Cyble Analysis and Intelligence Labs (CRIL) has uncovered a complicated Android banking trojan dubbed RedHook, which disguises itself as reliable purposes from Vietnamese authorities and monetary establishments to deceive customers.
This malware, first noticed within the wild round January 2025, exploits phishing web sites mimicking entities just like the State Financial institution of Vietnam, Sacombank, Central Energy Company, Visitors Police of Vietnam, and even the Authorities of Vietnam.
Distributed by way of misleading domains reminiscent of sbvhn[.]com and hosted on AWS S3 buckets, RedHook methods customers into downloading malicious APKs that seem as official banking apps.
Discovery of RedHook Trojan
As soon as put in, it prompts victims to allow accessibility providers and overlay permissions, granting it in depth management over the gadget.
This mixture of permissions permits the trojan to observe consumer actions silently, overlay pretend interfaces, and bypass safety protocols, making it a potent device for credential theft and monetary fraud.
RedHook’s capabilities lengthen past fundamental phishing, incorporating distant entry trojan (RAT) functionalities, keylogging, and display screen seize by way of Android’s MediaProjection API.
It establishes a persistent WebSocket connection to command-and-control (C2) servers like api9[.]iosgaxx423.xyz and skt9[.]iosgaxx423.xyz, enabling real-time communication and execution of over 30 instructions.
These instructions vary from accumulating gadget data, SMS messages, and contacts to performing gestures like swipes, clicks, and textual content enter, in addition to putting in or uninstalling apps, capturing screenshots, and even rebooting the gadget.
The malware’s phishing workflow is meticulously designed: it begins with pretend identification verification prompts requiring uploads of citizen ID images, adopted by requests for banking particulars, passwords, and two-step verification codes.
Keylogs, tagged with software package deal names and energetic class particulars, are exfiltrated to the C2, whereas steady display screen streaming by way of JPEG pictures permits risk actors to remotely work together with the gadget.
Code artifacts, together with Chinese language-language strings in logs and uncovered screenshots from an open AWS S3 bucket energetic since November 2024, level to a Chinese language-speaking developer or group behind RedHook.
This bucket revealed operational information like pretend templates, phishing interfaces, and proof linking to prior scams by way of the area mailisa[.]me, indicating an evolution from social engineering fraud to superior malware-driven assaults.
Broader Implications
Regardless of its superior options, RedHook maintains low detection charges on platforms like VirusTotal, underscoring its stealthy nature and the challenges in cellular risk landscapes. Evaluation exhibits it has contaminated over 500 units, with consumer IDs incrementing sequentially upon compromise.
The trojan abuses reliable APIs for protection evasion, reminiscent of masquerading as trusted apps and injecting inputs to imitate consumer interactions, aligning with MITRE ATT&CK methods like Phishing (T1660), Enter Injection (T1516), and Display screen Seize (T1513).
It collects protected information, together with SMS (T1636.004) and contacts (T1636.003), exfiltrating by way of HTTP-based C2 channels (T1437.001). This allows systematic harvesting of delicate data for fraudulent transactions, typically with out sufferer consciousness.
The emergence of RedHook highlights the escalating sophistication of Android banking trojans in high-risk areas like Vietnam, mixing phishing, RAT, and keylogging for complete gadget management.
Cybersecurity specialists suggest downloading apps solely from official sources, scrutinizing permission requests, enabling two-factor authentication, and utilizing cellular safety options with real-time scanning.
Retaining units up to date with safety patches is essential to mitigate vulnerabilities. Proactive risk intelligence, together with monitoring darkish internet actions, is important for early detection and response to such evolving cyber threats.
Indicators of Compromise (IOCs)
Indicators | Indicator Sort | Description |
---|---|---|
0ace439000c8c950330dd1694858f50b2800becc7154e137314ccbc5b1305f07 | SHA256 | RedHook |
ebc4bed126c380cb37e7936b9557e96d41a38989616855bb95c9107ab075daa3 | SHA256 | RedHook |
f33ebe44521abb954ec6b1c18efc567fe940ae8b7b495a302885ecefceba535b | SHA256 | RedHook |
adsocket[.]e13falsz.xyz | URL | C&C server |
api9[.]iosgaxx423.xyz | URL | C&C server |
skt9[.]iosgaxx423.xyz | Area | WebSocket URLs |
api5[.]jftxm.xyz | Area | WebSocket URLs |
dzcdo3hl3vrfl.cloudfront[.]internet/Chinhphu.apk | URL | Purple Hook |
nfe-bucketapk[.]s3.ap-southeast-1.amazonaws.com/SBV.apk | URL | Distribution URL |
sbvhn[.]com/ | URL | Phishing URL |
Discover this Information Attention-grabbing! Observe us on Google Information, LinkedIn, & X to Get Instantaneous Updates!