{"id":86363,"date":"2018-06-05T19:10:33","date_gmt":"2018-06-05T13:40:33","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86363"},"modified":"2018-06-08T10:46:12","modified_gmt":"2018-06-08T05:16:12","slug":"quick-heal-detects-another-banking-trojan-imitating-popular-banking-apps-india","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/quick-heal-detects-another-banking-trojan-imitating-popular-banking-apps-india\/","title":{"rendered":"Quick Heal detects banking Trojans imitating popular social media and banking apps in India"},"content":{"rendered":"<p>Quick Heal Security Labs has spotted two banking Trojan malware. These malware imitate some popular social and banking apps. While doing so, they gain access to some security permissions on the infected device which allow them to steal the user\u2019s banking credentials. The malware are able to do this by displaying a fake window that asks for a debit\/credit card number.<\/p>\n<p><strong>Technical analysis of the first banking Trojan that imitates social media apps<br \/>\n<\/strong><\/p>\n<p><strong>App<\/strong> <strong>name<\/strong>: Adobe Flash Player (fake)<br \/>\n<strong>Package<\/strong> <strong>Name<\/strong>: com.note.donote<br \/>\n<strong>MD5<\/strong>: ef3a283136bd24e745c43619118d4ff2<br \/>\n<strong>Size<\/strong>: 520 KB<\/p>\n<p>The banking Trojan masks itself with the icon of Adobe Flash Player to trick users. If installed, it asks for Device Administrator rights. If the user selects \u2018Cancel&#8217;, it will keep asking for the permission until the user selects the &#8216;Activate&#8217; button. Post this, it hides its icon.<\/p>\n<figure id=\"attachment_2391\" aria-describedby=\"caption-attachment-2391\" style=\"width: 169px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2391\" src=\"https:\/\/blogs_admin.seqrite.com\/wp-content\/uploads\/2018\/06\/Asking_for_Device_Admin_permission-169x300.png\" alt=\"\" width=\"169\" height=\"300\" \/><figcaption id=\"caption-attachment-2391\" class=\"wp-caption-text\">Fig 1. Asking for Device Admin permission<\/figcaption><\/figure>\n<p>After gaining the device administrator rights, the malware sends a text message to a premium rated number containing the device ID without user&#8217;s permission.<\/p>\n<figure id=\"attachment_2394\" aria-describedby=\"caption-attachment-2394\" style=\"width: 294px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2394\" src=\"https:\/\/blogs_admin.seqrite.com\/wp-content\/uploads\/2018\/06\/User_balance_deduction_and_sending_device_info_through_sms-294x300.png\" alt=\"\" width=\"294\" height=\"300\" \/><figcaption id=\"caption-attachment-2394\" class=\"wp-caption-text\">Fig 2. User balance deduction and sending device info via SMS<\/figcaption><\/figure>\n<p>In the background, the Trojan searches for the most frequently used apps. The malware has maintained two lists. One list mostly comprises the social and browsing apps it imitates.<\/p>\n<p><strong>Popular<\/strong><strong> applications <\/strong><strong>maintained in the first list<\/strong><\/p>\n<ol>\n<li>com.whatsapp<\/li>\n<li>com.skype.raider<\/li>\n<li>com.facebook.katana<\/li>\n<li>com.instagram.android<\/li>\n<li>com.android.chrome<\/li>\n<li>com.twitter.android<\/li>\n<li>com.android.calendar<\/li>\n<li>jp.naver.line.android<\/li>\n<li>com.android.vending<\/li>\n<li>com.viber.voip<\/li>\n<\/ol>\n<p>When a user opens any of these applications, the Trojan displays a fake window asking for a debit\/credit card number. Until the user provides this number, the malware does not allow access to Google Play or other apps (mentioned in the list above).<\/p>\n<figure id=\"attachment_2395\" aria-describedby=\"caption-attachment-2395\" style=\"width: 296px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2395\" src=\"https:\/\/blogs_admin.seqrite.com\/wp-content\/uploads\/2018\/06\/Overlaying_social_and_browsing_application_with_card_payment_activity-296x300.png\" alt=\"\" width=\"296\" height=\"300\" \/><figcaption id=\"caption-attachment-2395\" class=\"wp-caption-text\">Fig 3. Overlaying social and browsing apps with a window asking for a debit\/credit card number<\/figcaption><\/figure>\n<figure id=\"attachment_2398\" aria-describedby=\"caption-attachment-2398\" style=\"width: 300px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2398\" src=\"https:\/\/blogs_admin.seqrite.com\/wp-content\/uploads\/2018\/06\/Posting_card_details_on_URL-1-300x123.png\" alt=\"\" width=\"300\" height=\"123\" \/><figcaption id=\"caption-attachment-2398\" class=\"wp-caption-text\">Fig 4. Posting card details on a URL<\/figcaption><\/figure>\n<p>If the user enters the card number, the banking Trojan collects this information and sends it to a malicious server <strong>(<\/strong><strong>h<\/strong><strong>xx<\/strong><strong>p:\/\/nikorg.com\/1\/<\/strong><strong>)<\/strong><\/p>\n<p>The other list comprises 60 banking and finance related apps. When a user opens any of these apps, the Trojan displays an overlay web page and does not allow the user to perform any activity until the user stops it.<\/p>\n<p>At the time of our analysis, the malicious server was unable to show the similar page related to the app imitated by the Trojan. However, it displayed a blank white page over the app.<\/p>\n<figure id=\"attachment_2401\" aria-describedby=\"caption-attachment-2401\" style=\"width: 300px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2401\" src=\"https:\/\/blogs_admin.seqrite.com\/wp-content\/uploads\/2018\/06\/Overlaying_bank_application_with_web_page-300x294.png\" alt=\"\" width=\"300\" height=\"294\" \/><figcaption id=\"caption-attachment-2401\" class=\"wp-caption-text\">Fig 5. Overlaying bank application with the web page<\/figcaption><\/figure>\n<figure id=\"attachment_86366\" aria-describedby=\"caption-attachment-86366\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86366\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Apps_of_banks_with_overlaying_web_URLs-650x198.png\" alt=\"\" width=\"650\" height=\"198\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Apps_of_banks_with_overlaying_web_URLs-650x198.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Apps_of_banks_with_overlaying_web_URLs-300x92.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Apps_of_banks_with_overlaying_web_URLs-768x234.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Apps_of_banks_with_overlaying_web_URLs-789x241.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Apps_of_banks_with_overlaying_web_URLs.png 1284w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86366\" class=\"wp-caption-text\">Fig 6. Apps of banks with overlaying web URLs<\/figcaption><\/figure>\n<p><strong>Popular<\/strong><strong> applications <\/strong><strong>maintained in the second list<\/strong><\/p>\n<ol>\n<li>pl.mbank (mBank PL)<\/li>\n<li>com.db.mm.deutschebank (Meine Bank)<\/li>\n<li>pl.ing.ingmobile (ING Bankieren)<\/li>\n<li>com.konylabs.cbplpat (Citi Handlowy )<\/li>\n<li>com.paypal.android.p2pmobile (paypal)<\/li>\n<li>com.commbank.netbank (CommBank )<\/li>\n<\/ol>\n<p>The Trojan malware also steals incoming messages which may be an OTP or any other information and sends them to the malicious server.<\/p>\n<figure id=\"attachment_86367\" aria-describedby=\"caption-attachment-86367\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86367\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Sending_incoming_message_to_url-650x334.png\" alt=\"\" width=\"650\" height=\"334\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Sending_incoming_message_to_url-650x334.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Sending_incoming_message_to_url-300x154.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Sending_incoming_message_to_url-768x394.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Sending_incoming_message_to_url-789x405.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Sending_incoming_message_to_url.png 814w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86367\" class=\"wp-caption-text\">Fig 7. Sending incoming messages to a URL<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<p><strong>Technical analysis of the second banking Trojan that imitates banking apps<\/strong><\/p>\n<p><strong>App<\/strong> <strong>name<\/strong>: Update<br \/>\n<strong>Package<\/strong> <strong>name<\/strong>: anubis.bot.myapplication<br \/>\n<strong>MD5<\/strong>: cc76a822b8bd66350a78db70998650ca<br \/>\n<strong>Size<\/strong>: 149kb<\/p>\n<p>While installing the app, it asks user to enable Google Play service. And if enabled, it hides. Once it is done, the malicious app hides its icon and if a user in-between turns off the Google Play service then it keeps on showing the message to enable the Google Play service in a loop and also restricts the user from starting any other activity on the device.<\/p>\n<figure id=\"attachment_86368\" aria-describedby=\"caption-attachment-86368\" style=\"width: 324px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86368\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Malicious_app_icon-324x390.png\" alt=\"\" width=\"324\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Malicious_app_icon-324x390.png 324w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Malicious_app_icon-250x300.png 250w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Malicious_app_icon.png 589w\" sizes=\"(max-width: 324px) 100vw, 324px\" \/><figcaption id=\"caption-attachment-86368\" class=\"wp-caption-text\">Fig 8. Malicious app icon<\/figcaption><\/figure>\n<figure id=\"attachment_86369\" aria-describedby=\"caption-attachment-86369\" style=\"width: 390px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86369\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-390x390.png\" alt=\"\" width=\"390\" height=\"390\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-390x390.png 390w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-150x150.png 150w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-300x300.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-70x70.png 70w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-80x81.png 80w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission-45x45.png 45w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Repeatedly_asking_for_google_pro_service_permission.png 721w\" sizes=\"(max-width: 390px) 100vw, 390px\" \/><figcaption id=\"caption-attachment-86369\" class=\"wp-caption-text\">Fig 9. Repeatedly asking for Google pro service permission<\/figcaption><\/figure>\n<p>In the background, the malware it keeps searching the mentioned app\u2019s name on the list. If found, it shows a notification on behalf of the particular app and shows a similar login page and steals user\u2019s credentials.<\/p>\n<figure id=\"attachment_86370\" aria-describedby=\"caption-attachment-86370\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86370\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Creates_a_notification_message_according_to_the_app_maintained_in_the_list_of_the_malware-650x356.png\" alt=\"\" width=\"650\" height=\"356\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Creates_a_notification_message_according_to_the_app_maintained_in_the_list_of_the_malware-650x356.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Creates_a_notification_message_according_to_the_app_maintained_in_the_list_of_the_malware-300x164.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Creates_a_notification_message_according_to_the_app_maintained_in_the_list_of_the_malware.png 766w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86370\" class=\"wp-caption-text\">Fig 10. Creates a notification message according to the app maintained in the list of the malware<\/figcaption><\/figure>\n<p>At the time of analysis, the C&amp;C server <strong>(hxxp:\/\/46.254.16.53)<\/strong> was not functional. So, we were unable to monitor the dynamic activity of the app.<\/p>\n<p>The banking Trojan uses commands to get the user&#8217;s personal information such as contacts, messages (to get the OTP), location details, etc.<\/p>\n<figure id=\"attachment_86371\" aria-describedby=\"caption-attachment-86371\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86371\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Stealing_personal_informations_using_command-650x294.png\" alt=\"\" width=\"650\" height=\"294\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Stealing_personal_informations_using_command-650x294.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Stealing_personal_informations_using_command-300x136.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Stealing_personal_informations_using_command.png 665w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86371\" class=\"wp-caption-text\">Fig 11. Stealing personal information&#8217;s using commands<\/figcaption><\/figure>\n<figure id=\"attachment_86372\" aria-describedby=\"caption-attachment-86372\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86372\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Names_of_apps_of_banks_in_India-650x372.png\" alt=\"\" width=\"650\" height=\"372\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Names_of_apps_of_banks_in_India-650x372.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Names_of_apps_of_banks_in_India-300x172.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Names_of_apps_of_banks_in_India.png 717w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86372\" class=\"wp-caption-text\">Fig 12. Names of apps of banks in India<\/figcaption><\/figure>\n<p>There are other apps mentioned in the list that related to banking, shopping and cryptocurrency.<\/p>\n<p><strong>Some of the famous Indian banking applications are:<\/strong><\/p>\n<ol>\n<li>com.sbi.SBIFreedomPlus (SBI Anywhere personal)<\/li>\n<li>com.csam.icici.bank.imobile (ICICI iMobile)<\/li>\n<li>in.co.bankofbaroda.mpassbook (Baroda mPassbook)<\/li>\n<li>com.unionbank.ecommerce.mobile.android (Union Bank Mobile)<\/li>\n<li>com.axis.mobile (Axis Bank)<\/li>\n<li>hdfcbank.hdfcquickbank (HDFC Bank MobileBanking LITE)<\/li>\n<\/ol>\n<p>One unique activity performed by this app is that it checks whether a user&#8217;s Google Play protection service is ON or OFF. Accordingly, it sends information to the malicious server.<\/p>\n<figure id=\"attachment_86373\" aria-describedby=\"caption-attachment-86373\" style=\"width: 650px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86373\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/06\/Checking_for_play_protection-650x75.png\" alt=\"\" width=\"650\" height=\"75\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Checking_for_play_protection-650x75.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Checking_for_play_protection-300x34.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/06\/Checking_for_play_protection.png 724w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><figcaption id=\"caption-attachment-86373\" class=\"wp-caption-text\">Fig 13. Checking for Google Play Protection<\/figcaption><\/figure>\n<p><a href=\"https:\/\/bit.ly\/2isL3JA\"><strong>Quick Heal<\/strong><\/a><strong> successfully detects <\/strong><strong>these banking Trojans <\/strong><strong>as<\/strong><strong>:<\/strong><\/p>\n<ol>\n<li>Android.Marcher.C<\/li>\n<li>Android.Asacub.T<\/li>\n<\/ol>\n<p><strong>\u00a0<\/strong><strong>Tips to stay safe from Android Banking Trojans<\/strong><\/p>\n<ol>\n<li>Avoid downloading apps from third-party app stores or links provided in SMSs or emails.<\/li>\n<li>Always keep \u2018Unknown Sources\u2019 disabled. Enabling this option allows installation of apps from unknown sources.<\/li>\n<li>Verify app permissions before installing any app even from official stores such as Google Play.<\/li>\n<li>Keep Play Protection service &#8216;ON&#8217;.<\/li>\n<li>Install a reliable mobile security app that can detect and block fake and malicious apps before they can infect your device.<\/li>\n<li>Always keep your device OS and mobile security app up-to-date.<\/li>\n<\/ol>\n<p><strong>Subject Matter Experts<\/strong><\/p>\n<p>Rupali Parate, Anand Kumar Singh | Quick Heal Security Labs<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Quick Heal Security Labs has spotted two banking Trojan malware. These malware imitate some popular social and banking apps. While doing so, they gain access to some security permissions on the infected device which allow them to steal the user\u2019s banking credentials. The malware are able to do this by displaying a fake window that [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":86365,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-86363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86363"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86363"}],"version-history":[{"count":10,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86363\/revisions"}],"predecessor-version":[{"id":86382,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86363\/revisions\/86382"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86365"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}