×

New Android Malware Poses as SBI Card and Axis Bank Apps to Steal Financial Data

McAfee’s Mobile Research Team has identified a sophisticated Android malware campaign primarily aimed at Hindi-speaking users in India, masquerading as legitimate financial applications from institutions like SBI Card, Axis Bank, and IndusInd Bank.

This operation distributes malicious APKs through dynamically created phishing websites that mimic official banking portals, leveraging real assets such as images and JavaScript from genuine sites to enhance credibility.

Android Malware
phishing website

Dual-Threat Campaign

What sets this malware apart is its dual functionality: it not only exfiltrates sensitive personal and financial data but also covertly mines Monero cryptocurrency using the open-source XMRig tool, activated remotely via Firebase Cloud Messaging (FCM).

The malware poses as a Google Play update to exploit user trust, prompting installations that lead to data theft.

As a member of the App Defense Alliance, McAfee reported these threats to Google, resulting in the blocking of the associated FCM account to curb further dissemination.

McAfee Mobile Security classifies all variants as high-risk, with telemetry indicating infections predominantly in India, though sporadic cases appear elsewhere.

Cryptomining Payload

The malware employs a multi-stage dropper architecture to evade static analysis and detection.

Upon installation, the APK presents a fake Google Play interface urging an “update,” while internally decrypting an encrypted DEX file from its assets folder using an XOR key.

This first-stage loader then decrypts and dynamically loads a second-stage payload, which manifests as a counterfeit financial app interface.

Users are prompted to enter details like names, card numbers, CVVs, and expiration dates, which are transmitted to a command-and-control (C2) server.

Android Malware
Fake card verification screen

Post-submission, the app displays a deceptive confirmation page, simulating legitimacy with messages about email verifications within 48 hours, though all functionalities are inert.

Embedded within the second-stage code is a Firebase messaging service declared in the manifest, listening for remote commands that trigger the mining component.

This involves downloading an encrypted .so binary from one of three hardcoded URLs, which is then executed via Java’s ProcessBuilder as a standalone process with arguments mirroring XMRig’s command-line options, including mining pool specifications for Monero.

The RandomX algorithm, optimized for CPU efficiency, enables profitable mining on mobile devices, with privacy features of Monero obscuring transactions and aiding cybercriminals in laundering funds.

Logs from the decrypted binary confirm XMRig’s involvement, allowing silent background operation without user awareness.

This campaign builds on prior threats targeting India, as noted in McAfee’s previous reports, but innovates by integrating real-time phishing with dynamic payload loading and remote activation.

The dropper’s staged decryption complicates reverse engineering, while FCM-based triggers keep the malware dormant until commanded, reducing detection risks.

Phishing sites feature “Get App” buttons that deliver the APK, often promoted via SMS, WhatsApp, or social media.

Users should exclusively source apps from Google Play, scrutinize unsolicited links, and employ robust mobile security solutions to block such threats.

This blend of data theft and cryptojacking underscores evolving malware sophistication, demanding vigilant user practices and advanced defenses.

Indicators of Compromise (IOCs)

Type Value Description
APK 2c1025c92925fec9c500e4bf7b4e9580f9342d44e21a34a44c1bce435353216c SBI Credit Card
APK b01185e1fba96209c01f00728f6265414dfca58c92a66c3b4065a344f72768ce ICICI Credit Card
APK 80c6435f859468e660a92fc44a2cd80c059c05801dae38b2478c5874429f12a0 Axis Credit Card
APK 59c6a0431d25be7e952fcfb8bd00d3815d8b5341c4b4de54d8288149090dcd74 IndusInd Credit Card
APK 40bae6f2f736fcf03efdbe6243ff28c524dba602492b0dbb5fd280910a87282d Kotak Credit Card
URL https://www.sbi.mycardcare.in Phishing Site
URL https://kotak.mycardcard.in Phishing Site
URL https://axis.mycardcare.in Phishing Site
URL https://indusind.mycardcare.in Phishing Site
URL https://icici.mycardcare.in Phishing Site
Firebase 469967176169 FCM Account

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!

Post Comment