A new Android malware has been discovered called Android.Banking.L. The malware is considered to be an “all-in-one” Trojan as it comes packed with numerous capabilities.
Android.Banking.L contains all the basic functionalities of a banking Trojan. It also possesses capabilities such as keylogging, call forwarding, audio recording and ransomware. Android.Banking.L is also designed to steal users’ credentials and other sensitive information.
According to security researchers at Quick Heal, who discovered Android Banker, the Trojan has the ability to launch a victim’s browser with a URL received from the C2 server.
“It repeatedly opens the accessibility setting page until the user switches ON the ‘Accessibility Service’. The Accessibility Service allows the Trojan to enable and abuse any required permission without user concern,” Quick Heal researchers wrote in a blog. “The main APK file is highly obfuscated and all strings are encrypted. It also contains the extra junk code to make it difficult for reverse engineering.”
The malware is capable of checking whether a user’s Google Play protection service is on or off. Android Banker sends a fake alert to disable Google Play’s protection service, if it is on. The malware also encrypts all files and displays a ransom note on the screen.
The new malware indicates that cybercriminals are continuing to tweak malware, adding more capabilities to expand their attack vector. To stay safe from such powerful malware, Android users are recommended to use mobile sandbox solutions.