturées : -
  • Dernière : le -

Nous téléphoner

0 825 300 230

Profil

Android.Phantom.5

Added to the Dr.Web virus database: 2025-10-26

Virus description added:

SHA1 hashes:

  • c8466dd1f57bb38a984b3adb7a7e6a7c9f20fba3 (com.yippo.ai version 1.3.6 “Creation Magic World”)

Description

Someone on behalf of the developer SHENZHEN RUIREN NETWORK CO., LTD, released several applications. In terms of gameplay, they are all clones of popular mobile games:

  • Creation Magic World — a sandbox game that resembles Minecraft. It is an unmistakable cubic world with similar mechanics;
  • Cute Pet House — a game that operates on the principle of the Tamagotchi game, where one needs to take care of a cartoon pet;
  • Amazing Unicorn Party — a game that also operates on the principle of the Tamagotchi game, with unicorn pets;
  • SAKURA School Simulator — an anime-style school simulator game;
  • Theft Auto Mafia — a GTA-style imitation; an SLG with criminal elements;
  • Open World Gangsters — like the above example, it is a sandbox game involving criminals of all stripes.

All of these games acquired malicious modules after they were released. The first versions of these games did not contain malware. On September 28/29, Android.Phantom.2.origin was embedded in games, and on October 15/16, Android.Phantom.5 appeared. Here is an example of a typical inject for the applications, using Creation Magic World as an example:

#drweb

Android.Phantom.5, unlike Android.Phantom.2.origin, is a dropper. From arrays of bytes, it decrypts the payload, which is Android.Phantom.4.origin.

Android.Phantom.4.origin contains two identical modules for downloading remote code from different control servers:

  • hxxps[:]//fyapi[.]freeflightbird[.]com,
  • hxxps[:]//cgb[.]jingongbuxiao[.]com.

Modules download and execute remote code with the help of DexClassLoader. When the trojan was being tested, it received a task from control servers to download and launch several modules. Examples of commands for downloading files:

task   
  {
      "d": 1,
      "ms": [
          {
              "p": "1010",
              "c": "com.wwk.brh.Run",
              "d": "hxxps[:]//5[.]ahd187[.]com/thirdsdk/flowcashpack/243/newoffer-120-202510151732d",
              "cm": "1",
              "id": 243,
              "m": "instance"
          },
          {
              "p": "1010",
              "c": "com.yui.vyh.Run",
              "d": "hxxps[:]//5[.]ahd187[.]com/thirdsdk/flowcashpack/244/newjsAd-110-202510201655d",
              "cm": "1",
              "id": 244,
              "m": "instance"
          }
      ]
  }

The files downloaded by these modules were encrypted using the AES CBC algorithm. The first 16 bytes of this file are the initialization vector, and the last 16 bytes are the encryption key. After decryption, Android.Click.435.origin is found in the file.

Android.Click.435.origin is an obfuscated trojan-dropper. It contains mostly junk code. Its task is to unpack the payload in the form of Android.Click.429.origin.

Android.Click.429.origin. This is the final link in the chain that is launched by Android.Phantom.5. A clicker that is simpler in functionality than Android.Phantom.2.origin. It downloads websites to WebView, and then simulates user actions with the help of JavascriptInterface and JavaScript code from the control server hxxps[:]//newsadapi[.]zhuifengzhe[.]top.

Android.Click.429.origin is also downloaded using the second link in the task, but without the additional packer Android.Click.435.origin.

An interesting point. We encountered this domain earlier in the context of cybercriminal activity. In 2021, the zhuifengzhe[.]top domain was found in Android.Joker.310.origin, where the hxxps[:]//datastatisapi[.]zhuifengzhe[.]top server managed the download of remote code. Android.Joker.310.origin is a modification of Android.Joker.242.origin that includes a remote code download module. You can read more about this in our news post and in the virus database (Android.Joker.242.origin).

MITRE matrix

Stag Technique
Initial Access

Managing application versions (T1661)

Execution

Command and Scripting Interpreter (T1623)

Defense Evasion

Managing application versions (T1661)

Download New Code at Runtime (T1407)

Input Injection (T1516)

Obfuscated files or information (T1406)

Virtualization/Sandbox Evasion (T1633) System Checks (T1633.001)

Discovery

System Information Discovery (T1426)

System Network Configuration Discovery (T1422)

Command and Control

Encrypted Channel (T1521) Symmetric Encryption (T1521.001)

Ingress Tool Transfer (T1544)

Destructive impact

Generate Traffic from Victim (T1643)

Input Injection (T1516)

News posts about this trojan

Recommandations pour le traitement


Android

  1. Si votre appareil mobile fonctionne correctement, veuillez télécharger et installer sur votre appareil mobile le produit antivirus gratuit Dr.Web для Android Light. Lancez un scan complet et suivez les recommandations sur la neutralisation des menaces détectées.
  2. Si l'appareil mobile est bloqué par le Trojan de la famille Android.Locker (un message sur une violation grave de la loi ou une demande de rançon s’affichent sur l'écran de l'appareil mobile), procédez comme suit :
    • démarrez votre Smartphone ou votre tablette en mode sans échec (si vous ne savez pas comment faire, consultez la documentation de l'appareil mobile ou contactez le fabricant) ;
    • puis téléchargez et installez sur votre appareil contaminé le produit antivirus gratuit Dr.Web для Android Light et lancez un scan complet puis suivez les recommandations sur la neutralisation des menaces détectées ;
    • Débranchez votre appareil et rebranchez-le.

En savoir plus sur Dr.Web pour Android