1.0 Introduction
2. The victim was directed to a link given by phone call or mobile messaging app and asked to open using mobile browser and click on a BNM logo.
6. Actually, the page is a webpage hosted at C2 server where all the information supplied by the victim will be parsed to this page. The malicious app also records victim’s sim number and tied it to the information supplied by the same app.

MyCERT and NC4 had received several reports from Financial Institutions regarding their customers’ smartphones had been infected with malware through a scam campaign recently. National Cyber Coordination and Command Centre (NC4) has released an alert regarding this matter. Users may refer to the URL below for details:
2.0 Impact
• The victim suffered money loss through the non-consented transaction.
• Disclosure of personal information to scammers or unknown parties may increase similar scamming campaigns in future.
3.0 Modus Operandi
In summary, the modus operandi for this scam is as follows:
4.0 Preliminary Analysis
Sample:
Binary | Sha-256 Hash | Size |
bnm_d7_psigned | 21cda890254d5519bb6dfee3a68025ca4ddfdb41a846ae5d9b2b556bb0b3474c | 978 KB |
bnm_h_signed.apk | e010b28b36375a21fc08752235a9052a98cf4200e08a70c90a83cf3b1ed54c53 | 1.3 MB |
bnm_m_psigned.apk | a1494a3ccffc644da8470fd997c7f84446cd9dc961cae2703e15724a47730986 | 1.6 MB |
Server Information:
IP Address | Port | Location | Remark |
67.229.128.74 | 88 | South Korea | Cloud Service, host malicious file |
23.244.168.148 | 8080 | Nevada |
Cloud Service,
C2 server
|
183.86.209.102 | 8080 | South Korea |
Cloud Service,
C2 server
|
Scammer Information:
Phone Number Used |
+6011-25662436 |
+6011-12081457 |
+6011-2302925 |
When victim browses to the given link using mobile browser , it will display a web page with Bank Negara logo. The victim will be instructed to click on the logo to download an app and directed to install it on their device.
JavaScript is used on the website to ensure only mobile browser can see the content. If the victim is using the browser on their PC, they will be redirected to PDRM official website.
5.0 Behaviour Analysis
1. Scammer guide victim to enable “Unknown Sources” in Settings -> Security to enable application installation from unverified Source.
3. A file will be downloaded into the victim phone. The victim will be guided to install the APK on their device.
4. Once installed and open, the app will request to become default SMS app.
5. The app then displays a page for the user to key-in all the required credential information to log in to BNM system. The scammer will guide victim to fill up necessary information.
6. Actually, the page is a webpage hosted at C2 server where all the information supplied by the victim will be parsed to this page. The malicious app also records victim’s sim number and tied it to the information supplied by the same app.
7. After victim press Enter button on the screen, the app submits the information to C2 server and the victim will be served with a page "Submit OK. your information is under checking" (Page contain spelling error).
8. The app then starts monitoring the SMS inbox and continuously communicated with the C2 server.