Article
Operation Triangulation
Operation triangulation - SMS module analysis
12 juin 2024
Introduction
This blog post is the continuation of our series on Operation Triangulation. The previous blog post can be found here : https://shindan.io/posts/audio_module_analysis/.
In this blogpost we will focus on the sms stealing module c2393fceab76776e19848c2ca3c84bea0ed224ac53206c48f1c5fd525ef66306
.
The module is pretty simple. It is opening the SMS database, executing several requests on it, and saving the compressed and encrypted output in a file.
Strings obfuscation
Like the other modules, the strings are obfuscated. They are deobfuscated using a function located at 0x1000099CC
. The function is a simple routine and is the same that is used in the other modules :
We created an IDA python script to deobfuscate the strings. The python script and the strings list can be found in the Annexes.
Retrieving configuration
The module configuration is managed in the same way as the Microphone recording module. It contains a predefined configuration stored in the .data
segment. The function located at 0x100009840
is used to retrieve configuration parameter value.
As for the Microphone recording module, we chose to emulate that function to dump the module configuration easily. We used Unicorn Engine for that. The script used can be found in the Annexes.
We retrieved the following configuration with our script :
More explanation on the module configuration can be found here : https://shindan.io/posts/audio_module_analysis/#retrieving-the-configuration.
It is important to note that this module also has the possilibity to retrieve its configuration from an environment value. This will be explained later.
Main logic
After getting the strings and the configuration, we started to analyze the main function.
Retrieving SQL requests.
The module starts by retrieving the ul
parameter (corresponding to796
), and uses this value to allocate memory with calloc
.
Then it retrieves the value of parameter qs
, and uses base64 decode function to decode it.
Following this, the module uses zlibrary to decompress the data :
We used bash and python to retrieve the value :
echo -n 'eJytUstOwzAQ/BXfwqPgtD0UhMSl7SFSipCSu7VJlsYQ26m9bcnfk9BYoKIEDvi02pnZHY/NaysPQMgPYLkymayQxzKzYBuebBLulLstsodkHa+XKVtFSRo9tYXbVezFGtUVklAocITW065OWF4CCYXOwRbFq5GaHUu0yIp2H0mFFx7rGnwa+nN9v7ibh4tZGE5YsNfyHWuTl8Ele/ySBtocg0lwM29bjWsxYwu0LGvY96FstU6WLI42Ucpm3egzhz333Ne/+vmLD5F8xrgCggwcPltToyWJrtcsfkq6cMdRUYIuqj75QWaBFRIW/p1GNp7GDeM+eCCCvFSo6ZfVXlBbk7el1FtB4N6GBf1nc7jbo85HrHgiAU1HWI3Oxcj9PwDzBvxW' | base64 -d | python3 -c 'import zlib, sys; sys.stdout.buffer.write(zlib.decompress(sys.stdin.buffer.read()))'
/private/var/mobile/Library/SMS/sms.db;SELECT DISTINCT sql from sqlite_master;SELECT * from chat_message_join where datetime(message_date/1000000000+978307200, 'unixepoch') > datetime('now','-3 days') order by message_date DESC LIMIT 20000;SELECT * from message where datetime(date/1000000000+978307200, 'unixepoch') > datetime('now','-3 days') order by date DESC LIMIT 20000;SELECT * from _SqliteDatabaseProperties LIMIT 7000;SELECT * from chat LIMIT 7000;SELECT * from chat_handle_join LIMIT 7000;SELECT * from deleted_messages LIMIT 7000;SELECT * from handle LIMIT 7000;SELECT * from message_attachment_join LIMIT 7000;SELECT * from message_processing_task LIMIT 7000;SELECT * from sqlite_sequence LIMIT 7000;SELECT * from sqlite_stat1 LIMIT 7000;SELECT * from sync_deleted_messages LIMIT 7000
We see that the value contains a filename : /private/var/mobile/Library/SMS/sms.db
and several SQL requests. The ;
character is used as separator.
List of SQL Request
Here is the list of the executed SQL requests :
SELECT DISTINCT sql from sqlite_master;
SELECT * from chat_message_join where datetime(message_date/1000000000+978307200, 'unixepoch') > datetime('now','-3 days') order by message_date DESC LIMIT 20000;
SELECT * from message where datetime(date/1000000000+978307200, 'unixepoch')> datetime('now','-3 days') order by date DESC LIMIT 20000;
SELECT * from _SqliteDatabaseProperties LIMIT 7000;
SELECT * from chat LIMIT 7000;
SELECT * from chat_handle_join LIMIT 7000;
SELECT * from deleted_messages LIMIT 7000;
SELECT * from handle LIMIT 7000;
SELECT * from message_attachment_join LIMIT 7000;
SELECT * from message_processing_task LIMIT 7000;
SELECT * from sqlite_sequence LIMIT 7000;
SELECT * from sqlite_stat1 LIMIT 7000;
SELECT * from sync_deleted_messages LIMIT 7000
These requests are used to dump the /private/var/mobile/Library/SMS/sms.db
database.
Retrieving other parameters’ value
After that, The module retrieves its other parameters’ value:
fp
(file path) :/private/var/tmp/adr3
fx
(file extension) :.dat
ky
(key) :30f7ad596a12ddee75cba5efa560cda9e1e397bbae71b9c3d9c323929194fa54
sd
(self delete) :N
The logic is pretty much the same each time :
Decrypts the parameter name string.
Retrieves the parameter value.
Allocates memory for the parameter value.
Copy it into the newly allocated memory.
Reading configuration from environment
The module also reads values from the device environment. It checks the following environment variables :
QS
FP
FX
KY
These values seem to correspond to the module configuration parameters. For each parameter the logic is the same :
Decrypts the string.
Retrieves the value from environment using
getenv
.Allocates memory if value has been found in environment.
Copy the value into newly allocated memory.
If these values are found in the environment they are used instead of the module configuration value. It seems that it is another way to pass configuration value to the module.
Retrieving first argument value
The module can be started with one argument. The value is retrieved and then copied into allocated memory.
This argument is used as another alternative for the qs
value. If not specified, the module will uses the QS
from environment, or the qs
from the .data
section configuration.
Self deleting
Depending on the value of the sd
parameter (Self Delete
), the module decides to delete itself or not. The function responsible for this is located at 100009BCC
. It uses NSGetExecutablePath
to retrieve the current module path. After that, it verifies if the file exists, and calls unlink
to delete it.
Convert encryption key to bytes
The module is converting the ky
string: 30f7ad596a12ddee75cba5efa560cda9e1e397bbae71b9c3d9c323929194fa54
into a byte array. This is done by the function 10000B144
.
The function uses memmove
to read the string using blocks of two characters. Each block is converted to a long
using strtol
.
This parameter is the AES
key used to encrypt data before writing into the dump file.
Generating temporary dump file path
Now the module will generate the dump file path. This is handled by the function 0x100009A5C
that generates a pseudo-random filename. The generated path is used to create a temporary file used by the module
It takes three parameters :
the file path (corresponding to
fp
parameter).a file extension.
a byte number (equal to
6
in this case).
It will create a string in this format : FILEPATH+XXXXXX+FILE_EXTENSION
. (where. XXXXXX
corresponds to 6 random byte from this charset: 0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
).
With the current module configuration it results with : /private/var/tmp/adr3XXXXXX.tmp
. The module does an extra check to verify if the file extension from configuration is equal to .tmp
. If it’s the case, the temporary file will have the .bak
extension.
Opening and writing to the file
The module uses a custom fopen
function located at 0x10000A7F4
to open the file. As Kaspersky explained in their blogpost, a custom flag Z
has been added to indicate that the file is AES-encrypted and compressed with zlib.
file_ptr_ = tm_custom_fopen((char *)file_path, "wZ", (__int64)param_out_size);
Encryption is done using CCCryptor
related family function.
We observed that the module uses a system of “header”. Before each write of data in the file, the module writes 4 bytes. These are probably used to help reconstructing the file once it has been exfiltrated.
Dumping SQL database
The module retrieves the sqlite3 library version and write it into the file.
After that, the module starts to process the SQL requests.
Executing SQL request
The module starts by iterating over all the substring found in qs
parameter. It uses strtok_r
to split qs
with ;
as separator.
The first token is used as the database path. The module opens the database using sqlite3_open_v2
, then it enables sqlite3 extended result code using sqlite3_extended_result_codes
.
From the second token, the module uses sqlite3_prepare_v2
and then sqlite3_step
to process each row returned by the request.
For each rows, the module iterates over the columns and write their type, then their value into the file :
If an error happens (g_sqlite3_errmsg
is not null), the error message and the column names are dumped into the file :
This is probably done to retrieve the information if the database schema has changed.
These steps are done for all the sql requests found in the configuration. Once it’s done, the module closes and frees everything it needs, and then exits.
Conclusion
This module is one of the simplest of operation triangulation. Except the possibility of self deletion, it does not implement any tricks to hide itself. The module is just used to dump the content of the sms database using sql requests.
Annexes
String decryption script
Configuration extraction script
Strings list
Here is the decrypted strings list :