Open
Conversation
Collaborator
Author
🔗 Additional ContextOriginal Blog Post: https://securelist.com/beatbanker-miner-and-banker/119121/ Content Categories: Based on the analysis, this content was categorized under "Mobile Pentesting -> Android Applications Pentesting (new subsections on InMemoryDexClassLoader/fileless DEX, native .so staging/JNI loaders, Accessibility abuse for overlay + ACTION_SET_TEXT, and persistence via foreground service/MediaPlayer); optionally cross-link from Reversing/Malware analysis for in-memory DEX extraction with Frida". Repository Maintenance:
Review Notes:
Bot Version: HackTricks News Bot v1.0 |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Title/Scope
Kaspersky analyzes BeatBanker, a multi-stage Android malware campaign targeting Brazil. It spreads mainly via phishing through a website impersonating the Google Play Store. The chain delivers (a) a packed loader with native ELF staging + in-memory DEX execution, (b) an ARM XMRig 6.17.0 Monero miner, and (c) either a banking Trojan focused on USDT transaction hijacking (older wave) or the BTMOB RAT (newer wave)...
🔧 Technical Details
Native ELF staging to hide the real DEX: Package an Android dropper where a native library (e.g.,
lib*.so) decrypts an embedded encrypted ELF and writes it as a second-stage loader (l.so). The second stage continues execution via JNI and eventually loads the actual malicious DEX, reducing static visibility of the payload in the original APK.XOR “stack strings” to conceal Java method targets: Store Java method names as XOR-encrypted stack strings inside the native loader; reconstruct them at runtime to directly invoke Java methods without obvious symbol references, complicating static analysis and string-based detections.
Fileless DEX execution for AV evasion: Use
dalvik.system.InMemoryDexClassLoaderto load a DEX payload straight from memory so no DEX file is written to the filesystem. During analysis, dynamic instrumentation (e.g., Frida: https://frida.re/) can hook class loading / buffers to recover th...🤖 Agent Actions
Summary:
Added a new “Android malware tradecraft” section in
src/mobile-pentesting/android-app-pentesting/README.mdcovering native staging + fileless DEX, anti-analysis kill-switch, MediaPlayer foreground-service persistence, Accessibility overlay +ACTION_SET_TEXThijacking, FCM C2 gating, and filename-derived decryption keys.Appended the BeatBanker blog to the References section in the same file.
Files modified:
src/mobile-pentesting/android-app-pentesting/README.mdTests:
If you want this split into a dedicated page later, I can propose a single-file refactor that preserves the “one file” constraint.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.