Library
My library

+ Add to library

Contact us
24/7 Tech support | Rules regarding submitting

Send a message

Your tickets

Profile

Android.BankBot.29.origin

Added to the Dr.Web virus database: 2015-03-18

Virus description added:

A banking Trojan that steals authentication information used by the clients of some South Korean financial organizations. It is distributed under the guise of a Google Play application.

screen

Once launched, Android.BankBot.29.origin attempts to acquire administrator privileges, while hiding the appropriate system prompt behind its own dialog box that asks the victim to install an allegedly new version of the program. By giving consent, the user allows the Trojan to acquire administrator privileges without knowing it.

screen

Android.BankBot.29.origin steals authentication information from the following online banking applications used by South Korean financial organizations:

  • nh.smart,
  • com.shinhan.sbanking,
  • com.epost.psf.sdsi,
  • com.wooribank.pib.smart,
  • com.hanabank.ebk.channel.android.hananbank,
  • com.kbstar.kbbank,
  • com.kftc.dgbsmb,
  • com.keb.android.mbank,
  • com.smg.spbs,
  • com.cu.sb,
  • com.kftc.citismb,
  • com.ibk.neobanking,
  • com.areo.bs,
  • com.knb.psb,
  • com.kftc.jbsmb,
  • com.kftc.jejusmb,
  • com.kftc.kjbsmb.

Once one of these programs is launched, the malware replaces its interface with a fake one that prompts the user to enter all the confidential information necessary to control their bank account. The divulged data is forwarded to cybercriminals.

Under the pretext of subscribing the user to a banking service, Android.BankBot.29.origin attempts to install the malicious program Android.Banker.32.origin that is stored in the Trojan’s body.

Curing recommendations


Android

  1. If the mobile device is operating normally, download and install Dr.Web for Android Light. Run a full system scan and follow recommendations to neutralize the detected threats.
  2. If the mobile device has been locked by Android.Locker ransomware (the message on the screen tells you that you have broken some law or demands a set ransom amount; or you will see some other announcement that prevents you from using the handheld normally), do the following:
    • Load your smartphone or tablet in the safe mode (depending on the operating system version and specifications of the particular mobile device involved, this procedure can be performed in various ways; seek clarification from the user guide that was shipped with the device, or contact its manufacturer);
    • Once you have activated safe mode, install the Dr.Web для Android Light onto the infected handheld and run a full scan of the system; follow the steps recommended for neutralizing the threats that have been detected;
    • Switch off your device and turn it on as normal.

Find out more about Dr.Web for Android