SMSThief Targets Indian Banking Users


Posted November 14, 2022 by rachelkesavan

Every Ransomware variant has characteristics such as intrusion, evasion, obfuscation, and encryption technique. Suppose a ransomware code gets offered in an open-source model to invite fellow threat actors to modify it and create newer avatars.

 
In the recent past, we came across several Android malware incidents wherein Indian banking users were being deceived promising rewards for their cards. Recently, we came across a tweet that pointed to a Phishing URL which, on click, downloads an Android application, targeting users of another Indian bank.

Phishing URL is shown in Figure 1.

https://labs.k7computing.com/wp-content/uploads/2022/11/mod_Figure_1-1024x871.jpg

Figure 1: HDFC Credit Card Phishing URL
Clicking on the button, “Download application”, it downloads an APK, “HDFC_Credit_Card.apk” (packagename : com.credit.hdfccredit).

When installed HDFC_Credit_Card.apk takes the label “HDFC Credit Card” and the bank’s logo as shown in Figure 2.

https://labs.k7computing.com/wp-content/uploads/2022/11/mod_Figure_2-512x1024.png

Figure 2: “HDFC Credit Card” label of the application
This app collects user data like credit card details, email address, phone number, etc., along with the minimal required permissions (no other permissions requested/registered dynamically) to:

android.permission.RECEIVE_SMS

android.permission.READ_SMS

android.permission.SEND_SMS

Also, this app has registered a receiver in AndroidManifest.xml, “com.credit.hdfccredit.SmsRec” with the permission “android.permission.BROADCAST_SMS” and attribute “exported:true” that raises the suspicion that another linked malicious app could use this HDFC_Credit_Card.apk for data exfiltration as shown in Figure 3.

https://labs.k7computing.com/wp-content/uploads/2022/11/Figure_3-1024x93.png

Figure 3: Receiver registered with the permission
Let’s now begin the app analysis.

After installation when the user launches the app, it collects the information and saves in the shared preferences as shown in Figure 4.

https://labs.k7computing.com/wp-content/uploads/2022/11/Figure_4-1024x999.png

Figure 4: User information collected
Once the user feeds in the data, it displays a timer screen that encourages the user to “Redeem Point in Cash Or Voucher after time out” as shown in Figure 5.

https://labs.k7computing.com/wp-content/uploads/2022/11/Figure_5-512x1024.png

Figure 5: Timer Screen to redeem points
As aforementioned, this app’s registered receiver class, “com.credit.hdfccredit.SmsRec” is triggered whenever there is a broadcast for a new SMS received.

During the attempt of collecting the user information, the app confirms that it has the permission to “android.permission.RECEIVE_SMS”. Once confirmed it invokes the service “SmsProcessService” which in turn registers the “com.credit.hdfccredit.SmsRec” class again as shown in Figure 6 and Figure 7.

https://labs.k7computing.com/wp-content/uploads/2022/11/Figure_6.png

Figure 6: Initialising SmsProcessService from MainActivity class

https://labs.k7computing.com/wp-content/uploads/2022/11/Figure_7.png

Figure 7: SmsProcessService registering SmsRec class
Once registering the receiver “SmsRec” class is done (apart from the initial registration in AndroidManifest.xml), in the event of any new SMS received, the sms content including the phone number and message body is saved in the shared preferences as shown in Figure 8.

https://labs.k7computing.com/wp-content/uploads/2022/11/Figure_8-1024x490.png

Figure 8: Collecting data of a new SMS received by the user and the URL visited
As highlighted in the Figure 8, once the SMS content is successfully saved as per the defined data model, the app redirects the user to the link, “hxxp://updateyourcard.in/” which is the phishing page that we visited in the beginning.

This goes to show that Phishing links are still relevant as an infector vector and asusers we need to be vigilant before giving away any information online and cross-verify with the financial institution, if any bank related details are to be shared.

IoCs
Package Name: com.credit.hdfccredit

Hash: 4a4833977a2fb4196a7a14fae4bfb1fa

K7 Detection Name: Trojan ( 0001140e1 )
-- END ---
Share Facebook Twitter
Print Friendly and PDF DisclaimerReport Abuse
Contact Email [email protected]
Issued By Ragapriya
Phone 09150086709
Business Address K7 Computing Private Limited,
4th Floor, Tek Meadows,51, Rajiv Gandhi Salai (OMR), Sholinganallur, Chennai - 600119.
Country India
Categories Computers , Security , Software
Tags antivirus software , best antivirus for pc , free antivirus download , internet security
Last Updated November 14, 2022