GhostGrab Android Malware Hybrid Banking Stealer and Monero ... #1536
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Context (Published October 25, 2025)
GhostGrab is a modular Android stealer plus covert Monero miner distributed outside Google Play. It combines credential harvesting (banking/net‑banking, card data, OTPs), SMS/telephony control, SIM/device fingerprinting, Firebase‑backed C2, and strong persistence via a foreground audio service and broadcast receivers.
Kill chain overview
1) Lure/Delivery ➜ kychelp[.]live redirects to dropper APK:
BOM FIXED DEPOSIT.apk</cod...🔧 Technical Details
Sideload + WebView phishing pipeline: Distribute an APK outside Play, request
REQUEST_INSTALL_PACKAGES, then load staged HTML from assets in a JS‑enabled WebView (kyc.html → debit.html → net.html → pass.html → pin.html) to capture PII, card data, online‑banking creds, transaction password, and ATM PIN. Exfiltrate each submission with a device identifier to Firebase (e.g.,formInfo.json).Foreground audio persistence: Create a
NotificationChanneland callstartForeground()with an “Audio Playing” notification while looping a silentMediaPlayer. This elevates process priority, bypasses Doze throttling, and resists background kills on modern Android.Broadcast‑driven auto‑revival: Register exported receivers for boot, screen, power, connectivity, package, and SMS events. On any trigger, verify and restart the core service with
startForegroundService()and re‑arm a...🤖 Agent Actions
I analyzed the blog and the HackTricks repository and identified the best place to integrate the new technical techniques: the existing page “Mobile Phishing & Malicious App Distribution (Android & iOS)” under Phishing Methodology. This page already covers Android phishing, droppers, WebView, FCM, etc., but it lacked specific content on foreground audio persistence, broadcast-driven auto-revival, Firebase Realtime DB exfil structure, telephony hijack via USSD + SmsManager with SIM-slot control, launcher hiding via intent-filter, and covert native crypto-mining on Android—all central to the GhostGrab campaign.
What I did:
<project>.firebaseio.com/formInfo.json)<NUMBER># / ##21#), sendSms (SmsManager with subscription id), forwardSms with deduplication..so, load with System.load and start with Monero TLS flags using a runtime worker id (example provided).**21*/##21#, FCM+Realtime DB keysclients/<DeviceID>,repository, miner artifacts).Changes applied via repo tools:
No new files were created. The update maintains HackTricks style, adds concrete code snippets, and includes the required “References” update.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.