Android Document Readers and Deception: Tracking the Latest Updates to Anatsa
Anatsa, an Android banking malware first discovered in 2020, has evolved with new capabilities and targets. The latest variant now affects over 831 financial institutions worldwide, including new countries and cryptocurrency platforms. Anatsa has streamlined its payload delivery, implemented DES runtime decryption, and added device-specific restrictions. The malware uses decoy applications in the Google Play Store, some exceeding 50,000 downloads. Alongside Anatsa, 77 other malicious apps from various families were identified, totaling over 19 million installs. Anatsa's evasion techniques include emulation checks, device model verification, and the use of malformed archives to hide malicious code. The malware primarily steals credentials through fake banking login pages tailored to detected financial apps on the user's device.
AI Analysis
Technical Summary
Anatsa is a sophisticated Android banking malware first identified in 2020 that has recently evolved with enhanced capabilities and an expanded target range. The latest variant affects over 831 financial institutions globally, including new countries and cryptocurrency platforms, indicating a broadening of its attack surface. The malware employs decoy applications distributed via the Google Play Store, some of which have amassed over 50,000 downloads, facilitating widespread infection. Anatsa’s payload delivery has been streamlined for efficiency, and it now uses DES runtime decryption to evade static detection methods. It also incorporates device-specific restrictions, such as emulation checks and device model verification, to avoid execution in analysis environments and to target real devices selectively. Additionally, it uses malformed archives to conceal malicious code, further complicating detection. Once installed, Anatsa primarily steals user credentials by presenting fake banking login pages tailored to the financial apps detected on the infected device, enabling targeted credential theft. Alongside Anatsa, 77 other malicious Android apps from various malware families have been identified, collectively accounting for over 19 million installs, highlighting a significant threat landscape on the Android platform. Indicators of compromise include specific file hashes, IP addresses, domains, and URLs associated with the malware’s infrastructure. Despite its sophistication, there are no known exploits in the wild beyond these infection vectors, and no CVEs have been assigned to this malware. The threat is currently rated as medium severity by the source.
Potential Impact
For European organizations, especially financial institutions and cryptocurrency platforms, Anatsa poses a significant risk to the confidentiality and integrity of user credentials and sensitive financial data. The malware’s ability to masquerade as legitimate document reader apps on the Google Play Store increases the likelihood of infection among employees and customers using Android devices. Credential theft can lead to unauthorized access to banking accounts, fraudulent transactions, and potential financial losses. The tailored phishing pages increase the success rate of credential harvesting, potentially compromising multi-factor authentication if SMS or app-based tokens are targeted. The presence of device-specific evasion techniques complicates detection and mitigation efforts, increasing dwell time and potential damage. Additionally, the malware’s spread through popular apps with substantial downloads suggests a high infection rate, which could impact the reputation and trust in affected financial institutions. The inclusion of cryptocurrency platforms as targets also raises concerns about theft of digital assets, which are harder to recover. Overall, the threat undermines user trust in mobile banking and financial services, potentially leading to regulatory scrutiny and financial penalties under European data protection laws such as GDPR if customer data is compromised.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the unique characteristics of Anatsa. First, enforce strict mobile device management (MDM) policies that restrict installation of apps to trusted sources and enforce app vetting procedures, including scanning for known malicious hashes and behaviors. Encourage users to avoid downloading document reader or financial apps from unofficial or unverified sources, and educate them about the risks of fake banking login pages. Deploy advanced mobile threat defense (MTD) solutions capable of detecting runtime decryption and emulation evasion techniques used by Anatsa. Regularly update and patch all mobile applications and operating systems to reduce vulnerabilities that malware could exploit. Financial institutions should implement behavioral analytics to detect anomalous login patterns indicative of credential theft or account takeover. Employ strong multi-factor authentication methods that do not rely solely on SMS or app-based tokens vulnerable to interception. Monitor network traffic for connections to known malicious IPs and domains associated with Anatsa’s infrastructure, and block these at the perimeter. Finally, collaborate with app store providers to report and remove identified malicious apps promptly and participate in threat intelligence sharing to stay updated on emerging variants.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Belgium
Indicators of Compromise
- hash: 5f85261cf55ed10e73c9b68128092e70
- hash: 9b6e5703bb0dc0ce8aa98281d0821642
- hash: a4973b21e77726a88aca1b57af70cc0a
- hash: ed8ea4dc43da437f81bef8d5dc688bdb
- ip: 185.215.113.108
- ip: 193.24.123.18
- ip: 91.215.85.55
- url: http://docsresearchgroup.com/
- url: http://saurkanot.com/policy.html
- url: http://saurkanot.com/privacy.html
- domain: docsresearchgroup.com
- domain: saurkanot.com
Android Document Readers and Deception: Tracking the Latest Updates to Anatsa
Description
Anatsa, an Android banking malware first discovered in 2020, has evolved with new capabilities and targets. The latest variant now affects over 831 financial institutions worldwide, including new countries and cryptocurrency platforms. Anatsa has streamlined its payload delivery, implemented DES runtime decryption, and added device-specific restrictions. The malware uses decoy applications in the Google Play Store, some exceeding 50,000 downloads. Alongside Anatsa, 77 other malicious apps from various families were identified, totaling over 19 million installs. Anatsa's evasion techniques include emulation checks, device model verification, and the use of malformed archives to hide malicious code. The malware primarily steals credentials through fake banking login pages tailored to detected financial apps on the user's device.
AI-Powered Analysis
Technical Analysis
Anatsa is a sophisticated Android banking malware first identified in 2020 that has recently evolved with enhanced capabilities and an expanded target range. The latest variant affects over 831 financial institutions globally, including new countries and cryptocurrency platforms, indicating a broadening of its attack surface. The malware employs decoy applications distributed via the Google Play Store, some of which have amassed over 50,000 downloads, facilitating widespread infection. Anatsa’s payload delivery has been streamlined for efficiency, and it now uses DES runtime decryption to evade static detection methods. It also incorporates device-specific restrictions, such as emulation checks and device model verification, to avoid execution in analysis environments and to target real devices selectively. Additionally, it uses malformed archives to conceal malicious code, further complicating detection. Once installed, Anatsa primarily steals user credentials by presenting fake banking login pages tailored to the financial apps detected on the infected device, enabling targeted credential theft. Alongside Anatsa, 77 other malicious Android apps from various malware families have been identified, collectively accounting for over 19 million installs, highlighting a significant threat landscape on the Android platform. Indicators of compromise include specific file hashes, IP addresses, domains, and URLs associated with the malware’s infrastructure. Despite its sophistication, there are no known exploits in the wild beyond these infection vectors, and no CVEs have been assigned to this malware. The threat is currently rated as medium severity by the source.
Potential Impact
For European organizations, especially financial institutions and cryptocurrency platforms, Anatsa poses a significant risk to the confidentiality and integrity of user credentials and sensitive financial data. The malware’s ability to masquerade as legitimate document reader apps on the Google Play Store increases the likelihood of infection among employees and customers using Android devices. Credential theft can lead to unauthorized access to banking accounts, fraudulent transactions, and potential financial losses. The tailored phishing pages increase the success rate of credential harvesting, potentially compromising multi-factor authentication if SMS or app-based tokens are targeted. The presence of device-specific evasion techniques complicates detection and mitigation efforts, increasing dwell time and potential damage. Additionally, the malware’s spread through popular apps with substantial downloads suggests a high infection rate, which could impact the reputation and trust in affected financial institutions. The inclusion of cryptocurrency platforms as targets also raises concerns about theft of digital assets, which are harder to recover. Overall, the threat undermines user trust in mobile banking and financial services, potentially leading to regulatory scrutiny and financial penalties under European data protection laws such as GDPR if customer data is compromised.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the unique characteristics of Anatsa. First, enforce strict mobile device management (MDM) policies that restrict installation of apps to trusted sources and enforce app vetting procedures, including scanning for known malicious hashes and behaviors. Encourage users to avoid downloading document reader or financial apps from unofficial or unverified sources, and educate them about the risks of fake banking login pages. Deploy advanced mobile threat defense (MTD) solutions capable of detecting runtime decryption and emulation evasion techniques used by Anatsa. Regularly update and patch all mobile applications and operating systems to reduce vulnerabilities that malware could exploit. Financial institutions should implement behavioral analytics to detect anomalous login patterns indicative of credential theft or account takeover. Employ strong multi-factor authentication methods that do not rely solely on SMS or app-based tokens vulnerable to interception. Monitor network traffic for connections to known malicious IPs and domains associated with Anatsa’s infrastructure, and block these at the perimeter. Finally, collaborate with app store providers to report and remove identified malicious apps promptly and participate in threat intelligence sharing to stay updated on emerging variants.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.zscaler.com/blogs/security-research/android-document-readers-and-deception-tracking-latest-updates-anatsa"]
- Adversary
- Anatsa
- Pulse Id
- 68a8fd27824526b648f5b4e1
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash5f85261cf55ed10e73c9b68128092e70 | — | |
hash9b6e5703bb0dc0ce8aa98281d0821642 | — | |
hasha4973b21e77726a88aca1b57af70cc0a | — | |
hashed8ea4dc43da437f81bef8d5dc688bdb | — |
Ip
Value | Description | Copy |
---|---|---|
ip185.215.113.108 | — | |
ip193.24.123.18 | — | |
ip91.215.85.55 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://docsresearchgroup.com/ | — | |
urlhttp://saurkanot.com/policy.html | — | |
urlhttp://saurkanot.com/privacy.html | — |
Domain
Value | Description | Copy |
---|---|---|
domaindocsresearchgroup.com | — | |
domainsaurkanot.com | — |
Threat ID: 68ac42cead5a09ad004b061e
Added to database: 8/25/2025, 11:02:38 AM
Last enriched: 8/25/2025, 11:18:43 AM
Last updated: 8/26/2025, 7:36:53 AM
Views: 9
Related Threats
PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
MediumPhishing Campaign Targeting Companies via UpCrypter
MediumThreatFox IOCs for 2025-08-25
MediumMalicious apps with +19M installs removed from Google Play because spreading Anatsa banking trojan and other malware
MediumFake Voicemail Emails Install UpCrypter Malware on Windows Devices
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.