<span id="hs_cos_wrapper_post_body" class="hs_cos_wrapper hs_cos_wrapper_meta_field hs_cos_wrapper_type_rich_text" style="" data-hs-cos-general-type="meta_field" data-hs-cos-type="rich_text" ><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/bankbot.jpg" alt="bankbot.jpg" style="display: block; margin-left: auto; margin-right: auto;" width="448" height="269"> <p>BankBot is a malware targeting Android OS, and has appeared in the Google Play Store in different forms, often impersonating well-known application icons or names.<!--more-->The predecessor of this malware, <strong>BankBotAlpha</strong>, was first published back on December 19th, 2016, in a Russian forum as a new initiative to build an Android banker from scratch. The complete code for this malware and its command and control (C&amp;C) panel in PHP is available online. As of April 2017, there are 141 variants as reported by <a href="http://blog.fortinet.com/2017/04/26/bankbot-the-prequel">Fortinet</a> in their analysis of this malware. All variants use the internal name <strong>com.example.livemusay.myapplication</strong> with the known names and icons used by the malware being:</p> <table style="width: 100%;"> <tbody> <tr> <td style="width: 16.6%; text-align: center;"><strong>MMS Flash Player 11</strong></td> <td style="width: 16.6%; text-align: center;"><strong>Adoby Flash Player<br>(with a ‘y’)</strong></td> <td style="width: 16.6%; text-align: center;"><strong>Play Market Update</strong></td> <td style="width: 16.6%; text-align: center;"><strong>Game Launcher</strong></td> <td style="width: 16.6%; text-align: center;"><strong>My Application</strong></td> <td style="width: 16.6%; text-align: center;"><strong>Kate Mobile</strong></td> </tr> <tr> <td style="width: 16.6%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot%28Alpha%29%20Android/MMS%20Flash.png" alt="MMS Flash Icon" style="width: 100%; display: block; margin-left: auto; margin-right: auto;" title="MMS Flash Icon" caption="false" data-constrained="true"></td> <td style="width: 16.6%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/Adoby%20Flash.png" alt="Adoby Flash Icon" title="Adoby Flash Icon" caption="false" data-constrained="true" style="width: 100%; display: block; margin-left: auto; margin-right: auto;"></td> <td style="width: 16.6%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/Play%20Market%20Update.png" alt="Play Market Update Icon" title="Play Market Update Icon" caption="false" data-constrained="true" style="width: 100%; display: block; margin-left: auto; margin-right: auto;"></td> <td style="width: 16.6%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/Game%20Launcher.png" alt="Game Launcher Icon" title="Game Launcher Icon" caption="false" data-constrained="true" style="width: 100%; display: block; margin-left: auto; margin-right: auto;"></td> <td style="width: 16.6%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/My%20Application.png" alt="My Application Icon" title="My Application Icon" caption="false" data-constrained="true" style="width: 100%; display: block; margin-left: auto; margin-right: auto;"></td> <td style="width: 16.6%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/Kate%20Mobile.png" alt="Kate Mobile Icon" title="Kate Mobile Icon" caption="false" data-constrained="true" style="width: 100%; display: block; margin-left: auto; margin-right: auto;"></td> </tr> </tbody> </table> <p style="text-align: left;">Admin privileges are gained via system prompt to user for Application Permissions. These are used to collect information like IMEI, bank applications present on the device, OS version, presence of root, and other sensitive functions.It is claimed that injection works in versions of Android up to 6.0 (Marshmallow).</p> <p>When an infected device runs a <a href="https://www.threatfabric.com/blogs/banking_malware_in_google_play_targeting_many_new_apps">targeted banking application</a>, the malware takes control and replaces the actual screen of the application with their own phishing page which imitates the original application. Cautious users may be able to determine the difference, but many users will not be able to. The example below shows an example Qiwi Wallet phishing screen vs. an actual Qiwi wallet screen.</p> <table style="width: 100%;"> <tbody> <tr> <td style="text-align: left; width: 50%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/QiwiWallet800x500.png" alt="Native QiwiWallet Example" style="width: 100%; display: block; margin-left: auto; margin-right: auto;" title="Native QiwiWallet Example" caption="false" data-constrained="true"></td> <td style="width: 50%;"><img src="https://info.threatstop.com/hubfs/Article%20Internal%20Images/BankBot(Alpha)%20Android/BankBotAlpha022web.png" alt="BankBotAlpha022web.png" style="width: 100%; display: block; margin-left: auto; margin-right: auto;"></td> </tr> <tr> <td style="width: 50%; text-align: center;"><em>Unaltered Qiwi Wallet Screen</em></td> <td style="width: 50%; text-align: center;"><em>BankBot Phishing Screen</em></td> </tr> </tbody> </table> <p>Once the user inputs their credentials, their data is sent to the C&amp;C, where it is saved in a database. All the data is sent to the C&amp;C server through SMS and HTTP protocol.</p> <p>From a general point of view, <strong>BankBot</strong> and <strong>BankBotAlpha</strong> are very similar in their action and in code, still the difference between them is that BankBot packs more features than the alpha version, with AV detection, a higher number of banking apps controlled, messaging applications monitored, sometimes even obfuscation.</p> <p>Enabling the <strong>TSCritical </strong>targets in your user policy will add protection against <a href="https://blog.threatstop.com/bi-weekly-security-update-6/9/2017">Bankbot</a> and <strong>BankBotAlpha</strong> while devices are connected to your ThreatSTOP DNS and IP Firewall Services protected network. If you do not have a ThreatSTOP account&nbsp; for a free trial.</p> <p>If you do have a ThreatSTOP account, instructions to add targets to <a href="https://docs.threatstop.com/portal_policies.html" target="_blank" rel="noopener">DNS</a> or <a href="https://docs.threatstop.com/portal_policies.html" target="_blank" rel="noopener">IP</a> Firewall policies are available on the ThreatSTOP Documentation Hub, or contact our&nbsp; team.</p></span>