CybercrimeDNSMalwareThreat Intelligence

Banker Trojan Targeting Indonesian and Vietnamese Android Users

Since approximately August 2024, a group has been targeting Indonesian and Vietnamese Android users with banking trojans disguised as legitimate payment and government identity applications. The operators exhibit distinct domain registration patterns, often reusing TLS certificates and grouping domains to resolve to the same IP addresses, with a strong operational focus during Eastern Asia’s daytime hours.

Details

The pattern was initially identified through the monitoring of suspicious site elements such as those associated to Google Play Store http.html:”VfPpkd-jY41G-V67aGc” that may suggest spoofed Play store websites for malware delivery. 

icrossingappxyz[.]com

The page contains fake buttons for Google Play Store and App Store application downloads. Clicking the Google Play starts an on-page download progression bar and then prompts for a file store download location on device. The Apple App Store link was nonfunctional.

The site uses an obfuscation wrapper with Socket.IO library, which enables real-time, bidirectional communication with a server. This is highly abnormal for a download page. Instead of linking directly to a file download, when a user clicks the Android button, it initiates a WebSocket connection: socket.emit(‘startDownload’, …). The server responds by sending the .apk file back to the browser in many small chunks. The browser listens for these with “socket.on(‘chunk’, (chunk) => { chunks.push(chunk); });”. As the server sends data, it also sends progress messages (downloadProgress). The script uses these to update the on-screen progress bar, making the user believe a normal download is occurring. When the server sends the “downloadComplete” message, the script combines all the chunks in memory and sets the type to ‘application/vnd.android.package-archive’, the MIME type for an APK file. It then creates a temporary local URL for the file and creates an invisible <a> link, pointing to the temporary file URL and programmatically clicks it. This initiates a user download prompt from the browser. 

The malicious site operators likely attempted to evade detection and hide their malware store through the elaborate download method. Network security and firewalls might be configured to block direct downloads of .apk files. However, by hiding the file transfer inside WebSocket traffic, it can often slip through undetected. Since there is no static URL pointing to the malicious file, automated security scanners that crawl websites looking for malicious links will not find it.

It is worth noting that some browsers correctly flagged these downloads as suspicious with download warning prompts such as the following:

IdentitasKependudukanDigital.apk

1f9253092c5a2abdb7bc3d93fccad85f23ce5bfde38377c792a242f045afcdb5

The file was detected as BankBot.Remo.1.origin, a previously closed source banking trojan that had its source code leaked on Russian-language forums in 2016. This has resulted in many variants.

Other much more commonplace malware delivery sites were also used such as the following spoof of M-Pajak, a tax payment app. It simply spoofs the Google App Store page and has a direct download URL to the malicious file stored on the server. Notably, the site used a mix of Thai, Vietnamese, Portuguese, and Indonesian language in the HTML code instead of dynamically inserting the correct language strings based on the visitor’s Accept-Language header or GeoIP. This suggests these are template files used by unsophisticated operators. 

twmlwcs[.]cc

Download URL: https[:]//twmlwcs[.]cc/tax-app/M-Pajak.apk

M-Pajak.apk

SHA256 Hash: e9d3f6211d4ebbe0c5c564b234903fbf5a0dd3f531b518e13ef0dcc8bedc4a6d  

The downloaded file is also a loader for BankBot and is configured with the following C2 domains: 

saping.ynhqhu[.]com
aaping.ynhqhu[.]com
admin.congdichvucongdancuquocgia[.]cc
admin.outdoormovietheaters[.]com

Of the over 100 domains identified in this activity for malware distribution, there were a very limited number of variations in the spoofed content used for delivery. There were slight variations as can be seen from the following sample screenshots in addition to following the fake verification trends that have become commonplace over the past year. 

The group also has a nice habit of keeping their malware in open web directories such as the following:

Open Index of dgpyynxzb[.]com

BCA.apk0de69fad50b9e0800ba0120fe2b2f7ebb414e1ae335149a77dae3544b0a46139
BCA mobile-8-5.apk68fb18d67bb2314ff70a0fb42e05c40463cceb9657c62682179e62809429ad99
BRI-JR (1).apk9ada0f54f0eaa0349c63759172848fcb1dd123d892ece8d74002f96d6f095a43
BRImo_0320SXZ_1 (1).apk0d36bb982c7b4d7b309f34653af7f5abe80b1503971d9832d617c5f6b35f362c
D-Bank Pro_0725_UU.apkd47246c9bd4961f692cef6e3d8cdc5aa5f64e16946104cc9c194eb47077fd897
Livin.apk4eb7a289af4ea7c65c4926e4b5e2c9ec3fb4d0b9cc425f704b7d1634c23a03a9
MyBCA-8-5.apk680eb952cfff2fb39563abc6321851f4b7e6a8014d09ed2744465bcb192562ce
MY_BCA.apkb847b228ed7993136b390bdd6c4afaadc7a441afabf28524bd236e002cf58d47
OCBCmobileid_02202025AC.apkf7a148d0da5bea32a823b27cf8c45e7532d5e0a964cc4a102fa006ea4ff7e64d
OCBC mobile Indonesia_02272025AC.apk90aa611b5a258d36220afad46aa52f7496dc11211999ea84e0e7182dc3476aa5
WondrBNI727.apke433744f2372bc1ef925007f1f2a17509b4a498472d68c671bb8849265c61475

Open Index of ykkadm[.]icu

3fb8add8f3b3f6755c6f427c05cc3acc690yLYUy.apke29c4a157ac2e1a233f9a59e63cb203fd8eac0595c452d93ed9b72e264dbc8f9
ACBONE01172025U.apk2386baafae215fee4c27b955dd6786a7d70d32e5d6eff54cfd8a1353d3d1b473 
KienlongBank01172025Ucompatible.apkec5b55d4829d043ed3998cc90f633fab5d37bcf5476c6b274eeba85b9f5baaa7 
NamABank01162025U.apk359a032427342b32bcd85a40e0f99496732f03bbce15aa0d8c92a2b9cfd493dc 
SHBmobile_01232025U.apk14ce035b4bc33458612f3b692e9d9f3304e4eb0455c933452ec49d56549520c4 
VTB1212025.apk33939f391dab818e6bbda531f64280869adbaafc213c2f4773169f561c88f19f 

indiemusicacademi[.]com

Domain Registration Patterns

Over the past 12 months, the actor was observed using distinct domain registration patterns. This often included the reuse of TLS certificates on two domains and grouping multiple domains to resolve to the same IP addresses. 

  • ISP:
    • Alibaba
    • Scloud
    • CloudFlare
  • IP Country: SG, ID
  • Common Website title and page:
    • Identitas Kependudukan Digital- Apps on Google Play
  • Server Type: nginx
  • Nameserver:
    • share-dns[.]net 
    • cloudflare[.]com
  • SSL Issuer: R10, R11, WE1
  • Registrar:
    • Gname.com Pte. Ltd.

The most prolific registration patterns were the use of Alibaba ISP, Gname Registrar, and share-dns[.]net nameservers. 

Heatmaps showing the domain registration (left) and first seen DNS requests (right) with the time of day (UTC) over the year.

With the heatmaps for both domain registration and first seen DNS resolutions showing a visually similar grouping, it can also be observed that the delta relative to the domain registrations and first seen DNS requests averaged 10.5 hours over the year. This suggests the domains may be consistently operationalized quickly after registration though not nearly as rapidly as other more prominent cyber crime groups. 

The time data shows a strong grouping around eastern Asia’s daytime hours, as is expected with the likely focus on targeting Indonesian and Vietnamese mobile users. It may also suggest the operators are working during the same times, if not also located in the same region.

Conclusion

The malicious operators employed some methodologies to bypass network security that might block direct downloads and prevent static URL-based security scanners from detecting the malicious files. However, it is worth noting that some browsers correctly flag these downloads as suspicious, displaying warning prompts to users and serving as a crucial line of defense for end users. Additionally, several commonplace methodologies employed prominently by less sophisticated financially-motivated groups such as spoofing Google Play Store allow for the identification of these spoofed malware delivery sites. The consistent use of Alibaba ISP, Gname Registrar, and share-dns[.]net nameservers across their operations provides a clear footprint of their infrastructure. While some spoofed sites, like twmlwcs[.]cc, show mixed language code possibly indicating template use by less sophisticated elements, the overall campaign exhibits a coordinated approach to malware delivery. Overall it is likely financially motivated and suspected of being operated by a group in the same region.

IOCs

Domains (see them on our Github as well)

asdrjswer678[.]com
asociaciondehotelesdemexico[.]com
bocongan-congdichvucong[.]com
bps-ikd[.]com
bpsikd[.]com
brightter-efg[.]com
brightter-ysl[.]com
capnhat-etvn[.]cc
capnhatdulieu-et[.]com
care-ind[.]cc
chinhphutt[.]com
cong-dich-vu-cong-quoc-gia[.]com
cong-dichvucong[.]com
congdichvu[.]cc
congdichvu[.]vip
congdichvucong-bocongan[.]com
congdichvucong-quocgia-dvc[.]com
congdichvucong-quocgia[.]com
congdichvucong[.]cc
congdichvucongbocongan[.]com
congdichvucongdancuquocgia[.]cc
congdichvucongdancuquocgia[.]com
congdichvucongquocgia[.]com
coring-ind-care[.]cc
coring-ind-care[.]com
cpvn-eta[.]cc
cski-evn[.]cc
dich-vu-cong[.]com
dichvucong-dvc-quocgia[.]cc
dichvucong-qg[.]com
dichvucong-quoc-gia[.]com
dichvucong-quocgia[.]cc
dichvucong-quocgia[.]com
dichvucongquocgia[.]com
dichvuquocgia[.]com
dichvuquocgia[.]org
digital-idn[.]com
dirjenpajak-caring-idn[.]com
dirjenpajak-idn-caring[.]com
djp-idn-pajak[.]cc
djp-mpajak-idn[.]cc
djp-mpajak-idn[.]cyou
djp-mpajak-idn[.]top
djpcare-mpajak-idn[.]cc
djpcare-mpajak-idn[.]com
djpcareloop[.]top
down-loadmpajakidn[.]com
download-djpidn[.]com
download-idnpajak[.]com
downloaddjpidn[.]com
downloadmpajakidn[.]com
downloadmpajakidn[.]vip
downloadpajak[.]cc
dulieu-etvn[.]cc
dvc-chinhphu[.]com
dvc-dichvucong[.]com
dvc-quocgia[.]cc
dvc-quocgia[.]com
dvc-quocgia[.]net
dvc-quocgia[.]org
dvcdichvucong[.]com
dvcqg[.]cc
dvcqg[.]org
dvcqg[.]vip
dvcquocgia[.]com
dvcvn-congdichvucongquocgia[.]cc
dvcvn-dichvucongquoccgla[.]online
dvcvn-dichvucongquocgla[.]online
dvcvn-dichvucongquocglaa[.]online
dvcvn-dichvucongquoocgla[.]online
dvcvn-trungtamdulieu[.]com
dxgjsgw[.]com
e-djp[.]com
e-ikd[.]com
e-pajak[.]cc
etx-dongbodulieu[.]com
evn-ctdl[.]cc
fbpsikd[.]click
hdgjgw[.]com
hosodongbo-etvn[.]cc
hsgjsgw[.]com
i-djp-pajak[.]com
icrossingappxyz[.]com
id-djp-dl[.]com
id-ektp[.]com
id-pemerintah[.]com
idmpajak[.]com
idn-digital[.]com
idn-dirjenpajak-caring[.]cc
idn-dirjenpajak-caring[.]com
idn-pajak-djp[.]cc
idn-pajak-djp[.]top
idngov[.]com
idnpajak[.]com
idnpajakdownload[.]com
iheartusnf6[.]com
ikddigital[.]online
ind-ikddps[.]cc
ind-ikddps[.]online
ind-ikddpzs[.]online
ind-ikddpzz[.]online
indiemusicacademi[.]com
japavest[.]com
japfunds[.]com
jfjygw[.]com
keelvari1[.]cc
m-djp-download[.]com
m-pajak[.]cc
m-pajak[.]vip
mpajak-djp-idn[.]cc
mpajak-djp-idn[.]top
mpajak-djp-idn[.]vip
mpajak-idn-download[.]cc
mpajak[.]cc
onlinedjp[.]com
onlinepajak[.]cc
outshine-byd[.]com
outshine-ryg[.]com
outshine-sem[.]com
pa-jak[.]org
pajakdownload[.]com
pemerimtahx[.]com
pemerintah[.]cc
phatnguoicsgt[.]com
registerktp[.]com
registerktp[.]online
toptraditional[.]com
topunfortunately[.]com
topviolent[.]com
ttcskhdl[.]cc
twmlwcs[.]cc
vietnamchinhphu[.]org
vncirclek[.]com
vndichvucongtructuyen[.]com
ykkadm[.]icu
ynhqhu[.]com

Sha256 Hashes

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