Thursday, July 31, 2025

Android Banking Malware Masquerades as Authorities Companies to Assault Customers


Cyble Analysis and Intelligence Labs (CRIL) has uncovered a classy Android banking trojan dubbed RedHook, which disguises itself as reliable functions from Vietnamese authorities and monetary establishments to deceive customers.

This malware, first noticed within the wild round January 2025, exploits phishing web sites mimicking entities just like the State Financial institution of Vietnam, Sacombank, Central Energy Company, Site visitors Police of Vietnam, and even the Authorities of Vietnam.

Distributed through misleading domains comparable to sbvhn[.]com and hosted on AWS S3 buckets, RedHook tips customers into downloading malicious APKs that seem as official banking apps.

Discovery of RedHook Trojan

As soon as put in, it prompts victims to allow accessibility providers and overlay permissions, granting it intensive management over the system.

This mix of permissions permits the trojan to observe person actions silently, overlay faux interfaces, and bypass safety protocols, making it a potent software for credential theft and monetary fraud.

RedHook’s capabilities prolong past primary phishing, incorporating distant entry trojan (RAT) functionalities, keylogging, and display screen seize through Android’s MediaProjection API.

Phishing website distributing a malicious APK file

It establishes a persistent WebSocket connection to command-and-control (C2) servers like api9[.]iosgaxx423.xyz and skt9[.]iosgaxx423.xyz, enabling real-time communication and execution of over 30 instructions.

These instructions vary from gathering system info, SMS messages, and contacts to performing gestures like swipes, clicks, and textual content enter, in addition to putting in or uninstalling apps, capturing screenshots, and even rebooting the system.

The malware’s phishing workflow is meticulously designed: it begins with faux identification verification prompts requiring uploads of citizen ID photographs, adopted by requests for banking particulars, passwords, and two-step verification codes.

Keylogs, tagged with utility package deal names and lively class particulars, are exfiltrated to the C2, whereas steady display screen streaming through JPEG photos permits risk actors to remotely work together with the system.

Code artifacts, together with Chinese language-language strings in logs and uncovered screenshots from an open AWS S3 bucket lively since November 2024, level to a Chinese language-speaking developer or group behind RedHook.

Android Banking Malware
Information uncovered on open S3 bucket

This bucket revealed operational knowledge like faux templates, phishing interfaces, and proof linking to prior scams through the area mailisa[.]me, indicating an evolution from social engineering fraud to superior malware-driven assaults.

Broader Implications

Regardless of its superior options, RedHook maintains low detection charges on platforms like VirusTotal, underscoring its stealthy nature and the challenges in cellular risk landscapes. Evaluation exhibits it has contaminated over 500 units, with person IDs incrementing sequentially upon compromise.

The trojan abuses reliable APIs for protection evasion, comparable to masquerading as trusted apps and injecting inputs to imitate person interactions, aligning with MITRE ATT&CK methods like Phishing (T1660), Enter Injection (T1516), and Display Seize (T1513).

It collects protected knowledge, together with SMS (T1636.004) and contacts (T1636.003), exfiltrating through HTTP-based C2 channels (T1437.001). This allows systematic harvesting of delicate info for fraudulent transactions, usually with out sufferer consciousness.

The emergence of RedHook highlights the escalating sophistication of Android banking trojans in high-risk areas like Vietnam, mixing phishing, RAT, and keylogging for complete system management.

Cybersecurity consultants suggest downloading apps solely from official sources, scrutinizing permission requests, enabling two-factor authentication, and utilizing cellular safety options with real-time scanning.

Maintaining units up to date with safety patches is essential to mitigate vulnerabilities. Proactive risk intelligence, together with monitoring darkish internet actions, is crucial for early detection and response to such evolving cyber threats.

Indicators of Compromise (IOCs)

Indicators Indicator Kind Description
0ace439000c8c950330dd1694858f50b2800becc7154e137314ccbc5b1305f07 SHA256 RedHook
ebc4bed126c380cb37e7936b9557e96d41a38989616855bb95c9107ab075daa3 SHA256 RedHook
f33ebe44521abb954ec6b1c18efc567fe940ae8b7b495a302885ecefceba535b SHA256 RedHook
adsocket[.]e13falsz.xyz URL C&C server
api9[.]iosgaxx423.xyz URL C&C server
skt9[.]iosgaxx423.xyz Area WebSocket URLs
api5[.]jftxm.xyz Area WebSocket URLs
dzcdo3hl3vrfl.cloudfront[.]internet/Chinhphu.apk URL Pink Hook
nfe-bucketapk[.]s3.ap-southeast-1.amazonaws.com/SBV.apk URL Distribution URL
sbvhn[.]com/ URL Phishing URL

Discover this Information Fascinating! Comply with us on Google Information, LinkedIn, & X to Get Immediate Updates!

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

PHP Code Snippets Powered By : XYZScripts.com