Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

BeatBanker: both banker and miner for Android

0
Medium
Published: Tue Mar 10 2026 (03/10/2026, 12:26:22 UTC)
Source: AlienVault OTX General

Description

BeatBanker is a sophisticated Android malware campaign targeting Brazil. It spreads through phishing attacks using a fake Google Play Store website. The malware combines a cryptocurrency miner and a banking Trojan capable of hijacking devices and overlaying screens. It employs creative persistence mechanisms, including playing an inaudible audio loop. BeatBanker monitors device status, disguises itself as legitimate apps, and targets cryptocurrency transactions on Binance and Trust Wallet. Recent variants have replaced the banking module with the BTMOB remote administration tool, expanding its capabilities. The threat demonstrates advanced evasion techniques, uses Firebase Cloud Messaging for command and control, and targets multiple browsers for data collection. Victims are primarily located in Brazil, with some samples spreading via WhatsApp.

AI-Powered Analysis

AILast updated: 03/10/2026, 13:18:36 UTC

Technical Analysis

BeatBanker is a sophisticated Android malware campaign that targets Brazilian users by leveraging phishing attacks through fake Google Play Store websites. The malware uniquely combines two malicious functionalities: a banking Trojan and a cryptocurrency miner. The banking Trojan component hijacks devices by overlaying screens on targeted cryptocurrency applications such as Binance and Trust Wallet, enabling attackers to intercept credentials and transaction details. The mining component illicitly uses device resources to mine cryptocurrency, degrading device performance and increasing power consumption. BeatBanker employs creative persistence mechanisms, notably playing an inaudible audio loop to prevent the system from suspending the malware process, thereby maintaining continuous operation. It disguises itself as legitimate applications to evade user suspicion and monitors device status to optimize its malicious activities. Recent variants have replaced the banking module with the BTMOB remote administration tool (RAT), expanding the malware’s capabilities to include broader remote control and data exfiltration. The malware uses Firebase Cloud Messaging (FCM) as its command and control (C2) infrastructure, allowing attackers to send commands and updates stealthily. It targets multiple browsers to collect sensitive data and spreads primarily through phishing campaigns and WhatsApp messages. The infrastructure includes multiple malicious domains and URLs used for mining pools and C2 communication. Although primarily focused on Brazil, the malware’s modular design and propagation methods could facilitate expansion to other regions.

Potential Impact

The BeatBanker malware poses significant risks to infected individuals and organizations, especially those involved in cryptocurrency transactions. The banking Trojan component threatens the confidentiality and integrity of financial data by intercepting credentials and manipulating transactions on popular cryptocurrency platforms, potentially leading to direct financial losses. The cryptocurrency miner component degrades device performance, increases power consumption, and can shorten device lifespan, impacting user productivity and increasing operational costs. The use of the BTMOB RAT in recent variants expands the threat’s impact by enabling attackers to remotely control infected devices, exfiltrate sensitive data, and potentially deploy additional payloads. The malware’s persistence and evasion techniques complicate detection and removal, increasing the likelihood of prolonged infections. Organizations with employees using Android devices for cryptocurrency management or with BYOD policies are at risk of indirect compromise. The phishing vector and WhatsApp propagation method highlight the threat’s potential for rapid spread within social and professional networks. While currently focused on Brazil, the malware’s capabilities and infrastructure could be adapted for broader attacks, posing a global risk to Android users involved in cryptocurrency activities.

Mitigation Recommendations

To mitigate the risk posed by BeatBanker, organizations and users should implement targeted measures beyond generic advice: 1) Educate users specifically about phishing threats involving fake Google Play Store websites and the risks of installing apps from unofficial sources. 2) Deploy mobile threat defense (MTD) solutions capable of detecting overlay attacks, unauthorized audio playback, and suspicious background mining activity on Android devices. 3) Monitor network traffic for connections to known malicious domains and URLs associated with BeatBanker’s mining pools and command and control infrastructure, blocking these at the network perimeter. 4) Enforce strict app installation policies, including the use of Google Play Protect and restricting sideloading of apps unless verified. 5) Implement behavioral analytics on mobile devices to detect unusual CPU usage patterns indicative of cryptomining. 6) Regularly update Android OS and security patches to reduce exploitation opportunities. 7) Use multi-factor authentication (MFA) on cryptocurrency accounts to reduce the impact of credential theft. 8) Monitor and restrict the use of Firebase Cloud Messaging tokens and audit their usage to detect unauthorized command and control communications. 9) Encourage users to verify links received via WhatsApp or other messaging platforms before clicking, and consider deploying messaging security solutions that scan for malicious links. 10) Conduct incident response drills focused on mobile malware infections to improve detection and remediation capabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://securelist.com/beatbanker-miner-and-banker/119121/"]
Adversary
null
Pulse Id
69b00dee760ddbc37285d8c3
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hashd3005bf1d52b40b0b72b3c3b1773336b
hashf6c979198809e13859196b135d21e79b
hash84c05f590e9a5fe65ed34986900cf59334c7fbf5
hashbb9c6a6c84f26f5d98332089f90a4bfa735cbcc984a3f49e2ca8124db9d1600f

Url

ValueDescriptionCopy
urlhttp://pool-proxy.fud2026.com:9000
urlhttp://pool.fud2026.com:9000
urlhttps://accessor.fud2026.com/libmine-
urlhttps://fud2026.com/libmine-

Domain

ValueDescriptionCopy
domainbt-mob.net
domainbtmob.xyz
domaincupomgratisfood.shop
domainaccessor.fud2026.com
domainaptabase.fud2026.com
domainaptabase.khwdji319.xyz
domainpool-proxy.fud2026.com
domainpool.fud2026.com

Threat ID: 69b0169cea502d3aa852b221

Added to database: 3/10/2026, 1:03:24 PM

Last enriched: 3/10/2026, 1:18:36 PM

Last updated: 3/14/2026, 2:24:36 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses