New Android Malware Poses as SBI Card and Axis Bank Apps to Steal Financial Data
McAfee’s Mobile Research Team has identified a sophisticated Android malware campaign primarily aimed at Hindi-speaking users in India, masquerading as legitimate financial applications from institutions like SBI Card, Axis Bank, and IndusInd Bank.
This operation distributes malicious APKs through dynamically created phishing websites that mimic official banking portals, leveraging real assets such as images and JavaScript from genuine sites to enhance credibility.

Dual-Threat Campaign
What sets this malware apart is its dual functionality: it not only exfiltrates sensitive personal and financial data but also covertly mines Monero cryptocurrency using the open-source XMRig tool, activated remotely via Firebase Cloud Messaging (FCM).
The malware poses as a Google Play update to exploit user trust, prompting installations that lead to data theft.
As a member of the App Defense Alliance, McAfee reported these threats to Google, resulting in the blocking of the associated FCM account to curb further dissemination.
McAfee Mobile Security classifies all variants as high-risk, with telemetry indicating infections predominantly in India, though sporadic cases appear elsewhere.
Cryptomining Payload
The malware employs a multi-stage dropper architecture to evade static analysis and detection.
Upon installation, the APK presents a fake Google Play interface urging an “update,” while internally decrypting an encrypted DEX file from its assets folder using an XOR key.
This first-stage loader then decrypts and dynamically loads a second-stage payload, which manifests as a counterfeit financial app interface.
Users are prompted to enter details like names, card numbers, CVVs, and expiration dates, which are transmitted to a command-and-control (C2) server.

Post-submission, the app displays a deceptive confirmation page, simulating legitimacy with messages about email verifications within 48 hours, though all functionalities are inert.
Embedded within the second-stage code is a Firebase messaging service declared in the manifest, listening for remote commands that trigger the mining component.
This involves downloading an encrypted .so binary from one of three hardcoded URLs, which is then executed via Java’s ProcessBuilder as a standalone process with arguments mirroring XMRig’s command-line options, including mining pool specifications for Monero.
The RandomX algorithm, optimized for CPU efficiency, enables profitable mining on mobile devices, with privacy features of Monero obscuring transactions and aiding cybercriminals in laundering funds.
Logs from the decrypted binary confirm XMRig’s involvement, allowing silent background operation without user awareness.
This campaign builds on prior threats targeting India, as noted in McAfee’s previous reports, but innovates by integrating real-time phishing with dynamic payload loading and remote activation.
The dropper’s staged decryption complicates reverse engineering, while FCM-based triggers keep the malware dormant until commanded, reducing detection risks.
Phishing sites feature “Get App” buttons that deliver the APK, often promoted via SMS, WhatsApp, or social media.
Users should exclusively source apps from Google Play, scrutinize unsolicited links, and employ robust mobile security solutions to block such threats.
This blend of data theft and cryptojacking underscores evolving malware sophistication, demanding vigilant user practices and advanced defenses.
Indicators of Compromise (IOCs)
Type | Value | Description |
---|---|---|
APK | 2c1025c92925fec9c500e4bf7b4e9580f9342d44e21a34a44c1bce435353216c | SBI Credit Card |
APK | b01185e1fba96209c01f00728f6265414dfca58c92a66c3b4065a344f72768ce | ICICI Credit Card |
APK | 80c6435f859468e660a92fc44a2cd80c059c05801dae38b2478c5874429f12a0 | Axis Credit Card |
APK | 59c6a0431d25be7e952fcfb8bd00d3815d8b5341c4b4de54d8288149090dcd74 | IndusInd Credit Card |
APK | 40bae6f2f736fcf03efdbe6243ff28c524dba602492b0dbb5fd280910a87282d | Kotak Credit Card |
URL | https://www.sbi.mycardcare.in | Phishing Site |
URL | https://kotak.mycardcard.in | Phishing Site |
URL | https://axis.mycardcare.in | Phishing Site |
URL | https://indusind.mycardcare.in | Phishing Site |
URL | https://icici.mycardcare.in | Phishing Site |
Firebase | 469967176169 | FCM Account |
Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates!
Post Comment