Names | PixStealer BrazKing | |
Category | Malware | |
Type | Banking trojan, Info stealer, Credential stealer | |
Description | (Check Point) The PixStealer malware’s internal name is “Pag Cashback 1.4″. It was distributed on Google Play as a fake PagBank Cashback service and targeted only the Brazilian PagBank. The package name com.pagcashback.beta indicates the application might be in the beta stage. PixStealer uses a “less is more” technique: as a very small app with minimum permissions and no connection to a C&C, it has only one function: transfer all of the victim’s funds to an actor-controlled account. With this approach, the malware cannot update itself by communicating with a C&C, or steal and upload any information about the victims, but achieves the very important goal: to stay undetectable. | |
Information | <https://research.checkpoint.com/2021/pixstealer-a-new-wave-of-android-banking-trojans-abusing-accessibility-services/> <https://securityintelligence.com/posts/brazking-android-malware-upgraded-targeting-brazilian-banks/> | |
Malpedia | <https://malpedia.caad.fkie.fraunhofer.de/details/apk.pixstealer> |
Last change to this tool card: 27 December 2022
Download this tool card in JSON format
Changed | Name | Country | Observed | ||
Unknown groups | |||||
_[ Interesting malware not linked to an actor yet ]_ |
1 group listed (0 APT, 0 other, 1 unknown)
Digital Service Security Center Follow us on |
Report incidents |
|
+66 (0)2-123-1227 | ||
[email protected] |