Technical Analysis & Remediations
MITRE ATT&CK Mapping
T1404
Exploitation for Privilege Escalation (Targets IPv6 use-after-free and Mali GPU driver vulnerabilities).
T1574.004
Hijack Execution Flow: Dynamic Linker Hijacking (Replaces libandroid_runtime.so and libmedia_jni.so to inject code).
T1626
Steganography (Initial payload is an encrypted file hidden after the PNG IEND marker of an image asset).
T1636
Data from Local System (PtfLibc plugin targets and extracts WhatsApp's Signal protocol encrypted databases).
CVE Profile
Relies on legacy Android CVEs patched between 2016 and 2021.
[NVD Score: High/Critical]
[CISA KEV Status: Active for historical kernel flaws]
Telemetry
Hashes 03e62ac5080496c67676c0ef5f0bc50fc42fc31cf953538eda7d6ec6951979d8
066a096a3716e02a6a40f0d7e6c1063baecbebc9cbcc91e7f55b2f82c0dad413.
IPs/Domains
api[.]googlserves[.]com
fcm[.]androidlogs[.]com
stat[.]upload-logs[.]com
prod-log-oss-01[.]oss-ap-southeast-1[.]aliyuncs[.]com.
Constraint
The campaign uses a silent audio resource named R.raw.novioce to persistently keep a foreground service alive, and disguises its malicious components under the tampered package name com.facebook.utils.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue a fleet-wide advisory regarding unapproved third-party utility applications (e.g., cleaners, battery savers, gallery utilities) on corporately managed Android devices.
DETECT (DE) – Monitoring & Analysis
Command
Query MDM/UEM telemetry for the presence of known carrier apps (e.g., com.filnishww.fluttbuber.storagecleaner and com.wififinder.wificonnect).
Command
Monitor network telemetry for persistent beacons to api[.]googlserves[.]com or stat[.]upload-logs[.]com occurring at 60-second intervals or fallback connections between 1:00 AM and 4:00 AM.
RESPOND (RS) – Mitigation & Containment
Command
Quarantine non-compliant Android devices exhibiting indicators of compromise or running an OS security patch level older than 2021-05-01.
RECOVER (RC) – Restoration & Trust
Command
For confirmed infections on legacy devices (Android 7 and below), execute a complete firmware re-flash. Standard factory resets are insufficient because the rootkit installer (CsKaitno.d) writes directly to the system partition.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Enforce strict MDM policies restricting app installations entirely to an approved enterprise app catalog, disallowing end-user downloads from the consumer Play Store.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if you suspect an infection and your Android Security Update patch level is older than May 1, 2021.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Revoke all active sessions for messaging apps (specifically WhatsApp) and reset passwords/MFA using a known clean device (e.g., a secondary trusted computer or a phone on 5G), as the malware explicitly extracts the device's Signal protocol identity keys and registration ID to clone sessions.
Priority 3: Persistence
Command
Understand that a standard factory reset will not clear this rootkit if the exploitation phase was successful. If the device was compromised and runs Android 7 or older, it must be reflashed with official firmware by the manufacturer or completely replaced.
Hardening & References
Baseline
CIS Benchmarks for Google Android.
Framework
NIST CSF 2.0 / SP 800-61r3.
Vulnerability Check
All Android devices with a security patch level of 2021-05-01 or higher are immune to the rootkit exploits associated with this command-and-control server. Enable automatic OS updates to ensure consistent baseline protection.
Source
McAfee Labs / Advanced Threat Research