Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Malware

Ajina.Banker (Infostealer) – Malware

February 26, 2025
Reading Time: 6 mins read
in Malware
Ajina.Banker (Infostealer) – Malware

Ajina.Banker

Type of Malware

Infostealer

Date of Initial Activity

2023

Targeted Countries

Pakistan
Uzbekistan
Azerbaijan
Armenia
Kazakhstan
Russia
Ukraine
Iceland

Motivation

Financial Gain
Data Theft

Attack Vectors

Phishing

Targeted Systems

Android

Type of Information Stolen

Communication Data
Financial Information

Overview

In May 2024, a significant cybersecurity threat was uncovered by Group-IB, a leading cybersecurity firm, targeting bank customers in Central Asia. This threat, identified as Ajina.Banker, is a sophisticated Android malware campaign designed to steal sensitive banking information and intercept Two-Factor Authentication (2FA) messages. Ajina.Banker is distributed through malicious .APK files, often masquerading as legitimate applications related to banking, payments, deliveries, and other everyday services. The malware, which first appeared in the region in late 2023, has rapidly gained traction across Central Asia and beyond, affecting thousands of Android users. The name “Ajina” is derived from a mythical spirit in Uzbek folklore, known for its deceptive and harmful nature. Just as the spirit is said to mislead and harm individuals, the Ajina.Banker malware operates by disguising itself as trusted, benign apps, tricking users into downloading and installing it. Once executed on the device, the malware steals personal and financial data, and can intercept 2FA codes, making it particularly dangerous for users engaged in mobile banking or financial transactions. This type of attack represents a growing trend in the cyber threat landscape, where attackers target individuals’ most sensitive data by leveraging mobile apps, which are increasingly relied upon for financial services.

Targets

Individuals

How they operate

Infection Chain and Initial Access
Ajina.Banker malware typically spreads via malicious Android package files (APKs) disguised as legitimate applications. These apps are often found on informal platforms such as Telegram channels, which are commonly used to distribute pirated or unauthorized software in the region. Upon installation, the malware requests numerous permissions, including access to sensitive system components and applications. These permissions are typically granted by unsuspecting users who believe they are installing legitimate apps, such as banking, payment, or delivery services. The malware’s initial access is largely dependent on social engineering tactics. The attackers take advantage of users’ trust in what appear to be legitimate apps, making it harder for them to distinguish between malicious and trusted software. Once the app is installed, Ajina.Banker begins its malicious behavior by setting up communication with its command-and-control (C2) server. This enables it to receive commands, upload stolen data, and download additional payloads.
Execution and Data Collection
Once activated, the malware begins executing its core functionality. Ajina.Banker’s primary purpose is to steal banking credentials and sensitive financial data. The malware is capable of harvesting data from a wide variety of sources, including banking apps, online payment apps, and even social media platforms that may store sensitive personal information. Ajina.Banker uses techniques such as keylogging, form grabbing, and screen capturing to intercept sensitive data as users interact with their devices. The malware may also initiate fake login screens to capture user credentials when they attempt to access banking or payment applications. Ajina.Banker is particularly dangerous because it can also intercept two-factor authentication (2FA) codes that are often sent via SMS or other messaging systems. This allows attackers to bypass an additional layer of security and gain full access to users’ banking accounts or financial services. The malware’s ability to interact with 2FA mechanisms significantly increases the success rate of its attacks and makes it an attractive tool for cybercriminals targeting the financial sector.
Persistence and Privilege Escalation
To maintain control over infected devices, Ajina.Banker employs several persistence techniques. After installation, the malware ensures that it remains active even if the device is rebooted. It may add itself to the Android system’s startup processes or abuse legitimate system services to ensure that it automatically launches upon boot. Additionally, Ajina.Banker can exploit root access or request additional system privileges from the user, escalating its permissions to gain deeper control over the device. Once it has secured persistence on the infected device, Ajina.Banker can continue its malicious operations undetected, ensuring that the attackers can maintain a continuous stream of stolen data. The malware can also adjust its behavior depending on the permissions it has acquired, expanding its capabilities and making it harder to remove.
Exfiltration and Command-and-Control Communication
Ajina.Banker communicates with remote command-and-control servers to exfiltrate stolen data and receive further instructions. The malware uses encrypted communication channels to obfuscate the data being sent and ensure that its activities remain hidden from network security tools. Stolen banking credentials, payment information, and 2FA codes are transmitted back to the attacker’s C2 infrastructure, where they can be used for financial fraud or sold on underground markets. The malware’s ability to remain undetected while performing these activities is one of its most dangerous features. It avoids triggering security alerts by using standard Android communication protocols, which makes it difficult for traditional antivirus solutions to detect its presence.
Evolution and Spread
Since its discovery, Ajina.Banker has evolved in both sophistication and scale. Initially targeting users in Central Asia, the malware has begun to expand beyond its original region, affecting victims in other parts of the world. This evolution reflects the attackers’ ability to adapt to security measures, change tactics, and refine their distribution techniques. The malware’s modular structure allows it to be easily updated and modified, enabling the threat actors to incorporate new features or exploit newly discovered vulnerabilities in Android systems. Furthermore, the network of affiliates spreading the malware has been growing, with different groups taking part in distributing the malicious APKs. This indicates a highly organized operation with financial incentives driving the spread of the malware across various digital platforms.
Conclusion
Ajina.Banker malware represents a significant threat to users in Central Asia and potentially beyond, due to its ability to bypass common security measures and steal sensitive financial information. Its infection chain, persistence mechanisms, and sophisticated data exfiltration techniques demonstrate the malware’s advanced capabilities. As cybercriminals continue to adapt and refine their tactics, it is essential for users and organizations to remain vigilant against such threats. Using reliable security solutions, exercising caution when installing apps, and being wary of suspicious communications are critical steps in defending against Ajina.Banker and similar Android banking trojans.

MITRE Tactics and Techniques

Initial Access (T1071)
Ajina.Banker malware typically gains initial access through the distribution of malicious .APK files masquerading as legitimate applications. These files are often shared through Telegram channels and other informal messaging platforms.
Execution (T1203)
The malware executes when the user installs the malicious APK. It leverages techniques that require user interaction, including permissions granting and app installation, to initiate the malicious payload on the device.
Persistence (T1547)
Ajina.Banker achieves persistence by embedding itself within the system after installation. It uses techniques to ensure that it continues running even after the device is restarted, and can use system permissions to maintain access to the device.
Privilege Escalation (T1548)
The malware might attempt to escalate its privileges by requesting additional permissions from the user or exploiting system vulnerabilities to obtain root access, enabling it to gain deeper control over the infected device.
Credential Dumping (T1003)
Once installed, the malware seeks to steal sensitive banking information, including credentials. It may use keylogging or other data collection techniques to harvest login credentials and financial data from the infected device.
Credential Access (T1071.001)
Ajina.Banker is specifically designed to target financial data. As part of its credential access, it also seeks to intercept Two-Factor Authentication (2FA) messages, which are commonly used to secure online banking transactions, making the malware especially dangerous.
Exfiltration (T1041)
The collected data, including sensitive banking information and intercepted 2FA codes, is exfiltrated to remote command-and-control (C2) servers controlled by the attackers. This information is typically sent to IP addresses identified in the malware’s network communications.
Command and Control (T1071)
Ajina.Banker communicates with remote C2 servers to receive instructions and send stolen data back to the threat actors. This communication is typically initiated by the malware through hardcoded server addresses or dynamically retrieved C2 information.
Impact (T1486)
The final goal of the malware is to monetize the stolen financial data, which may be used for identity theft, unauthorized transactions, or sold on underground marketplaces. The attackers profit directly from the theft of sensitive financial information.  
References
  • Ajina attacks Central Asia: Story of an Uzbek Android Pandemic
Tags: Ajina.BankerAndroidArmeniaAsiaAzerbaijanGROUP-IBIcelandInfostealersKazakhstanMalwarePakistanRussiaUkraineUzbekistan
ADVERTISEMENT

Related Posts

Iranian Phishing Campaign (Scam) – Malware

Iranian Phishing Campaign (Scam) – Malware

March 2, 2025
Fake WalletConnect (Infostealer) – Malware

Fake WalletConnect (Infostealer) – Malware

March 2, 2025
SilentSelfie (Infostealer) – Malware

SilentSelfie (Infostealer) – Malware

March 2, 2025
Sniper Dz (Scam) – Malware

Sniper Dz (Scam) – Malware

March 2, 2025
TikTok Malware Scam (Trojan) – Malware

TikTok Malware Scam (Trojan) – Malware

March 2, 2025
Zombinder (Exploit Kit) – Malware

Zombinder (Exploit Kit) – Malware

March 2, 2025

Latest Alerts

Old Discord Links Now Lead To Malware

VexTrio TDS Uses Adtech To Spread Malware

Simple Typo Breaks AI Safety Via TokenBreak

Coordinated Brute Force Hits Tomcat Manager

SmartAttack Uses Sound To Steal PC Data

Pentest Tool TeamFiltration Hits Entra ID

Subscribe to our newsletter

    Latest Incidents

    Cyberattack On Brussels Parliament Continues

    Swedish Broadcaster SVT Hit By DDoS

    Major Google Cloud Outage Disrupts Web

    AI Spam Hijacks Official US Vaccine Site

    DragonForce Ransomware Hits Philly Schools

    Erie Insurance Cyberattack Halts Operations

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial