Smartphone users try to be vigilant about the apps which they install on their device and are very careful about the data that is being accessed and shared with the outside world. However, the threat actors try to trick users into installing their malicious application by masquerading as a legitimate application that is popular and used by the majority of smartphone users. 

Recently, we analysed one such application that disguises itself as a popular logistics app “DHL”, but is actually Aberebot; a Banking Trojan that targets banking users in India and in many other countries. 

Upon further investigation, this application was found to be downloaded from the phishing URL, “hxxp[://dhl-getnextalert[.duckdns[.]org/dl/DHL.apk” and the technical analysis is as follows. 

As mentioned earlier, the app disguised itself as DHL.apk and after installation, the app name reads “DHL Express” as shown in Figure 1. 

Figure 1: Malicious app disguised as DHL

This app requests for the permissions as shown in Figure 2. 

Figure 2: Permissions requested by the Trojan

REQUEST_IGNORE_BATTERY_OPTIMIZATIONS: to conceal its presence by not appearing in the notifications bar 

RECEIVE_SMS: to intercept incoming messages and retrieve confidential text messages

The malware catalogues a list of installed packages on the victim’s device and looks for popular social networking apps such as WhatsApp, Snapchat, Telegram and Instagram as shown in Figure 3. 

Figure 3: Social networking apps targeted by Aberebot

Along with the networking apps, this malware also targets banking apps. It can inject values into the banking apps’ text fields, when any one of the targeted apps are accessed, it displays appropriate and well-crafted phishing pages and collects the data entered by the user. Deception feasibility is checked by collecting the device location and looking it up on a custom list of target countries which includes India, as shown in Figure 4 & 5 respectively.

Figure 4: List of banks targeted in India
Figure 5: Code showing countries affected by this Aberebot version 

Adding to its cryptocurrency targets,this version has new entries like Payoneer, Paypal, Stripe, Perfect Money, Qiwi, etc., to its payment platform target list as shown in Figure 6.

Figure 6: List of payment platforms targeted

From the list of installed applications collected from the victim’s device, this malware looks for one or more of the targeted apps and based on the targets identified, it proceeds with its malicious behaviour. 

It abuses the notification service and requests users for the notification access to read the contents of the messages received or generally any notification and verifies if it is from any one of the targeted applications as shown in Figure 7.

Figure 7: Notification access request to the user

Once the user falls prey and grants the notification access, Aberebot now reads the contents of all the notifications posted and stores it in a file named “notifications.txt” as shown in Figure 8.

Figure 8: Notifications saved in a text file, “notifications.txt” 

It specially looks for OTP messages and forwards to its C2, which is a Telegram bot as shown in Figure 9.

Figure 9: OTP collected and forwarded to C2

This malware also carries a list of C2 commands within the apk as shown in Figure 10. 

Figure 10. List of C2 commands

Monetary benefits being the primary target of the threat actors behind this banking Trojan, it is also capable of many other malicious behaviours like stealing contact details, SMS, call logs, etc., and forwarding them to the C2. In spite of the awareness and the vigilance for fraudulent apps, still we could see such banking Trojans spreading around. We recommend users to stay safe in terms of their device health by using a reputed and powerful security product like K7 Mobile Security. 

Indicators of Compromise (IOCs)

MD5: 6A729B0AC0FD14C2C5EE97018E61705E

K7 Detection Name: Spyware (005817811)

Package Name: com.ru.dhl 

Like what you're reading? Subscribe to our top stories.

If you want to subscribe to our monthly newsletter, please submit the form below.

    0 replies on “Indian Banking Users affected by Aberebot”