HXXP Malware Spread By Fake Russian MMS & SMS

MMS 9560 “I love you” fake MMS notification

Android premium rate SMS Trojans (aka toll fraud) is nothing new in Russia but typically it is distributed via fake Android marketplaces or unofficial app stores. In conjunction with one of our carriers customers we investigated malware that was promoted via SMS. In this attack spammers were targeting Russian consumers with a social engineering campaign that sent out tens of thousands of SMS with links to a website hosting mobile malware.


This threat was promoted via SMS instead of Google Play or the fake Android markets that have been seen before in Russia. Since Google increased the security of Google Play scammers have gone off market looking for other channels to distribute and promote their apps to a wide audience.

The SMS tell the recipients they have received an MMS message with the text “I love you” and a link to view the MMS.


“Vam prishlo MMS s tekstom “Anastasiya, ya tebya lublu!”. Prosmotr: hxxp://”


The name in the SMS varies but is usually a woman’s name. It is an interesting use of social engineering to entice people to click on the link.

If the link is clicked on using an Android phone it downloads an SMS Trojan app that sends out 5 premium SMS without notifying the user. The malware is a variant of the FakePlayer family. If a phone that supports J2ME is used it downloads a variant of the J2ME.OpFake family.



The app is downloaded through a “drive-by download” technique. When a subscriber clicks on the link hxxp:// using an Android browser the malware app is downloaded automatically without user intervention. The malware authors achieve this by configuring the server to send a HTTP 302 response to the browser that links to the malicious apk. This causes the browser to issue a GET request for the apk that is downloaded to the phone’s file system without the user’s consent.

Drive by download

The app is a variant of the FakePlayer family that was first seen in August 2010. If a non-Android phone is used a J2ME file, mms9560.jar, is downloaded. This is a J2ME.Opfake variant.

Several URLs have been identified as serving up malware from Russian servers:


hxxp:// -> hxxp://
hxxp:// -> hxxp://
hxxp:// -> hxxp://


The URL names are similar to ones use by Russian operators and have been chosen so the user thinks they are going to a legitimate website to view a new MMS that was sent to them.

When the download starts, the phone shows a notification. Fake Russain MMS malware notification as it downloads onto a user's device Download complete page for HXXP malware on mobile phone spread vis fake Russian MMS and SMS messages


After the app has downloaded the user has to click on it to start the install – it does not install automatically without user intervention. The app puts an ‘MMS’ icon on the desktop.

Install page for MMS application containing HXXP malware, and MMS icon as it appears on Smartphone

The app starts a background receiver to intercept any SMS replies from the short codes so that the user does not know that they have been charged as the SMS will not show up in the Inbox.

background receiver used by HXXP malware to intercept SMS replies so user doesn't know they've been charged to send an SMS

When the app is opened it immediately sends out 5 SMS to premium short codes while showing a loading screen. The SMS numbers and contents are read from a configuration file inside the apk package.


SMS numbers and contents read from a configuration file inside apk package used to send SMS or MMS containing malware

The text may be related to the original FakePlayer app and left in by the author.


app_text1 Данное видео содержит эротические материалыrn Продолжить?
app_text2 Идет буферизайия видеоrnНажимайте ОК для продолжения


The app_id value is not used in the app, the ‘9510’ value may refer to an earlier version of the threat that used a different URL such as




Sending premium SMS

As the SMS are sent, they can be seen in the debug log.

debug log showing SMS messages sent from user's infected phone containing HXXP malware

After sending out the SMS, the app displays the fake MMS to the user in a webview that loads content from the website ‘hxxp://’.

Webview content displayed by fake SMS app after an SMS or MMS containing HXXP malware is sent

The 3 lines of the MMS says:

Message: You won’t believe where I am now! Look at the 2 photos I sent you.

I can’t believe I am here.

This is a new nudist beach


Premium SMS

The 5 short codes used by the malware will only affect Russian subscribers as they are only valid in Russia.

3698 costs 300 roubles per SMS sent
3652 costs 200 roubles per SMS sent
7019 costs 80 roubles per SMS sent
7015 costs 35 roubles per SMS sent
1231 costs 4 roubles per SMS sent

The 5 SMS sent by the app will cost the subscriber approximately 619 roubles (15 Euros / 13 GBP / 20 USD). The exact cost may vary per network.


Source of SMS

The app does not attempt to promote itself via SMS so this malware is not the source of the fake MMS notification sent to Russian subscribers. There is evidence of SMS being sent from multiple countries into Russia, as well from Russian mobile numbers.

+673 Brunei
+84 Vietnam
+230 Mauritius
+995 Georgia
+249 Sudan
+628 Indonesia
+234 Nigeria

At this moment it is unclear what is sending the SMS – they could be sent by malware from infected phones or by scammers sending an SMS spam campaign.



There is evidence to suggest that there may have been earlier versions of this scam, using different URLs. Note that the URLs are designed to look like legitimate URLs used by Russian operators.


Some of the URLs served up both J2ME and Android premium SMS Trojans.


It is unclear exactly how many phones were infected in this the “9560” campaign, most likely in the low thousands, but it and it’s predecessors were successful enough for the authors to start working on new variations which we’ll cover in a follow up posting.


Although these scams are most prevalent in Russia, we’ve seen a number of copycat compound threats, using SMS and social engineering to deliver mobile malware to users phones appearing across the globe. Whilst many operators already have measures in place to counter SMS spam, it is important that they are aware of these specific threats so that they ensure the correct action is taken to protect consumers.

Thanks to Yicheng Zhou for assisting in the analysis of the samples.

Related insights

Mobile World live webinar: Diary of a CISO

Watch Webinar Recording: Diary of a CISO – Building a Resilient Telecom Organization

Read more

Tags: MNO, Mobile Security

Storm-0539 Cybercrime Gang: Microsoft Alerts Companies of Gift Card Fraud From Moroccan Hackers

Read more

Tags: SMS, SMS scam

Infosecurity Magazine logo

Cyber-criminals Exploit Cloud Storage for SMS Phishing Scams

Read more

Tags: SMS scam

Enea in Mobile Europe

Cyber-criminals using AWS, Google and IBM services to steal data by SMS

Read more

Tags: SMS scam

Top Cloud Services Used for Malicious Website Redirects in SMS Scams

Read more

Tags: SMS, SMS scam