
| Names | PixStealer BrazKing | |
| Category | Malware | |
| Type | Banking trojan, Info stealer, Credential stealer | |
| Description | (Check Point) The PixStealer malware’s internal name is “Pag Cashback 1.4″. It was distributed on Google Play as a fake PagBank Cashback service and targeted only the Brazilian PagBank. The package name com.pagcashback.beta indicates the application might be in the beta stage. PixStealer uses a “less is more” technique: as a very small app with minimum permissions and no connection to a C&C, it has only one function: transfer all of the victim’s funds to an actor-controlled account. With this approach, the malware cannot update itself by communicating with a C&C, or steal and upload any information about the victims, but achieves the very important goal: to stay undetectable. | |
| Information | <https://research.checkpoint.com/2021/pixstealer-a-new-wave-of-android-banking-trojans-abusing-accessibility-services/> <https://securityintelligence.com/posts/brazking-android-malware-upgraded-targeting-brazilian-banks/> | |
| Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/apk.pixstealer> | |
Last change to this tool card: 27 December 2022
Download this tool card in JSON format
Previous: PixPirate
Next: PlainGnome
| Changed | Name | Country | Observed | ||
Unknown groups | |||||
| _[ Interesting malware not linked to an actor yet ]_ | |||||
1 group listed (0 APT, 0 other, 1 unknown)
|
Digital Service Security Center Follow us on |
Report incidents |
|
| +66 (0)2-123-1227 | ||
| [email protected] | ||