EclecticIQ Threat Research Team
January 26, 2023

The Godfather Banking Trojan Expands Application Targeting to Affect More Europe-Based Victims

Intelligence Research

Analyst Blog Post  Rectangular - threat actor


Godfather malware includes banking trojans used by different threat actors to target Android mobile devices. Initial variants were reported beginning of March 2021. (1)  One primary design of Godfather malware is to harvest login credentials for various financial applications, including cryptocurrency wallets and exchanges. Most notable features of Godfather malware are bypassing two-factor authentication (2FA) by capturing SMS texts or notifications from Android devices and executing itself as an Android service by abusing AccessibilityService to keep persistent and privileged access on infected Android devices. According to a GroupIB report, Godfather malware derives from Anubis malware based on code similarity. (2) 

In January, BAFIN - the German Federal Financial Supervisory Authority - warned that Godfather variants are becoming well established and are targeting Europe using approximately 400 different banking and cryptocurrency applications spread across 15 international banks, 94 cryptocurrency wallets, and 110 cryptocurrency exchange platforms. (5, 6, 7, 8)

Variants of Godfather malware can be distributed amongst different Threat Actors using the MaaS (Malware-as-a-Service) model, with easy malware management (configuration, support, etc.). MaaS malware can rapidly spread to new regions, as with new Godfather campaigns. Latest samples of Godfather malware imitate the Google Protect application and deceive users into believing they are protected by a legitimate Android service. In fact, malicious actors gain access to their financial accounts.

The malware is commonly installed through malicious app-store application packages, as observed in Figure 1. 

Godfather blog 1
Figure 1 - Screenshot of the malicious application linked to
Godfather distribution in Google Play Store. 

EclecticIQ researchers identified the latest malware samples of Godfather banking trojan uploaded to Virustotal (9) on 2023-01-08 as a Google Protect (Android Protect) lure. Figure 2 shows an example of this lure. 

Godfather blog 2

Figure 2 - Godfather banking trojan installing itself as a fake Google Protect
application that targets Spanish-speaking victims. 

 

Location of Organizations Affected 

Godfather malware will stop executing if it detects any of the following languages (5) 

Canada 

Armenian 

France 

Azerbaijani 

Germany 

Belarusian 

Spain 

Kazakh 

Turkey 

Kyrgyz 

The United States 

Moldovan 

The United Kingdom 

Tajik 

 

Uzbek 



The exit feature of the malware is possible evidence that Godfather malware was developed by a Russia-linked malware developer, based on the exit feature that ceases operations if the malware detects language packages common to Commonwealth of Independent States (CIS). (2)

Installation of the Godfather Malware:  

Upon the installation of the malware, it requests permissions from victim users by abusing the AccessibilityService. Godfather asks infected users to issue itself the necessary permissions as in Figure 3. If victim user is not granted access to AccessibilityService then this process will execute every eight seconds until the user grants the access.  

Godfather blog 3

Figure 3 - Godfather malware request access to AccessibilityService. 

AccessiblityService provides the necessary permissions to malware, including SMS and notification processing, screen recording, and other administrator privileges, while also serving as the persistent access channel on infected devices. The malicious AccessiblityService is launched when the victim device is restarted, turned on, or unlocked. 

 
Features of the Latest Godfather Banking Trojan Kill-Chain Include:  

Establishing VNC connections for recording the screen of the victim’s device. 

Godfather blog 4
Figure 4 - Malware code which uses the VNC viewer to control
the device screen and steal victim data.

Using a keylogger for collection of keystrokes on every android application.   

Godfather blog 5

Figure 5 - Collecting keystrokes on android device. 

Exfiltrating push notifications and forwarding phone calls for bypassing two-factor authentication.  Godfather malware can perform money transfers by making USSD (Unstructured Supplementary Service Data) calls without using the graphical user interface. 


Godfather blog 6

Figure 6 - Code to transfer money through USSD.

Sending SMS messages from infected devices. 

Godfather blog 7
Figure 7 - Code to steal text SMS.

Launching proxy servers for command-and-control connections. 

Godfather blog 8
Figure 8 - Code to establish SOCKS5 Proxy. 

Command and Control Activity

Figure 9 shows that the Godfather malware fetches the latest Command and Control (C2) URL from a Telegram channel like hxxps://t[.]me/potezkomerpozx. 

Godfather blog 9
Figure 9 - C&C URL from a Telegram Channel.

Figure 10 shows that C2 URLs are gathered from the description section of the attackers Telegram Channels. This way attackers can update their C2 URL every time when needed (for example when their C2 server is deleted). This technique has been used before for some versions of Anubis (7).

Godfather blog 10

Figure 10 – Example of C2 URLs stored as encrypted
format to increase anti malware evasion. 

After the infection, Godfather malware sends a HTTP request to an attacker-controlled Telegram Channel to get the latest C2 URLs from the description section of channel. The C2 URL is stored as encrypted using Blowfish (ECB mode) and the key is the string ABC (Figure 11). 

Godfather blog 11
Figure 11 - C2 Decryption process. 

EclecticIQ analysts decrypted the encrypted C2 server and obtained this URL (henkormerise[.]com) by using the same decryption algorithm (Blowfish ECB mode) with a key “ABC”. 

Godfather blog 12
Figure 12 – Decrypted C2 server. 

After the successful infection, Godfather malwares collects the below data and sends it to the C2 server:

  • The default user-agent for the device 
  • The country code of the current network operator
  • Bot ID  
  • Whether the screen is currently being recorded
  • List of installed applications
  • Name of the network operator
  • Phone status (locked or unlocked)
  • Android version
  • Device model 

Conclusion 

Mobile banking applications are popular with many users, increasing cybercriminals’ focus on stealing financial data in mobile phones. The Godfather banking trojan is a successful example of malware-as-a-service model and its ease of use have made it a notable cyber threat. EclecticIQ researchers assess that banking trojan malware developers will continue to retool their malware into multi-application credential stealers mimicking Godfather’s success.  

How to Protect Against New Godfather Banking Trojan Campaigns: 

  • Do not install applications from un-official app stores and always verify sources. 
  • Be careful allowing any permissions on a mobile app, for example a calculator app won’t need to access to the microphone or SMS messages. 
  • Ensure that Google Play Protect is enabled on Android devices. 
  • Be cautious opening unsolicited links received via SMS or emails on your mobile phone. 
  • Use strong passwords updated regularly and enforce multi-factor authentication for accounts. 
  • Keep devices, operating systems, and applications updated to avoid vulnerabilities exploited by cyber criminals. 

MITRE ATT&CK® Techniques 

Technique ID  

Technique Name 

T1476 

Deliver Malicious App via Other Mean 

T1444 

Masquerade as Legitimate Application 

T1575 

Native Code 

T1412 

Capture SMS Messages 

T1437.001 

Application Layer Protocol: Web Protocols 

T1513 

Screen Capture 

T1406 

Obfuscated Files or Information 



Indicators of Compromise (IOCs)
  

Godfather Banking Trojan APK - SHA256 Hash 

0b72c22517fdefd4cf0466d8d4c634ca73b7667d378be688efe131af4ac3aed8 
38386f4fabd0bc7f7065eaee818717e89772fb3b1a3744df754c45778e353f70 7664293fc1dde797940d857d1f16eb1e12a15b9126d704854f97df1bedc18758 9815ba07d0a2528c11d377b583243df24218a48c6a4f839f40769ea290555070 9dfb5b4ad9aac36c2d7fbb93f8668faa819cb0df16f4a55d00f1cdda89c9a6d2 a14aad1265eb307fbe71a3a5f6e688408ce153ff19838b3c5229f26ee3ece5dd b6249fa996cb4046bdab37bab5e3b4d43c79ea537f119040c3b3e138149897fd c3dadb9a593523d1bf3fe76dabf375578119aff3110d92a1a4ee6db06742263a c4bace10849f23e9972e555ac2e30ac128b7a90017a0f76c197685a0c60def6d c79857015dbf220111e7c5f47cf20a656741a9380cc0faecd486b517648eb199 d652ac528102de3ebb42a973db639ae27f13738e005172e5ff8aac6e91f3f760 a0991b9933ac9365945991822f9e09597c24f79a5770ee9c7980d7b840b0c12a 

 

C2 Channels

xxps[://]t[.]me/kingwallmansjob 
hxxp[://]50[.]18[.]3[.]26/ 
hxxps[://]t[.]me/nutkomterposekcons 
hxxps[://]t[.]me/dobrynyanikitichsobre 
hxxps[://]t[.]me/ropenetwork 
hxxp[://]heikenmorgan[.]com/ 
hxxps[://]t[.]me/bektororrope 
hxxp[://]45[.]61[.]138[.]60/ 
hxxp[://]168[.]100[.]9[.]86/ 
hxxps[://]henkormerise[.]com/ 
hxxps[://]t[.]me/dobrynyanikitichwarrior 
hxxps[://]t[.]me/dukestepanovich 
hxxps[://]banerrokutepera[.]com/ 
hxxps[://]t[.]me/rosesoldiermans 
hxxps[://]t[.]me/puykomterivon 
hxxps[://]t[.]me/potezkomerpozx 

 

About EclecticIQ Intelligence & Research Team

EclecticIQ is a global provider of threat intelligence, hunting, and response technology and services. Headquartered in Amsterdam, the EclecticIQ Intelligence & Research Team is made up of experts from Europe and the U.S. with decades of experience in cyber security and intelligence in industry and government.

We would love to hear from you. Please send us your feedback by emailing us at research@eclecticiq.com.

You might also be interested in:

QakBot Malware Used Unpatched Vulnerability to Bypass Windows OS Security Feature

EclecticIQ Retrospective: A Look at the Themes & Events That Shaped the 2022 Cyber Landscape

Compliance Does Not Equal Cybersecurity

Appendix

  1. https://blog.cyble.com/2022/12/20/godfather-malware-returns-targeting-banking-users/   
  2. https://blog.group-ib.com/godfather-trojan   
  3. https://www.msn.com/en-xl/news/other/germany-regulator-warns-of-godfather-malware-attacks/ar-AA168vkj   
  4. https://cointelegraph.com/news/german-regulator-warns-of-new-banking-and-crypto-malware-godfather   
  5. https://www.malwarebytes.com/blog/news/2022/12/godfather-android-banking-malware-is-on-the-rise    
  6. https://www.theregister.com/2022/12/22/godfather_banking_trojan/
  7. https://www.bafin.de/SharedDocs/Veroeffentlichungen/DE/Verbrauchermitteilung/weitere/2023/meldung_2023_01_09_warnung_aktuelle_schadsoftware.html
  8. https://www.trendmicro.com/en_us/research/19/a/google-play-apps-drop-anubis-banking-malware-use-motion-based-evasion-tactics.html
  9. https://www.virustotal.com/gui/file/a0991b9933ac9365945991822f9e09597c24f79a5770ee9c7980d7b840b0c12a/detection  

Talk to one of our experts

Protect your organization with cutting-edge threat intelligence. Book your free demo today and explore how our products and services can help you meet your security needs.
Book a call
cta-footer
Book a demo