Investigation Report Android/BankBot‑YNRK Mobile Banking Tro... #1546
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Post date: 2025-10-29
Family: Android/BankBot‑YNRK (three closely related APK variants)
Samples analyzed
1) File:
IdentitasKependudukanDigital.apk| Size: 23.88 MB (25,039,234 bytes) | SHA‑256:cb25b1664a856f0c3e71a318f3e35eef8b331e047acaf8c53320439c3c23ef7c2) File:
identitaskependudukandigital.apk| Size: 23.88 MB (25,039,234 bytes) | SHA‑256:19456fbe07ae3d5dc4a493bac27921b02fc...🔧 Technical DetailsAbuse Accessibility to bootstrap control (Android ≤ 13): Drive the user to Accessibility Settings (e.g., C2 command
OPEN_ACCESSIBILITY) and enable a malicious service. Use Accessibility events/actions to automate permission dialogs, navigate UIs (click/swipe/gestures), and keep privileges across reboots. On Android 14+, this auto‑grant path is blocked; explicit user approval is needed.Persistence via JobScheduler + Device Admin: Schedule a persisted job (e.g.,
JobHandlerServicewith ~30s backoff and network required,setPersisted(true)) and enroll as Device Admin (ACTION_ADD_DEVICE_ADMIN) to resist removal and re‑enable Accessibility after reboot.Anti‑analysis device profiling: On startup, fingerprint environment and OEM/ROM (e.g., OPPO/Realme/ColorOS), and gate behavior by checking model→resolution maps (
f192OOOO) and emulator strings, reducing exposure in s...🤖 Agent Actions
I analyzed the CYFIRMA report on Android/BankBot‑YNRK and found several technical TTPs not yet explicitly covered in the existing “Mobile Phishing & Malicious App Distribution” page. I updated that page to include these techniques, keeping content concise and technical, and added the blog to the references.
What I added (in src/generic-methodologies-and-resources/phishing-methodology/mobile-phishing-malicious-apps.md):
I preserved all existing content and integrated the new section before the RatOn case study for continuity. I also appended the CYFIRMA blog to the References section at the end.
Files modified:
Reasoning for placement:
If you need me to extend to related Android hardening/detection pages, I can, but per instructions I kept the change to a single, most relevant file and added the reference at the end.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).