BeatBanker: both banker and miner for Android
BeatBanker is a sophisticated Android malware campaign targeting Brazil. It spreads through phishing attacks using a fake Google Play Store website. The malware combines a cryptocurrency miner and a banking Trojan capable of hijacking devices and overlaying screens. It employs creative persistence mechanisms, including playing an inaudible audio loop. BeatBanker monitors device status, disguises itself as legitimate apps, and targets cryptocurrency transactions on Binance and Trust Wallet. Recent variants have replaced the banking module with the BTMOB remote administration tool, expanding its capabilities. The threat demonstrates advanced evasion techniques, uses Firebase Cloud Messaging for command and control, and targets multiple browsers for data collection. Victims are primarily located in Brazil, with some samples spreading via WhatsApp.
AI Analysis
Technical Summary
BeatBanker is a sophisticated Android malware campaign that targets Brazilian users by leveraging phishing attacks through fake Google Play Store websites. The malware uniquely combines two malicious functionalities: a banking Trojan and a cryptocurrency miner. The banking Trojan component hijacks devices by overlaying screens on targeted cryptocurrency applications such as Binance and Trust Wallet, enabling attackers to intercept credentials and transaction details. The mining component illicitly uses device resources to mine cryptocurrency, degrading device performance and increasing power consumption. BeatBanker employs creative persistence mechanisms, notably playing an inaudible audio loop to prevent the system from suspending the malware process, thereby maintaining continuous operation. It disguises itself as legitimate applications to evade user suspicion and monitors device status to optimize its malicious activities. Recent variants have replaced the banking module with the BTMOB remote administration tool (RAT), expanding the malware’s capabilities to include broader remote control and data exfiltration. The malware uses Firebase Cloud Messaging (FCM) as its command and control (C2) infrastructure, allowing attackers to send commands and updates stealthily. It targets multiple browsers to collect sensitive data and spreads primarily through phishing campaigns and WhatsApp messages. The infrastructure includes multiple malicious domains and URLs used for mining pools and C2 communication. Although primarily focused on Brazil, the malware’s modular design and propagation methods could facilitate expansion to other regions.
Potential Impact
The BeatBanker malware poses significant risks to infected individuals and organizations, especially those involved in cryptocurrency transactions. The banking Trojan component threatens the confidentiality and integrity of financial data by intercepting credentials and manipulating transactions on popular cryptocurrency platforms, potentially leading to direct financial losses. The cryptocurrency miner component degrades device performance, increases power consumption, and can shorten device lifespan, impacting user productivity and increasing operational costs. The use of the BTMOB RAT in recent variants expands the threat’s impact by enabling attackers to remotely control infected devices, exfiltrate sensitive data, and potentially deploy additional payloads. The malware’s persistence and evasion techniques complicate detection and removal, increasing the likelihood of prolonged infections. Organizations with employees using Android devices for cryptocurrency management or with BYOD policies are at risk of indirect compromise. The phishing vector and WhatsApp propagation method highlight the threat’s potential for rapid spread within social and professional networks. While currently focused on Brazil, the malware’s capabilities and infrastructure could be adapted for broader attacks, posing a global risk to Android users involved in cryptocurrency activities.
Mitigation Recommendations
To mitigate the risk posed by BeatBanker, organizations and users should implement targeted measures beyond generic advice: 1) Educate users specifically about phishing threats involving fake Google Play Store websites and the risks of installing apps from unofficial sources. 2) Deploy mobile threat defense (MTD) solutions capable of detecting overlay attacks, unauthorized audio playback, and suspicious background mining activity on Android devices. 3) Monitor network traffic for connections to known malicious domains and URLs associated with BeatBanker’s mining pools and command and control infrastructure, blocking these at the network perimeter. 4) Enforce strict app installation policies, including the use of Google Play Protect and restricting sideloading of apps unless verified. 5) Implement behavioral analytics on mobile devices to detect unusual CPU usage patterns indicative of cryptomining. 6) Regularly update Android OS and security patches to reduce exploitation opportunities. 7) Use multi-factor authentication (MFA) on cryptocurrency accounts to reduce the impact of credential theft. 8) Monitor and restrict the use of Firebase Cloud Messaging tokens and audit their usage to detect unauthorized command and control communications. 9) Encourage users to verify links received via WhatsApp or other messaging platforms before clicking, and consider deploying messaging security solutions that scan for malicious links. 10) Conduct incident response drills focused on mobile malware infections to improve detection and remediation capabilities.
Affected Countries
Brazil, Portugal, United States, India, Germany
Indicators of Compromise
- hash: d3005bf1d52b40b0b72b3c3b1773336b
- hash: f6c979198809e13859196b135d21e79b
- hash: 84c05f590e9a5fe65ed34986900cf59334c7fbf5
- hash: bb9c6a6c84f26f5d98332089f90a4bfa735cbcc984a3f49e2ca8124db9d1600f
- url: http://pool-proxy.fud2026.com:9000
- url: http://pool.fud2026.com:9000
- url: https://accessor.fud2026.com/libmine-
- url: https://fud2026.com/libmine-
- domain: bt-mob.net
- domain: btmob.xyz
- domain: cupomgratisfood.shop
- domain: accessor.fud2026.com
- domain: aptabase.fud2026.com
- domain: aptabase.khwdji319.xyz
- domain: pool-proxy.fud2026.com
- domain: pool.fud2026.com
BeatBanker: both banker and miner for Android
Description
BeatBanker is a sophisticated Android malware campaign targeting Brazil. It spreads through phishing attacks using a fake Google Play Store website. The malware combines a cryptocurrency miner and a banking Trojan capable of hijacking devices and overlaying screens. It employs creative persistence mechanisms, including playing an inaudible audio loop. BeatBanker monitors device status, disguises itself as legitimate apps, and targets cryptocurrency transactions on Binance and Trust Wallet. Recent variants have replaced the banking module with the BTMOB remote administration tool, expanding its capabilities. The threat demonstrates advanced evasion techniques, uses Firebase Cloud Messaging for command and control, and targets multiple browsers for data collection. Victims are primarily located in Brazil, with some samples spreading via WhatsApp.
AI-Powered Analysis
Technical Analysis
BeatBanker is a sophisticated Android malware campaign that targets Brazilian users by leveraging phishing attacks through fake Google Play Store websites. The malware uniquely combines two malicious functionalities: a banking Trojan and a cryptocurrency miner. The banking Trojan component hijacks devices by overlaying screens on targeted cryptocurrency applications such as Binance and Trust Wallet, enabling attackers to intercept credentials and transaction details. The mining component illicitly uses device resources to mine cryptocurrency, degrading device performance and increasing power consumption. BeatBanker employs creative persistence mechanisms, notably playing an inaudible audio loop to prevent the system from suspending the malware process, thereby maintaining continuous operation. It disguises itself as legitimate applications to evade user suspicion and monitors device status to optimize its malicious activities. Recent variants have replaced the banking module with the BTMOB remote administration tool (RAT), expanding the malware’s capabilities to include broader remote control and data exfiltration. The malware uses Firebase Cloud Messaging (FCM) as its command and control (C2) infrastructure, allowing attackers to send commands and updates stealthily. It targets multiple browsers to collect sensitive data and spreads primarily through phishing campaigns and WhatsApp messages. The infrastructure includes multiple malicious domains and URLs used for mining pools and C2 communication. Although primarily focused on Brazil, the malware’s modular design and propagation methods could facilitate expansion to other regions.
Potential Impact
The BeatBanker malware poses significant risks to infected individuals and organizations, especially those involved in cryptocurrency transactions. The banking Trojan component threatens the confidentiality and integrity of financial data by intercepting credentials and manipulating transactions on popular cryptocurrency platforms, potentially leading to direct financial losses. The cryptocurrency miner component degrades device performance, increases power consumption, and can shorten device lifespan, impacting user productivity and increasing operational costs. The use of the BTMOB RAT in recent variants expands the threat’s impact by enabling attackers to remotely control infected devices, exfiltrate sensitive data, and potentially deploy additional payloads. The malware’s persistence and evasion techniques complicate detection and removal, increasing the likelihood of prolonged infections. Organizations with employees using Android devices for cryptocurrency management or with BYOD policies are at risk of indirect compromise. The phishing vector and WhatsApp propagation method highlight the threat’s potential for rapid spread within social and professional networks. While currently focused on Brazil, the malware’s capabilities and infrastructure could be adapted for broader attacks, posing a global risk to Android users involved in cryptocurrency activities.
Mitigation Recommendations
To mitigate the risk posed by BeatBanker, organizations and users should implement targeted measures beyond generic advice: 1) Educate users specifically about phishing threats involving fake Google Play Store websites and the risks of installing apps from unofficial sources. 2) Deploy mobile threat defense (MTD) solutions capable of detecting overlay attacks, unauthorized audio playback, and suspicious background mining activity on Android devices. 3) Monitor network traffic for connections to known malicious domains and URLs associated with BeatBanker’s mining pools and command and control infrastructure, blocking these at the network perimeter. 4) Enforce strict app installation policies, including the use of Google Play Protect and restricting sideloading of apps unless verified. 5) Implement behavioral analytics on mobile devices to detect unusual CPU usage patterns indicative of cryptomining. 6) Regularly update Android OS and security patches to reduce exploitation opportunities. 7) Use multi-factor authentication (MFA) on cryptocurrency accounts to reduce the impact of credential theft. 8) Monitor and restrict the use of Firebase Cloud Messaging tokens and audit their usage to detect unauthorized command and control communications. 9) Encourage users to verify links received via WhatsApp or other messaging platforms before clicking, and consider deploying messaging security solutions that scan for malicious links. 10) Conduct incident response drills focused on mobile malware infections to improve detection and remediation capabilities.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://securelist.com/beatbanker-miner-and-banker/119121/"]
- Adversary
- null
- Pulse Id
- 69b00dee760ddbc37285d8c3
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hashd3005bf1d52b40b0b72b3c3b1773336b | — | |
hashf6c979198809e13859196b135d21e79b | — | |
hash84c05f590e9a5fe65ed34986900cf59334c7fbf5 | — | |
hashbb9c6a6c84f26f5d98332089f90a4bfa735cbcc984a3f49e2ca8124db9d1600f | — |
Url
| Value | Description | Copy |
|---|---|---|
urlhttp://pool-proxy.fud2026.com:9000 | — | |
urlhttp://pool.fud2026.com:9000 | — | |
urlhttps://accessor.fud2026.com/libmine- | — | |
urlhttps://fud2026.com/libmine- | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainbt-mob.net | — | |
domainbtmob.xyz | — | |
domaincupomgratisfood.shop | — | |
domainaccessor.fud2026.com | — | |
domainaptabase.fud2026.com | — | |
domainaptabase.khwdji319.xyz | — | |
domainpool-proxy.fud2026.com | — | |
domainpool.fud2026.com | — |
Threat ID: 69b0169cea502d3aa852b221
Added to database: 3/10/2026, 1:03:24 PM
Last enriched: 3/10/2026, 1:18:36 PM
Last updated: 3/14/2026, 2:24:36 AM
Views: 55
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.