SlideShare a Scribd company logo
Android Bootkit Malware Analysis 
Kim, Hobin 
HobinKim125@gmail.com 
www.CodeEngn.com 
2014 CodeEngn Conference 11
What is Bootkit? 
• Bootkit = Rootkit + Boot capability 
• Boot sector of a disk is infecting the host 
when introduced at the boot process. 
• Ex) Windows MBR Rootkit
Android Boot Partition 
• Android devices’ boot partition uses 
RAM disk file system 
• Consist of Linux kernel(zImage) & root 
file system ramdisk(initrd; initial ramdisk)
Android Boot Process 
Bootloader Kernel(Linux) init(init.rc) 
• init process is first process on Android
Stealth Technic of Android Bootkit 
• Modifying devices’ boot partition and 
booting script during early stage of 
system’s booting for hiding and 
protecting itself 
• Launching system service as root and 
extracting malware app as system app
Characteristics of Android Bootkit 
• Bypass built-in kernel-level security 
restrictions 
• Difficult to detect and cure by AV
Oldboot; The First Android Bootkit 
• Oldboot 
• Reported by Qihoo360 in China 
• The first bootkit officially found on Android 
in the wild 
• More than 500,000 Android devices infected 
in China 
• Proof that the boot partition of Android 
could be infected easily
How Android Can Be Infected? 
• The attacker has a chance to physically 
touch the devices, and flash a malcious 
boot.img image files to the boot 
partition of the disk
How Android Can Be Infected? (cont) 
• Qihoo360 found the infected device in big IT 
mall in Beijing 
• the recovery partition has been replaced by a 
custom recovery ROM. and the timestamp of 
all files in the boot partition are the same.
How Android Can Be Infected? (cont) 
• based on Qihoo’s cloud security technology, 
they figured out almost infected devices are 
only well-known device such as the Galaxy 
Note II
Oldboot Bootkit’s Components 
• Oldboot.a 
• init.rc (modified) 
• imei_chk (located at /sbin) 
• libgooglekernel.so (located at /system/lib) 
• GoogleKernel.apk (located at /system/app)
Analyzing init process(init.rc) 
• Content of the modified init.rc 
• Adding imei_chk service as root
Analyzing imei_chk 
• Extract so files
Analyzing imei_chk (cont) 
• Extract apk files
Analyzing imei_chk (cont) 
• Socket listening & read
Analyzing imei_chk (cont) 
• executes received commands
Analyzing GoogleKernel.apk 
• GoogleKernel.apk’s AndroidManifest.xml
Analyzing GoogleKernel.apk (cont) 
• GoogleKernel.apk’s AndroidManifest.xml
Analyzing GoogleKernel.apk (cont) 
• BootRecv service
Analyzing GoogleKernel.apk (cont) 
• EventsRecv service
Analyzing GoogleKernel.apk (cont) 
• Dalvik service
Analyzing GoogleKernel.apk (cont) 
• Incomplete malicious function
Analyzing GoogleKernel.apk (cont) 
• Communicate with libgooglekernel.so by 
JNI
Analyzing libgooglekernel.so 
• Connecting to its C&C Servers to 
download configuration files
Analyzing libgooglekernel.so (cont) 
• Location of C&C Server
Analyzing libgooglekernel.so (cont) 
• Location of C&C Server
Analyzing libgooglekernel.so (cont) 
• Downloading APK file
Analyzing libgooglekernel.so (cont) 
• Downloading APK file
Analyzing libgooglekernel.so (cont) 
• Installing downloaded APK as system 
application
Analyzing libgooglekernel.so (cont) 
• Deleting system application
Oldboot.a Running Flow Chart 
init process init.rc 
system server 
imei_chk 
GoogleKernel.apk libgooglekernel.so 
JNI 
socket
Preview point of Android Bootkit Malware 
• Totally new malware attack method on 
Android 
• Not only apk can be infected
References 
• Oldboot: the first bootkit on Android, Zihang Xiao, Qing Dong, Hao 
Zhang & Xuxian Jiang, Qihoo 360 
• Advanced Bootkit Techniques on Android, Zhangqi Chen & Di Shen 
@SyScan360 
• Android Hacker’s handbook, Drake, Oliva Fora, Lanier Mulliner, Ridley, 
Wicherski, Wiley 
• 인사이드 안드로이드, 송형주, 김태연, 박지훈, 이백, 임기영, 위키북스 
• 안드로이드의 모든 것 분석과 포팅, 고현철, 유형목, 한빛미디어 
• http://contagiominidump.blogspot.kr/
Q & A 
Any question so far? 
www.CodeEngn.com 
2014 CodeEngn Conference 11

More Related Content

What's hot (20)

PPT
ApacheCon NA 2011 report
Koji Kawamura
 
PDF
Playing games-in-the-sandbox-dynamic-analysis-and-modern-evasion-tactics copy1
Priyanka Aash
 
PPTX
IronRuby on Teched Japan
Shay Friedman
 
PPTX
How to Secure Containers
Sysdig
 
PPT
FTP Commando to Git Hero - WordCamp Denver 2013
Jeremy Green
 
PPTX
Performance is a feature! - London .NET User Group
Matt Warren
 
PPTX
Dock ir incident response in a containerized, immutable, continually deploy...
Shakacon
 
PDF
XFLTReat: a new dimension in tunnelling
Shakacon
 
PDF
[2014 CodeEngn Conference 11] 정든품바 - 웹성코드
Code Engn
 
PDF
Docker 102 - Immutable Infrastructure
Adrian Otto
 
PPTX
How to Make a Honeypot Stickier (SSH*)
Jose Hernandez
 
PPTX
Power forensics
nullowaspmumbai
 
PDF
Mission ImpAnsible - NSM at (RobotFrame)work
Adam Przybyła
 
PDF
Infrastructure coders logstash
David Lutz
 
PDF
Java Logging discussion Log4j,Slf4j
Rajiv Gupta
 
PDF
Effortless network response logging on Android
Simon Percic
 
PDF
Di shen pacsec_final
PacSecJP
 
PDF
Is ruby logger thread(process)-safe? at RubyConf 2013
Naotoshi Seo
 
PDF
Git 101
Dimitris Tsironis
 
ApacheCon NA 2011 report
Koji Kawamura
 
Playing games-in-the-sandbox-dynamic-analysis-and-modern-evasion-tactics copy1
Priyanka Aash
 
IronRuby on Teched Japan
Shay Friedman
 
How to Secure Containers
Sysdig
 
FTP Commando to Git Hero - WordCamp Denver 2013
Jeremy Green
 
Performance is a feature! - London .NET User Group
Matt Warren
 
Dock ir incident response in a containerized, immutable, continually deploy...
Shakacon
 
XFLTReat: a new dimension in tunnelling
Shakacon
 
[2014 CodeEngn Conference 11] 정든품바 - 웹성코드
Code Engn
 
Docker 102 - Immutable Infrastructure
Adrian Otto
 
How to Make a Honeypot Stickier (SSH*)
Jose Hernandez
 
Power forensics
nullowaspmumbai
 
Mission ImpAnsible - NSM at (RobotFrame)work
Adam Przybyła
 
Infrastructure coders logstash
David Lutz
 
Java Logging discussion Log4j,Slf4j
Rajiv Gupta
 
Effortless network response logging on Android
Simon Percic
 
Di shen pacsec_final
PacSecJP
 
Is ruby logger thread(process)-safe? at RubyConf 2013
Naotoshi Seo
 

Viewers also liked (9)

PDF
[2014 CodeEngn Conference 11] 김호빈 - Android Bootkit Analysis KO
Code Engn
 
PDF
[2014 CodeEngn Conference 10] 노용환 - 디버거 개발, 삽질기
Code Engn
 
PDF
[2014 CodeEngn Conference 11] 박세한 - IE 1DAY Case Study EN
Code Engn
 
PDF
[2013 CodeEngn Conference 09] 김홍진 - 보안컨설팅 이해 및 BoB 보안컨설팅 인턴쉽
Code Engn
 
PDF
[2014 CodeEngn Conference 11] 이경식 - 동적 추적 프레임워크를 이용한 OS X 바이너리 분석
Code Engn
 
PDF
[2014 CodeEngn Conference 11] 박한범 - 가상화 기술과 보안
Code Engn
 
PDF
[2014 CodeEngn Conference 11] 남대현 - iOS MobileSafari Fuzzer 제작 및 Fuzzing
Code Engn
 
PDF
[2014 CodeEngn Conference 11] 김기홍 - 빅데이터 기반 악성코드 자동 분석 플랫폼
Code Engn
 
PDF
기업 IT 인프라 환경 최적화를 위한 하이브리드 클라우드 적용 방안 - AWS Summit Seoul 2017
Amazon Web Services Korea
 
[2014 CodeEngn Conference 11] 김호빈 - Android Bootkit Analysis KO
Code Engn
 
[2014 CodeEngn Conference 10] 노용환 - 디버거 개발, 삽질기
Code Engn
 
[2014 CodeEngn Conference 11] 박세한 - IE 1DAY Case Study EN
Code Engn
 
[2013 CodeEngn Conference 09] 김홍진 - 보안컨설팅 이해 및 BoB 보안컨설팅 인턴쉽
Code Engn
 
[2014 CodeEngn Conference 11] 이경식 - 동적 추적 프레임워크를 이용한 OS X 바이너리 분석
Code Engn
 
[2014 CodeEngn Conference 11] 박한범 - 가상화 기술과 보안
Code Engn
 
[2014 CodeEngn Conference 11] 남대현 - iOS MobileSafari Fuzzer 제작 및 Fuzzing
Code Engn
 
[2014 CodeEngn Conference 11] 김기홍 - 빅데이터 기반 악성코드 자동 분석 플랫폼
Code Engn
 
기업 IT 인프라 환경 최적화를 위한 하이브리드 클라우드 적용 방안 - AWS Summit Seoul 2017
Amazon Web Services Korea
 
Ad

Similar to [2014 CodeEngn Conference 11] 김호빈 - Android Bootkit Analysis EN (20)

PDF
ToorCon 14 : Malandroid : The Crux of Android Infections
Aditya K Sood
 
PDF
Linux kernel booting
Ramin Farajpour Cami
 
PDF
Yet Another Android Rootkit
FFRI, Inc.
 
PDF
Security Issues in Android Custom Rom
n|u - The Open Security Community
 
PDF
Security Issues in Android Custom ROM
Anant Shrivastava
 
PDF
Booting Android: bootloaders, fastboot and boot images
Chris Simmonds
 
PDF
Android Attacks
Michael Scovetta
 
PDF
Bootkits: Past, Present & Future - Virus Bulletin
ESET
 
PDF
Android Internals
Opersys inc.
 
PDF
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
PDF
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
 
PPTX
Mobile security
priyanka pandey
 
PDF
Bootkits: past, present & future
Alex Matrosov
 
PDF
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Arash Ramez
 
PPTX
Android Hacking + Pentesting
Sina Manavi
 
PDF
Android malware overview, status and dilemmas
Tech and Law Center
 
PDF
CNIT 128 6. Analyzing Android Applications (Part 3 of 3)
Sam Bowne
 
PPT
Android Rooting
Ajay Dasila
 
PPT
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
PDF
When developer's api simplify user mode rootkits developing.
Yury Chemerkin
 
ToorCon 14 : Malandroid : The Crux of Android Infections
Aditya K Sood
 
Linux kernel booting
Ramin Farajpour Cami
 
Yet Another Android Rootkit
FFRI, Inc.
 
Security Issues in Android Custom Rom
n|u - The Open Security Community
 
Security Issues in Android Custom ROM
Anant Shrivastava
 
Booting Android: bootloaders, fastboot and boot images
Chris Simmonds
 
Android Attacks
Michael Scovetta
 
Bootkits: Past, Present & Future - Virus Bulletin
ESET
 
Android Internals
Opersys inc.
 
Building Custom Android Malware BruCON 2013
Stephan Chenette
 
Survey of Rootkit Technologies and Their Impact on Digital Forensics
Tyler Shields
 
Mobile security
priyanka pandey
 
Bootkits: past, present & future
Alex Matrosov
 
Anti-tampering in Android and Take Look at Google SafetyNet Attestation API
Arash Ramez
 
Android Hacking + Pentesting
Sina Manavi
 
Android malware overview, status and dilemmas
Tech and Law Center
 
CNIT 128 6. Analyzing Android Applications (Part 3 of 3)
Sam Bowne
 
Android Rooting
Ajay Dasila
 
ethical hacking-mobile hacking methods.ppt
Jayaprasanna4
 
When developer's api simplify user mode rootkits developing.
Yury Chemerkin
 
Ad

More from Code Engn (20)

PDF
[2014 CodeEngn Conference 11] 최우석 - 자바스크립트 난독화 너네 뭐니?
Code Engn
 
PDF
[2014 CodeEngn Conference 11] 박세한 - IE 1DAY Case Study KO
Code Engn
 
PDF
[2014 CodeEngn Conference 10] 심준보 - 급전이 필요합니다
Code Engn
 
PDF
[2013 CodeEngn Conference 09] x15kangx - MS Office 2010 문서 암호화 방식 분석 결과
Code Engn
 
PDF
[2013 CodeEngn Conference 09] proneer - Malware Tracker
Code Engn
 
PDF
[2013 CodeEngn Conference 09] BlueH4G - hooking and visualization
Code Engn
 
PDF
[2013 CodeEngn Conference 09] wh1ant - various tricks for linux remote exploits
Code Engn
 
PDF
[2013 CodeEngn Conference 09] 제갈공맹 - MS 원데이 취약점 분석 방법론
Code Engn
 
PDF
[2013 CodeEngn Conference 09] Park.Sam - 게임 해킹툴의 변칙적 공격 기법 분석
Code Engn
 
PDF
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
Code Engn
 
PDF
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
Code Engn
 
PDF
[2010 CodeEngn Conference 04] hahah - Defcon 18 CTF 문제풀이
Code Engn
 
PDF
[2009 CodeEngn Conference 03] externalist - Reversing Undocumented File Forma...
Code Engn
 
PDF
[2009 CodeEngn Conference 03] hkpco - DEFCON CTF 2009 Binary Leetness 100-500...
Code Engn
 
PDF
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
Code Engn
 
PDF
[2009 CodeEngn Conference 03] sionics, kaientt - (파일바이러스 치료로직 개발자 입장에서 본) 파일 ...
Code Engn
 
PDF
[2013 CodeEngn Conference 08] pwn3r - Pwning multiplayer game - case Starcraf...
Code Engn
 
PDF
[2013 CodeEngn Conference 08] CherishCat - 각종 취약점과 대응방안 & 해킹, 보안 문제풀이
Code Engn
 
PDF
[2013 CodeEngn Conference 08] Homeless - Android 악성앱 필터링 시스템
Code Engn
 
PDF
[2013 CodeEngn Conference 08] manGoo - Windows 8 Exploit
Code Engn
 
[2014 CodeEngn Conference 11] 최우석 - 자바스크립트 난독화 너네 뭐니?
Code Engn
 
[2014 CodeEngn Conference 11] 박세한 - IE 1DAY Case Study KO
Code Engn
 
[2014 CodeEngn Conference 10] 심준보 - 급전이 필요합니다
Code Engn
 
[2013 CodeEngn Conference 09] x15kangx - MS Office 2010 문서 암호화 방식 분석 결과
Code Engn
 
[2013 CodeEngn Conference 09] proneer - Malware Tracker
Code Engn
 
[2013 CodeEngn Conference 09] BlueH4G - hooking and visualization
Code Engn
 
[2013 CodeEngn Conference 09] wh1ant - various tricks for linux remote exploits
Code Engn
 
[2013 CodeEngn Conference 09] 제갈공맹 - MS 원데이 취약점 분석 방법론
Code Engn
 
[2013 CodeEngn Conference 09] Park.Sam - 게임 해킹툴의 변칙적 공격 기법 분석
Code Engn
 
[2010 CodeEngn Conference 04] Max - Fighting against Botnet
Code Engn
 
[2010 CodeEngn Conference 04] window31 - Art of Keylogging 키보드보안과 관계없는 키로거들
Code Engn
 
[2010 CodeEngn Conference 04] hahah - Defcon 18 CTF 문제풀이
Code Engn
 
[2009 CodeEngn Conference 03] externalist - Reversing Undocumented File Forma...
Code Engn
 
[2009 CodeEngn Conference 03] hkpco - DEFCON CTF 2009 Binary Leetness 100-500...
Code Engn
 
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
Code Engn
 
[2009 CodeEngn Conference 03] sionics, kaientt - (파일바이러스 치료로직 개발자 입장에서 본) 파일 ...
Code Engn
 
[2013 CodeEngn Conference 08] pwn3r - Pwning multiplayer game - case Starcraf...
Code Engn
 
[2013 CodeEngn Conference 08] CherishCat - 각종 취약점과 대응방안 & 해킹, 보안 문제풀이
Code Engn
 
[2013 CodeEngn Conference 08] Homeless - Android 악성앱 필터링 시스템
Code Engn
 
[2013 CodeEngn Conference 08] manGoo - Windows 8 Exploit
Code Engn
 

Recently uploaded (20)

PDF
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
PPTX
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
PPTX
How to Set Maximum Difference Odoo 18 POS
Celine George
 
PPTX
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
PPT
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
PPTX
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
PPTX
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
PPTX
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
PPTX
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
PDF
Dimensions of Societal Planning in Commonism
StefanMz
 
PDF
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
PDF
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
PDF
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
PPTX
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PPTX
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
PPTX
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
PDF
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
PPTX
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
PPTX
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
PDF
Women's Health: Essential Tips for Every Stage.pdf
Iftikhar Ahmed
 
Knee Extensor Mechanism Injuries - Orthopedic Radiologic Imaging
Sean M. Fox
 
Unit 2 COMMERCIAL BANKING, Corporate banking.pptx
AnubalaSuresh1
 
How to Set Maximum Difference Odoo 18 POS
Celine George
 
Neurodivergent Friendly Schools - Slides from training session
Pooky Knightsmith
 
Talk on Critical Theory, Part One, Philosophy of Social Sciences
Soraj Hongladarom
 
How to Create a PDF Report in Odoo 18 - Odoo Slides
Celine George
 
CATEGORIES OF NURSING PERSONNEL: HOSPITAL & COLLEGE
PRADEEP ABOTHU
 
Stereochemistry-Optical Isomerism in organic compoundsptx
Tarannum Nadaf-Mansuri
 
Universal immunization Programme (UIP).pptx
Vishal Chanalia
 
Dimensions of Societal Planning in Commonism
StefanMz
 
The Constitution Review Committee (CRC) has released an updated schedule for ...
nservice241
 
ARAL_Orientation_Day-2-Sessions_ARAL-Readung ARAL-Mathematics ARAL-Sciencev2.pdf
JoelVilloso1
 
Generative AI: it's STILL not a robot (CIJ Summer 2025)
Paul Bradshaw
 
Cultivation practice of Litchi in Nepal.pptx
UmeshTimilsina1
 
PATIENT ASSIGNMENTS AND NURSING CARE RESPONSIBILITIES.pptx
PRADEEP ABOTHU
 
SPINA BIFIDA: NURSING MANAGEMENT .pptx
PRADEEP ABOTHU
 
Stokey: A Jewish Village by Rachel Kolsky
History of Stoke Newington
 
Growth and development and milestones, factors
BHUVANESHWARI BADIGER
 
ASRB NET 2023 PREVIOUS YEAR QUESTION PAPER GENETICS AND PLANT BREEDING BY SAT...
Krashi Coaching
 
Women's Health: Essential Tips for Every Stage.pdf
Iftikhar Ahmed
 

[2014 CodeEngn Conference 11] 김호빈 - Android Bootkit Analysis EN