Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1195.003
Supply Chain Compromise: Hardware Dependencies
T1543
Create or Modify System Process (Zygote and system_server hooks)
T1562.001
Impair Defenses: Disable or Modify Tools (bypassing Android permissions)
T1111
Two-Factor Authentication Interception (via Google Chrome search hijacking and credential theft modules)
CVE Profile
None Assigned [CISA KEV Status: Inactive].
Telemetry
Hashes
ca98ae7ab25ce144927a46b7fee6bd21
(MD5 of libVndxUtils.a)
f0184f6955479d631ea4b1ea0f38a35d
(Nova Clicker module)
Network
keepgo123[.]com
gsonx[.]com
zcnewy[.]com
trends.search-hub[.]cn
67.198.232[.]4
67.198.232[.]187.
Registry/Strings
Decryption is heavily reliant on MD5 hashes of specific strings, such as "ota.host.ba60d29da7fd4794b5c5f732916f7d5c" or "37d9a33df833c0d6f11f1b8079aaa2dc", using an initialization vector of "0102030405060708". The magic bytes "encrypttag" are used for payload verification.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Enforce strict supply-chain risk management (SCRM) policies prohibiting the procurement or BYOD integration of low-cost, unvetted Android devices (specifically noted: Alldocube models like iPlay 50 mini Pro and TCT content center variants).
DETECT (DE) – Monitoring & Analysis
Command
Implement network-layer blocking and alert generation for DNS queries to keepgo123[.]com, gsonx[.]com, and zcnewy[.]com.
Command
Monitor for anomalous HTTP POST requests to URI paths ending in /ak/api/pts/v4 and /ota/api/tasks/v3.
RESPOND (RS) – Mitigation & Containment
Command
Isolate any Android device exhibiting unauthorized ad traffic, search engine hijacking in Google Chrome, or unexpected app installations.
RECOVER (RC) – Restoration & Trust
Command
Standard factory resets are ineffective due to system-partition infection. Quarantine hardware until vendor-verified clean firmware is flashed via physical USB connection.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Audit corporate Google Play accounts to ensure no applications related to "smart cameras" containing the com.arcsoft.closeli.service.KucopdInitService package are installed.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if you experience mysterious audio playback, sudden unauthorized e-commerce cart additions, or hijacked browser searches on a budget tablet.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset all passwords (especially Google, Facebook, Amazon, and Telegram) using a known clean device, as Keenadu payloads have targeted credential exfiltration on these apps.
Priority 3: Persistence
Command
Since the malware resides in the read-only system partition (libandroid_runtime.so), a standard factory reset will not work. Discontinue using the device until the manufacturer issues a known clean firmware update, or manually flash clean firmware if technically capable. Remove any suspicious apps recently downloaded from the Google Play Store (e.g., com.taismart.global).
Hardening & References
Baseline
CIS Benchmarks for Mobile Devices.
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Kaspersky Securelist
Federal Bureau of Investigation (FBI / IC3 PSA