Monday, November 4, 2024
HomeMalwareNew Malicious dropper Spreading Dangerous "Bankbot" Banking Malware via Google Play store

New Malicious dropper Spreading Dangerous “Bankbot” Banking Malware via Google Play store

Published on

Malware protection

Two new campaigns using a malicious dropper to inject bankbot Banking Malware via play store apps and campaigns are dropping two different types of Banking Trojan.

This Bankbot Trojan distribution has been analyzed through one of a Playstore application called Tornado FlashLight.

Bankbot Malware Basically considering as too Risky one when its behavioral Intelligence Mimics as legitimate with existing Banking application and create a fake overlay which helps to steal the Credentials from Victims.

- Advertisement - SIEM as a Service

The first campaign drops a Bankbot malware and security one drops some different type of banking trojan that performs Android-based bank information stealer with legitimate-looking and with delayed onset of malicious activity.

Previously Discovered Bankbot malware contains more stealthy futures and more sophisticated functionality which performs background unknown clicks and performing app installation from unknown sources.

New dropped Bankbot trojan variant doesn’t perform any automatic tricks but if the user enables the unknown resources, then the user will promote to install the bankbot Malware.

Also Read:  New Banking Trojan Steal Money From Bank Accounts by Abusing Windows OS

How Does this Banking Malware Work

Initially, Dropper app and Malware downloaded and installed from third party location to the victims mobile.

Tornado FlashLight dropper (com.andrtorn.app) not discovered by Google’s Play Protect and it running by without interface unless the device is running suitable security software.

Once Dropper started to dropping the Malware, it will check all installed application against 160 Hardcoded apps.

if its find one or more of the targeted apps are installed when the dropper app is closed, it will start the service with dropper functionality.

Later, Dropper will check the device boot and once it succeeds then it will start the services and asking permission to gain admin access from the victim.

Once it obtains the admin level permission then it will Download the Bankbot Malware dropper from Command & Control Server (hxxp://138.201.166.31/kjsdf.tmp).

Downloaded malware will be triggered 2 hours after when the admin permission will be granted by the victim.

According to SfyLabs,Once the download is completed, the dropper will try to install the APK, using the standard Android mechanism to install applications from outside the Google Play store. Besides requiring unknown sources to be already enabled, this install method requires the user to press a button to continue the installation.

Later Dropper malware started by the dropper and listed banking apps with overlays trying to steal user credentials to perform fraud.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues

White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics

The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

LightSpy iOS Malware Enhanced with 28 New Destructive Plugins

The LightSpy threat actor exploited publicly available vulnerabilities and jailbreak kits to compromise iOS...

New PySilon RAT Abusing Discord Platform to Maintain Persistence

Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan...

Notorious WrnRAT Delivered Mimic As Gambling Games

WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling...