{"id":86679,"date":"2018-08-17T19:42:09","date_gmt":"2018-08-17T14:12:09","guid":{"rendered":"https:\/\/blogs_admin.quickheal.com\/?p=86679"},"modified":"2018-08-17T19:42:09","modified_gmt":"2018-08-17T14:12:09","slug":"android-malware-combines-banking-trojan-keylogger-ransomware-one-package","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/android-malware-combines-banking-trojan-keylogger-ransomware-one-package\/","title":{"rendered":"Android malware that combines a Banking Trojan, Keylogger, and Ransomware in one package"},"content":{"rendered":"<p>This malware has\u00a0all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user&#8217;s browser with URL received from the C&amp;C server.<\/p>\n<p>It repeatedly opens the accessibility setting page until the user\u00a0switches\u00a0ON the &#8216;AccessibilityService&#8217;. The AccessibilityService allowing the Trojan to enable and abuse any required permission without user concern.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86705 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/24.png\" alt=\"\" width=\"697\" height=\"306\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/24.png 697w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/24-300x132.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/24-650x285.png 650w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/><\/p>\n<p style=\"text-align: center\">Fig.1 Malicious app icon and accessibility setting page opened by malware<\/p>\n<p><strong><b>Overlays on targeted Apps<\/b><\/strong><\/p>\n<p>After launching one of the targeted application, the Trojan displays an overlay phishing login form of confidential information over its window where it asks the user to enter a username, password, and\u00a0other sensitive data.<\/p>\n<p>Following are some\u00a0overlays displayed by Trojan :<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86707 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/25.png\" alt=\"\" width=\"867\" height=\"302\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/25.png 867w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/25-300x104.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/25-768x268.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/25-650x226.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/25-789x275.png 789w\" sizes=\"(max-width: 867px) 100vw, 867px\" \/><\/p>\n<p style=\"text-align: center\">Fig.2 Overlay on banking Apps<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86708 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/26.png\" alt=\"\" width=\"690\" height=\"302\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/26.png 690w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/26-300x131.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/26-650x284.png 650w\" sizes=\"(max-width: 690px) 100vw, 690px\" \/><\/p>\n<p style=\"text-align: center\">Fig.3 Overlay on Play store and zebpay<\/p>\n<p><strong><b>Commands and respective features are shown in below table<\/b><\/strong><\/p>\n<p>The malware performs activity according to commands received from the C&amp;C server. Following list shows the commands used by the malware-<\/p>\n<table>\n<tbody>\n<tr>\n<td style=\"text-align: left\" width=\"152\"><strong><b>Commands<\/b><\/strong><\/td>\n<td style=\"text-align: left\" width=\"415\"><strong><b>Meaning<\/b><\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">Send_GO_SMS<\/td>\n<td style=\"text-align: left\" width=\"415\">Send SMS\u00a0from the infected device<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">nymBePsG0<\/td>\n<td style=\"text-align: left\" width=\"415\">Upload all numbers from the phone book to C&amp;C server<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">GetSWSGO<\/td>\n<td style=\"text-align: left\" width=\"415\">Upload all\u00a0SMS to C&amp;C server<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">telbookgotext<\/td>\n<td style=\"text-align: left\" width=\"415\">Send the SMS to all numbers saved in the infected\u00a0device<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">getapps<\/td>\n<td style=\"text-align: left\" width=\"415\">Upload the list of all installed applications<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">ALERT<\/td>\n<td style=\"text-align: left\" width=\"415\">Show alert whose contents are specified in the command<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">PUSH<\/td>\n<td style=\"text-align: left\" width=\"415\">show notification whose contents are specified in the command<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">startAutoPush<\/td>\n<td style=\"text-align: left\" width=\"415\">Show notification whose contents are set in the Trojan&#8217;s code<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">ussd<\/td>\n<td style=\"text-align: left\" width=\"415\">Calls a USSD number from the infected device<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">sockshost<\/td>\n<td style=\"text-align: left\" width=\"415\">Start Server Socket<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">stopsocks5<\/td>\n<td style=\"text-align: left\" width=\"415\">Stop Server Socket<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">recordsound<\/td>\n<td style=\"text-align: left\" width=\"415\">Start record sound<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">replaceurl<\/td>\n<td style=\"text-align: left\" width=\"415\">Replace URL Panel<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">startapplication<\/td>\n<td style=\"text-align: left\" width=\"415\">Start application specified in the commands<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">killBot<\/td>\n<td style=\"text-align: left\" width=\"415\">Clear the C&amp;C server address<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">getkeylogger<\/td>\n<td style=\"text-align: left\" width=\"415\">Upload keystrokes logs on the server<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">startrat<\/td>\n<td style=\"text-align: left\" width=\"415\">Start Remote Administration Tool<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">startforward<\/td>\n<td style=\"text-align: left\" width=\"415\">Start call forwarding to the number specified in the commands<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">stopforward<\/td>\n<td style=\"text-align: left\" width=\"415\">Stop call forwarding<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">openbrowser<\/td>\n<td style=\"text-align: left\" width=\"415\">Open URL in the browser<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">openactivity<\/td>\n<td style=\"text-align: left\" width=\"415\">Open URL in WebView<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">cryptokey<\/td>\n<td style=\"text-align: left\" width=\"415\">Encrypts all files<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left\" width=\"152\">decryptokey<\/td>\n<td style=\"text-align: left\" width=\"415\">Decrypts all files<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><strong><b>Technical analysis<\/b><\/strong><\/p>\n<p>The main APK file is highly obfuscated and all strings are encrypted. It also contains the extra junk code to make it difficult for reverse engineering. The main APK contains &#8216;image\/files&#8217; encrypted file. The &#8216;image\/files&#8217; file is decrypted at runtime and drops\u00a0another file &#8216;app_files\\driqoy.jar&#8217;. Further malicious activities are performed by that file.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-86694\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/14.png\" alt=\"\" width=\"1427\" height=\"621\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/14.png 1427w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/14-300x131.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/14-768x334.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/14-650x283.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/14-789x343.png 789w\" sizes=\"(max-width: 1427px) 100vw, 1427px\" \/><\/p>\n<p style=\"text-align: center\">Fig.4 The main APK file code<\/p>\n<p><strong><b>Fake alert to disable <\/b><\/strong><strong><b>G<\/b><\/strong><strong><b>oogle <\/b><\/strong><strong><b>P<\/b><\/strong><strong><b>lay protect service<\/b><\/strong><\/p>\n<p>It checks whether a user&#8217;s Google Play protection service is ON or OFF. If it is ON then it displays the fake alert to disable it with the message&#8221;The system does not work correctly, disable Google Play Protect!&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86709 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/27.png\" alt=\"\" width=\"345\" height=\"304\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/27.png 345w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/27-300x264.png 300w\" sizes=\"(max-width: 345px) 100vw, 345px\" \/><\/p>\n<p style=\"text-align: center\">Fig.5 Fake alert to disable google play protect service<\/p>\n<p><strong><b>Prevent from uninstalling the malicious App<\/b><\/strong><\/p>\n<p>If user goes\u00a0to uninstall the application from the setting then malware shows the alert with &#8220;System Error 495&#8221; message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-86697\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/17.png\" alt=\"\" width=\"1007\" height=\"90\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/17.png 1007w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/17-300x27.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/17-768x69.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/17-650x58.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/17-789x71.png 789w\" sizes=\"(max-width: 1007px) 100vw, 1007px\" \/><\/p>\n<p style=\"text-align: center\">Fig.6 Fake alert code<\/p>\n<p>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0\u00a0 <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86710 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/28.png\" alt=\"\" width=\"345\" height=\"303\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/28.png 345w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/28-300x263.png 300w\" sizes=\"(max-width: 345px) 100vw, 345px\" \/><\/p>\n<p style=\"text-align: center\">Fig.7 The fake alert when user tries\u00a0to uninstall<\/p>\n<p><strong><b>Used Twitter for malicious purpose<\/b><\/strong><\/p>\n<p>The malware author uses the Twitter to get C&amp;C server address. The malware takes the encrypted server address from the specified Twitter account that starts with &lt;zero&gt; and ends with &lt;\/zero&gt;.<\/p>\n<p>Twitter accounts used in this malware are \u201chxxps:\/\/twitter.com\/KeremTu81270252\u201d and \u201chxxps:\/\/twitter.com\/JackCorne\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-86700 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/20.png\" alt=\"\" width=\"719\" height=\"483\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/20.png 719w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/20-300x202.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/20-581x390.png 581w\" sizes=\"(max-width: 719px) 100vw, 719px\" \/><\/p>\n<p style=\"text-align: center\">Fig.8 Code to take server address from twitter<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-86701 aligncenter\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/21-650x339.jpg\" alt=\"\" width=\"650\" height=\"339\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/21-650x339.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/21-300x156.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/21-768x401.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/21-789x412.jpg 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/21.jpg 924w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center\">Fig.9 Tweet on the specified\u00a0account<\/p>\n<p><strong><b>It Encrypts and Decrypts the files<\/b><\/strong><\/p>\n<p>Whenever the client receives a command &#8220;cryptokey&#8221; from the server, it encrypts all the files. All the\u00a0encrypted files are\u00a0renamed with the extension &#8220;.AnubisCrypt&#8221;. It\u00a0deletes\u00a0all the original files whereas when the client receives a command &#8220;decryptokey&#8221; from the server, it decrypts all files.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-86702\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/22.png\" alt=\"\" width=\"1117\" height=\"645\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/22.png 1117w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/22-300x173.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/22-768x443.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/22-650x375.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/22-789x456.png 789w\" sizes=\"(max-width: 1117px) 100vw, 1117px\" \/><\/p>\n<p style=\"text-align: center\">Fig.10 Code for files Encryption and Decryption<\/p>\n<p>After\u00a0it\u00a0encrypts all the files it shows the ransom screen. It blocks the screen of the device by Window WebView, which shows the content received from the server. Below Fig. shows the htmllocker\u00a0code which is received from the server.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-86703\" src=\"https:\/\/blogs_admin.quickheal.com\/wp-content\/uploads\/2018\/08\/23.jpg\" alt=\"\" width=\"1352\" height=\"155\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/23.jpg 1352w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/23-300x34.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/23-768x88.jpg 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/23-650x75.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2018\/08\/23-789x90.jpg 789w\" sizes=\"(max-width: 1352px) 100vw, 1352px\" \/><\/p>\n<p style=\"text-align: center\">Fig.11 HTML locker code<\/p>\n<p><strong><b>Quick Heal detection<\/b><\/strong><\/p>\n<p>Quick Heal successfully detects this Android Trojan as <strong><b>Android.Banker.L<\/b><\/strong><\/p>\n<p><strong><b>Indicator of compromise<\/b><\/strong><\/p>\n<p>App Name: <em><i>sistemguncelle<\/i><\/em><br \/>\nPackage name: <em><i>com.qvgstiwjsndr.jktqnsyc<\/i><\/em><br \/>\nMD5: b0ff12e875d1c32bd05dde6bb34e9805<br \/>\nSize: 344<em><i>\u00a0KB<\/i><\/em><\/p>\n<p>App Name: <em><i>Adobe Flash Player<\/i><\/em><br \/>\nPackage name: <em><i>com.fzuhnorsz.xgvmhdztawmg<\/i><\/em><br \/>\nMD5: <em><i>bc53a5857b1e29bef175d64fbec0c186<\/i><\/em><br \/>\nSize: 383<em><i>\u00a0KB<\/i><\/em><\/p>\n<p><strong><b>Targeted Apps<\/b><\/strong><\/p>\n<p>com.csam.icici.bank.imobile<\/p>\n<p>com.snapwork.hdfc<\/p>\n<p>hdfcbank.hdfcquickbank<\/p>\n<p>com.sbi.SBIFreedomPlus<\/p>\n<p>com.axis.mobile<\/p>\n<p>org.bom.bank<\/p>\n<p>com.idbi.mpassbook<\/p>\n<p>com.amazon.mShop.android.shopping<\/p>\n<p>com.paypal.android.p2pmobile<\/p>\n<p>com.mobikwik_new<\/p>\n<p>com.ebay.mobile<\/p>\n<p>zebpay.Application<\/p>\n<p>pl.ideabank.mobilebanking<\/p>\n<p>wos.com.zebpay<\/p>\n<p>at.easybank.mbanking<\/p>\n<p>at.bawag.mbanking<\/p>\n<p>com.idbibank.abhay_card<\/p>\n<p>src.com.idbi<\/p>\n<p>com.citibank.mobile.au<\/p>\n<p>com.citibank.mobile.uk<\/p>\n<p>ru.sberbank.mobileoffice<\/p>\n<p>com.grppl.android.shell.BOS<\/p>\n<p>ru.sberbank.spasibo<\/p>\n<p>com.bitcoin.ss.zebpayindia<\/p>\n<p>com.comarch.security.mobilebanking<\/p>\n<p>pl.pkobp.ipkobiznes<\/p>\n<p>com.coins.ful.bit<\/p>\n<p>com.bbva.bbvacontigo<\/p>\n<p>com.quickmobile.anzirevents15<\/p>\n<p>com.bankinter.launcher<\/p>\n<p>com.scotiabank.mobile<\/p>\n<p>pl.ing.mojeing<\/p>\n<p>com.portfolio.coinbase_tracker<\/p>\n<p>com.oxigen.oxigenwallet<\/p>\n<p>finansbank.enpara.sirketim<\/p>\n<p>au.com.ingdirect.android<\/p>\n<p>com.fusion.ATMLocator<\/p>\n<p>de.comdirect.android<\/p>\n<p>de.fiducia.smartphone.android.banking.vr<\/p>\n<p>com.usbank.mobilebanking<\/p>\n<p>com.phyder.engage<\/p>\n<p>pl.allegro<\/p>\n<p>com.isis_papyrus.raiffeisen_pay_eyewdg<\/p>\n<p>com.vakifbank.mobile<\/p>\n<p>com.empik.empikapp<\/p>\n<p>com.crypter.cryptocyrrency<\/p>\n<p>es.bancosantander.apps<\/p>\n<p>com.localbitcoins.exchange<\/p>\n<p>com.garanti.cepbank<\/p>\n<p>com.commbank.netbank<\/p>\n<p>com.cibc.android.mobi<\/p>\n<p>ccom.tmob.denizbank<\/p>\n<p>tr.com.sekerbilisim.mbank<\/p>\n<p>com.barclays.android.barclaysmobilebanking<\/p>\n<p>com.thunkable.android.santoshmehta364.UNOCOIN_LIVE<\/p>\n<p>com.rbs.mobile.investisir<\/p>\n<p>info.blockchain.merchant<\/p>\n<p>com.coins.bit.local<\/p>\n<p>pl.millennium.corpApp<\/p>\n<p>com.yinzcam.facilities.verizon<\/p>\n<p>org.banksa.bank<\/p>\n<p>it.volksbank.android<\/p>\n<p>com.ziraat.ziraatmobil<\/p>\n<p>pl.bph<\/p>\n<p>me.doubledutch.hvdnz.cbnationalconference2016<\/p>\n<p>wit.android.bcpBankingApp.millenniumPL<\/p>\n<p>com.imb.banking2<\/p>\n<p>com.unionbank.ecommerce.mobile.commercial.legacy<\/p>\n<p>eu.eleader.mobilebanking.pekao<\/p>\n<p>com.dbs.hk.dbsmbanking<\/p>\n<p>ru.alfabank.oavdo.amc<\/p>\n<p>nz.co.bnz.droidbanking<\/p>\n<p>com.kutxabank.android<\/p>\n<p>com.clairmail.fth<\/p>\n<p>may.maybank.android<\/p>\n<p>jp.co.aeonbank.android.passbook<\/p>\n<p>eu.inmite.prj.kb.mobilbank<\/p>\n<p>cz.sberbankcz<\/p>\n<p>fr.banquepopulaire.cyberplus<\/p>\n<p>pl.mbank<\/p>\n<p>com.idamob.tinkoff.android<\/p>\n<p>pl.fmbank.smart<\/p>\n<p>com.scb.breezebanking.hk<\/p>\n<p>pl.ceneo<\/p>\n<p>pl.bzwbk.ibiznes24<\/p>\n<p>eu.newfrontier.iBanking.mobile.Halk.Retail<\/p>\n<p>com.bankofamerica.cashpromobile<\/p>\n<p>com.magiclick.odeabank<\/p>\n<p>com.akbank.android.apps.akbank_direkt_tablet_20<\/p>\n<p>hr.asseco.android.jimba.mUCI.ro<\/p>\n<p>at.psa.app.bawag<\/p>\n<p>com.starfinanz.smob.android.sfinanzstatus<\/p>\n<p>com.cleverlance.csas.servis24<\/p>\n<p>com.DijitalSahne.EnYakinHalkbank<\/p>\n<p>com.bawagpsk.securityapp<\/p>\n<p>in.co.bankofbaroda.mpassbook<\/p>\n<p>com.ifs.banking.fiid4202<\/p>\n<p>com.usaa.mobile.android.usaa<\/p>\n<p>au.com.mebank.banking<\/p>\n<p>nz.co.anz.android.mobilebanking<\/p>\n<p>com.citi.citimobile<\/p>\n<p>fr.lcl.android.customerarea<\/p>\n<p>com.rbs.mobile.android.natwest<\/p>\n<p>ru.sberbank.sberbankir<\/p>\n<p>com.akbank.android.apps.akbank_direkt_tablet<\/p>\n<p>hk.com.hsbc.hsbchkmobilebanking<\/p>\n<p>com.pozitron.vakifbank<\/p>\n<p>it.secservizi.mobile.atime.bpaa<\/p>\n<p>ru.alfabank.mobile.android<\/p>\n<p>de.schildbach.wallet<\/p>\n<p>jp.co.rakuten_bank.rakutenbank<\/p>\n<p>com.htsu.hsbcpersonalbanking<\/p>\n<p>pl.orange.mojeorange<\/p>\n<p>com.garanti.cepsubesi<\/p>\n<p>com.anz.android<\/p>\n<p>com.bmo.mobile<\/p>\n<p>com.matriksmobile.android.ziraatTrader<\/p>\n<p>com.magiclick.FinansPOS<\/p>\n<p>sk.sporoapps.accounts<\/p>\n<p>ru.bm.mbm<\/p>\n<p>pl.bzwbk.bzwbk24<\/p>\n<p>com.tmob.tabletdeniz<\/p>\n<p>pl.bzwbk.mobile.tab.bzwbk24<\/p>\n<p>com.grppl.android.shell.CMBlloydsTSB73<\/p>\n<p>com.matriksdata.finansyatirim<\/p>\n<p>at.spardat.netbanking<\/p>\n<p>ru.alfabank.sense<\/p>\n<p>com.ing.diba.mbbr2<\/p>\n<p>com.blockfolio.blockfolio<\/p>\n<p>at.easybank.securityapp<\/p>\n<p>com.getingroup.mobilebanking<\/p>\n<p>com.ideomobile.hapoalim<\/p>\n<p>com.moneybookers.skrillpayments.neteller<\/p>\n<p>com.bbva.netcash<\/p>\n<p>com.coin.profit<\/p>\n<p>com.db.mm.deutschebank<\/p>\n<p>jp.co.netbk<\/p>\n<p>com.mtel.androidbea<\/p>\n<p>com.caisseepargne.android.mobilebanking<\/p>\n<p>fr.axa.monaxa<\/p>\n<p>fr.laposte.lapostetablet<\/p>\n<p>com.bankaustria.android.olb<\/p>\n<p>com.cba.android.netbank<\/p>\n<p>com.binance.odapplications<\/p>\n<p>com.anzspot.mobile<\/p>\n<p>org.westpac.banknz.co.westpac<\/p>\n<p>com.cm_prod.epasal<\/p>\n<p>jp.mufg.bk.applisp.app<\/p>\n<p>com.akbank.android.apps.akbank_direkt<\/p>\n<p>com.empik.empikfoto<\/p>\n<p>sk.sporoapps.skener<\/p>\n<p>com.rbc.mobile.android<\/p>\n<p>com.tecnocom.cajalaboral<\/p>\n<p>ru.vtb24.mobilebanking.android<\/p>\n<p>au.com.bankwest.mobile<\/p>\n<p>nz.co.kiwibank.mobile<\/p>\n<p>cz.airbank.android<\/p>\n<p>com.grppl.android.shell.halifax<\/p>\n<p>com.fragment.akbank<\/p>\n<p>jp.co.smbc.direct<\/p>\n<p>com.pozitron.albarakaturk<\/p>\n<p>com.barclays.ke.mobile.android.ui<\/p>\n<p>ro.btrl.mobile<\/p>\n<p>com.kuveytturk.mobil<\/p>\n<p>com.edsoftapps.mycoinsvalue<\/p>\n<p>ru.sberbankmobile<\/p>\n<p>com.moneybookers.skrillpayments<\/p>\n<p>com.bssys.VTBClient<\/p>\n<p>com.rbs.mobile.android.natwestoffshore<\/p>\n<p>pl.com.rossmann.centauros<\/p>\n<p>au.com.suncorp.SuncorpBank<\/p>\n<p>com.cm_prod.bad<\/p>\n<p>fr.creditagricole.androidapp<\/p>\n<p>com.jackpf.blockchainsearch<\/p>\n<p>com.ykb.android<\/p>\n<p>com.finanteq.finance.ca<\/p>\n<p>com.rbs.mobile.android.rbs<\/p>\n<p>de.postbank.finanzassistent<\/p>\n<p>com.binance.dev<\/p>\n<p>eu.eleader.mobilebanking.raiffeisen<\/p>\n<p>pl.pkobp.iko<\/p>\n<p>com.btcturk<\/p>\n<p>com.rbs.mobile.android.rbsbandc<\/p>\n<p>com.pozitron.iscep<\/p>\n<p>com.localbitcoinsmbapp<\/p>\n<p>com.ing.mobile<\/p>\n<p>com.ziraat.ziraattablet<\/p>\n<p>com.bankia.wallet<\/p>\n<p>com.anz.SingaporeDigitalBanking<\/p>\n<p>com.crowdcompass.appSQ0QACAcYJ<\/p>\n<p>de.fiducia.smartphone.android.securego.vr<\/p>\n<p>pl.bps.bankowoscmobilna<\/p>\n<p>com.anz.android.gomoney<\/p>\n<p>at.easybank.tablet<\/p>\n<p>pl.bosbank.mobile<\/p>\n<p>com.ykb.android.mobilonay<\/p>\n<p>mobi.societegenerale.mobile.lappli<\/p>\n<p>nz.co.westpac<\/p>\n<p>es.cm.android.tablet<\/p>\n<p>com.boursorama.android.clients<\/p>\n<p>finansbank.enpara<\/p>\n<p>com.wf.wellsfargomobile.tablet<\/p>\n<p>com.teb<\/p>\n<p>com.garantibank.cepsubesiro<\/p>\n<p>com.unocoin.unocoinwallet<\/p>\n<p>com.arubanetworks.atmanz<\/p>\n<p>at.volksbank.volksbankmobile<\/p>\n<p>com.starfinanz.mobile.android.pushtan<\/p>\n<p>com.rsi<\/p>\n<p>com.konylabs.capitalone<\/p>\n<p>com.amazon.windowshop<\/p>\n<p>de.commerzbanking.mobil<\/p>\n<p>es.lacaixa.mobile.android.newwapicon<\/p>\n<p>com.unionbank.ecommerce.mobile.android<\/p>\n<p>com.aff.otpdirekt<\/p>\n<p>ru.tcsbank.c2c<\/p>\n<p>com.orangefinanse<\/p>\n<p>uk.co.bankofscotland.businessbank<\/p>\n<p>org.stgeorge.bank<\/p>\n<p>com.finansbank.mobile.cepsube<\/p>\n<p>piuk.blockchain.android<\/p>\n<p>fr.laposte.lapostemobile<\/p>\n<p>ru.mw<\/p>\n<p>com.infrasofttech.indianBank<\/p>\n<p>de.dkb.portalapp<\/p>\n<p>com.matriksdata.ziraatyatirim.pad<\/p>\n<p>io.getdelta.android<\/p>\n<p>mobile.santander.de<\/p>\n<p>com.bbva.bbvawallet<\/p>\n<p>com.cm_prod.nosactus<\/p>\n<p>alior.bankingapp.android<\/p>\n<p>com.fi6122.godough<\/p>\n<p>com.wellsFargo.ceomobile<\/p>\n<p>com.ykb.androidtablet<\/p>\n<p>com.vakifbank.mobilel<\/p>\n<p>com.entersekt.authapp.sparkasse<\/p>\n<p>com.rbs.mobile.android.natwestbandc<\/p>\n<p>com.td<\/p>\n<p>com.kryptokit.jaxx<\/p>\n<p>com.bankofqueensland.boq<\/p>\n<p>tr.com.tradesoft.tradingsystem.gtpmobile.halk<\/p>\n<p>com.mobillium.papara<\/p>\n<p>com.vipera.ts.starter.QNB<\/p>\n<p>com.orangefinansek<\/p>\n<p>com.monitise.isbankmoscow<\/p>\n<p>au.com.newcastlepermanent<\/p>\n<p>com.tmobtech.halkbank<\/p>\n<p>com.snapwork.IDBI<\/p>\n<p>cz.csob.smartbanking<\/p>\n<p>com.coinbase.android<\/p>\n<p>es.cm.android<\/p>\n<p>org.westpac.bank<\/p>\n<p>com.MobileTreeApp<\/p>\n<p>au.com.nab.mobile<\/p>\n<p>au.com.cua.mb<\/p>\n<p>com.yurtdisi.iscep<\/p>\n<p>es.bancopopular.nbmpopular<\/p>\n<p>com.rbs.mobile.android.ubr<\/p>\n<p>com.garantiyatirim.fx<\/p>\n<p>com.vtb.mobilebank<\/p>\n<p>com.bendigobank.mobile<\/p>\n<p>com.softtech.isbankasi<\/p>\n<p>com.thunkable.android.manirana54.LocalBitCoins<\/p>\n<p>de.consorsbank<\/p>\n<p>pl.aliorbank.aib<\/p>\n<p>com.palatine.android.mobilebanking.prod<\/p>\n<p>es.evobanco.bancamovil<\/p>\n<p>ru.tinkoff.sme<\/p>\n<p>com.comarch.mobile.banking.bgzbnpparibas.biznes<\/p>\n<p>com.de.dkb.portalapp<\/p>\n<p>com.advantage.RaiffeisenBank<\/p>\n<p>com.tmob.denizbank<\/p>\n<p>com.thunkable.android.manirana54.LocalBitCoins_unblock<\/p>\n<p>com.FubonMobileClient<\/p>\n<p>eu.eleader.mobilebanking.pekao.firm<\/p>\n<p>com.mal.saul.coinmarketcap<\/p>\n<p>ru.tinkoff.goabroad<\/p>\n<p>ru.alfadirect.app<\/p>\n<p>com.SifrebazCep<\/p>\n<p>com.sovereign.santander<\/p>\n<p>com.infonow.bofa<\/p>\n<p>com.softtech.iscek<\/p>\n<p>uk.co.santander.businessUK.bb<\/p>\n<p>eu.eleader.mobilebanking.invest<\/p>\n<p>net.bnpparibas.mescomptes<\/p>\n<p>com.akbank.softotp<\/p>\n<p>com.redrockdigimark<\/p>\n<p>com.unocoin.unocoinmerchantPoS<\/p>\n<p>com.hangseng.rbmobile<\/p>\n<p>MyING.be<\/p>\n<p>com.cm_prod_tablet.bad<\/p>\n<p>com.bssys.vtb.mobileclient<\/p>\n<p>ru.tinkoff.mgp<\/p>\n<p>com.ykb.avm<\/p>\n<p>pl.ipko.mobile<\/p>\n<p>jp.co.sevenbank.AppPassbook<\/p>\n<p>com.jamalabbasii1998.localbitcoin<\/p>\n<p>at.spardat.bcrmobile<\/p>\n<p>com.veripark.ykbaz<\/p>\n<p>uk.co.santander.santanderUK<\/p>\n<p>com.wf.wellsfargomobile<\/p>\n<p>ru.sberbank_sbbol<\/p>\n<p>com.starfinanz.smob.android.sfinanzstatus.tablet<\/p>\n<p>com.chase.sig.android<\/p>\n<p>nz.co.asb.asbmobile<\/p>\n<p>biz.mobinex.android.apps.cep_sifrematik<\/p>\n<p>com.tnx.apps.coinportfolio<\/p>\n<p>com.santander.app<\/p>\n<p>by.st.alfa<\/p>\n<p>com.starfinanz.smob.android.sbanking<\/p>\n<p>com.suntrust.mobilebanking<\/p>\n<p><strong><b>Conclusion<\/b><\/strong><\/p>\n<p>For Android version 7 and 8, previously used overlay techniques were rendered inaccessible, but malware authors find a new way to use overlays in their banking malware. The implementation of the overlay attack abuses the Usage Access permission in order to run on all versions\u00a0of the Android operating system including the latest Android 7 and 8.<\/p>\n<p><strong><b>Tips to stay safe from Android Trojans<\/b><\/strong><\/p>\n<ul>\n<li>Avoid downloading apps from third-party app stores or links provided in SMSsor emails.<\/li>\n<li>Always keep \u2018Unknown Sources\u2019 disabled. Enabling this option allows installation of apps from unknown sources.<\/li>\n<li>Most importantly, verify app permissions before installing any app even from official stores such as Google Play.<\/li>\n<li>Install a reliable <a href=\"https:\/\/bit.ly\/2isL3JA\"><u>mobile security<\/u><\/a>\u00a0app that can detect and block fake and malicious apps before they can infect your device.<\/li>\n<li>Always keep your device OS and mobile security app up-to-date.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This malware has\u00a0all basic functionalities of the Android banker along with additional features like call forwarding, sound recording, keylogging and ransomware activities. It has the ability to launch user&#8217;s browser with URL received from the C&amp;C server. It repeatedly opens the accessibility setting page until the user\u00a0switches\u00a0ON the &#8216;AccessibilityService&#8217;. The AccessibilityService allowing the Trojan to [&hellip;]<\/p>\n","protected":false},"author":52,"featured_media":86716,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1611,910],"tags":[380,972,1139,207],"class_list":["post-86679","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-banking-trojan","category-ransomware","tag-android-malware","tag-android-ransomware","tag-banking-trojan","tag-keylogger"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86679"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/52"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=86679"}],"version-history":[{"count":7,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86679\/revisions"}],"predecessor-version":[{"id":86715,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/86679\/revisions\/86715"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/86716"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=86679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=86679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=86679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}