マイライブラリ
マイライブラリ

+ マイライブラリに追加

電話

お問い合わせ履歴

電話(英語)

+7 (495) 789-45-86

Profile

Android.Banker.26.origin

Added to the Dr.Web virus database: 2015-03-18

Virus description added:

Steals confidential information from customers of Kookmin Bank in South Korea. Spread in the guise of a legitimate banking application, it uses the same title and icon.

screen

After its successful launch, it demonstrates a fake notification informing the user that the mobile device is protected by the anti-virus AhnLab V3 Mobile Plus—the legitimate banking application behaves exactly this way and checks if the handheld is protected.

screen screen

The malicious program checks if NPKI-certificates are present in the memory card's root folder and if found, places them in zip-archives, which are saved next to the original filess, and then displays information about the found files.

screen

When the user taps on an item on the list, Android.Banker.26.origin prompts them to enter a password for the corresponding certificate.

screen

The malware uses the following method to verify entered passwords: if the password is longer than or equal to six characters, it informs the victim about an error and prompts them to re-enter the password, while temporarily storing the previous value (if the input value is less than six characters, it will not be saved). If the re-entered value coincides with the previous one and is longer than six characters Android.Banker.26.origin proceeds to the next step of collecting confidential information. In particular, the malicious program prompts the user for the following credentials:

  • name;
  • id_first – id_second;
  • account;
  • account password.

If the user selects the last option—enter a password—the Trojan displays a separate field that accepts numeric values of no fewer than four characters.

screen

Once the required data is entered, Android.Banker.26.origin invites its victim to input their credit card number.

screen

All the confidential information collected by the malware, including certificates and the IMEI, is sent to a remote server located at http://xxx.xx.177.105:80/v/ . This information is transmitted in JSON format and arranged as follows:

{:"clientId" :
"accountName" :
"accountNo" :
"accountPsw" :
"bkType" :
"certPath" :
"card" :
"transPsw" :
"certPsw" :
"personIdFirst" :
"personIdSecond" :
"fileName" :}

Curing recommendations


Android

  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android