#dropper

๐Ÿšจ ALERT: Banking Apps Under Attack: Credentials Hijacked via Telegram
โš ๏ธ A #malware dropper delivers a stealer disguised as the IndusInd Bank app. It embeds a phishing website inside the Android app to steal victimsโ€™ financial data, posing a threat to mobile banking users and financial institutions.

๐Ÿ” Analysis: app.any.run/tasks/fe800ccb-fcc

The malware tricks users into entering their sensitive information (registered mobile number, Aadhaar number, PAN card, net banking user ID, etc.) through a fake banking interface embedded in the app.

๐Ÿ“ฅ Once submitted, the stolen data is sent to both the #phishing site and a C2 server controlled via Telegram.

The AndroidManifest.xml shows that the dropper APK has permissions to install applications. The #dropper contains base.apk, the malicious #payload, and is responsible for dropping and executing it.

๐Ÿ‘จโ€๐Ÿ’ป Our new #Android sandbox allows #SOC teams reveal base.apk behavior: communication via Telegram, starting from another location, monitoring incoming messages, and more. Fast access to threat details enables deep analysis and proactive response, mitigating potential damage.

The APK is obfuscated, with all strings #XOR-encrypted with the โ€˜npmanagerโ€™ key. The CyberChef recipe below reveals the script that sends intercepted data to Telegram: gchq.github.io/CyberChef/#reci

#IOCs:
#Phish URL: hxxps://t15[.]muletipushpa[.]cloud/page/
C2 Server (Telegram Bot): hxxps://api[.]telegram[.]org/bot7931012454:AAGdsBp3w5fSE9PxdrwNUopr3SU86mFQieE

More IOCs and insights will be shared in our blog post. Let us know if you're interested! ๐Ÿ’ฌ

๐Ÿš€ Expose Android threats in seconds with real-time APK analysis in #ANYRUN Sandbox: app.any.run/?utm_source=mastod

#Cybersecurity #infosec

GOMOOT :mastodon:gomoot@mastodon.uno
2024-06-12

๐Ÿ’ก Malware: cosa sono, quali e come difendersi
Panoramica completa sul mondo oscuro dei malware, le diverse famiglie di questi software malevoli che rappresentano una costante minaccia per la sicurezza dei dispositivi e dei dati.

gomoot.com/malware-cosa-sono-q

#Adware #Backdoor #Dropper #malware #ransomware #spyware #tech #tecnologia #Trojan #virus #hacker #dialer

The material impact [of #operationendgame] to attackers is that theyโ€™ve just had it laid out to them, very clearly, that thereโ€™s a capable, resourced, and persistent threat in play on the defender side.

cpomagazine.com/cyber-security

#dropper #malware #disruptops #takedown

Matt Willemsenmattotcha
2024-06-01
securityskeptic :donor: :verified:securityskeptic@infosec.exchange
2024-05-30

Largest ever operation against botnets hits dropper malware ecosystem

Congratulations to Europol and partners for concluding an
International operation that disrupted botnets responsible for distributing IcedID, SystemBC, Pikabot, Smokeloader and Bumblebee botnets.

europol.europa.eu/media-press/

Now it's up to the courts to impose serious sentences on the perpetrators.

#botnets #dropper #malware #cybercrime

๐Ÿ–ฑ๐Ÿ› ๐Ÿ‘‰๐Ÿ‘•๐Ÿ‘ˆ SOSOrdinet ๐ŸŽฃ๐Ÿ–ฅ๏ธ๐Ÿ› ๐Ÿ—ž๏ธSOSOrdinet@social.targaryen.house
2024-04-03
2022-12-06

[Paper of the day][#7] How to bypass #Machine #Learning (ML)-based #malware detectors with adversarial ML. We show how we bypassed all malware detectors in the #MLSEC competition by embedding malware samples into a benign-looking #dropper. We show how this strategy also bypass real #AVs detection.

Academic paper: dl.acm.org/doi/10.1145/3375894
Archived version: secret.inf.ufpr.br/papers/root
Dropper source code: github.com/marcusbotacin/Dropp

LED Hack Teaches DJI Mini 2 Drone New Tricks

Despite its diminutive proportions, the thrust to weight ratio of the DJI Mini 2 is high enough that it can carry a considerable amount of baggage. So it's no surprise that there's a cottage industry of remotely controlled payload releases that can be bolted onto the bottom of this popular quadcopter. But [tterev3] wanted something that would integrate better with DJI's software instead of relying on a separate transmitter.

As explained in the video below, his solution was to tap into the signals that control the RGB LED on the front of the drone. Since the user can change the color of the LED at any time with the official DJI smartphone application, decoding this signal to determine which color had been selected is like adding several new channels to the transmitter. In this case [tterev3] just needed to decode a single color to use as a "drop" signal, but it's not hard to imagine how this concept could be expanded to trigger several different actions with a few more lines of code.

Examining the LED control signal.

[tterev3] wrote some software to decode the 48 bits of data being sent to the LED with a PIC18F26K40 microcontroller, which in turn uses an L9110H H-Bridge to control a tiny gear motor. To get feedback, he's using a small magnet glued to the release arm and a Hall-effect sensor.

Concerned about how much power he could realistically pull from a connection that was intended for an LED, he gave the release its own battery that is slowly charged while the drone is running. You could argue that since the motor only needs to fire up once to drop the payload, [tterev3] probably could have gotten away with not recharging it at all during the flight. But as with the ability to decode additional color signals, the techniques being demonstrated here hold a lot of promise for future development.

Folks have been strapping additional hardware to commercial quadcopters for years, but modifications like this one that actually let the craft release its payload and fly away hold particular promise for environmental monitoring and building mesh communication networks.

#dronehacks #ledhacks #dji #drone #dropper #hbridge #payload #pic18f26k40 #quadcopter #release

image
2021-04-04

#letsroll

โšƒ โš€ โš… โš… โš‚โ†’#nature
โš€ โš‚ โš€ โš โš€โ†’#backtalk
โš โš โš โš‚ โš€โ†’#daybed
โš โš€ โš โš โš‚โ†’#counting
โš‚ โš„ โš‚ โš‚ โš‚โ†’#kebab
โš โšƒ โš โš… โšƒโ†’#dropper

nature-backtalk-daybed-counting-kebab-dropper

Roll your own @ eff.org/deeplinks/2016/07/new-

2021-01-18

#letsroll

โš โšƒ โš โš… โšƒโ†’#dropper
โšƒ โš‚ โš… โš€ โš„โ†’#partition
โšƒ โš… โšƒ โš„ โšƒโ†’#reanalyze
โš… โšƒ โš โš… โš‚โ†’#unmanaged
โšƒ โš€ โšƒ โš โš‚โ†’#motor
โš… โš… โš€ โš„ โšโ†’#waltz

dropper-partition-reanalyze-unmanaged-motor-waltz

Roll your own @ eff.org/deeplinks/2016/07/new-

2021-01-09

#letsroll

โš โšƒ โš โš… โšƒโ†’#dropper
โš โš€ โš‚ โš… โš€โ†’#crepe
โšƒ โšƒ โš โš„ โš‚โ†’#periscope
โš€ โš… โš… โšƒ โšƒโ†’#contents
โš‚ โš‚ โš โš€ โšโ†’#gumdrop
โš‚ โš„ โš€ โšƒ โšƒโ†’#jingle

dropper-crepe-periscope-contents-gumdrop-jingle

Roll your own @ eff.org/deeplinks/2016/07/new-

2020-12-21

#letsroll

โš โšƒ โš โš… โšƒโ†’#dropper
โš โš„ โš€ โšƒ โšโ†’#embargo
โšƒ โš… โš„ โš€ โš€โ†’#reassure
โš โš€ โš โš„ โš‚โ†’#cradling
โšƒ โš… โš… โšƒ โšโ†’#reentry
โš„ โš… โš… โš โš„โ†’#studio

dropper-embargo-reassure-cradling-reentry-studio

Roll your own @ eff.org/deeplinks/2016/07/new-

2020-10-30

#letsroll

โš… โšƒ โš„ โš… โšƒโ†’#unstitch
โš โšƒ โš โš… โšƒโ†’#dropper
โšƒ โš€ โš โš‚ โš„โ†’#mom
โšƒ โš€ โš โš โš…โ†’#mold
โšƒ โš โš„ โšƒ โš…โ†’#osmosis
โšƒ โš‚ โšƒ โš โš„โ†’#paging

unstitch-dropper-mom-mold-osmosis-paging

Roll your own @ eff.org/deeplinks/2016/07/new-

2020-09-07

#letsroll

โšƒ โš„ โš€ โš€ โš€โ†’#postal
โš… โš€ โšƒ โš โš€โ†’#swan
โš โšƒ โš‚ โš‚ โš…โ†’#duke
โš โšƒ โš โš… โšƒโ†’#dropper
โšƒ โš‚ โš„ โš โšโ†’#parabola
โš… โš„ โšƒ โš€ โšƒโ†’#vanity

postal-swan-duke-dropper-parabola-vanity

Roll your own @ eff.org/deeplinks/2016/07/new-

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst