SHA1:
- 90013a24d03b72a6d9f8df38899fc2200e69682d
Description
Trojanized WhatsApp application for Android. The modified messenger was added to the smartphone firmware as part of a supply chain attack.
Operating routine
This APK is a WhatsApp application modified using the LSPatch framework. The framework embeds the necessary DEX and SO files directly into the target APK file, which allows modifying the app's operation on launch without modifying its code.
After the modification, a subdirectory lspatch is added to the assets directory with the following structure:
-
lspatch/
-
modules/
- com.whatsHook.apk
-
so/
-
arm64-v8a/
- liblspatch.so
-
armeabi-v7a/
- liblspatch.so
-
x86/
- liblspatch.so
-
86_64/
- liblspatch.so
-
arm64-v8a/
- config.json
- cloader.dex
- origin.apk
-
modules/
- loader.dex, liblspatch.so — files required for Xposed API integration;
- config.json — JSON configuration file containing settings for LSPatch;
- origin.apk — original WhatsApp source application file;
- com.whatsHook.apk — malicious module containing Android.Clipper.31.