Authored by ZePeng Chen and Wenfeng Yu
McAfee Cell Analysis Workforce has noticed an energetic rip-off malware marketing campaign concentrating on Android customers in India. This malware has gone by three levels. The primary one is the event stage, from March 2023 to July 2023, throughout which a few functions have been created every month. The second is the enlargement stage, from August 2023 to October 2023, throughout which dozens of functions have been created every month. The third is the energetic stage, from September 2023 to the current, throughout which a whole lot of functions have been created every month. In keeping with McAfee’s detection telemetry knowledge, this malware has collected over 800 functions and has contaminated greater than 3,700 Android units. The marketing campaign remains to be ongoing, and the variety of contaminated units will proceed to rise.
Malware builders create phishing pages for situations which can be simple to deceive, corresponding to electrical energy invoice funds, hospital appointments, and courier bundle bookings. Builders use completely different functions to load completely different phishing pages, that are ultimately offered to scammers. In our analysis, greater than 100 distinctive phishing URLs and greater than 100 distinctive C2 URLs are created in these malicious functions. It signifies that every scammer can perform rip-off actions independently.
Scammers use malware to assault victims. They sometimes contact victims through cellphone, textual content, e-mail, or social functions to tell them that they should reschedule providers. This type of fraud assault is a typical and efficient fraud technique. In consequence, victims are requested to obtain a selected app, and submit private data. There was a report the place an Indian girl downloaded malware from a hyperlink in WhatsApp and about ₹98,000 was stolen from her. We weren’t in a position to affirm if is similar malware, but it surely is only one instance of how these malicious functions might be distributed immediately through WhatsApp.
The assault state of affairs seems credible, many victims don’t doubt the scammers’ intentions. Following the directions offered, they obtain and put in the app. Within the app, victims are induced to submit delicate data corresponding to private cellphone numbers, addresses, financial institution card numbers, and passwords. As soon as this data falls into the arms of scammers, they will simply steal funds from the sufferer’s checking account.
The malware not solely steals victims’ checking account data through phishing net pages but additionally steals SMS messages on victims’ units. Due to the stolen data, even when the checking account helps OTP authentication, the scammer can switch all of the funds. The malware makes use of official platforms to deploy phishing pages to make it seem extra reliable to evade detection.
McAfee Cell Safety detects this menace as Android/SmsSpy. For extra data, and to get absolutely protected, go to McAfee Cell Safety.
Malware-as-a-Service (MaaS)
We found that these phishing pages and malware have been being offered as a service by a cyber group named ELVIA INFOTECH. A definite distinction between this malware and others is that the apps offered have a legitimate expiration date. When the expiration date is reached, some software hyperlinks will redirect to a cost notification web page. The notification is clearly to request the purchaser to pay a price to revive using the malware.

Determine 1. Cost notification.
We additionally found that the cybercriminal group was promoting malware in a Telegram group. Based mostly on these observations, we consider that ELVIA INFOTECH is knowledgeable cybercriminal group engaged within the growth, upkeep, and sale of malware and phishing web sites.

Determine 2. Telegram Group dialog.
Malware Evaluation
This malware has been maintained and just lately up to date, and a whole lot of malicious functions have been created. They like to make use of the file names corresponding to “CustomerSupport.apk”, “Mahavitaran Invoice Replace.apk”, “Appointment Reserving.apk”, “Hospital Assist.apk”, “Emergency Courier.apk” and the appliance names corresponding to “Buyer Assist”, “Blue Dart”, “Hospital Assist”,” Emergency Courier” to trick victims, under are some functions’ names and icons.

Determine 3. Some functions’ names and icons
Not solely do they faux to be “Buyer Assist”, however additionally they faux to be standard courier corporations like “Blue Dart” in India, however additionally they goal utility corporations like “Mahavitaran” (Energy Company of India).
As soon as victims click on the pretend icon, the appliance shall be launched and begin to assault victims.
1. Loading Phishing Pages
The phishing web page hundreds as soon as the appliance is launched. It’ll disguise itself as a web page of assorted official providers, making victims consider that they’re visiting a official service web site. Right here, victims are tricked into offering delicate data corresponding to title, deal with, cellphone quantity, financial institution card quantity, and password. Nonetheless, as soon as submitted, this data falls into the arms of scammers, permitting them to simply entry and management the sufferer’s checking account.
We discovered that the majority of this assault marketing campaign impersonated service bundle supply corporations.

Determine 4. Phishing Pages Load As soon as App Launches
The malware builders additionally designed completely different phishing pages for various functions to deceive victims in several situations that exploit electrical energy invoice funds and hospital appointments.

Determine 5. Hospital appointment and Electrical energy Invoice Phishing Pages
2. Stealing One-Time Passwords through SMS message
As a core design of this malware, the appliance requests permissions to permit it to ship and examine SMS messages as soon as it launches.

Determine 6. Request SMS permissions.
If victims click on the “Permit” button, the malware begins a background service that secretly screens customers’ textual content messages and forwards them to a quantity which is from C2 server.

Determine 7. Ahead cellphone quantity from C2 server
This step is essential for the rip-off course of, as many banks ship a one-time password (OTP) to the client’s cellphone for transaction verification. Utilizing this technique, the scammers can receive these OTPs and efficiently full financial institution transactions.
Conclusion:
This malicious app and the builders behind it have emerged quickly in India from final 12 months to now, purposefully creating and sustaining malware, and specializing in deploying well-designed phishing web sites by official platforms. The group secretly promotes and sells its malware by social media platforms, making the unfold of the malware extra refined and troublesome to detect. This tactic resulted in an much more extreme malware outbreak, posing an ongoing and severe menace to the monetary safety of Indian customers.
Malware campaigns are very persistent and utilizing a number of completely different functions on completely different web sites can trick many victims into putting in these functions and offering their personal and private data, which may then be used to commit fraud. On this setting, bizarre customers in India face enormous cybersecurity challenges. Subsequently, customers want to stay vigilant and cautious when coping with any digital communications or software obtain requests that seem official however could comprise malware. We strongly advocate customers set up safety software program on their units and at all times preserve it updated. Through the use of McAfee Cell Safety merchandise, customers can additional defend their units and scale back the dangers related to any such malware, offering a safer expertise.
Indicators of Compromise (IOCs)
SHA256 hash Record:
- 092efedd8e2e0c965290154b8a6e2bd5ec19206f43d50d339fa1485f8ff6ccba
- 7b1f692868df9ff463599a486658bcdb862c1cf42e99ec717e289ddb608c8350
- c59214828ed563ecc1fff04efdfd2bff0d15d411639873450d8a63754ce3464c
- b0df37a91b93609b7927edf4c24bfdb19eecae72362066d555278b148c59fe85
- 07ad0811a6dac7435f025e377b02b655c324b7725ab44e36a58bc68b27ce0758
- c8eb4008fa4e0c10397e0fb9debf44ca8cbadc05663f9effbeac2534d9289377
- 1df43794618ef8d8991386f66556292429926cd7f9cf9b1837a08835693feb40
- 5b3d8f85f5637b217e6c97e6b422e6b642ce24d50de4a6f3a6b08c671f1b8207
Phishing URLs:
- hxxps://bijlipayupdate[.]wixsite[.]com/my-site
- hxxps://appointmentservice0[.]wixsite[.]com/onlineappointment
- hxxps://couriers9343[.]wixsite[.]com/courier/
- hxxps://doctorappointment34[.]wixsite[.]com/appointmentbooking
- hxxps://hospitalservice402[.]wixsite[.]com/hospital-in
- hxxps://adn-reg[.]com/web site
C2 Server URLs:
- hxxps://forexroyality[.]on-line/complainf13/My_File[.]txt
- hxxps://adn-reg[.]com/knowledge[.]json
- hxxps://icustomrcore[.]com/chand3/knowledge[.]json
- hxxps://sms[.]hrms[.]org[.]in/chugxgddhmurgiwalabhaiqwertadmin/no[.]html
- hxxps://krishna[.]salaar[.]co[.]in/admindata[.]txt
- hxxps://courier[.]elviainfotech[.]cloud/pages/cellphone[.]json