Malicious Android Loan Apps

There were reports of several Android loan apps that pretended to be providing loan services and easy access to funds, which were found to be malicious apps that collected personal and financial information from the victims.

These applications are identified as “SpyLoan” apps as they collect users’ sensitive information and use them to extort money. More than 17 applications that were available on Google Play were discovered, reported, and subsequently removed.

According to the reviews of these applications, the owners of these apps were harassing customers even if the loan was not provided to the users. The targeted users of these apps were based in Southeast Asia, Africa, and Latin America.

SIEM as a Service

These applications were distributed among victims through social media, SMS messages, and scam websites. It is important to note that all of these applications have the same behavior and functions.

The operators of these applications were mainly from Mexico, Indonesia, Thailand, Vietnam, India, Pakistan, Colombia, Peru, the Philippines, Egypt, Kenya, Nigeria and Singapore. 

Malicious Android Loan Apps

Once these apps are installed on the victim’s device, they are prompted to accept the terms of service and requested to provide too much permission on the device. These permissions allow users to access sensitive information on the device. A mobile phone number registration process is also made to confirm the user’s country of residence.

To complete the loan application process, users are forced to provide personal information such as contact information, address details, proof of income, banking account information, and selfie confirmations. 

Code for Extracting Permission (Source: ESET)

Along with this information, these applications also collect a list of accounts, call logs, calendar events, device information, installed applications list, local Wi-Fi network information, and other EXIF metadata of images and photographs on the device.

Data Exfiltration and Modus Operandi

This collected information is then transferred to the C&C server with several techniques like code obfuscation, encrypted strings, and encrypted communication between the C2 server and the device.

However, Google updated its policies on Google Play in May 2023, which prohibited applications from asking to access sensitive information like images, videos, contacts, phone numbers, location, and storage access. 

Though this policy prohibited several applications from getting inside Google Play, existing applications were still having all these permissions provided.

Furthermore, the victims of these applications are threatened with extorting more money from the application operators. These kinds of applications specifically affected vulnerable individuals in urgent need of money and borrowers with limited access to legitimate financial institutions.

Reviews about Blackmail and threats (Source: ESET)

A complete report about these kinds of malicious blackmailing applications has been published, providing detailed information about the source code, operations, and others.

Indicators of Compromise

Files

SHA-1FilenameDetectionDescription
136067AC519C23EF7B9E8EB788D1F5366CCC5045com.aa.kredit.android.apkAndroid/SpyLoan.ANSpyLoan malware.
C0A6755FF0CCA3F13E3C9980D68B77A835B15E89com.amorcash.credito.prestamo.apkAndroid/SpyLoan.BESpyLoan malware.
0951252E7052AB86208B4F42EB61FC40CA8A6E29com.app.lo.go.apkAndroid/Spy.Agent.CMOSpyLoan malware.
B4B43FD2E15FF54F8954BAC6EA69634701A96B96com.cashwow.cow.eg.apkAndroid/Spy.Agent.EYSpyLoan malware.
D5104BB07965963B1B08731E22F00A5227C82AF5com.dinero.profin.prestamo.credito.credit.credibus.loan.efectivo.cash.apkAndroid/Spy.Agent.CLKSpyLoan malware.
F79D612398C1948DDC8C757F9892EFBE3D3F585Dcom.flashloan.wsft.apkAndroid/Spy.Agent.CNBSpyLoan malware.
C0D56B3A31F46A7C54C54ABEE0B0BBCE93B98BBCcom.guayaba.cash.okredito.mx.tala.apkAndroid/Spy.Agent.CLKSpyLoan malware.
E5AC364C1C9F93599DE0F0ADC2CF9454F9FF1534com.loan.cash.credit.tala.prestmo.fast.branch.mextamo.apkAndroid/SpyLoan.EZSpyLoan malware.
9C430EBA0E50BD1395BB2E0D9DDED9A789138B46com.mlo.xango.apkAndroid/Spy.Agent.CNASpyLoan malware.
6DC453125C90E3FA53988288317E303038DB3AC6com.mmp.optima.apkAndroid/Spy.Agent.CQXSpyLoan malware.
532D17F8F78FAB9DB953970E22910D17C14DDC75com.mxolp.postloan.apkAndroid/Spy.KreditSpy.ESpyLoan malware.
720127B1920BA8508D0BBEBEA66C70EF0A4CBC37com.okey.prestamo.apkAndroid/Spy.Agent.CNASpyLoan malware.
2010B9D4471BC5D38CD98241A0AB1B5B40841D18com.shuiyiwenhua.gl.apkAndroid/Spy.KreditSpy.CSpyLoan malware.
892CF1A5921D34F699691A67292C1C1FB36B45A8com.swefjjghs.weejteop.apkAndroid/SpyLoan.EWSpyLoan malware.
690375AE4B7D5D425A881893D0D34BB63462DBBFcom.truenaira.cashloan.moneycredit.apkAndroid/SpyLoan.FASpyLoan malware.
1F01654928FC966334D658244F27215DB00BE097king.credit.ng.apkAndroid/SpyLoan.AHSpyLoan malware.
DF38021A7B0B162FA661DB9D390F038F6DC08F72om.sc.safe.credit.apkAndroid/Spy.Agent.CMESpyLoan malware.

Network

DomainHosting providerFirst seenDetails
pss.aakredit[.]inAmazon.com, Inc.2023-03-27C&C server.
www.guayabacash[.]comAmazon.com, Inc.2021-10-17C&C server.
eg.easycredit-app[.]comAmazon.com, Inc.2022-11-26C&C server.
ag.ahymvoxxg[.]comHUAWEI CLOUDS2022-05-28C&C server.
hwpamjvk.whcashph[.]comAlibaba (US) Technology Co., Ltd.2020-01-22C&C server.
qt.qtzhreop[.]comAlibaba (US) Technology Co., Ltd.2022-03-22C&C server.
rest.bhvbhgvh[.]spaceAlibaba (US) Technology Co., Ltd.2021-10-26C&C server.
la6gd.cashwow[.]clubAlibaba (US) Technology Co., Ltd.2022-10-28C&C server.
mpx.mpxoptim[.]comAlibaba (US) Technology Co., Ltd.2023-04-24C&C server.
oy.oyeqctus[.]comALICLOUD-US2023-01-27C&C server.
iu.iuuaufbt[.]comAlibaba (US) Technology Co., Ltd.2022-03-01C&C server.
kk.softheartlend2[.]comIRT-HIPL-SG2023-01-28C&C server.
www.credibusco[.]comAmazon.com, Inc.2022-03-26C&C server.
cy.amorcash[.]comCloudflare, Inc.2023-01-24C&C server.
api.yumicash[.]comHUAWEI CLOUDS2020-12-17C&C server.
app.truenaira[.]coIRT-UCLOUD-HK2021-10-18C&C server.
apitai.coccash[.]comCloudflare, Inc.2021-10-21C&C server.
Guru Baran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.