Klopatra exposing a new Android banking trojan operation wit... #1459
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What it is
Klopatra is a new Android banking trojan/RAT disclosed by Cleafy on September 30, 2025. It couples commercial code protection (Virbox) with extensive native libraries to evade analysis, and executes fraud via Hidden VNC (HVNC) and dynamic HTML overlays. Cleafy observed two main botnets and >3,000 compromised devices, primarily in Spain and Italy.
Infection chain
1) Dropper lure: A sideloaded IPTV app named “Mobdro Pro IP TV + VPN” acts as the firs...
🔧 Technical Details
Social-engineering dropper → silent stage install
Abuse a sideloaded lure (e.g., IPTV) to obtain
REQUEST_INSTALL_PACKAGES
, hide the second stage inside a JSON-packed resource, then programmatically extract and install the payload once permission is granted.Accessibility as a full-control substrate
Request Accessibility Services to read UI text, capture keystrokes/gestures, and synthesize clicks/swipes. Use it to auto-approve dialogs, navigate settings, toggle the malware’s own Accessibility state, and operate any app with the victim’s privileges.
HVNC black-screen takeover
Start HVNC (
start_hvnc
), then render a black overlay withaction_blackscreen
by settingscreenBrightness = 0.0f
and drawingR.drawable.blsc
. Operators perform banking actions invisibly while the user sees a blank screen.Dynamic overlay credential theft
Detect targeted apps; fetch server-...
🤖 Agent Actions
I analyzed the blog and updated HackTricks accordingly.
What I added
References
Why this location
No other changes were necessary because:
PR-impacted files
If you want me to additionally add blue-team rules or YARA-like heuristics specifically for HVNC black-screen detection or Virbox artifact hunting, I can extend the detection ideas section further.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).