Firmware-level Android Backdoor via libandroid_runtime Zygote Injection
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.
Overview
Kuingilia kati mnyororo wa ugavi wa /system/lib[64]/libandroid_runtime.so inaweza kudukua android.util.Log.println_native hivyo kwamba kila app inayotokana na Zygote inatekeleza msimbo wa mshambuliaji. Backdoor ya Keenadu inaongeza simu moja ndani ya println_native ambayo inaendesha native dropper. Kwa kuwa mchakato wote wa app zinaendesha msimbo huu, mipaka ya Android sandbox na ruhusa za kila-app zinavunjwa kwa ufanisi.
Dropper path: native patch β RC4 β DexClassLoader
- Hooked entry: extra call inside
println_nativeto__log_check_tag_count(injected static liblibVndxUtils.a). - Payload storage: RC4-decrypt blob embedded in the
.so, drop to/data/dalvik-cache/arm[64]/system@framework@vndx_10x.jar@classes.jar. - Load & execute:
DexClassLoaderloads the jar and invokescom.ak.test.Main.main. Runtime logs use tagAK_CPP(triage artifact). - Anti-analysis: aborts in Google/Sprint/T-Mobile system apps or if kill-switch files exist.
- Zygote role split:
- In
system_serverβ instantiateAKServer. - In any other app β instantiate
AKClient.
Binder-based client/server backdoor
AKServer(running insystem_server) sends protected broadcasts:com.action.SystemOptimizeServiceβ binder interface for clients.com.action.SystemProtectServiceβ binder interface for downloaded modules.AKClient(inside every app) receives the interface via broadcast and performs anattachtransaction, handing an IPC wrapper so the server can load arbitrary DEX inside the current app process.- Exposed privileged operations (via
SystemProtectService): grant/revoke any permission for any package, retrieve geolocation, and exfiltrate device info. Hii inajaza kivyo vya kupitisha ruhusa huku msimbo ukitekelezwa ndani ya apps walengwa (Chrome, YouTube, launcher, shopping apps, n.k.).
C2 staging, crypto, and gating
- Host discovery: Base64 β gzip β AES-128-CFB decrypt with key
MD5("ota.host.ba60d29da7fd4794b5c5f732916f7d5c"), IV"0102030405060708". - Victim registration: collect IMEI/MAC/model/OS, encrypt with key
MD5("ota.api.bbf6e0a947a5f41d7f5226affcfd858c"), POST to/ak/api/pts/v4with paramsm=MD5(IMEI)andn=w|m(network type). Responsedatais encrypted identically. - Activation delay: C2 serves modules only after ~2.5 months from an βactivation timeβ in the request, frustrating sandbox detonations.
- Module container (proprietary):
struct KeenaduPayload {
int32_t version;
uint8_t padding[0x100];
uint8_t salt[0x20];
KeenaduChunk config; // size + data
KeenaduChunk payload; // size + data
KeenaduChunk signature;// size + data
} __packed;
- Integrity: MD5 file check + DSA signature (mwendeshaji pekee aliye na private key anaweza kutoa modules).
- Decryption: AES-128-CFB, key
MD5("37d9a33df833c0d6f11f1b8079aaa2dc" + salt), IV"0102030405060708".
Persistence & forensic tips
- Supply chain placement: maktaba ya static ya hatari
libVndxUtils.aimeunganishwa ndani yalibandroid_runtime.sowakati wa build (kwa mfano,vendor/mediatek/proprietary/external/libutils/arm[64]/libVndxUtils.a). - Firmware auditing: picha za firmware hutumwa kama Android Sparse
super.img; tumialpunpack(au sawa) kutoa partitions na kuchunguzalibandroid_runtime.sokwa wito za ziada katikaprintln_native. - On-device artifacts: uwepo wa
/data/dalvik-cache/arm*/system@framework@vndx_10x.jar@classes.jar, logcat tagAK_CPP, au protected broadcasts zenye majinacom.action.SystemOptimizeService/com.action.SystemProtectServicezinaashiria kuingiliwa.
Marejeo
Tip
Jifunze na fanya mazoezi ya AWS Hacking:
HackTricks Training AWS Red Team Expert (ARTE)
Jifunze na fanya mazoezi ya GCP Hacking:HackTricks Training GCP Red Team Expert (GRTE)
Jifunze na fanya mazoezi ya Azure Hacking:
HackTricks Training Azure Red Team Expert (AzRTE)
Support HackTricks
- Angalia mpango wa usajili!
- Jiunge na π¬ kikundi cha Discord au kikundi cha telegram au tufuatilie kwenye Twitter π¦ @hacktricks_live.
- Shiriki mbinu za hacking kwa kuwasilisha PRs kwa HackTricks na HackTricks Cloud repos za github.


