Skip to main content

Android Document Readers and Deception: Tracking the Latest Updates to Anatsa

Medium
Published: Fri Aug 22 2025 (08/22/2025, 23:28:39 UTC)
Source: AlienVault OTX General

Description

Anatsa, an Android banking malware first discovered in 2020, has evolved with new capabilities and targets. The latest variant now affects over 831 financial institutions worldwide, including new countries and cryptocurrency platforms. Anatsa has streamlined its payload delivery, implemented DES runtime decryption, and added device-specific restrictions. The malware uses decoy applications in the Google Play Store, some exceeding 50,000 downloads. Alongside Anatsa, 77 other malicious apps from various families were identified, totaling over 19 million installs. Anatsa's evasion techniques include emulation checks, device model verification, and the use of malformed archives to hide malicious code. The malware primarily steals credentials through fake banking login pages tailored to detected financial apps on the user's device.

AI-Powered Analysis

AILast updated: 08/25/2025, 11:18:43 UTC

Technical Analysis

Anatsa is a sophisticated Android banking malware first identified in 2020 that has recently evolved with enhanced capabilities and an expanded target range. The latest variant affects over 831 financial institutions globally, including new countries and cryptocurrency platforms, indicating a broadening of its attack surface. The malware employs decoy applications distributed via the Google Play Store, some of which have amassed over 50,000 downloads, facilitating widespread infection. Anatsa’s payload delivery has been streamlined for efficiency, and it now uses DES runtime decryption to evade static detection methods. It also incorporates device-specific restrictions, such as emulation checks and device model verification, to avoid execution in analysis environments and to target real devices selectively. Additionally, it uses malformed archives to conceal malicious code, further complicating detection. Once installed, Anatsa primarily steals user credentials by presenting fake banking login pages tailored to the financial apps detected on the infected device, enabling targeted credential theft. Alongside Anatsa, 77 other malicious Android apps from various malware families have been identified, collectively accounting for over 19 million installs, highlighting a significant threat landscape on the Android platform. Indicators of compromise include specific file hashes, IP addresses, domains, and URLs associated with the malware’s infrastructure. Despite its sophistication, there are no known exploits in the wild beyond these infection vectors, and no CVEs have been assigned to this malware. The threat is currently rated as medium severity by the source.

Potential Impact

For European organizations, especially financial institutions and cryptocurrency platforms, Anatsa poses a significant risk to the confidentiality and integrity of user credentials and sensitive financial data. The malware’s ability to masquerade as legitimate document reader apps on the Google Play Store increases the likelihood of infection among employees and customers using Android devices. Credential theft can lead to unauthorized access to banking accounts, fraudulent transactions, and potential financial losses. The tailored phishing pages increase the success rate of credential harvesting, potentially compromising multi-factor authentication if SMS or app-based tokens are targeted. The presence of device-specific evasion techniques complicates detection and mitigation efforts, increasing dwell time and potential damage. Additionally, the malware’s spread through popular apps with substantial downloads suggests a high infection rate, which could impact the reputation and trust in affected financial institutions. The inclusion of cryptocurrency platforms as targets also raises concerns about theft of digital assets, which are harder to recover. Overall, the threat undermines user trust in mobile banking and financial services, potentially leading to regulatory scrutiny and financial penalties under European data protection laws such as GDPR if customer data is compromised.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to the unique characteristics of Anatsa. First, enforce strict mobile device management (MDM) policies that restrict installation of apps to trusted sources and enforce app vetting procedures, including scanning for known malicious hashes and behaviors. Encourage users to avoid downloading document reader or financial apps from unofficial or unverified sources, and educate them about the risks of fake banking login pages. Deploy advanced mobile threat defense (MTD) solutions capable of detecting runtime decryption and emulation evasion techniques used by Anatsa. Regularly update and patch all mobile applications and operating systems to reduce vulnerabilities that malware could exploit. Financial institutions should implement behavioral analytics to detect anomalous login patterns indicative of credential theft or account takeover. Employ strong multi-factor authentication methods that do not rely solely on SMS or app-based tokens vulnerable to interception. Monitor network traffic for connections to known malicious IPs and domains associated with Anatsa’s infrastructure, and block these at the perimeter. Finally, collaborate with app store providers to report and remove identified malicious apps promptly and participate in threat intelligence sharing to stay updated on emerging variants.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/android-document-readers-and-deception-tracking-latest-updates-anatsa"]
Adversary
Anatsa
Pulse Id
68a8fd27824526b648f5b4e1
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash5f85261cf55ed10e73c9b68128092e70
hash9b6e5703bb0dc0ce8aa98281d0821642
hasha4973b21e77726a88aca1b57af70cc0a
hashed8ea4dc43da437f81bef8d5dc688bdb

Ip

ValueDescriptionCopy
ip185.215.113.108
ip193.24.123.18
ip91.215.85.55

Url

ValueDescriptionCopy
urlhttp://docsresearchgroup.com/
urlhttp://saurkanot.com/policy.html
urlhttp://saurkanot.com/privacy.html

Domain

ValueDescriptionCopy
domaindocsresearchgroup.com
domainsaurkanot.com

Threat ID: 68ac42cead5a09ad004b061e

Added to database: 8/25/2025, 11:02:38 AM

Last enriched: 8/25/2025, 11:18:43 AM

Last updated: 8/26/2025, 7:36:53 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats