Pre-installed C2 Infrastructure and RAT Payload on Android P...#2126
Open
carlospolop wants to merge 1 commit intomasterfrom
Open
Pre-installed C2 Infrastructure and RAT Payload on Android P...#2126carlospolop wants to merge 1 commit intomasterfrom
carlospolop wants to merge 1 commit intomasterfrom
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://github.com/Kavan00/Android-Projector-C2-Malware Content Categories: Based on the analysis, this content was categorized under "Mobile Pentesting -> Android Applications Pentesting (or a new page under Android: 'OEM/IoT Android Backdoors & Property Injection Root (customer.prop)') and optionally cross-link from Network Services Pentesting -> 5555 Android Debug Bridge (ADB) for the 'ADB over TCP unauth + adb root after property injection' angle". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What this repo is
A technical security analysis (Apr 11–12, 2026) documenting a factory pre-installed command-and-control (C2) ecosystem on cheap Android projectors (supply-chain style; compared to “BADBOX”). The core finding is a preloaded “app store” system app that silently downloads/installs a hidden Remote Access Trojan (RAT), plus additional telemetry/ad modules, all with system-level privileges.
Affected devices / identification fingerprints
The analy...
🔧 Technical Details
Boot-time Android property injection to gain persistent root via ADB
If an Android device loads properties from an OEM-controlled file (e.g.,
/oem/customer.prop) at boot, and that partition is writable (e.g., FAT mounted with permissive masks such asfmask=0000) while SELinux isPermissive, an attacker can append properties likero.debuggable=1,service.adb.root=1, andro.secure=0, reboot, then useadb rootto obtainuid=0. This converts a misconfiguration into a repeatable local/adjacent-network root backdoor (especially dangerous if ADB over TCP/5555 is exposed without auth).Privileged “app store” system app as a dropper (manifest-driven silent install)
A preinstalled system app with
INSTALL_PACKAGEScan behave as a dropper by polling a vendor endpoint for a JSON manifest describing payload packages (pkg, encryptedpat...🤖 Agent Actions
I’m mapping the repo first and locating existing Android/mobile pages that could absorb these techniques. Then I’ll read the closest matches and check for duplication before deciding whether any edit is justified.
The first pass shows a clear
mobile-pentesting/android-app-pentestingarea, plus likely overlap withADBnetwork-service content. I’m now reading Android and related pages directly to decide whether the new material belongs in an existing Android page or if the techniques are already covered elsewhere.I’ve narrowed placement to the main Android pentesting page rather than creating a new file. That page already carries Android malware tradecraft and firmware/backdoor case studies, so I’m now validating the source material against existing HackTricks content to avoid adding duplicate or overly CVE-specific text.
The repo uses the
releasebranch, notmain, so I’m pulling the canonical README from there now. After that I’ll check exact insertion points in the Android page and patch only one file.I’ve confirmed the content is additive and reusable rather than just a one-off malware report. I’m patching the Android main page now, keeping it concise: one new subsection for OEM Android system-app droppers and property-injection root backdoors, plus source links in the page’s existing references section.
Updated README.md in
src/mobile-pentesting/android-app-pentesting/as the best existing location. I did not create a new page because the reusable value here is Android malware tradecraft on OEM devices, not a device-specific CVE or product page.The new content adds three technical patterns that were not already documented there: boot-time
customer.propproperty injection to turn exposed ADB into root, privileged system-app droppers driven by C2 manifests andpm install -r, and analyst workflow for C2-controlled anti-analysis usingreverseLenbyte reversal plus AES-CBC-hidden CDN paths. I also added the blog URL and the corroborating external analysis to the file’s## Referencessection at the end.Verification: I re-read the modified section and checked the diff; the change is isolated to that single file and preserves the existing page structure.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.