GHOSTGRAB ANDROID MALWARE

GhostGrab is a modular Android malware family that combines covert Monero mining with extensive banking credential theft, SMS interception (including OTPs), and device fingerprinting to enable financial fraud and resource monetization. The campaign uses Firebase for C2 and data exfiltration and leverages domains such as kychelp[.]live and uasecurity[.]org to deliver droppers and payloads. #GhostGrab #kychelp.live #uasecurity.org #Monero

Keypoints

  • GhostGrab is a hybrid Android threat that performs covert Monero mining while simultaneously harvesting banking credentials, debit card data, Aadhaar numbers, and SMS-based OTPs for financial fraud.
  • Initial delivery is via a malicious domain (kychelp[.]live) hosting a JavaScript redirect that forces download of a dropper APK (ā€œBOM FIXED DEPOSIT.apkā€) which then installs hidden payloads.
  • The dropper uses WebView-based phishing pages (KYC, debit.html, net.html, pass.html, pin.html) to capture personal and financial data, then exfiltrates it to a publicly accessible Firebase Realtime Database keyed by device ID.
  • Persistence and stealth are achieved through hiding the app icon, foreground services with silent audio loops, alarm receivers, battery-optimization exemptions, and multi-event broadcast receivers to auto-restart services.
  • Extensive permission abuse (READ_SMS, SEND_SMS, CALL_PHONE, notification listeners, storage access, foreground-service permissions) enables SMS interception, SMS forwarding, call forwarding via USSD, media access, and full notification harvesting.
  • Remote command-and-control uses Firebase (FCM/webhook) to issue commands such as sendSms, forwardSms, and callForward, and the miner uses hardcoded Monero wallet and pool endpoints (pool[.]uasecurity[.]org/pool-proxy[.]uasecurity[.]org).
  • IOCs include hardcoded domains and URLs (kychelp[.]live, access[.]uasecurity[.]org, accessor[.]pages[.]dev), SHA-256 hashes for dropper and payload, and a Monero wallet address used by the miner.

MITRE Techniques

  • [T1660 ] Phishing – Used as the initial access vector via kychelp[.]live which forces a browser download of the malicious dropper APK (ā€œA JavaScript-based redirect on that site automatically forces the victim’s browser to download a malicious dropper APKā€).
  • [T1541 ] Foreground Persistence – Maintains persistence by running a foreground service with silent audio loops and sticky notifications to resist system kills (ā€œplays silent audio to sustain a persistent foreground serviceā€).
  • [T1603 ] Scheduled Task/Job – Uses AlarmReceiver and scheduled alarms to periodically restart services and ensure auto-revival after termination (ā€œAn AlarmReceiver monitors the app … reschedules alarms to periodically restart the serviceā€).
  • [T1628 ] Hide Artifacts – Hides the app icon using an intent-filter with CATEGORY.INFO instead of CATEGORY.LAUNCHER to remain concealed from the launcher (ā€œallows it to stay hidden from the app launcher and run discreetly in the backgroundā€).
  • [T1406 ] Obfuscated Files or Information – Uses APK protection/obfuscation services (access[.]uasecurity[.]org) to frustrate static analysis and hide malicious code (ā€œadvertises an ā€˜APK protection’ service offering obfuscation and hardeningā€).
  • [T1417 ] Input Capture – Captures credentials via injected JavaScript in WebView phishing pages and form monitoring to collect banking credentials and PINs (ā€œinjected JavaScript monitors the DOMContentLoaded event, captures the entered fieldsā€¦ā€).
  • [T1418 ] Software Discovery – Enumerates installed apps using QUERY_ALL_PACKAGES and other APIs to profile the device (ā€œpresence of the Android permissions QUERY_ALL_PACKAGES … indicates the malware can enumerate all installed appsā€).
  • [T1426 ] System Information Discovery – Collects device fingerprinting data including model, OS, CPU, identifiers, root status, battery and storage stats (ā€œcollects … Android version, battery level, CPU architecture, SIM informationā€).
  • [T1422 ] Internet Connection Discovery – Gathers network-related telemetry such as public IP and connectivity state as part of device profiling (ā€œgenerates a comprehensive device fingerprint, including public IPā€¦ā€).
  • [T1414 ] Input Capture – Intercepts SMS messages and reads SMS history to harvest OTPs and transaction messages (ā€œreads SMS records from the device’s content provider (content://sms/) and filters messages for banking-related keywordsā€).
  • [T1636.004 ] SMS Messages – Uses SMS interception and forwarding capabilities to capture incoming OTPs and optionally forward them to attacker numbers (ā€œhandleSmsReceived method functions as an SMS interceptor, silently capturing all incoming messages … can optionally forward the messages to an attacker’s phone numberā€).
  • [T1437 ] Application Layer Protocol – Uses Web protocols and Firebase for command-and-control and data exfiltration (ā€œregisters with Firebase Cloud Messaging (FCM) … stores stolen credentials in a Firebase Realtime Databaseā€).
  • [T1521 ] Encrypted Channel – Employs TLS and encrypted channels for miner and C2 communications (miner parameters include ā€œā€“tlsā€ and mining pools use secure endpoints noted in configuration parameters).
  • [T1481 ] Web Services – Leverages Firebase Realtime Database and Firebase webhooks as C2 and data exfiltration channels (ā€œthe malware stores stolen credentials … in a publicly accessible Firebase Realtime Databaseā€).
  • [T1646 ] Exfiltration Over C2 Channel – Exfiltrates captured forms, SMS, and device fingerprints to the attacker’s Firebase backend and webhook endpoints (ā€œpackages the data … and sends to a Firebase Realtime Database node (formInfo.json)ā€).

Indicators of Compromise

  • [SHA256 ] Dropper and payload hashes – 29c60e17d43f7268431929836c1b72df60d3b7643ed177f858a9d9bbab207783 (dropper), eae2c1f80b6d57285952b6e3da558d4c588a9972ee45ebd31c725772fe15edb3 (dropped APK)
  • [Domain ] Phishing and distribution – kychelp[.]live (malware delivery / phishing domain)
  • [URL ] C2 / hosting – access[.]uasecurity[.]org (C2 / APK protection service), accessor[.]pages[.]dev (hosts libmine-arm64.so miner)
  • [Crypto wallet ] Monero wallet – 44DhRjPJrQeNDqomajQjBvdD39UiQvoeh67ABYSWMZWEWKCB3Tzhvtw2jB9KC3UARF1gsBuhvEoNEd2qSDz76BYEPYNuPKD (hardcoded miner wallet)
  • [File name ] Dropper APK name – ā€œBOM FIXED DEPOSIT.apkā€ (social-engineered dropper filename)


Read more: https://www.cyfirma.com/research/ghostgrab-android-malware/