This web page was created programmatically, to learn the article in its unique location you possibly can go to the hyperlink bellow:
https://www.welivesecurity.com/en/eset-research/rigged-game-scarcruft-compromises-gaming-platform-supply-chain-attack/
and if you wish to take away this text from our web site please contact us
ESET researchers uncovered a multiplatform supply-chain assault by North Korea-aligned APT group ScarCruft, concentrating on the Yanbian area in China – house to ethnic Koreans and a crossing level for North Korean refugees and defectors. In the assault, in all probability ongoing since late 2024, ScarCruft compromised Windows and Android elements of a online game platform devoted to Yanbian-themed video games, trojanizing them with a backdoor.
The backdoor, named ChickenCall by ESET, was initially identified to focus on Windows solely; the Android model was found as a part of this supply-chain assault. In this blogpost, we offer an summary of the assault, and the primary public evaluation of the Android backdoor.
Key factors of this blogpost:
- North Korea-aligned APT group ScarCruft compromised a online game platform utilized by ethnic Koreans dwelling within the Yanbian area in China.
- The gaming platform’s Windows shopper was compromised by a malicious replace resulting in the RokRAT backdoor, which deployed the extra subtle ChickenCall backdoor.
- Android video games obtainable on the gaming platform have been trojanized to comprise the Android model of the ChickenCall backdoor – a brand new instrument in ScarCruft’s arsenal.
- The aim of the marketing campaign is espionage, with the backdoor able to accumulating private information and paperwork, taking screenshots, and making voice recordings.
Scarcruft profile
ScarCruft, also referred to as APT37 or Reaper, has been working since not less than 2012 and is suspected to be a North Korean espionage group. It primarily focuses on South Korea, however different Asian nations have additionally been focused. ScarCruft appears to be primarily in authorities and army organizations, and corporations in varied industries linked to the pursuits of North Korea. The group additionally targets North Korean defectors, with the newest such exercise introduced on this blogpost.
ChickenCall backdoor
Windows model
ChickenCall is a Windows backdoor written in C++ that we found in 2021 and attributed to ScarCruft as a part of the ESET Threat Intelligence reporting.
The backdoor has a variety of spying capabilities, together with taking screenshots, logging keystrokes and clipboard content material, stealing credentials and information, and executing shell instructions. For C&C functions, the backdoor makes use of authentic cloud storage providers, similar to Dropbox or pCloud, or compromised web sites. ChickenCall is often deployed in a multistage loading chain, beginning with a Ruby or Python script, and containing elements encrypted utilizing a computer-specific key. The preliminary model of ChickenCall was publicly described by South Korean distributors in 2021 as a sophisticated model of RokRAT (S2W, AhnLab).
Android model
The Android model of ChickenCall, found within the assault that we describe on this blogpost, implements a subset of the instructions and capabilities of the Windows backdoor – it collects contacts, SMS messages, name logs, paperwork, media information, and personal keys. It may take screenshots and document surrounding audio.
Based on our analysis, Android ChickenCall was actively developed over a span of a number of months. We recognized seven variations, starting from model 1.0 (created roughly in October 2024) to model 2.0 (created roughly in June 2025).
Discovery
Our investigation began with a suspicious APK file discovered on VirusTotal. Upon preliminary evaluation, we decided that the APK is malicious and incorporates a backdoor.
Interestingly, the APK turned out to be a trojanized card recreation known as 延边红十 (machine translation: Yanbian Red Ten), which we traced to its official web site, https://www.sqgame[.]web. sqgame is a gaming platform tailor-made for the folks of Yanbian and hosts conventional Yanbian video games for Windows, Android, and iOS. The gamers can compete in card and board video games (see Figure 1) with buddies or be part of organized tournaments.

Surprisingly, the APK obtainable for obtain on the official web site is similar because the APK we initially discovered on VirusTotal. Moreover, a second Android recreation (新画图, machine translation: New Drawing) obtainable for obtain from sqgame was additionally trojanized with the identical backdoor. Further evaluation revealed that the backdoor is an Android port of the ScarCruft group’s ChickenCall backdoor.
The Windows desktop shopper hyperlink on the sqgame web site results in a few-years-old installer that seems to be clear. It does obtain updates as soon as put in, however we didn’t establish any malicious code there throughout our evaluation.
Investigating additional in ESET telemetry, we recognized a trojanized mono.dll library, originating from an replace package deal for the desktop shopper. ESET telemetry reveals that this replace package deal had been malicious since not less than November 2024, for an unknown interval. At the time of writing, this replace package deal was not malicious.
We additionally checked the iOS recreation obtainable on the sqgame web site and didn’t discover any malicious code. We suppose that ScarCruft skipped this platform, because the trojanization and supply of the app could be rather more tough in comparison with different platforms, presumably operating into Apple’s assessment course of.
Victimology
Since the web site compromised on this assault is devoted to the folks of Yanbian and their conventional video games, we infer that the first targets are ethnic Koreans dwelling in Yanbian. Yanbian Korean Autonomous Prefecture is a area in China that borders North Korea and is house to the most important ethnic Korean group outdoors Korea.
In this context, we imagine that it’s possible that the assault was aimed toward accumulating data on people primarily based in (or originating from) the Yanbian area and deemed of curiosity to the North Korean regime – more than likely refugees or defectors.
Attack overview
Android
Two of the Android video games obtainable on the sqgame web site have been discovered to be trojanized to comprise the ChickenCall backdoor. The obtain web page obtainable at https://www.sqgame[.]web/video games/gamedownload.aspx is proven in Figure 2, with obtain buttons for the 2 trojanized video games highlighted in pink. The third obtainable Android recreation was clear on the time of our evaluation.

We discovered proof that the victims downloaded the trojanized video games through an internet browser on their gadgets and doubtless put in them deliberately. We haven’t discovered another APK areas. We additionally haven’t discovered the malicious APKs on the official Google Play retailer.
We have been unable to find out when the web site was first compromised and the supply-chain assault began. However, primarily based on our evaluation of the deployed malware, we estimate that it occurred in late 2024.
Table 1 reveals the internet hosting URLs of the 2 trojanized APK information, together with the hashes of information served on the time of discovery. At the time of writing of this blogpost, the malicious information have been nonetheless up on the sqgame web site. We notified sqgame of the compromise in December 2025, however haven’t acquired a response.
Table 1. Malicious samples
| Time of discovery | URL | SHA‑1 | Description |
| 2025-10 | http://sqgame.com |
03E3ECE9F48CF4104AAF |
Trojanized recreation with the ChickenCall |
| 2025-10 | http://sqgame.com |
FC0C691DB7E2D2BD3B0B |
Trojanized recreation with the ChickenCall |
Windows
While the Windows desktop shopper obtainable on the sqgame web site didn’t comprise malicious code after we analyzed it, we later recognized a trojanized mono.dll library, originating from an replace package deal of the desktop shopper hosted on the URL http://xiazai.sqgame.com[.]cn/courting/20240429.zip. ESET telemetry reveals that this replace package deal had been malicious since not less than November 2024, for an unknown interval – however on the time of writing, this replace package deal was not malicious.
ScarCruft took a clear mono library and patched it with additional code and information, containing a downloader. The downloader first checks operating processes for evaluation instruments and digital machine environments and doesn’t proceed if any are discovered. Otherwise, it appears to be like for the method of the sqgame shopper and constructs a path to the mono library in its set up folder.
Next, it downloads and executes shellcode, which contained the RokRAT backdoor on the time of discovery. Finally, the downloader terminates the shopper course of and downloads the unique clear model of the mono library, changing the trojanized one within the put in shopper folder. Both the payload and clear mono library are downloaded from authentic South Korean web sites that have been compromised for this objective – a typical TTP of ScarCruft.
According to our telemetry, the RokRAT backdoor was subsequently used to obtain and set up the ChickenCall backdoor on the victimized machines.
Android ChickenCall evaluation
In this part, we offer a technical evaluation of the Android ChickenCall backdoor – an Android port of the eponymous Windows backdoor written in C++. Internally, the backdoor is called zhuagou, which may be translated (from Chinese) as “catching dogs”.
Trojanized Android video games
Android ChickenCall is distributed through trojanized Android video games. In the assault described on this blogpost, we imagine that ScarCruft didn’t achieve entry to the sport’s supply code, solely to the sqgame web site or internet server, and as a substitute took the unique recreation APKs and recompiled or repackaged them with malicious code added.
In the trojanized APKs, the AndroidManifest.xml entry level exercise is modified and factors to the added malicious code – which, after beginning the backdoor, executes the unique entry exercise of the sport.
In the analyzed samples, the modified entry level exercise was both com.instance.zhuagou.SplashScreen or com.mob.util.MobSs (within the newest pattern). The modifications to AndroidManifest.xml additionally embrace new exercise and repair definitions for the backdoor, in addition to extra permissions required for its operation. A comparability of packages within the unique recreation and its trojanized model is proven in Figure 3.

Since the Android ChickenCall backdoor is part of a trojanized Android app put in on the system, it doesn’t routinely begin after set up or a tool reboot; as a substitute, it depends on consumer execution.
Configuration
Android ChickenCall incorporates a default configuration, which is initialized on the primary run. The configuration makes use of JSON format and is continued in a file. Subsequent runs load the present configuration file, and the configuration may be modified through backdoor instructions. An instance of a formatted configuration is proven in Figure 4.
{
"bi": "E823D451D636D0A0",
"skey": "A8FE823D451D636D0A0366C0629EF5C3##@(()(#@",
"si": "20251105141404",
"rft": 20000,
"fst": true,
"kill": false,
"log": true,
"ctm": 10000,
"scr": false,
"rec": false,
"cmd": 0,
"data": 1,
"bd_version": 37,
"extentions": ".jpg;.doc;.docx;.xls;.xlsx;.ppt;.pptx;.txt;.hwp;.pdf;.m4a;.p12;",
"cloud": [
{
"ct": 9,
"idx": 28,
"cid": "1000.2IGB56IS1FHQ1V332R[redacted]",
"cst": "fa7ec5c8b050[redacted]",
"rt": "1000.a7fc479e[redacted]",
"at": "empty",
"fid": "8mwe5bbc0a2759839401f813968808a2f36a6",
"dm": "",
"use": 0
},
[redacted]
]
}
Figure 4. Android ChickenCall configuration instance
The bd_version configuration entry encodes the model of the backdoor, saved as MAJOR << 5 | MINOR, so worth 37 is the same as model 1.5.
The continued configuration file is saved within the information listing of the app and has a device-specific path. Additionally, throughout the configuration initialization, the default configuration of cloud storage drives hardcoded within the pattern may be overridden by an exterior supply. If obtainable, the backdoor downloads a JPG picture that incorporates an encrypted cloud configuration embedded in its overlay. The picture is often hosted on a compromised South Korean web site.
C&C communication
Android ChickenCall makes use of cloud storage drives for C&C communication, much like the Windows model. In the analyzed samples, three cloud suppliers are supported: pCloud, Yandex Disk, and Zoho WorkDrive, though solely Zoho WorkDrive is used. The backdoor communicates through HTTPS, sending requests to API endpoints of the respective supplier utilizing the okhttp3 library.
During our analysis, we noticed 12 Zoho WorkDrive drives utilized by the Android ChickenCall backdoor for C&C functions. Details of the related accounts are proven in Table 2.
Table 2. Android ChickenCall Zoho WorkDrive accounts
| client_id | display_name | e mail |
| 1000.AJUEYDUIQQ5G |
tomasalfred37 | tomasalfred37@zohomail[.]com |
| 1000.INXKBHQ3698C |
kalimaxim279 | kalimaxim279@zohomail[.]com |
| 1000.FYRJ46E75TUY |
Smith Bentley | smithbentley0617@zohomail[.]com |
| 1000.8QU6D2LJZ3RC |
Mic haelLarrow19 | michaellarrow19@zohomail[.]com |
| 1000.NT1QEE7V73IH |
dsf sdf | amandakurth94@zohomail[.]com |
| 1000.SKXUYYKYL06F |
dsf sdf | rexmedina89@zohomail[.]com |
| 1000.7BMBOS8GV1ZR |
dsf dsf | alishaross751@zohomail[.]com |
| 1000.V0J0QN7SJ2N7 |
sdf sdf | jamesdeeds385@zohomail[.]com |
| 1000.2IGB56IS1FHQ |
asdf sdaf | joyceluke505@zohomail[.]com |
| 1000.W4V2XMB83C6V |
dfsd sdf | marjoriemiller280@zohomail[.]com |
| 1000.LIUBF67S89H0 |
Bill Jackson | teresadaniels200@zohomail[.]com |
| 1000.8BLOFSFU4WOF |
Zoe Jack | michaelgiesen62@zohomail[.]com |
Capabilities
Android ChickenCall options an replace mechanism: a more recent model may be loaded from an replace file, which is predicted to be within the type of an APK within the app information listing, and its obtain is triggered through the command MP_SEND_FILE.
After the non-obligatory replace process, the unique recreation exercise is began, so as to not elevate suspicion. Then the backdoor checks and waits for an web connection, earlier than continuing to its important operation.
Data assortment
On the primary run, the backdoor collects a full listing itemizing of the gadget’s main shared external storage, and consumer information consisting of contact checklist, name log, and SMS messages.
The backdoor periodically checks in with the C&C and uploads fundamental data, which consists of:
- identifier values from configuration and present time,
- battery temperature, RAM and storage data, cloud configuration, backdoor model, and file extensions of curiosity,
- IP geolocation data from https://ipinfo[.]io/json, and
- on the primary run, extra details about the gadget, community, and the applying is included:
○ model, mannequin, OS, kernel, and rooted standing,
○ IMEI quantity, IP deal with, MAC deal with, and community sort, and
○ utility package deal and permissions.
The backdoor can periodically take screenshots (scr flag). In some variations, we noticed the strategy of taking part in a silent MP3 file in a loop whereas taking screenshots, which is used to forestall the trojanized app from being suspended whereas operating within the background.
In a number of the variations, the backdoor can document audio through the microphone and snoop on the environment of the compromised gadget. Strangely, even when the recording is enabled (rec flag), it’s restricted to a three-hour time interval within the night, from 7 pm to 10 pm native time.
The backdoor periodically searches the shared exterior storage for information with extensions of curiosity (extentions) and phases them for exfiltration. In the samples we analyzed, exfiltration was aimed toward media information, paperwork, and personal keys: .jpg, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .txt, .hwp, .pdf, .m4a, and .p12.
Commands
Android ChickenCall periodically checks the cloud storage drive for instructions issued for the sufferer. Decrypted instructions begin with the magic DWORD 0x2A7B4C33, and this worth matches the Windows model of ChickenCall. The instructions have zero or extra parameters, relying on their sort. Table 3 reveals an summary of the supported instructions with their descriptions for each platforms.
The Android model of the backdoor implements solely a subset of instructions obtainable within the Windows model.
Table 3. ChickenCall backdoor instructions
| Type | Name | Android description | Windows description |
| 0x48 | MP_SET_FILESEARCH_EXTENTION | Sets file extensions of curiosity within the configuration. | |
| 0x49 | MP_SET_THREADS | Toggles screenshot taking and voice recording. | Includes extra capabilities similar to clipboard stealing and keylogging. |
| 0x4A | MP_SET_CLOUD | Sets cloud API credentials within the configuration. | |
| 0x4B | MP_SET_REGISTER_FILE_CONTROL | N/A | Modifies filter used throughout file search. |
| 0x4C | MP_SET_MODE | Toggles assortment of the backdoor execution logs. | Toggles varied collection-related flags. |
| 0x4D | MP_ACTION_KILLME | Disables the backdoor. The unique recreation continues working. | Uninstalls the backdoor and exits. |
| 0x4E | MP_ACTION_KILLPROCESS | N/A | Uses the taskkill utility to kill a course of. |
| 0x4F | MP_ACTION_FILE_OR_DIRECTORY | Supports add of a specified file or listing. | Supports a number of file and listing operations: delete, rename, open, and add. |
| 0x50 | MP_ACTION_DOWNLOAD_COMMAND | N/A | Downloads and executes instructions from a URL or cloud drive. |
| 0x51 | MP_ACTION_RESET_WORKDIRECTORIES | N/A | Can delete working directories utilized by the backdoor. |
| 0x52 | MP_ACTION_EXECUTE_SIMPLE_COMMAND | N/A | Can restart the backdoor and execute a command through cmd.exe. |
| 0x53 | MP_ACTIONS_MORE | N/A | Can carry out three operations: · Delete continued configuration. · Enable macros in Word (Microsoft and Hancom Office). · Restart the backdoor. |
| 0x54 | MP_ACTION_SHELL | N/A | Starts shell (primarily based on WCMD). |
| 0x55 | MP_ACTION_WEBSCAN | N/A | Performs HTTP scan of specified hosts/ports. |
| 0x56 | MP_GET_DATA | Can acquire: · contacts, name logs, and SMS messages, · full listing itemizing of the first shared exterior storage, and · fundamental data. |
Can acquire: · backdoor configuration and varied system data, · credentials from browsers and different software program, · information from IM apps – KakaoTalk, WeChat, and Signal, · digital camera pictures, and · listing itemizing. |
| 0x57 | MP_GET_TREES | Retrieves listing itemizing. | |
| 0x59 | MP_SEND_FILE | Supports backdoor updating. | Supports dropping of a file to a specified location, dropping and execution of extra executables, and updating of the backdoor. |
| 0x5A | MP_SEND_SHELL | N/A | Executes shell instructions. |
| 0x5C | MP_SET_PROXY | N/A | Connects to a specified |
A dump containing the Windows model of ChickenCall that carefully resembles the one we noticed on this assault and options all of the instructions listed above may be discovered on VirusTotal with SHA‑1 B06110E0FEB7592872E380B7E3B8F77D80DD1108. The pattern was uploaded from China on July 15th, 2024.
Conclusion
We have uncovered a multiplatform supply-chain assault concentrating on the Yanbian area by a compromised online game platform. Analyzing the trojanized Android video games on the platform, we found a brand new instrument in ScarCruft’s arsenal – an Android model of the group’s ChickenCall backdoor. The Android backdoor has seen lively improvement, and offers surveillance capabilities, similar to assortment of private information and paperwork, taking screenshots, and making voice recordings.
For any inquiries about our analysis printed on WeLiveSecurity, please contact us at [email protected].ESET Research affords personal APT intelligence studies and information feeds. For any inquiries about this service, go to the ESET Threat Intelligence web page.
IoCs
A complete checklist of indicators of compromise (IoCs) and samples may be present in our GitHub repository.
Files
| SHA-1 | Filename | Detection | Description |
| 01A33066FBC6253304C9 |
sqybhs.apk | Android/Spy.Agent.EXM | Trojanized recreation with Android ChickenCall model 2.0. |
| 03E3ECE9F48CF4104AAF |
ybht.apk | Android/Spy.Agent.EGE | Trojanized recreation with Android ChickenCall model 1.3. |
| 2B81F78EC4C3F8D6CF8F |
sqybhs.apk | Android/Spy.Agent.EGE | Trojanized recreation with Android ChickenCall model 1.5. |
| 59A9B9D47AE36411B277 |
ybht.apk | Android/Spy.Agent.EGE | Trojanized recreation with Android ChickenCall model 1.0. |
| 7356D7868C81499FB4E7 |
sqybhs.apk | Android/Spy.Agent.EGE | Trojanized recreation with Android ChickenCall model 1.0. |
| FC0C691DB7E2D2BD3B0B |
sqybhs.apk | Android/Spy.Agent.EGE | Trojanized recreation with Android ChickenCall model 1.5. |
| 95BDB94F6767A3CCE6D9 |
mono.dll | Win32/TrojanDownloader |
Trojanized mono library. |
| 409C5ACAED587F62F7E2 |
N/A | Win32/TrojanDownloader |
Downloader resulting in the RokRAT backdoor. |
| B06110E0FEB7592872E3 |
N/A | Win64/Agent.EGN | Publicly obtainable dump of Windows ChickenCall backdoor. |
Network
| IP | Domain | Hosting supplier | First seen | Details |
| 39.106.249[.]68 | sqgame.com[.]cn | Hangzhou Alibaba Advertising Co.,Ltd. | 2024‑06‑01 | Compromised sqgame web site internet hosting trojanized video games and malicious updates. |
| 211.239.117[.]117 | 1980food.co[.]kr | Hostway IDC | 2025‑03‑07 | Compromised South Korean web site used to host Android ChickenCall configuration. |
| 114.108.128[.]157 | inodea[.]com | LG DACOM Corporation | 2025‑07‑03 | Compromised South Korean web site used to host Android ChickenCall configuration. |
| 221.143.43[.]214 | www.lawwell.co[.]kr | SK Broadband Co Ltd | 2024‑11‑04 | Compromised South Korean web site used to host shellcode and clear mono library. |
| 222.231.2[.]20 | colorncopy.co[.]kr swr.co[.]kr |
LG DACOM Corporation | 2025‑03‑18 | Compromised South Korean web site used to host shellcode. |
| 222.231.2[.]23 | sejonghaeun[.]com | IP Manager | 2025‑03‑18 | Compromised South Korean web site used to host clear mono library. |
| 222.231.2[.]41 | cndsoft.co[.]kr | IP Manager | 2025‑03‑18 | Compromised South Korean web site used to host shellcode. |
MITRE ATT&CK methods
This desk was constructed utilizing version 18 of the MITRE ATT&CK Enterprise framework.
| Tactic | ID | Name | Description |
| Resource Development | T1584.004 | Compromise Infrastructure: Server | ScarCruft compromised South Korean web sites to host payloads and configurations. ScarCruft compromised the sqgame web site to carry out a supply-chain assault. |
| T1585.003 | Establish Accounts: Cloud Accounts | ScarCruft created Zoho WorkDrive accounts and used their cloud storage drives for C&C functions. | |
| T1587.001 | Develop Capabilities: Malware | ScarCruft developed the Android model of the ChickenCall backdoor. | |
| T1608.001 | Stage Capabilities: Upload Malware | ScarCruft uploaded trojanized video games to the compromised sqgame web site. | |
| Initial Access | T1195.002 | Supply Chain Compromise: Compromise Software Supply Chain | ScarCruft compromised an sqgame replace server to distribute malicious updates. |
| Execution | T1059.003 | Command and Scripting Interpreter: Windows Command Shell | ChickenCall can execute shell instructions. |
| Defense Evasion | T1027.013 | Obfuscated Files or Information: Encrypted/Encoded File | ChickenCall has encrypted strings and loading chain elements. The trojanized mono library incorporates encrypted shellcode. |
| T1070.004 | Indicator Removal: File Deletion | The trojanized mono library is changed with a clear one. | |
| T1112 | Modify Registry | ChickenCall can modify settings of phrase processors to allow macros. | |
| T1140 | Deobfuscate/Decode Files or Information | ChickenCall decrypts strings and loading chain elements. | |
| T1480.001 | Execution Guardrails: Environmental Keying | ChickenCall’s loading chain has elements encrypted with a computer-specific key. | |
| T1497 | Virtualization/Sandbox Evasion | The downloader within the trojanized mono library checks for evaluation instruments and digital machine environments. | |
| Credential Access | T1555 | Credentials from Password Stores | ChickenCall can acquire saved passwords from browsers and different software program. |
| Discovery | T1046 | Network Service Discovery | ChickenCall can scan a variety of IPs and ports with an HTTP GET request. |
| T1082 | System Information Discovery | ChickenCall can acquire varied system data. | |
| T1083 | File and Directory Discovery | ChickenCall can acquire details about drives and directories. | |
| Collection | T1005 | Data from Local System | ChickenCall can gather consumer information from IM purchasers KakaoTalk, WeChat, and Signal. |
| T1056.001 | Input Capture: Keylogging | ChickenCall can log keystrokes. | |
| T1113 | Screen Capture | ChickenCall can seize screenshots. | |
| T1115 | Clipboard Data | ChickenCall can gather clipboard contents. | |
| T1119 | Automated Collection | ChickenCall can periodically gather information with sure extensions from native and detachable drives. | |
| T1125 | Video Capture | ChickenCall can seize a webcam picture. | |
| T1560 | Archive Collected Data | ChickenCall compresses and encrypts collected information earlier than exfiltration. | |
| Command and Control | T1071.001 | Application Layer Protocol: Web Protocols | ChickenCall makes use of HTTP to speak with cloud storage providers. |
| T1090 | Proxy | ChickenCall can act as a proxy. | |
| T1102.002 | Web Service: Bidirectional Communication | ChickenCall communicates with cloud storage providers to obtain instructions and exfiltrate information. | |
| Exfiltration | T1020 | Automated Exfiltration | ChickenCall periodically exfiltrates collected information. |
| T1041 | Exfiltration Over C2 Channel | ChickenCall exfiltrates information to its C&C server. | |
| T1567.002 | Exfiltration Over Web Service: Exfiltration to Cloud Storage | ChickenCall exfiltrates information to cloud storage providers. |
This desk was constructed utilizing version 18 of the MITRE ATT&CK Mobile framework.
| Tactic | ID | Name | Description |
| Initial Access | T1474.003 | Supply Chain Compromise: Compromise Software Supply Chain | ScarCruft carried out a supply-chain assault, compromising the sqgame web site, to distribute trojanized video games containing the Android ChickenCall backdoor. |
| Defense Evasion | T1406 | Obfuscated Files or Information | Version 2.0 of the Android ChickenCall backdoor is obfuscated. |
| T1407 | Download New Code at Runtime | The Android ChickenCall backdoor can obtain and cargo newer variations of itself. | |
| T1541 | Foreground Persistence | Android ChickenCall makes use of the beginForeground API to take screenshots whereas within the background. | |
| Discovery | T1420 | File and Directory Discovery | Android ChickenCall creates a listing itemizing and searches for information with specified extensions. |
| T1422 | Local Network Configuration Discovery | Android ChickenCall obtains the gadget’s IMEI, IP deal with, and MAC deal with. | |
| T1426 | System Information Discovery | Android ChickenCall obtains system data of the compromised gadget together with model, mannequin, OS model, kernel model, rooted standing, battery temperature, RAM, and storage data. | |
| Collection | T1532 | Archive Collected Data | Android ChickenCall compresses and encrypts collected information. |
| T1429 | Audio Capture | Android ChickenCall can document voice utilizing the microphone. | |
| T1430 | Location Tracking | Android ChickenCall obtains approximate gadget location utilizing the ipinfo[.]io service. | |
| T1513 | Screen Capture | Android ChickenCall can take screenshots. | |
| T1533 | Data from Local System | Android ChickenCall collects native information with the next extensions: .jpg, .doc, .docx, .xls, .xlsx, .ppt, .pptx, .txt, .hwp, .pdf, .m4a, and .p12. | |
| T1636.002 | Protected User Data: Call Log | Android ChickenCall collects the decision log. | |
| T1636.003 | Protected User Data: Contact List | Android ChickenCall collects the contact checklist. | |
| T1636.004 | Protected User Data: SMS Messages | Android ChickenCall collects SMS messages. | |
| Command and Control | T1437.001 | Application Layer Protocol: Web Protocols | Android ChickenCall communicates with the C&C cloud storage drive utilizing HTTPS. |
| T1481.002 | Web Service: Bidirectional Communication | Android ChickenCall makes use of a Zoho WorkDrive service cloud storage drive for C&C functions. | |
| Exfiltration | T1646 | Exfiltration Over C2 Channel | Android ChickenCall makes use of the C&C channel for information exfiltration. |
This web page was created programmatically, to learn the article in its unique location you possibly can go to the hyperlink bellow:
https://www.welivesecurity.com/en/eset-research/rigged-game-scarcruft-compromises-gaming-platform-supply-chain-attack/
and if you wish to take away this text from our web site please contact us


