XERXES ANDROID BANKING BOTNET 2023
This largely grow to XERXES ANDROID BANKING BOTNET be acknowledged for the surge in big and small-scale ransomware attacks, which skyrocketed indiscriminately across industries, our analysts have also witnessed an increase in the gives of Android-based totally far flung get entry to Trojans/gear (RATs).
These criminally-masterminded virtual XERXES ANDROID BANKING BOTNET:
are used no longer handiest to extract statistics from and spy on Android mobile devices, however also are regularly the attack vector through which most of the ransomware versions which have been deployed in recent assaults have been added

.
Android-precise malware, especially if deployed alongside a “crypter,” is one in every of many credible threats to commercial and authorities corporations that make use of devices with the Android operating gadget. DarkOwl discovered that chance actors are efficiently deploying cell ransomware along with “Sauron Locker” and RATs together with AhMyth, disguised as a COVID-19 testing app, designed to ‘exfiltrate’ or extract the contents of the cellular tool with out information of the consumer, and in addition ‘extort’ the consumer locking the tool until cryptocurrency ransom is paid.
Android Malware on the Darknet A conscious goal XERXES ANDROID BANKING BOTNET:
As mentioned in previous reporting, a threat actor that plans offensive operations in opposition to a completely unique variety of targets will utilize some thing cyber weapons and gear which are to be had in their arsenal to destabilize and/or damage their objectives. objectives ranging from regular citizens, government officers, healthcare workers, legal professionals, and so forth. The open-source nature of the Android OS gives an amazing starting point for direct software program exploration and remaining exploitation of vulnerabilities inside the generation. This opportunity is not distinct to kingdom state actors and their proxies, however newbie cybercrime enthusiasts who’re getting into the underground malware development network are perfectly capable with the right motivation consisting of political time table or social motion to make use of such exploits in their stock of cyber equipment XERXES ANDROID BANKING BOTNET.
The a success implementation of distributing malware and exploiting tool vulnerabilities lies inside the obscuration and obfuscation methods employed. Deep internet and darknet discussion board customers additionally have the choice to buy DNS website hosting offerings for nameless port forwarding for their malware, VPNs, RDPs, faraway administration gear, ransomware, in addition to the particular crypter had to make the malware absolutely undetected or undetectable XERXES ANDROID BANKING BOTNET.
RATs at the darknet: common variations for provide
considering the fact that 2019, one of the maximum broadly discussed RATs has been is Cerberus, particularly in the context of focused on banking packages supported by means of the Google Play shop and Android cellular running systems XERXES ANDROID BANKING BOTNET.
The Cerberus RAT is able to deep surveillance inside the victim’s tool, interfering with the encrypted communications the cellphone has with its apps, and outside. An update to the RAT appeared in 2020 (v2) that has additional security-evasion functionalities, which include stealing two-step authentication (2FA) codes from apps like Google Authenticator.
basically, the XERXES ANDROID BANKING BOTNET is able to intercepting and recording a victim’s cellular telephone’s liberate sample or PIN, Google Authenticator codes, and intercepting SMS messages necessary to carry out a two-step authentication. further, this malware can embed itself between the sufferer and their mobile banking utility sitting and ready to extract any and all of the necessary data to perform financial institution fraud.
discern 1: In early October 2020, a Telegram user “blutheCA” posted a link to the Cerberus V2 supply code on the IndianAnons supergroup channel. (source – DarkOwl vision)
determine 1: In early October 2020, a Telegram person “blutheCA” published a link to the Cerberus V2 supply code at the IndianAnons supergroup channel. (source – DarkOwl imaginative and prescient)

The developers of Cerberus decided to get out of the XERXES ANDROID BANKING BOTNET:
fraud commercial enterprise, apparently because of internal organization conflicts and subsequent fracture, and the main developer supplied their complete operation, including the source code and C2 community, for auction. regrettably, no person changed into interested by taking over their criminal operations and the builders as an alternative released the source code of the Cerberus malware into the wild. The auction changed into advertised on popular darknet malware discussion board, take advantage of, with a beginning price of $25,000 USD and advertised month-to-month income of $10,000 USD.
The builders stated they have been which include “the source code of the apk, the supply code of the module, the supply code of the admin panel, their servers, the patron base with an active license, the touch list of customers, the contact list of folks who wanted to purchase the product, and numerous XERXES ANDROID BANKING BOTNET additional facts.”
different customers on the discussion board advised that Google Play launched a protection replace that is able to detecting Cerberus’s important module signature and this RAT turned into not possible without software changes XERXES ANDROID BANKING BOTNET.
ALIEN of XERXES ANDROID BANKING BOTNET:
within weeks of the Cerberus supply code leaks, a fork of the initial version of Cerberus (v1) called Alien surfaced on the market on the darknet. similarly to all the primary talents that Cerberus furnished, Alien also protected a XERXES ANDROID BANKING BOTNET , device software installs, removals, and provider start and prevent, 2FA authenticator stealer, and tool notification sniffer. The Alien RAT successfully installs and leverages the economic TeamViewer application in its operation at the victim’s cell tool providing the risk actors full far flung control and commentary of the device and its proprietor’s behaviors. (supply)
an established user of the darknet forum, make the most, the usage of the pseudonym “megabyte” first offered a 3-month license to use the Alien Android RAT on August 14, 2020 for $four,500 USD.
over the last three years is every other malicious Android RAT that has been actively traded and mentioned at the darknet. Its repositories on github.com have been updated as lately as 3 months in the past. The RAT includes an electron-framework based totally server-aspect computing device application and the APK installers for the client or sufferer’s Android tool. The developer is active on Twitter under the cope with and states their region is XERXES ANDROID BANKING BOTNET.
The XERXES ANDROID BANKING BOTNET RAT functions:
•A document manager allowing the danger actor to view the contents of the victim’s device which includes firmware
•get entry to to sufferer tool’s browser records, cookies and net surfing records
•remote access to the victim’s device microphone and camera
•faraway access to all tool call logs
•SMS access – allows the risk actor to no longer best study but additionally ship SMS textual content messages from the sufferer’s device
•GPS area facts – allows for the chance actor to music the geographical place of the sufferer XERXES ANDROID BANKING BOTNET.
Parent three: advertisement for Rogue RAT (source: DarkOwl imaginative and prescient) XERXES ANDROID BANKING BOTNET:
parent 3: commercial for Rogue RAT (source: DarkOwl imaginative and prescient)
in advance this yr, open source reporting indicated that the builders of the Rogue XERXES ANDROID BANKING BOTNET were circulating the malware across darknet boards for lease for as little as $29 USD in keeping with calendar month and presenting discounts including $45 for 3 months and lifelong memberships. consistent with researchers, the Rogue RAT exploits Google’s Firebase development platform to conceal its malevolence and Android’s Accessibility services to pass restrictions on tracking user moves and registers its personal notification provider to view such messages at the inflamed tool; an exploitation technique determined with different Android malware lines.
the vendor of the RAT, called “Triangulum” released model 6.2 of the malware on deep internet boards lower back in April 2020, and its supply code emerged too, revealing that the Rogue RAT does no longer appear to be a completely unique malware codebase, but as an alternative an replace to an earlier version referred to as DarkShades. Analysts at ThreatFabric have these days located a new Android banking Trojan they’re calling “XERXES ANDROID BANKING BOTNET.”
After their evaluation, they decided it to be primarily based on the supply code of Xerxes, another banking malware that is a descendant of LokiBot. whilst BlackRock starts offevolved, it’s going to disguise its icon from the app drawer after which ask the sufferer to grant it Accessibility provider privileges on the tool. To appearance convincing, the app disguises itself as a Google replace. If the sufferer permits the app Accessibility Privileges, BlackRock begins granting itself other privileges wished for the bot to fully function. There are a number of instructions that bots can obtain, consisting of XERXES ANDROID BANKING BOTNET
Sending or flooding SMS messages
Sending SMS messages to a Command and manage server (C2)
putting itself because the default SMS supervisor
Run every other app
begin/stop key logging
Sending notifications to XERXES ANDROID BANKING BOTNET.

Administrative profile to the tool XERXES ANDROID BANKING BOTNET.
even as Xerxes and LokiBot were strictly banking Trojans, BlackRock appears to have accelerated its attain to goal other packages that can ask customers for fee information as properly. ThreatFabric has observed 337 precise packages being centered with standard card grabbing overlays to trick sufferers into giving away credit card statistics.
click right here to subscribe to chance Watch XERXES ANDROID BANKING BOTNET
ANALYST NOTES
Analyst Notes: constantly use the authentic Google Play store while putting in apps for an Android tool. at the same time as no strategies are ideal, Google has many automated and guide efforts in vicinity to trap malicious activity on their store. earlier than installing an utility, additionally verify that the name of the publisher is a business enterprise or person anticipated to have possession of the app.
even as 2020 has largely come to be known for the surge in massive and small-scale ransomware assaults, which skyrocketed indiscriminately across industries, our analysts have additionally witnessed an growth in the offers of Android-based far off get right of entry to Trojans/equipment (RATs) XERXES ANDROID BANKING BOTNET.
those criminally-masterminded virtual weapons are used now not most effective to extract records from and undercover agent on Android mobile gadgets, however also are regularly the attack vector through which a number of the ransomware editions that have been deployed in latest attacks were introduced XERXES ANDROID BANKING BOTNET.
Android-unique malware, in particular if deployed along a “crypter,” is one in every of many credible threats to industrial and government groups that utilize gadgets with the Android operating gadget. DarkOwl located that risk actors are effectively deploying cell ransomware together with “Sauron Locker” and RATs consisting of AhMyth, disguised as a COVID-19 trying out app, designed to ‘exfiltrate’ or extract the contents of the cell tool without expertise of the person, and similarly ‘extort’ the consumer locking the device till cryptocurrency ransom is paid.
Android Malware on the Darknet: A aware intention XERXES ANDROID BANKING BOTNET
As mentioned in preceding reporting, a risk actor that plans offensive operations towards a completely unique range of objectives will utilize some thing cyber guns and gear which might be available in their arsenal to destabilize and/or harm their targets. objectives ranging from everyday residents, authorities officials, healthcare workers, legal professionals, and so on. The open-source nature of the Android OS offers an splendid start line for direct software exploration and closing exploitation of vulnerabilities inside the era.
This possibility isn’t always exclusive to state country actors and their proxies, but novice cybercrime lovers who are entering the underground malware development network are perfectly capable with the right motivation together with political schedule or social motion to make use of such exploits in their inventory of cyber equipment XERXES ANDROID BANKING BOTNET.
The a hit implementation of distributing malware and exploiting device vulnerabilities lies inside the obscuration and obfuscation methods hired. Deep web and darknet discussion board users additionally have the option to buy DNS hosting offerings for anonymous port forwarding for their malware, VPNs, RDPs, far flung management equipment, ransomware, as well as the particular crypter had to make the malware absolutely undetected or undetectable XERXES ANDROID BANKING BOTNET.
RATs on the darknet: commonplace variants for offer
CERBERUS
given that 2019, one of the most extensively discussed RATs has been is Cerberus, especially within the context of focused on banking packages supported by way of the Google Play store and Android cellular running structures.
The Cerberus RAT is able to deep surveillance inside the victim’s tool, interfering with the encrypted communications the cellphone has with its apps, and outside. An replace to the RAT seemed in 2020 (v2) that has extra protection-evasion functionalities, inclusive of stealing -step authentication (2FA) codes from apps like Google Authenticator.
basically, the Cerberus RAT is able to intercepting and recording a sufferer’s cell telephone’s liberate sample or PIN, Google Authenticator codes, and intercepting SMS messages important to perform a -step authentication. similarly, this malware can embed itself among the victim and their cell banking software sitting and ready to extract any and all of the important statistics to perform financial institution fraud.
parent 1: In early October 2020, a Telegram person “blutheCA” published a link to the Cerberus V2 supply code on the XERXES ANDROID BANKING BOTNET supergroup channel. (supply – DarkOwl imaginative and prescient)
figure 1: In early October 2020, a Telegram person “XERXES ANDROID BANKING BOTNET” posted a link to the Cerberus V2 supply code on the Indian Anons supergroup channel. (source – DarkOwl imaginative and prescient)
In late July 2020, the developers of Cerberus determined to get out of the banking fraud commercial enterprise, apparently because of internal organization conflicts and subsequent fracture, and the principle developer offered their entire operation, inclusive of the source code and C2 network, for public sale. lamentably, no person become interested by taking on their criminal operations and the developers rather launched the supply code of the Cerberus malware into the wild XERXES ANDROID BANKING BOTNET.
The public sale became marketed on famous darknet malware forum, take advantage of, with a beginning rate of $25,000 USD and marketed month-to-month income of $10,000 USD. The builders said they have been together with “the source code of the apk, the source code of the module, the supply code of the admin panel, their servers, the patron base with an lively license, the contact listing of clients, the contact listing of individuals who desired to buy the product, and a variety of additional statistics XERXES ANDROID BANKING BOTNET”
different customers at the forum suggested that Google Play launched a safety update this is able to detecting Cerberus’s essential module signature and this RAT changed into now not viable with out software changes XERXES ANDROID BANKING BOTNET.

inside weeks of the Cerberus source code leaks, a fork of the preliminary variation of Cerberus (v1) called Alien surfaced for sale on the darknet. similarly to all the primary competencies that Cerberus furnished, Alien additionally blanketed a keylogger, device application installs, removals, and carrier begin and prevent, 2FA authenticator stealer, and tool notification sniffer. The Alien RAT efficiently installs and leverages the industrial TeamViewer utility in its operation on the victim’s cellular device presenting the hazard actors complete faraway control and observation of the device and its owner’s behaviors. (supply) XERXES ANDROID BANKING BOTNET.
a longtime consumer of the darknet discussion board, make the most, using the pseudonym “megabyte” first offered a 3-month license to use the Alien Android RAT on August 14, 2020 for $four,500 USD.
AHMYTH
over the last 3 years, AhMyth is another malicious Android RAT that has been actively traded and mentioned at the darknet. Its repositories on github.com had been updated as recently as three months in the past. The RAT consists of an electron-framework primarily based server-side desktop utility and the APK installers for the patron or sufferer’s Android tool. The developer is active on Twitter under the take care of @AhMythDev and states their vicinity is Oman.
The AyMyth RAT functions:
•A report supervisor permitting the danger actor to view the contents of the sufferer’s tool together with firmware
•get admission to to victim device’s browser statistics, cookies and net browsing history
•faraway get admission to to the sufferer’s device microphone and digital camera
•far off get entry to to all device name logs
•SMS get admission to – permits the chance actor to now not best examine however also send SMS text messages from the sufferer’s device
•GPS area facts – permits for the risk actor to tune the geographical place of the sufferer.

Advertisement for XERXES ANDROID BANKING BOTNET (supply:
parent 3: commercial for Rogue RAT (source: DarkOwl imaginative and prescient) XERXES ANDROID BANKING BOTNET
earlier this yr, open supply reporting indicated that the builders of the Rogue RAT have been circulating the malware across darknet forums for lease for as little as $29 USD consistent with calendar month and presenting discounts inclusive of $forty five for three months and lifetime memberships. according to researchers, the Rogue RAT exploits Google’s Firebase development platform to hide its malevolence and Android’s Accessibility services to skip restrictions on monitoring consumer movements and registers its very own notification provider to view such messages on the infected device; an exploitation method found with other Android malware strains.
the seller of the RAT, referred to as “Triangulum” launched model 6.2 of the malware on deep web forums again in April 2020, and its source code emerged too, revealing that the Rogue RAT does not seem like a completely unique malware codebase, however rather an replace to an in advance variant referred to as Dark Shades.
Installing instructions are inside.
After installing the panel you have to modify the APK to link it to your own IP/Domain.
APKEasyTool would do the job.
Features:
Send SMS
SMS Intercept
Bank Inject
Contact manager
Read and send/mass send SMS
Lock Device
File manager
Credit card data grabber
Injections
Commands
And more.