S1055 SharkBot
SharkBot is a banking malware, first discovered in October 2021, that tries to initiate money transfers directly from compromised devices by abusing Accessibility Services.1
| Item | Value | 
|---|---|
| ID | S1055 | 
| Associated Names | |
| Type | MALWARE | 
| Version | 1.0 | 
| Created | 18 January 2023 | 
| Last Modified | 28 February 2023 | 
| Navigation Layer | View In ATT&CK® Navigator | 
Techniques Used
| Domain | ID | Name | Use | 
|---|---|---|---|
| mobile | T1517 | Access Notifications | SharkBot can intercept notifications to send to the C2 server and take advantage of the Direct Reply feature.1 | 
| mobile | T1437 | Application Layer Protocol | - | 
| mobile | T1437.001 | Web Protocols | SharkBot can use HTTP to send C2 messages to infected devices.1 | 
| mobile | T1407 | Download New Code at Runtime | SharkBot can use the Android “Direct Reply” feature to spread the malware to other devices. It can also download the full version of the malware after initial device compromise.1 | 
| mobile | T1637 | Dynamic Resolution | - | 
| mobile | T1637.001 | Domain Generation Algorithms | SharkBot contains domain generation algorithms to use as backups in case the hardcoded C2 domains are unavailable.1 | 
| mobile | T1521 | Encrypted Channel | - | 
| mobile | T1521.001 | Symmetric Cryptography | SharkBot can use RC4 to encrypt C2 payloads.1 | 
| mobile | T1521.002 | Asymmetric Cryptography | SharkBot has used RSA to encrypt the symmetric encryption key used for C2 messages.1 | 
| mobile | T1646 | Exfiltration Over C2 Channel | SharkBot can exfiltrate captured user credentials and event logs back to the C2 server. 1 | 
| mobile | T1630 | Indicator Removal on Host | - | 
| mobile | T1630.001 | Uninstall Malicious Application | SharkBot has C2 commands that can uninstall the app from the infected device.1 | 
| mobile | T1544 | Ingress Tool Transfer | SharkBot can download attacker-specified files.1 | 
| mobile | T1417 | Input Capture | - | 
| mobile | T1417.001 | Keylogging | SharkBot can use accessibility event logging to steal data in text fields.1 | 
| mobile | T1417.002 | GUI Input Capture | SharkBot can use a WebView with a fake log in site to capture banking credentials.1 | 
| mobile | T1516 | Input Injection | SharkBot can use input injection via Accessibility Services to simulate user touch inputs, prevent applications from opening, change device settings, and bypass MFA protections.1 | 
| mobile | T1406 | Obfuscated Files or Information | SharkBot can use a Domain Generation Algorithm to decode the C2 server location.1 | 
| mobile | T1644 | Out of Band Data | SharkBot can use the “Direct Reply” feature of Android to automatically reply to notifications with a message provided by C2.1 | 
| mobile | T1424 | Process Discovery | SharkBot can use Accessibility Services to detect which process is in the foreground.1 | 
| mobile | T1636 | Protected User Data | - | 
| mobile | T1636.004 | SMS Messages | SharkBot can intercept SMS messages.1 | 
| mobile | T1582 | SMS Control | SharkBot can hide and send SMS messages. SharkBot can also change which application is the device’s default SMS handler.1 |