18 Apr
18Apr

A newly discovered Android malware dubbed Gorilla is quietly emerging as a serious threat, according to a technical analysis by Prodaft’s Threat Intelligence team. While Gorilla appears to be in its early stages of development, its evolving features, clever use of Android services, and hints of broader surveillance capabilities suggest it could mature into a powerful tool for both financial theft and espionage.
β€œGorilla does not yet employ obfuscation techniques, indicating that it may still be under active development,” the report notes, β€œhowever, it already includes mechanisms to evade battery optimizations, maintain persistent access, and collect sensitive information from infected devices.”
Written in Kotlin, Gorilla requests to become the default SMS application, allowing it to intercept, read, and send text messages. Once granted, it collects incoming SMS messages and tags them based on their contentβ€”examples from the command-and-control (C2) panel include β€œBanks” and β€œYandex,” revealing its interest in financial communications.
To extend surveillance capabilities, Gorilla requests READ_PHONE_STATE and READ_PHONE_NUMBERS permissions to access SIM data and phone numbers. It also continuously sends this dataβ€”along with device details like model, Android version, installed apps, and screen statusβ€”back to the attackers via a WebSocket connection.

Collected SMS messages are categorized with tags like β€˜Banks’ and β€˜Yandex,’” the report states. β€œGorilla waits for new commands while sending heartbeats to the C2 server every 10 seconds.”
Each infected device is labeled in the attacker’s C2 panel using one of three tags:
State AuthorityImportantTrashThis tagging system indicates a dual-use model: while initial behavior points to financially motivated theft, the β€œState Authority” tag hints at potential espionage operations, perhaps for nation-state or politically driven surveillance.
β€œThe presence of these specific tags indicates the malware may also be used for broader surveillance or espionage purposes,” Prodaft warns.
To stay persistent, Gorilla uses a foreground serviceβ€”a technique that requires Android’s FOREGROUND_SERVICE permission. To avoid termination by aggressive battery optimization settings (especially on Huawei and Honor devices), it prompts users to exempt it from battery-saving features, and adjusts its heartbeat intervals dynamically.
β€œIf the manufacturer string contains β€˜Honor’ or β€˜Huawei,’ it introduces a longer delay between its heartbeat service executions,” the report adds.
Prodaft analysts highlight Gorilla’s excessive logging and multiple unused classes, which point to its evolving nature. Among these dormant features are:
WebViewActivity: Likely intended for future phishing attacks by displaying fake banking pages to steal credentials.USSDReceiver: A unique class that listens for a dialed code (*#0000#) to trigger malware functionsβ€”a novel persistence or control mechanism that could be weaponized later.β€œIt is possible that future versions of Gorilla may utilize this class for such purposes,” the report speculates, referring to WebViewActivity.
While currently in an early stage of development, Gorilla demonstrates the capacity to evolve into a more sophisticated threat. Its focus on SMS interception, C2 communication, and evasion techniques poses a risk to Android users.

Comments
* The email will not be published on the website.