GhostGrab is a modular Android malware family that combines covert Monero mining with extensive banking credential theft, SMS interception (including OTPs), and device fingerprinting to enable financial fraud and resource monetization. The campaign uses Firebase for C2 and data exfiltration and leverages domains such as kychelp[.]live and uasecurity[.]org to deliver droppers and payloads. #GhostGrab #kychelp.live #uasecurity.org #Monero
Keypoints
- GhostGrab is a hybrid Android threat that performs covert Monero mining while simultaneously harvesting banking credentials, debit card data, Aadhaar numbers, and SMS-based OTPs for financial fraud.
- Initial delivery is via a malicious domain (kychelp[.]live) hosting a JavaScript redirect that forces download of a dropper APK (āBOM FIXED DEPOSIT.apkā) which then installs hidden payloads.
- The dropper uses WebView-based phishing pages (KYC, debit.html, net.html, pass.html, pin.html) to capture personal and financial data, then exfiltrates it to a publicly accessible Firebase Realtime Database keyed by device ID.
- Persistence and stealth are achieved through hiding the app icon, foreground services with silent audio loops, alarm receivers, battery-optimization exemptions, and multi-event broadcast receivers to auto-restart services.
- Extensive permission abuse (READ_SMS, SEND_SMS, CALL_PHONE, notification listeners, storage access, foreground-service permissions) enables SMS interception, SMS forwarding, call forwarding via USSD, media access, and full notification harvesting.
- Remote command-and-control uses Firebase (FCM/webhook) to issue commands such as sendSms, forwardSms, and callForward, and the miner uses hardcoded Monero wallet and pool endpoints (pool[.]uasecurity[.]org/pool-proxy[.]uasecurity[.]org).
- IOCs include hardcoded domains and URLs (kychelp[.]live, access[.]uasecurity[.]org, accessor[.]pages[.]dev), SHA-256 hashes for dropper and payload, and a Monero wallet address used by the miner.
MITRE Techniques
- [T1660 ] Phishing ā Used as the initial access vector via kychelp[.]live which forces a browser download of the malicious dropper APK (āA JavaScript-based redirect on that site automatically forces the victimās browser to download a malicious dropper APKā).
- [T1541 ] Foreground Persistence ā Maintains persistence by running a foreground service with silent audio loops and sticky notifications to resist system kills (āplays silent audio to sustain a persistent foreground serviceā).
- [T1603 ] Scheduled Task/Job ā Uses AlarmReceiver and scheduled alarms to periodically restart services and ensure auto-revival after termination (āAn AlarmReceiver monitors the app ⦠reschedules alarms to periodically restart the serviceā).
- [T1628 ] Hide Artifacts ā Hides the app icon using an intent-filter with CATEGORY.INFO instead of CATEGORY.LAUNCHER to remain concealed from the launcher (āallows it to stay hidden from the app launcher and run discreetly in the backgroundā).
- [T1406 ] Obfuscated Files or Information ā Uses APK protection/obfuscation services (access[.]uasecurity[.]org) to frustrate static analysis and hide malicious code (āadvertises an āAPK protectionā service offering obfuscation and hardeningā).
- [T1417 ] Input Capture ā Captures credentials via injected JavaScript in WebView phishing pages and form monitoring to collect banking credentials and PINs (āinjected JavaScript monitors the DOMContentLoaded event, captures the entered fieldsā¦ā).
- [T1418 ] Software Discovery ā Enumerates installed apps using QUERY_ALL_PACKAGES and other APIs to profile the device (āpresence of the Android permissions QUERY_ALL_PACKAGES ⦠indicates the malware can enumerate all installed appsā).
- [T1426 ] System Information Discovery ā Collects device fingerprinting data including model, OS, CPU, identifiers, root status, battery and storage stats (ācollects ⦠Android version, battery level, CPU architecture, SIM informationā).
- [T1422 ] Internet Connection Discovery ā Gathers network-related telemetry such as public IP and connectivity state as part of device profiling (āgenerates a comprehensive device fingerprint, including public IPā¦ā).
- [T1414 ] Input Capture ā Intercepts SMS messages and reads SMS history to harvest OTPs and transaction messages (āreads SMS records from the deviceās content provider (content://sms/) and filters messages for banking-related keywordsā).
- [T1636.004 ] SMS Messages ā Uses SMS interception and forwarding capabilities to capture incoming OTPs and optionally forward them to attacker numbers (āhandleSmsReceived method functions as an SMS interceptor, silently capturing all incoming messages ⦠can optionally forward the messages to an attackerās phone numberā).
- [T1437 ] Application Layer Protocol ā Uses Web protocols and Firebase for command-and-control and data exfiltration (āregisters with Firebase Cloud Messaging (FCM) ⦠stores stolen credentials in a Firebase Realtime Databaseā).
- [T1521 ] Encrypted Channel ā Employs TLS and encrypted channels for miner and C2 communications (miner parameters include āātlsā and mining pools use secure endpoints noted in configuration parameters).
- [T1481 ] Web Services ā Leverages Firebase Realtime Database and Firebase webhooks as C2 and data exfiltration channels (āthe malware stores stolen credentials ⦠in a publicly accessible Firebase Realtime Databaseā).
- [T1646 ] Exfiltration Over C2 Channel ā Exfiltrates captured forms, SMS, and device fingerprints to the attackerās Firebase backend and webhook endpoints (āpackages the data ⦠and sends to a Firebase Realtime Database node (formInfo.json)ā).
Indicators of Compromise
- [SHA256 ] Dropper and payload hashes ā 29c60e17d43f7268431929836c1b72df60d3b7643ed177f858a9d9bbab207783 (dropper), eae2c1f80b6d57285952b6e3da558d4c588a9972ee45ebd31c725772fe15edb3 (dropped APK)
- [Domain ] Phishing and distribution ā kychelp[.]live (malware delivery / phishing domain)
- [URL ] C2 / hosting ā access[.]uasecurity[.]org (C2 / APK protection service), accessor[.]pages[.]dev (hosts libmine-arm64.so miner)
- [Crypto wallet ] Monero wallet ā 44DhRjPJrQeNDqomajQjBvdD39UiQvoeh67ABYSWMZWEWKCB3Tzhvtw2jB9KC3UARF1gsBuhvEoNEd2qSDz76BYEPYNuPKD (hardcoded miner wallet)
- [File name ] Dropper APK name ā āBOM FIXED DEPOSIT.apkā (social-engineered dropper filename)
Read more: https://www.cyfirma.com/research/ghostgrab-android-malware/