Threat Description

Riskware:​WinCE/FlexiSPY.A

Details

Category: Riskware
Type: RiskwareMonitoring Tool
Platform: WinCE

Summary



Riskware:WinCE/FlexiSPY.A is a commercial monitoring application written for devices running Windows Mobile 5 or Windows Mobile 6.

It is capable of logging voice call information, SMS information and contents, physical location, and uploads the details to a remote server.



Removal



Automatic Disinfection

Allow F-Secure Anti-Virus to disinfect the relevant files.

For more general information on disinfection, please see Removal Instructions.



Technical Details



Installation and Activation

Installation of FlexiSPY requires physical access to the monitored phone. It is commerical software and uses a unique activation key. The key is tied to a user account on the backend server through which the monitored activity can be reviewed via a website interface.

Once Flexispy is on the device, the phone is rebooted to allow the software to hook into various locations of the phone's operating system. This is required in order to collect information about the phone's usage.

Hidden Interface

FlexiSPY uses a hidden interface. A passcode is required to access the control panel.

Once activated, the passcode is changed from the default of *#900900900 to the unique activation key.

RBackup.exe

The file responsible for the configuration pane is RBackup.exe, which is stored in the \Windows\VPhone folder.

Once the settings are configured, and the user selects apply, the details are saved into an "encrypted" setting file also stored in the \Windows\VPhone folder.

Collected information is also stored, in the same directory, inside the files 1.sys (e-mail), 2.sys (phone calls), and 3.sys (text messages). These files are not encrypted which means they can be opened in any text editor for review.

Upon reboot and a successful configuration, the three new services on the Windows Mobile device start recording and managing communications. In summary, FPMapi.dll monitors the incoming e-mails and text messages, VRILLibCM.dll is responsible for cell tower tracking, and VPhone.dll is responsible for everything else.

Because these three files are started as a service, they are difficult for the average user to detect, which means the program and its operations are likely to go unnoticed by the average Windows Mobile user.

File System Changes

Creates these files:

  • \Windows\VPhone\RBackup.exe
  • \Windows\VPhone\config
  • \Windows\VPhone\setting
  • \Windows\VPhone\VCStatus
  • \Windows\VPhone\1.sys
  • \Windows\VPhone\2.sys
  • \Windows\VPhone\3.sys
  • \Windows\VPhone\Response.txt
  • \Windows\VPhone.dll
  • \Windows\FPMapi.dll
  • \Windows\VRILLibCM.dll

Registry Modifications

Creates these keys:

  • HKLM\Software\Microsoft\Inbox\Svc\SMS\Rules\{F1488272-B6ED-455d-8D38-F3F00F6DA55F} with value of 1.
  • HKCR\CLSID\{F1488272-B6ED-455d-8D38-F3F00F6DA55F}\InProcServer32 with value of FPMapi.dll.
  • HKLM\Services\VPhone with following values:
    • Dll = VPhone.dll
    • Prefix = FPS
    • Order = 9
    • Keep = 1
    • Index = 0
    • Context = 0
    • DisplayName = FP Service
    • Description = FP Service
  • HKLM\Software\VPhone\UC key with value of 1.





SUBMIT A SAMPLE

Suspect a file or URL was wrongly detected? Submit a sample to our Labs for analysis

Submit Now

Submit a sample

Wondering if a file or URL is malicious? Submit a sample to our Lab for analysis via the Sample Analysis System (SAS)

Learn More

Give And Get Advice

Give advice. Get advice. Share the knowledge on our free discussion forum.

Learn More