Questions? +1 (202) 335-3939 Login
Trusted News Since 1995
A service for global professionals · Wednesday, April 2, 2025 · 799,559,280 Articles · 3+ Million Readers

ANY.RUN Uncovers Salvador Stealer: A New Android Malware Targeting Banking Credentials

DUBAI, DUBAI, UNITED ARAB EMIRATES, April 1, 2025 /EINPresswire.com/ -- ANY.RUN, a leading provider of interactive malware analysis and threat intelligence solutions, has uncovered a new Android malware variant, internally naming it Salvador Stealer. Disguised as a legitimate banking application, this malware is designed to steal sensitive personal and financial data, including net banking credentials and OTPs.

๐‡๐จ๐ฐ ๐’๐š๐ฅ๐ฏ๐š๐๐จ๐ซ ๐’๐ญ๐ž๐š๐ฅ๐ž๐ซ ๐–๐จ๐ซ๐ค๐ฌ

Salvador Stealer follows a two-stage infection chain. It is first delivered as a dropper APK, which silently installs a second-stage payload โ€” the actual banking credential stealer.

Once active, the malware displays a fake banking interface inside the app to trick users into entering their personal and banking details. It also abuses SMS permissions to intercept OTPs and verification codes, allowing attackers to bypass two-factor authentication.

๐Š๐ž๐ฒ ๐Ÿ๐ข๐ง๐๐ข๐ง๐ ๐ฌ

ยท ๐—ง๐˜„๐—ผ-๐˜€๐˜๐—ฎ๐—ด๐—ฒ ๐—ถ๐—ป๐—ณ๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—ฐ๐—ต๐—ฎ๐—ถ๐—ป: Dropper APK installs the banking stealer payload.

ยท ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด-๐—ฏ๐—ฎ๐˜€๐—ฒ๐—ฑ ๐—ฐ๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น ๐˜๐—ต๐—ฒ๐—ณ๐˜: Victims are tricked into entering personal and banking data.

ยท ๐—ฅ๐—ฒ๐—ฎ๐—น-๐˜๐—ถ๐—บ๐—ฒ ๐—ฒ๐˜…๐—ณ๐—ถ๐—น๐˜๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป: Stolen information is sent to a phishing server and Telegram C2.

ยท ๐—ข๐—ง๐—ฃ ๐—ถ๐—ป๐˜๐—ฒ๐—ฟ๐—ฐ๐—ฒ๐—ฝ๐˜๐—ถ๐—ผ๐—ป: The malware captures incoming SMS messages to steal OTPs.

ยท ๐—ฃ๐—ฒ๐—ฟ๐˜€๐—ถ๐˜€๐˜๐—ฒ๐—ป๐—ฐ๐—ฒ ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€: Automatically restarts after being stopped and survives device reboots.

ยท ๐—˜๐˜…๐—ฝ๐—ผ๐˜€๐—ฒ๐—ฑ ๐—ถ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ: Publicly accessible admin panel and attackerโ€™s contact information.

To explore the full technical analysis and see how Salvador Stealer operates in real time, visit the detailed report on the ANY.RUN Blog.

๐€๐›๐จ๐ฎ๐ญ ๐€๐๐˜.๐‘๐”๐

ANY.RUN is a leading provider of interactive malware analysis and threat intelligence solutions. Trusted by over 15,000 companies and more than 500,000 cybersecurity professionals worldwide, ANY.RUN empowers security teams to detect, analyze, and investigate cyber threats in real time across Windows, Linux, and Android environments. Every day, the platform processes more than 20,000 malware samples, helping organizations stay ahead of evolving cyber threats.

The ANY.RUN team
ANYRUN FZCO
+1 657-366-5050
email us here
Visit us on social media:
X
LinkedIn
YouTube

Powered by EIN Presswire

Distribution channels: Banking, Finance & Investment Industry, Companies, IT Industry, International Organizations, Technology

Legal Disclaimer:

EIN Presswire provides this news content "as is" without warranty of any kind. We do not accept any responsibility or liability for the accuracy, content, images, videos, licenses, completeness, legality, or reliability of the information contained in this article. If you have any complaints or copyright issues related to this article, kindly contact the author above.

Submit your press release