PlayCloak: A Play Store–Distributed Travel Utility Covertly Operating as a Financial Fraud and Cybercrime Platform – CYFIRMA

PlayCloak: A Play Store–Distributed Travel Utility Covertly Operating as a Financial Fraud and Cybercrime Platform – CYFIRMA

The Android app Hicas (package com.apptool.hicash.newhicash) is distributed as a travel utility but dynamically switches on Indian devices to a fully web-based, coercive loan platform delivered via remote WebView and aggressive UI pressure. Static and dynamic analysis revealed heavy obfuscation, runtime XOR string decryption, contact harvesting, excessive permissions, and remote configuration hosted at in-h5.oss-ap-southeast-1.aliyuncs.com and bksn515.vercel.app, indicating a Chinese-operated loan ecosystem with coercive repayment tactics. #Hicas #hicas.tech

Keypoints

  • Hicas is listed on Google Play as a travel packing companion (com.apptool.hicash.newhicash) but delivers a loan workflow to Indian users via remote WebView; the app reports 500,000+ downloads.
  • The app implements region-based behavior switching: travel features for non-Indian devices and a loan/dunning UI for Indian devices, including login and borrowing flows.
  • Remote configuration endpoints (in-h5.oss-ap-southeast-1.aliyuncs.com and bksn515.vercel.app) control runtime behavior and UI, enabling operators to change loan terms and coercive content without app updates.
  • Extensive obfuscation and runtime XOR string decryption (802 strings recovered) were used to hide logic and endpoints; the app requests excessive permissions and includes explicit contact-harvesting functionality.
  • Firebase Cloud Messaging and redundant hosting (cdn.hicas.tech, hicas.tech, Firebase) enable remote-triggered actions, dynamic content delivery, and resilience against takedown efforts.
  • User complaints and technical indicators (harassment, image manipulation, unauthorized contact/photo access, deceptive repayment prompts) support classification as a deceptive, high-risk loan platform rather than a legitimate travel app.

MITRE Techniques

  • [T1660 ] Phishing – Promoted via social media and ads to lure users into installing and using the app for loans (‘actively promoted on social media platforms, including YouTube’)
  • [T1603 ] Scheduled Task/Job – Persistence or delayed activation mechanisms used to defer malicious behavior until runtime (‘delaying malicious behavior until runtime and selectively activating functionality based on device attributes and region’)
  • [T1628 ] Hide Artifacts – Techniques used to conceal code and behavior through obfuscation and encrypted strings (‘aggressive obfuscation and runtime string decryption to conceal operational logic and evade static analysis’)
  • [T1628.002 ] User Evasion – Region-based cloaking to present benign functionality to non-targeted users while activating malicious flows on targets (‘When the app detects non-Indian devices, the application behaves as advertised… on devices identified as Indian, the application bypasses its stated functionality and instead presents a loan workflow’)
  • [T1406 ] Obfuscated Files or Information – Use of XOR-based string encryption and randomized class/method names to hinder analysis (‘heavy use of string encryption and obfuscation… class and package names are composed of seemingly random characters’)
  • [T1417 ] Input Capture – The app presents login screens and captures user input as part of the loan workflow (‘Upon launching the application, it immediately presents a login screen’)
  • [T1418 ] Software Discovery – The app enumerates device attributes and environment to determine targeted behavior (‘selectively activating functionality based on device attributes and region’)
  • [T1426 ] System Information Discovery – Collection or detection of system-level details to support region-based behavior and targeting (‘region-based behavior switching’ and SDK targeting to ensure broader device coverage)
  • [T1422 ] Internet Connection Discovery – The app queries remote configuration and checks connectivity to load WebView content (‘issues a GET request to https://h5.hicas.tech/domain.json to retrieve additional runtime configuration’)
  • [T1414 ] Input Capture – Capturing of user-provided data through forms or WebView for loan processing and potential misuse (‘delivers the complete loan workflow through a remote WebView… including login and borrowing features’)
  • [T1636.003 ] Contact list – Explicit contact harvesting and serialization of contact entries for likely transmission to backend (‘collects the total number of contacts from the device, processes the contact list, and serializes the data into a JSON object’)
  • [T1437 ] Application Layer Protocol – Use of web protocols and remote-hosted WebView content to deliver primary malicious functionality (‘delivers the complete loan workflow through a remote WebView’ and ‘loads a dynamic WebView from cdn.hicas.tech’)
  • [T1437.001 ] Web Protocols – Reliance on HTTP(S) to fetch remote UI assets and configuration (‘loads UI resources such as JavaScript, CSS, and images at runtime’ from cdn.hicas.tech and config endpoints)
  • [T1521 ] Encrypted Channel – Use of encrypted channels for remote configuration and backend communications (‘GET request to https://h5.hicas.tech/domain.json’ and other HTTPS endpoints)
  • [T1481 ] Web Services – Use of web services and remote hosting (CDN, object storage, vercel) to serve dynamic loan UI and APIs (‘remote configuration hosted at in-h5.oss-ap-southeast-1.aliyuncs.com/hosts/hicas/config.json’ and ‘bksn515.vercel.app/hosts/hicas/config.json’)
  • [T1646 ] Exfiltration Over C2 Channel – Packaging and likely transmission of harvested contacts and data to backend C2 infrastructure (‘structured output is indicative of intentional contact enumeration and packaging, likely for transmission to a remote backend’)

Indicators of Compromise

  • [Sha256 ] APK binary – 0ac8f10afbc7f73f75ff732e9637846604b009f15b99cce9344ad94b49490844 (identified in YARA rule and analysis)
  • [Domain ] Primary malicious domains and CDN – hicas.tech (webview/landing), cdn.hicas.tech (runtime UI assets)
  • [URL ] Remote configuration and C2 endpoints – https://in-h5.oss-ap-southeast-1.aliyuncs.com/hosts/hicas/config.json, https://bksn515.vercel.app/hosts/hicas/config.json
  • [URL ] Runtime configuration and discovery – https://h5.hicas.tech/domain.json (used to retrieve additional runtime configuration)
  • [Package Name ] Android identifier – com.apptool.hicash.newhicash (Google Play listing and APK package)
  • [Firebase Storage ] Potential dynamic content/push infrastructure – hicas-37f6e.firebasestorage.app (observed inactive at time of analysis but linked to FCM usage)


Read more: https://www.cyfirma.com/research/playcloak-a-play-store-distributed-travel-utility-covertly-operating-as-a-financial-fraud-and-cybercrime-platform/