Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. SharkBot

SharkBot

SharkBot is a banking malware, first discovered in October 2021, that tries to initiate money transfers directly from compromised devices by abusing Accessibility Services.[1]

ID: S1055
Type: MALWARE
Platforms: Android
Version: 1.0
Created: 18 January 2023
Last Modified: 16 April 2025
Mobile Layer
downloadview

Techniques Used

DomainIDNameUse
MobileT1517Access Notifications

SharkBot can intercept notifications to send to the C2 server and take advantage of the Direct Reply feature.[1]

MobileT1437.001Application Layer Protocol:Web Protocols

SharkBot can use HTTP to send C2 messages to infected devices.[1]

MobileT1661Application Versioning

SharkBot initially poses as a benign application, then malware is downloaded and executed after an application update.[1]

MobileT1407Download New Code at Runtime

SharkBot can use the Android "Direct Reply" feature to spread the malware to other devices. It can also download the full version of the malware after initial device compromise.[1]

MobileT1637.001Dynamic Resolution:Domain Generation Algorithms

SharkBot contains domain generation algorithms to use as backups in case the hardcoded C2 domains are unavailable.[1]

MobileT1521.001Encrypted Channel:Symmetric Cryptography

SharkBot can use RC4 to encrypt C2 payloads.[1]

.002Encrypted Channel:Asymmetric Cryptography

SharkBot has used RSA to encrypt the symmetric encryption key used for C2 messages.[1]

MobileT1646Exfiltration Over C2 Channel

SharkBot can exfiltrate captured user credentials and event logs back to the C2 server.[1]

MobileT1630.001Indicator Removal on Host:Uninstall Malicious Application

SharkBot has C2 commands that can uninstall the app from the infected device.[1]

MobileT1544Ingress Tool Transfer

SharkBot can download attacker-specified files.[1]

MobileT1417.001Input Capture:Keylogging

SharkBot can use accessibility event logging to steal data in text fields.[1]

.002Input Capture:GUI Input Capture

SharkBot can use a WebView with a fake log in site to capture banking credentials.[1]

MobileT1516Input Injection

SharkBot can use input injection via Accessibility Services to simulate user touch inputs, prevent applications from opening, change device settings, and bypass MFA protections.[1]

MobileT1406Obfuscated Files or Information

SharkBot can use a Domain Generation Algorithm to decode the C2 server location.[1]

MobileT1644Out of Band Data

SharkBot can use the "Direct Reply" feature of Android to automatically reply to notifications with a message provided by C2.[1]

MobileT1424Process Discovery

SharkBot can use Accessibility Services to detect which process is in the foreground.[1]

MobileT1636.004Protected User Data:SMS Messages

SharkBot can intercept SMS messages.[1]

MobileT1582SMS Control

SharkBot can hide and send SMS messages.SharkBot can also change which application is the device’s default SMS handler.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp