Detecting SharkBot malware hiding in anti-virus applications on Google Play

Somehow, the SharkBot anti-virus application has been approved on the Google Play Store.

SharkBot banking malware has infiltrated the Google Play Store, the official Android app store, masquerading as anti-virus software with the ability to clean the system.

While this malicious app is not very popular, its presence on the Play Store shows that bad actors still find a way to bypass Google's automated defenses. Up to this point, this application is still available on the Google Play Store.

Picture 1 of Detecting SharkBot malware hiding in anti-virus applications on Google Play

The application contains malicious code SharkBot

Picture 2 of Detecting SharkBot malware hiding in anti-virus applications on Google Play

Application developer details

NCC Group researchers discovered the existence of SharkBot on the Google Play Store. Recently, NCC Group published a detailed technical analysis article about this malware.

What can SharkBot do?

SharkBot malware was first discovered by Cleafy in October 2021. Its most important feature, which sets it apart from other banking trojans, is money transfer via Automated Funds Transfer System (ATS). This is done by it by simulating taps, clicks and button presses on compromised devices.

The NCC says the money transfer feature is still available in the latest version of SharkBot but is only used in case of advanced attacks.

Currently, the four main functions in the latest version of SharkBot are:

  1. Injections (overley attack): SharkBot can steal login information by displaying web content (WebView) with a phishing login page as soon as it detects that the official banking application is open.
  2. Keylogging: SharkBot can steal credentials by logging accessibility events (related to text field changes and buttons being clicked) and sending these logs to a command and control server (C2).
  3. Block SMS: SharkBot can block/hide SMS messages (steal OTP codes without the user's knowledge).
  4. Remote Control/ATS: SharkBot can take full control of Android device and control it remotely (via Accessibility Services).

To do the above, SharkBot abuses the Accessibility privilege on Android and then grants it more permissions if needed.

In this way, SharkBot can detect when the user opens the banking application then execute the appropriate website injection and steal the user's information.

In addition, SharkBot can also receive commands from the C2 server to perform other actions as follows:

  1. Send SMS to a phone number.
  2. Change SMS manager.
  3. Download files from a specified URL.
  4. Get the updated configuration file.
  5. Uninstall the app from the device.
  6. Turn off battery optimization.
  7. Display overlay for phishing.
  8. Activate or deactivate the ATS.
  9. Closes a specific application (such as an anti-virus tool) when the user tries to open it.

Reply to notifications

One of the notable differences between SharkBot and other Android banking trojans is the use of relatively new components to take advantage of the "Direct reply" feature for notifications.

SharkBot can intercept new messages and respond to them with incoming messages directly from the C2 server.

Picture 3 of Detecting SharkBot malware hiding in anti-virus applications on Google Play

The source code of the auto-reply to notifications feature

NCC notes that SharkBot uses this feature to drop feature-rich payloads onto the compromised device via a shortened Bit.ly URL.

Initially, the rogue antivirus will only contain a reduced version of SharkBot to reduce the risk of detection and bypass the automatic defenses of the Google Play Store. Then, through the "Direct reply" feature, the official version of SharkBot with full features including ATS will be downloaded and installed.

Picture 4 of Detecting SharkBot malware hiding in anti-virus applications on Google Play

Decrypt the additional malicious download command sent from the C2 server

SharkBot's C2 server is based on a DGA (domain generation algorithm) so it becomes much more difficult to detect and block command-level domains for SharkBot.

To protect yourself against dangerous trojans like SharkBot, you should never completely trust apps on the Google Play Store. Install as few apps as possible on your device. In other words, only install applications that you feel are necessary for life and work.

Update 09 March 2022
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile