Skip to content
REPORT

Mobile banking Trojans abuse Android BinaryXML format to avoid detection

Android BinaryXML format is heavily abused by malware authors

According to ThreatFabric's analysts, there has been a rise in numbers for mobile banking Trojans abusing a flaw in the Android source code. It leverages the way Android processes application files. This allows malware authors to install applications with malformed contents on Android devices.

The inconsistency is present in all Android OS versions including the most up-to-date ones. Insufficient checks in the validation of the file format result in invalid applications treated by the operating system as valid, while other third-party validators and parsers treat it as invalid (corrupted).

Several malware actors have been seen abusing this flaw. Malicious applications are successfully installed and running on victim's devices. This inconsistency is being exploited by Anatsa in its most recent campaign hitting UK and Germany, which was reported by ThreatFabric here. Besides Anatsa, multiple malware families like Hydra, Cerberus, and Alien use this trick to bypass detection by security products.

For more information we have a full detailed report available for you here.

 

Obfuscated Samples

MALWARE FAMILY

ISSUE EXPLOITED

SHA256

Hydra

StringPool corruption

409558f7cbdc9bd49328438e11964cdf58f5147ea3f195cd156e9c7c4a6f5438

Anatsa

StringPool corruption

991c0d17eea2c235c26b663a8b9e04555bf3d82c400e128a5819d1375ca5cac9

Hydra

StringPool corruption + attributeSize increase

224dde5d1f9fde6a239205b9c5e44f207f4a8abaf7df8a0e91c3231ef022064e



View Report

Start your free trial now

Free Trial