{"id":89866,"date":"2021-05-18T21:05:24","date_gmt":"2021-05-18T15:35:24","guid":{"rendered":"https:\/\/blogs.quickheal.com\/?p=89866"},"modified":"2023-06-17T17:01:16","modified_gmt":"2023-06-17T11:31:16","slug":"beware-of-fake-oximeter-apps-they-can-steal-your-banking-credentials","status":"publish","type":"post","link":"https:\/\/www.quickheal.com\/blogs\/beware-of-fake-oximeter-apps-they-can-steal-your-banking-credentials\/","title":{"rendered":"Beware of Fake Oximeter Apps: They Can Steal Your Banking Credentials"},"content":{"rendered":"<p>No one had expected a new chapter to the current life devouring pandemic. People crawled from one situation to another, and so did the malware trend. Several apps were developed in different countries and states for easy management and tracking of <a href=\"https:\/\/blogs.quickheal.com\/scam-alert-covid-19-vaccine-phishing-and-money-scam-hits-india\/\">COVID-19<\/a> cases. At Quick Heal Security Labs, we have been tracking such applications to identify malware-laced apps misusing the official apps meant to ease the lives of people and authorities.<\/p>\n<p>As mentioned in our previous blog, various <a href=\"https:\/\/blogs.quickheal.com\/sure-right-aarogya-setu-app-phone\/\">Arogya Setu apps<\/a> were found malicious. Malware authors make use of apps that are already launched and keep sneaking on current statements made by authorities regarding apps that will use for vaccination registration. A similar app was found and mentioned in the earlier blog regarding the co-win app. A new malicious application serving the same purpose has come to light, along with another app that was meant to check a person&#8217;s oxygen saturation level.<\/p>\n<h2><strong>Trojan masquerading as benign oximeter app<\/strong><\/h2>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89867 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/oximetero2.png\" alt=\"\" width=\"450\" height=\"373\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oximetero2.png 450w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oximetero2-300x249.png 300w\" sizes=\"(max-width: 450px) 100vw, 450px\" \/><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89868 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/vaccine.png\" alt=\"\" width=\"484\" height=\"362\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/vaccine.png 484w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/vaccine-300x224.png 300w\" sizes=\"(max-width: 484px) 100vw, 484px\" \/><\/p>\n<p><span data-preserver-spaces=\"true\">Two similar apps imitating legitimate oximeter and <a href=\"https:\/\/blogs.quickheal.com\/beware-hackers-target-users-with-fake-covid-19-vaccine-registration-app\/\">vaccine registration app<\/a> are found, as mentioned in Karnataka\u00a0<\/span><a class=\"editor-rtfLink\" href=\"https:\/\/twitter.com\/DgpKarnataka\/status\/1385069449087049735?s=08\" target=\"_blank\" rel=\"noopener noreferrer\"><span data-preserver-spaces=\"true\">DGP&#8217;s tweet<\/span><\/a><span data-preserver-spaces=\"true\"> last week. Fake oximeter apps were found that took user&#8217;s fingerprint data for Google Pay, PhonePe, Paytm, etc. This app is cut from the same cloth. It asks for contacts and SMS permission which seems unnecessary for an app that would check oxygen saturation level. It accesses contacts and sends a link to every contact in the system via SMS and WhatsApp message, which is hosted on some mega account which on download turns out to be a <a href=\"https:\/\/blogs.quickheal.com\/beware-banking-trojans-using-enhanced-techniques-to-spread-malware\/\">banking trojan<\/a>-banker.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Inspection bypass and distribution tricks<\/span><\/strong><\/h3>\n<p style=\"padding-top: 10px;\"><span data-preserver-spaces=\"true\">Malware authors are evolving with their techniques every day. One of the essential things in malware&#8217;s success is distribution. For Android users, Google Play Store is the most sought-after market to get free and paid apps, and that is where the effective target lies. Malware authors apply different tricks to bypass Google Play Store restrictions. Some of the tricks used to publish apps and distribute via specific other means are:<\/span><\/p>\n<ol>\n<li><span data-preserver-spaces=\"true\">Authors use firebase to initiate malicious functions before and after the app is published. Firebase being Google&#8217;s product becomes less suspicious in its activities.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Authors use GitHub and mega accounts to deploy their payloads.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Authors use different app markets and repositories to distribute their malware other than Google Play, e.g., Koodous, QooApp, Huawei AppGallery, Apkpure, and many more. People who want certain removed apps from Play Store go to repos., like Apkpure, Apkmirror, and Koodous, and bumps into malware.<\/span><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<h3 style=\"margin-bottom: 15px;\"><strong>Technical analysis<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-89869 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/asking_contacts_and_sending_sms_permission.png\" alt=\"\" width=\"437\" height=\"364\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/asking_contacts_and_sending_sms_permission.png 437w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/asking_contacts_and_sending_sms_permission-300x250.png 300w\" sizes=\"(max-width: 437px) 100vw, 437px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.1 Asking contacts and send SMS permission<\/em><\/p>\n<p>onCreate method requesting for permissions and calling the method &#8220;sendO2toContacts&#8221; which is the malicious method that carries out the further activity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89870 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/oncreate-650x142.png\" alt=\"\" width=\"650\" height=\"142\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oncreate-650x142.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oncreate-300x65.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oncreate-768x167.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oncreate-789x172.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/oncreate.png 927w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.2 Calling method sendO2toContacts<\/em><\/p>\n<p>sendO2toContacts calls a method &#8220;getAllContacts&#8221; that collects every contact number from the system. It then gets a link for SMS and WhatsApp and iterates over an array of contacts and calls the methods that send those links via SMS and WhatsApp.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-89871 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/sendo2tocontacts.png\" alt=\"\" width=\"608\" height=\"235\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendo2tocontacts.png 608w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendo2tocontacts-300x116.png 300w\" sizes=\"(max-width: 608px) 100vw, 608px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.3 Driver function for malicious activity<\/em><\/p>\n<p>sendO2ViaSMS function return a decoded bas64 hash that decodes to &#8220;<strong>hxxps:\/\/mega[.]nz\/file\/Zhh0RSJQ#81GUF7ruoEv9itdyh_kswLlBYWoAe0TwMLt4MTM9V4g<\/strong>&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89874 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/send02viasms-650x53.png\" alt=\"\" width=\"650\" height=\"53\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/send02viasms-650x53.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/send02viasms-300x25.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/send02viasms-768x63.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/send02viasms-789x65.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/send02viasms.png 1145w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig<\/em>.4 <em>Malicious<\/em> link<\/p>\n<p>Visiting this link takes us to the mega[.]nz page that has an APK file ready to be downloaded.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89873 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/SAVE_20210426_102406-650x276.jpg\" alt=\"\" width=\"650\" height=\"276\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/SAVE_20210426_102406-650x276.jpg 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/SAVE_20210426_102406-300x128.jpg 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/SAVE_20210426_102406.jpg 762w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.5 Banker trojan<\/em><\/p>\n<p>Though we can see the name of the app is <strong><em>Oxygen Saturation Checker.apk<\/em><\/strong> it actually is a &#8220;pamdemicdestek.apk&#8221; file and is detected by Quick Heal by the name <a href=\"https:\/\/www.virustotal.com\/gui\/file\/17059b397cc98ee8ccd8cf38c7e5d9907ab243640ffa410cee11a7bea34fec9c\/detection\">Android.Anubis.GEN30551<\/a>.<\/p>\n<ul>\n<li>SendO2ViaWhatsApp method returns the same link as the text of the message formatted properly to be sent using WhatsApp API in the format &#8220;hxxps:\/\/api.whatsapp.com\/send?phone=+91xxxxxxxxxx&amp;text=link&#8221;.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-89872 aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/whatsapppp-650x71.png\" alt=\"\" width=\"650\" height=\"71\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/whatsapppp-650x71.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/whatsapppp-300x33.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/whatsapppp-768x84.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/whatsapppp-789x87.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/whatsapppp.png 1076w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 6 Returning formatted WhatsApp API link<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>SendViaSMS function receives the number and the message to be sent to every contact in the system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-89876 size-large aligncenter\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105-650x179.png\" alt=\"\" width=\"650\" height=\"179\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105-650x179.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105-300x82.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105-768x211.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105-789x217.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105-304x84.png 304w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/sendingsms-e1621344945105.png 1045w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig.7 sending SMS link<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Similarly, send via WhatsApp method gets the crafted WhatsApp API message and starts the activity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-89877 size-large\" src=\"https:\/\/blogs.quickheal.com\/wp-content\/uploads\/2021\/05\/wsenit-e1621345043110-650x368.png\" alt=\"\" width=\"650\" height=\"368\" srcset=\"https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/wsenit-e1621345043110-650x368.png 650w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/wsenit-e1621345043110-300x170.png 300w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/wsenit-e1621345043110-768x435.png 768w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/wsenit-e1621345043110-789x447.png 789w, https:\/\/www.quickheal.com\/blogs\/wp-content\/uploads\/2021\/05\/wsenit-e1621345043110.png 875w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Fig. 8 Sending trojan link via WhatsApp<\/em><\/p>\n<h5><strong>Indicator of Compromise<\/strong><\/h5>\n<table style=\"height: 114px; margin-top: 10px;\" border=\"1\" width=\"614\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" width=\"274\"><strong>Package Name<\/strong><\/td>\n<td style=\"text-align: center;\" width=\"274\"><strong>MD5<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"274\">com.body.saturation.vaccineregistration<\/td>\n<td width=\"274\">\u00a0682280287f8d0f53f57e35ec47d9d873<\/td>\n<\/tr>\n<tr>\n<td width=\"274\">com.body.saturation.oximetero2<\/td>\n<td width=\"274\">\u00a084684e063b664aa2d1b8c5441d1fb1b9<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2><strong>How to stay safe<\/strong><\/h2>\n<ul>\n<li>Download Applications only from trusted sources like Google Play Store.<\/li>\n<li>Learn how to <a href=\"https:\/\/blogs.quickheal.com\/how-to-identify-fake-apps-in-the-google-play-store\/\">identify fake apps<\/a> in Google Play Store<\/li>\n<li>Do not click on alien links received through messages or any other social media platforms.<\/li>\n<li>Turn off installation from unknown source option<\/li>\n<li>Read the pop-up messages you get from the Android system before Accepting\/Allowing any new permissions.<\/li>\n<li>Malicious developers spoof original Application names and Developer names. So, make sure you are downloading genuine apps only. Often app descriptions contain typos and grammatical mistakes. Check the developer&#8217;s website if a link is available on the app&#8217;s webpage. Avoid using it if anything looks strange or odd.<\/li>\n<li>Reviews and ratings can be fake but still reading user reviews of the app and the experience of existing users can be helpful. Pay attention to reviews with low ratings.<\/li>\n<li>Check download count of the app \u2014 popular apps have very high download counts. But do note that some fake apps have been downloaded thousands or even millions of times before they were discovered.<\/li>\n<li>Avoid downloading apps from third-party app stores or links provided in SMSs, emails, or WhatsApp messages. Also, avoid installing apps that are downloaded after clicking on an advertisement.<\/li>\n<li>Use a trusted anti-virus like <a href=\"https:\/\/www.quickheal.co.in\/home-users\/quick-heal-mobile-security\">Quick Heal Mobile Security<\/a> to <a href=\"https:\/\/blogs.quickheal.com\/28-fake-apps-removed-google-play-store-post-quick-heal-security-lab-reports\/\">stay safe from Android malware<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>No one had expected a new chapter to the current life devouring pandemic. People crawled from one situation to another, and so did the malware trend. Several apps were developed in different countries and states for easy management and tracking of COVID-19 cases. At Quick Heal Security Labs, we have been tracking such applications to [&hellip;]<\/p>\n","protected":false},"author":83,"featured_media":89889,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1739,24],"tags":[1808],"class_list":["post-89866","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-malware","tag-fake-oximeter-apps-covid19-cybersecurity-trojan-malware"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89866"}],"collection":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/users\/83"}],"replies":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/comments?post=89866"}],"version-history":[{"count":15,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89866\/revisions"}],"predecessor-version":[{"id":91476,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/posts\/89866\/revisions\/91476"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media\/89889"}],"wp:attachment":[{"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/media?parent=89866"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/categories?post=89866"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.quickheal.com\/blogs\/wp-json\/wp\/v2\/tags?post=89866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}