During our routine research operations/activities, Cyble Researchers found a variant of a banking Trojan that spreads through Android applications and steals the user’s sensitive information. Based on a post on Twitter, the fake banking application impersonated the prosecutor’s office of South Korea, with Korea as the primary target.
A banking Trojan is a malicious piece of software designed to gain unauthorized access to confidential information stored or processed through online banking systems. Generally, a Trojan performs malicious activities without the knowledge of the user. It establishes remote access connections, captures keyboard inputs, collects system information, downloads/uploads files in the victim’s machine, drops various malware into the infected system, performs Denial-of-Service (DoS) attacks, and runs or terminates processes.
Among various types of Trojans, attackers extensively use banking Trojans for multiple purposes, such as monitoring user activity and collecting sensitive data. Also known as ‘Spybot,’ these are one of the top 3 preferred malware tools. These banking Trojans pretend to be legitimate applications and spy on targeted victims after installation.
The malware sample we found belongs to the Trojan family and targets Android mobile devices. Once the attacker successfully installs the malware in the victim’s device, it performs various malicious activities listed below:
- Stealing usernames and passwords from online banking services
- Collecting data such as the user’s banking information (cardholder name, card number, CVV, and expiration date).
- Gathering call logs and contacts
- Reading SMS content from the device and storing the data within the device
- Reading SMS notifications received from user’s device.
- Collecting the machine’s information
- Having keylogger functionality
Cyble researchers found a sample of the banking Trojan and performed our technical analysis on it to know more about it. The malware application we used for our analysis is:
Package Name: com.android.ktspo
Main Activity: pkgflag.cocknut.yummy.MainActivity
We performed the static analysis of the sample and found that the application has been defined with many permissions listed in Figure 1.
Figure 1 Permissions Requested by the App
On performing the dynamic analysis of the sample, the applications launch the main activity and displays the main screen, as shown in Figure 2.
Figure 2 App’s Main Screen
Some of the permissions, services, and receivers that may perform malicious activities are listed below:
Intent Filters by Action:
The app uses the permissions granted by the users to perform activities on their devices as discussed below:
- Tracking the user’s location from the compromised device
Figure 3 Code for Location Tracking
- Checking for internet connectivity in the infected device
Figure 4 Query on Internet Connectivity
- Recording audio source or media contents from the infected device
Figure 5 Media content collected from the device
- Accessing the private ITelephony interface to use it for blocking phone calls
Figure 6 Blocking Phone calls using Telephony Manager
- Terminating processes at the backend
Figure 7 Killing the processes of the device
- Service/Receivers are registered when the screen is in off status using intent action
Figure 8 Registers the service/receivers when the screen is in off status
- Checking for the network operator name
Figure 9 Query for the Operator name of the network
- Using encryption techniques to encrypt the device information.
Figure 10 Code for encrypting device information
- Using the Outgoing call permission to monitor outgoing calls
Figure 11 Monitoring outgoing calls
- Collecting the list of installed packages from the infected device
Figure 12 Code that fetches the list of installed packages from the device
- Storing the information collected from the device in strings
Figure 13 Collects the lists of information
The sensitive information collected by the malware is sent to the Command-and-Control (C2) server, using the code showcased in Figure 14.
Figure 14 C2 builder using Header Interceptor
The banking Trojan family has always maintained a simple code format and brought in new campaigns from time-to-time. The challenge associated with the malware is the ease with which the code can be obtained and modified by cybercriminals to launch a sophisticated attack.
- Verify the privileges and permissions requested by apps before granting access.
- Install mobile applications downloaded only through trusted application stores.
- Keep your antivirus software updated so that it can detect and prevent malware infections.
- Keep your system and applications updated.
- Use strong passwords and enable two-factor authentication during logins.
- People concerned about the exposure of their stolen credentials in the darkweb can register at AmIBreached.com to ascertain their exposure.
MITRE ATT&CK® Techniques- for Mobile
|Tactic||Technique ID||Technique Name|
|Defense Evasion||T1406||Obfuscated Files or Information|
|Credential access||T1412||Capture SMS Message|
|Discovery||T1430 T1426 T1421 T1424||1. Location Tracking 2. System Information Discovery 3. System Network Connections Discovery 4. Process Discovery|
|Collection||T1430 T1412 T1432 T1433 T1429||1. Location Tracking 2. Capture SMS Messages 3. Access Contact List 4. Access Call Logs 5. Capture Audio|
|Command and Control||T1573 T1071 T1571||1. Encrypted Channel 2. Application Layer Protocol 3. Non-Standard Port|
|Impact||T1447||Delete Device Data|
Indicators of Compromise (IoCs):
|103.147.12[.]89||Suspicious IP address (communicating IP)|
Cyble is a global threat intelligence SaaS provider that helps enterprises protect themselves from cybercrimes and exposure in the darkweb. Cyble’s prime focus is to provide organizations with real-time visibility into their digital risk footprint. Backed by Y Combinator as part of the 2021 winter cohort, Cyble has also been recognized by Forbes as one of the top 20 Best Cybersecurity Startups To Watch In 2020. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence. To learn more about Cyble, visit www.cyble.com.