BankBot Anubis Switches to Chinese and Adds Telegram for C2

We’ve recently noticed two significant changes in C2 tactics used by the threat actors behind BankBot Anubis, a mobile banking trojan. First is the use of Chinese characters to encode the C2 strings (in addition to base64 encoding). The second is the use of Telegram Messenger in addition to Twitter for communicating C2 URLs. 

Previously reported by PhishLabs, the criminals behind BankBot Anubis have been using public Twitter accounts to post tweets containing encoded C2 URLs in an attempt to hide their C2 infrastructure.

 

BankBot AnubisExample of BankBot Anubis C2 communications via Twitter

 

Recently, we observed BankBot Anubis threat actors encoding C2 information posted to Twitter using Chinese characters. 

 C2 Message Chinese - Twitter

BankBot Anubis Twitter C2 Message in Chinese

 

Why use Chinese? Previously, the C2 posts contained base64 encoded strings. Translating the base64 strings to Chinese characters creates an additional step that malware analysts have to take in order to reveal the plaintext C2. Plus, having a large string of Chinese characters is less suspicious and would definitely garner less attention than the previous base64 encoded strings.

The first step towards revealing the plaintext C2 URL is to convert the Chinese characters.

苏尔的开始比语有屄并而标妈死寞没脚死语在符拉中念吸个中意都拉语意脚拉而努号比要需你拉而件音拉要死斯比的件音苏尔苏尔完

This converts to a base64 string:

NDI2Yzg1ZmU4ZDRkMTA5OTEyMDE4MzBlNWQ0MzdhMWZiNjdh

Which can then be converted to a base16 string:

426c85fe8d4d10991201830e5d437a1fb67a

This is then decoded to reveal the C2 URL in plaintext.

https://[EVIL-DOMAIN.TLD]

Not only have these threat actors updated how they encode their C2 communications, they’re also trying out new ways to deliver them. After seeing the use of Chinese characters on Twitter, we observed the criminals also start using Telegram Messenger, a free messaging application. Telegram offers the use of public channels to broadcast messages to large audiences with a public URL. 

 

Telegram Anubis C2 Message ChineseBankBot Anubis Telegram C2 Message in Chinese

 

Anubis JAR - Public URLScreenshot of BankBot Anubis JAR file containing C2 URL

 

Why the change? The overall trend of using social media such as Facebook, blogs, or Twitter for C2 is not new, however we suspect the addition of Telegram by BankBot Anubis could simply be to test it out as a new venue for C2 communications.

—————————————————–

In summary, these changes are a good example of the ongoing efforts by the threat actors behind BankBot Anubis to improve their product and make it more difficult for the good guys to counter. BankBot Anubis is a very popular mobile banking trojan that targets hundreds of unique mobile applications from organizations worldwide. Security and threat intelligence professionals should have it on their radar and pay close attention to how it evolves. 

*** This is a Security Bloggers Network syndicated blog from The PhishLabs Blog authored by Dan Chabala and Joseph Fleming. Read the original post at: https://info.phishlabs.com/blog/bankbot-anubis-telegram-chinese-c2