Malware descriptions

The banker that encrypted files

Many mobile bankers can block a device in order to extort money from its user. But we have discovered a modification of the mobile banking Trojan Trojan-Banker.AndroidOS.Faketoken that went even further – it can encrypt user data. In addition to that, this modification is attacking more than 2,000 financial apps around the world.

We have managed to detect several thousand Faketoken installation packages capable of encrypting data, the earliest of which dates back to July 2016. According to our information, the number of this banker’s victims exceeds 16,000 users in 27 countries, with most located in Russia, Ukraine, Germany and Thailand.

Trojan-Banker.AndroidOS.Faketoken is distributed under the guise of various programs and games, often imitating Adobe Flash Player.

Preparing the groundwork

The Trojan is capable of interacting with protection mechanisms in the operating system. For example, it requests rights to overlay other apps or the right to be a default SMS application. This allows Faketoken to steal user data even in the latest versions of Android.

Once the Trojan becomes active, it requests administrator rights. If the user denies the request, Faketoken repeatedly refreshes the window asking for these rights, which leaves the victim with little choice.

faketoken_eng_1

The Trojan imitating “Yandex.Navigator” to request administrator rights

Once it has received administrator rights, Faketoken starts requesting the necessary permissions: to access the user’s text messages, files and contacts, to send text messages and make calls. These requests will also be repeatedly displayed until the user agrees to provide access.

The Trojan then requests the right to display its windows on top of other applications. This is necessary to block the device and steal user data by displaying phishing pages.

The banker that encrypted files

The Trojan requesting the right to display its windows on top of other applications

The final request at the preparatory stage is for the right to be the default SMS application – this allows Faketoken to covertly steal text messages on the latest versions of Android. The Trojan integrates the options necessary for the user to work with SMS. However, on some Android devices and versions when the user attempts to send an SMS via Faketoken it returns an error. As a result, the user cannot send SMS messages until they manually change the SMS application. The Trojan doesn’t like that, and will start requesting the right again.

Manipulations with application shortcuts can also be added to the preparatory stage. After launching, Faketoken starts downloading an archive containing file icons of several applications (the version being analyzed here has eight) related to social networks, instant messengers and browsers. Then it tries to delete the previous shortcuts to these applications and create new ones.

The banker that encrypted files

On the test devices the Trojan failed to remove the previous shortcuts which eventually led to the appearance of duplicates

It is not clear why it does this because the shortcuts created by Faketoken lead to the original applications.

Data theft

Once the shortcuts are installed, the next stage of the Trojan’s work begins – the theft of user data. Faketoken downloads a database from the server containing phrases in 77 languages for different device localizations.

The banker that encrypted files

Screenshot of the database with phrases in different languages

Using these or other phrases from the database, depending on the operating system language, the Trojan will show the user various phishing messages.

faketoken_eng_5

Examples of phishing messages displayed by the Trojan

If the user clicks on the message, the Trojan opens a phishing page designed to steal passwords from Gmail accounts. In addition to that, the Trojan overlays the original Gmail application with this page for the same purpose – to steal the password.

faketoken_eng_6

Phishing page imitating the login page of the Gmail mail service

However, the Trojan doesn’t limit itself to Gmail. Like most modern mobile Trojans, Faketoken overlays the original Google Play app with its phishing window to steal the victim’s bank card details.

faketoken_eng_7

Phishing page used by the Trojan to steal credit card details

The Trojan can also get the list of applications for attack and an HTML template page to generate phishing pages for the attacked applications from the C&C server. In our case, Faketoken received a list of 2,249 financial applications from around the world.

faketoken_eng_8 faketoken_eng_9

Example of the Trojan’s phishing pages designed for different applications

It should be noted that the Trojan integrates functionality enabling it to call some of the methods from the HTML page it received from the C&C server. As a result, in addition to the phishing functionality, the pages described above can get certain information about the device including the address of the Gmail account and, even worse, reset the device to factory settings.

What’s more, Faketoken can perform the following actions upon command from the C&C server:

  • Change masks to intercept incoming text messages;
  • Send text messages to a specified number with a specified text;
  • Send text messages with a specified text to a specified list of recipients;
  • Send a specified text message to all contacts;
  • Upload all text messages from the device to the malicious server;
  • Upload all the contacts from the device to the malicious server;
  • Upload the list of installed applications to the malicious server;
  • Reset the device to factory settings;
  • Make a call to a specified number;
  • Download a file to the device following a specified link;
  • Remove specified applications;
  • Create a notification on the phone to open a specified page or run a specified application;
  • Start overlaying specified applications with a specified phishing window;
  • Open a specified link in its own window;
  • Run an application;
  • Block the device in order to extort money for unblocking it. This command may include an option indicating the need to encrypt files.

Ransomware banker

As mentioned above, the ransomware functionality in mobile banking Trojans is now commonplace, after being pioneered by Svpeng in early 2014. However, the new Faketoken version can not only extort money by blocking the screen but also by encrypting user files.

faketoken_eng_10

Screenshot of the Trojan code that renames and then encrypts files.

Once the relevant command is received, the Trojan compiles a list of files located on the device (external memory, memory card) corresponding to the given list of 89 extensions and encrypts them. The AES symmetric encryption algorithm is used, which leaves the user with a chance of decrypting files without paying a ransom. The Trojan receives the encryption key and the initialization vector from the C&C server. The encrypted files include both media files (pictures, music, videos) and documents. The Trojan changes the extension of the encrypted files to .cat.

In conclusion, we would like to note that file encryption is not that popular with the developers of mobile ransomware (at least currently), which may be because most files stored on a mobile device are copied to the cloud. In other words, demanding a ransom in return for decrypting them is pointless.

MD5

7faec9e6e630478ea5faa4a35f999c9f
64d59186e4f7af1bf06b3321fed00712

The banker that encrypted files

Your email address will not be published. Required fields are marked *

 

  1. tom

    Do yo have by any chance a list of the affected entities? if so, could you mail it to me?

Reports

APT trends report Q3 2024

The report features the most significant developments relating to APT groups in Q3 2024, including hacktivist activity, new APT tools and campaigns.

BlindEagle flying high in Latin America

Kaspersky shares insights into the activity and TTPs of the BlindEagle APT, which targets organizations and individuals in Colombia, Ecuador, Chile, Panama and other Latin American countries.

Subscribe to our weekly e-mails

The hottest research right in your inbox