Secure Honey

SSH honeypot written in C

Creating An Antidote For Android Simplelocker Ransomware

Tuesday 17th June 2014 10:09

In yesterday's blog post (How To Dissect Android Simplelocker Ransomware) we dissected the new Android Simplelocker ransomware.

In this blog post we'll be creating an antidote for the ransomware to decrypt any files it encrypts.

The process of creating the antidote is actually very simple because the ransomware comes with a built-in decrypt method and cipher password. This means we're able to create our own Java class and copy the decryption code from the ransomware into our antidote class.

So let's jump right in and start creating our antidote for Simplelocker!

NB: if you haven't already read the previous post (How To Dissect Android Simplelocker Ransomware) it might be worth having a quick read through that now, since I'll be referencing Java classes that were analysed in that post.

First, we want to examine the AesCrypt class, which is shown in full below:

package org.simplelocker;

import java.io.FileInputStream;
import java.io.FileOutputStream;
import java.security.MessageDigest;
import java.security.spec.AlgorithmParameterSpec;
import javax.crypto.Cipher;
import javax.crypto.CipherInputStream;
import javax.crypto.CipherOutputStream;
import javax.crypto.spec.IvParameterSpec;
import javax.crypto.spec.SecretKeySpec;

public class AesCrypt
{
  private final Cipher cipher;
  private final SecretKeySpec key;
  private AlgorithmParameterSpec spec;

  public AesCrypt(String paramString)
    throws Exception
  {
    MessageDigest localMessageDigest = MessageDigest.getInstance("SHA-256");
    localMessageDigest.update(paramString.getBytes("UTF-8"));
    byte[] arrayOfByte = new byte[32];
    System.arraycopy(localMessageDigest.digest(), 0, arrayOfByte, 0, arrayOfByte.length);
    this.cipher = Cipher.getInstance("AES/CBC/PKCS7Padding");
    this.key = new SecretKeySpec(arrayOfByte, "AES");
    this.spec = getIV();
  }

  public void decrypt(String paramString1, String paramString2)
    throws Exception
  {
    FileInputStream localFileInputStream = new FileInputStream(paramString1);
    FileOutputStream localFileOutputStream = new FileOutputStream(paramString2);
    this.cipher.init(2, this.key, this.spec);
    CipherInputStream localCipherInputStream = new CipherInputStream(localFileInputStream, this.cipher);
    byte[] arrayOfByte = new byte[8];
    while (true)
    {
      int i = localCipherInputStream.read(arrayOfByte);
      if (i == -1)
      {
        localFileOutputStream.flush();
        localFileOutputStream.close();
        localCipherInputStream.close();
        return;
      }
      localFileOutputStream.write(arrayOfByte, 0, i);
    }
  }

  public void encrypt(String paramString1, String paramString2)
    throws Exception
  {
    FileInputStream localFileInputStream = new FileInputStream(paramString1);
    FileOutputStream localFileOutputStream = new FileOutputStream(paramString2);
    this.cipher.init(1, this.key, this.spec);
    CipherOutputStream localCipherOutputStream = new CipherOutputStream(localFileOutputStream, this.cipher);
    byte[] arrayOfByte = new byte[8];
    while (true)
    {
      int i = localFileInputStream.read(arrayOfByte);
      if (i == -1)
      {
        localCipherOutputStream.flush();
        localCipherOutputStream.close();
        localFileInputStream.close();
        return;
      }
      localCipherOutputStream.write(arrayOfByte, 0, i);
    }
  }

  public AlgorithmParameterSpec getIV()
  {
    return new IvParameterSpec(new byte[16]);
  }
}

We can see that the decrypt() method is clearly provided within this class. We also already know the decryption password (as set in the Constants class), so all we need to is call this method on any files ending in .enc.

Let's create a new Java class called SimplelockerAntidote with a method called getEncryptedFiles() which will scan the current directory for all files ending with .enc:

public static String[] getEncryptedFiles() {

		File dir = new File(System.getProperty("user.dir"));

		Collection<String> files  =new ArrayList<String>();

		if(dir.isDirectory()){
			File[] listFiles = dir.listFiles();

			for(File file : listFiles){
				String filename = file.getName();
				if(
					file.isFile() 
					&& (filename.lastIndexOf(".") >= 0)
					&& (filename.substring(filename.lastIndexOf(".")).toLowerCase().equals(".enc"))
				) {
					files.add(file.getName());
				}
			}
		}
		
		return files.toArray(new String[]{});
	}

This method returns an array of String files names (of all files ending in .enc in the current directory) which we can then feed into the decrypt() method. Line 3 sets the current directory (where the Java program is running). Line 10 iterates over all files in the directory. Finally, line 15 checks if the current file ends in .enc where line 17 adds it to the return array if it matches.

Next, create a main method which calls getEncryptedFiles() and sets the decryption password:

	public static void main(String[] args) throws Exception{

		// set default cipher password
		String cipher_password = "jndlasf074hr";

		// overwrite cipher password if set by first argument
		if(args.length == 1)
		{
			cipher_password = args[0];
		}

		// create new SimplelockerAntidote object
		SimplelockerAntidote sa = new SimplelockerAntidote(cipher_password);

		// get array of filenames to decrypt from current directory
		String[] files = sa.getEncryptedFiles();

		// iterate through files in the array
		for (int i = 0; i < files.length; i++) {

			// set input and output filenames
			// and remove the .enc file extension
			String inputFilename = files[i];			
			String outputFilename = inputFilename.substring(0,inputFilename.length()-4);

			System.out.println("Decrypting "+outputFilename);

			// call decrypt on the current file
			sa.decrypt(inputFilename,outputFilename);
		}

		System.out.println("Decryption complete.");

	}

Now all we need to do is copy-and-paste the constructor method from AesCrypt along with AlgorithmParameterSpec getIV(), encrypt() and decrypt().

This completes the antidote. The full Java class file is shown below:

// Simplelocker antidote, written by Simon Bell, SecureHoney.net

import javax.crypto.*;
import javax.crypto.interfaces.*;
import javax.crypto.spec.*;
import java.io.*;
import java.security.*;
import java.security.cert.*;
import java.security.interfaces.*;
import java.security.spec.*;
import javax.xml.bind.DatatypeConverter;
import java.util.ArrayList;
import java.util.Collection;

public class SimplelockerAntidote {

	private final Cipher cipher;
	private final SecretKeySpec key;
	private AlgorithmParameterSpec spec;

	public SimplelockerAntidote(String password) throws Exception {

		MessageDigest digest = MessageDigest.getInstance("SHA-256");
		digest.update(password.getBytes("UTF-8"));
		byte[] keyBytes = new byte[32];
		System.arraycopy(digest.digest(), 0, keyBytes, 0, keyBytes.length);

		cipher = Cipher.getInstance("AES/CBC/PKCS5Padding");
		key = new SecretKeySpec(keyBytes, "AES");
		spec = getIV();
	}

	public AlgorithmParameterSpec getIV() {
		return new IvParameterSpec(new byte[16]);
	}

	public void encrypt(String paramString1, String paramString2) throws Exception {
		FileInputStream localFileInputStream = new FileInputStream(paramString1);
		FileOutputStream localFileOutputStream = new FileOutputStream(paramString2);
		this.cipher.init(1, this.key, this.spec);
		CipherOutputStream localCipherOutputStream = new CipherOutputStream(localFileOutputStream, this.cipher);
		byte[] arrayOfByte = new byte[8];
		while (true) {
			int i = localFileInputStream.read(arrayOfByte);
			if (i == -1) {
				localCipherOutputStream.flush();
				localCipherOutputStream.close();
				localFileInputStream.close();
				return;
			}
			localCipherOutputStream.write(arrayOfByte, 0, i);
		}
	}

	public void decrypt(String paramString1, String paramString2) throws Exception {
		FileInputStream localFileInputStream = new FileInputStream(paramString1);
		FileOutputStream localFileOutputStream = new FileOutputStream(paramString2);
		this.cipher.init(2, this.key, this.spec);
		CipherInputStream localCipherInputStream = new CipherInputStream(localFileInputStream, this.cipher);
		byte[] arrayOfByte = new byte[8];
		while (true) {
			int i = localCipherInputStream.read(arrayOfByte);
			if (i == -1) {
				localFileOutputStream.flush();
				localFileOutputStream.close();
				localCipherInputStream.close();
				return;
			}
			localFileOutputStream.write(arrayOfByte, 0, i);
		}
	} 

	public static String[] getEncryptedFiles() {

		File dir = new File(System.getProperty("user.dir"));

		Collection<String> files  =new ArrayList<String>();

		if(dir.isDirectory()){
			File[] listFiles = dir.listFiles();

			for(File file : listFiles){
				String filename = file.getName();
				if(
					file.isFile() 
					&& (filename.lastIndexOf(".") >= 0)
					&& (filename.substring(filename.lastIndexOf(".")).toLowerCase().equals(".enc"))
				) {
					files.add(file.getName());
				}
			}
		}
		
		return files.toArray(new String[]{});
	}

	public static void main(String[] args) throws Exception{

		// set default cipher password
		String cipher_password = "jndlasf074hr";

		// overwrite cipher password if set by first argument
		if(args.length == 1)
		{
			cipher_password = args[0];
		}

		// create new SimplelockerAntidote object
		SimplelockerAntidote sa = new SimplelockerAntidote(cipher_password);

		// get array of filenames to decrypt from current directory
		String[] files = sa.getEncryptedFiles();

		// iterate through files in the array
		for (int i = 0; i < files.length; i++) {

			// set input and output filenames
			// and remove the .enc file extension
			String inputFilename = files[i];			
			String outputFilename = inputFilename.substring(0,inputFilename.length()-4);

			System.out.println("Decrypting "+outputFilename);

			// call decrypt on the current file
			sa.decrypt(inputFilename,outputFilename);
		}

		System.out.println("Decryption complete.");

	}
}

Once compiled, this Java program will scan the current directory for all files ending in .enc and attempt to decrypt them using the pre-set password.

It's also possible to override the default cipher password by calling the program as follows:

java SimplelockerAntidote <cipher-password>

The complete Java program can be downloaded here: SimplelockerAntidote.java.

It would be fairly straightforward from here to convert this Java program into an Android app. This app could then search for all .enc files on the SD card and attempt to decrypt them - thus providing a direct Android antidote app.

The antidote for this ransomware was incredibly easy to create because the ransomware came with both the decryption method and the decryption password. Therefore producing an antidote was more of a copy-and-paste job than anything.

It's also worth noting that while this antidote doesn't detect the decryption password automatically, it could be possible to do so. However, future versions of the ransomware will probably not reveal the decryption password so easily and will likely receive it from the C&C server.

Since the Simplelocker ransomware is a proof-of-concept, the antidote provided here is simply a solution to this proof-of-concept. Future versions of advanced smartphone ransomware will likely prove significantly harder to reverse engineer.

Image credit: "Chemistry" by Paul, flickr.com/photos/howzey/4955405374.

Comments

Roshin

Tue, 17 Jun 2014 12:45:00 +0100

you're awesome!

GK

Tue, 17 Jun 2014 12:49:35 +0100

Small type: \"with both the decryption method and the decryption password.\", should be encryption method I assume. Awesome write-up, thanks alot! :)

Hello

Tue, 17 Jun 2014 18:20:52 +0100

I guess it should be Android Simplocker Ransomware.

Cii3er

Wed, 18 Jun 2014 21:45:13 +0100

Very good Job. (Y)

Alex

Fri, 20 Jun 2014 13:37:53 +0100

Ctrl+C, Ctrl+V from source decompiled code.

TomTerrific

Tue, 07 Apr 2015 14:32:34 +0100

As an IT professional, we're constantly looking for solutions that would protect customer from CryptoWall etc. Since this was published in June 2014 and the ransomware world never sleeps, what has evolved since then in viable solutions and protection. Thanks

Simon

Sat, 11 Apr 2015 17:57:51 +0100

Hi Tom

As far as I'm aware, in terms of Android ransomware, the only real threat was Koler (See Android ransomware demanding $300 from porn site visitors and Android ransomware 'Koler' turns into a worm, spreads via SMS). Also known as FBI Ransomware, the Trojan was disguised as a BaDoink streaming app and would lock the users screen and demand a ransom of $300 to unlock the device.

Thanks
Simon

Add Comment

Name

Email (won't be displayed)

Website (optional)

Comments

Live Stats (see full stats)

Attempted logins

date range # attempts
today82
yesterday541
past 7 days6,340
past 30 days29,301
all time3,968,195

Top 5 passwords

password # attempts
12345613,637
admin6,711
-6,305
password5,302
6666663,700

Top 5 usernames

username # attempts
root3,818,575
admin73,903
oracle2,952
test2,555
bin2,296

Stats represent data collected from SSH login attempts on multiple honeypots. Parts of some stats may be filtered to maintain anonymity.

Updated: Tue, 04 Aug 2015 15:02:15 +0100

Live Password Cloud

qweasd idc2008 adminpp Pass123 112233 asdf oracle manager 123123 server 77777777 q123456 monitor admin123 zzzzzz 1234%^ woaini zxcvbn 12345678 1111 _ master 147147 Passw0rd 123456a iloveyou administrator apple qazwsx123 23456 abc123 147258369 caonima 12345qwert test123 raspberry 1qaz2wsx 123qweasd a1b2c3d4e5 zaqxswcdevfr 789789 system mnbvcxz default P@ssw0rd1 changeme guest huawei123 welcome123 idc123 147852369 pass password windows 225588 !@#$%^ q1w2e3r4 123456789 asdfghjkl 0000 12qwaszx 456789 cisco123 110110 qwer1234 qweasdzxc 1234567 superman 1qaz@WSX 11223344 huawei zxcvbnm !2#4%6 qqpp asdfgh - admin@123 Huawei@123 111 zaqxsw 1q2w3e4r5t6y 1qaz2wsx3edc z1x2c3v4 11111111 qwer support qwert toor a123456 123654 1qazxsw2 987654321 hacker welcome cisco 159357 000000 1234qwer zaq12wsx f**kyou abcd1234 P@$$w0rd 1234 changeme123 qazwsxedc aaa 5201314 china Admin123456 asdfg public 1q2w3e sqlpp 654321 qwe qwe123 1q2w3e4r5t qwertyuiop admin123!@# nagios 888888 12345 passwd 123456 P@ssw0rd a1b2c3d4 !QAZ@WSX adminadmin admin1 zxcv 1122334455 111111 abcdef p@ssword secret letmein password1 zaq1xsw2 qazxsw 963852741 qaz ubnt linux 88888888 !QAZ2wsx power qwerty 123123123 p0o9i8u7 super q1w2e3 1q2w3e4r idcidc sysadmin 102030 password123 q1w2e3r4t5 zhang backup redhat root123 159753 1a2s3d4f 123321 qwaszx abc1234 1234567890 user okokok !qaz1QAZ root sapp 666666 admin Aa123456 POIUYT qwerty123456 12344321 123abc 123 test qazwsx