Tria stealer targets Android users for SMS exfiltration and financial gain

Jan. 30, 2025, 5:33 p.m.

Description

Since mid-2024, a malicious Android campaign dubbed 'Tria Stealer' has been targeting users in Malaysia and Brunei using wedding invitation lures. The malware collects SMS data, call logs, messages from apps like WhatsApp, and email data from Gmail and Outlook. It exfiltrates this information to Telegram bots used as C2 servers. The threat actor exploits the stolen data to hijack personal messaging accounts, impersonate victims to request money transfers, and compromise other accounts. The campaign is likely operated by an Indonesian-speaking threat actor based on language artifacts found. The malware continues to be actively distributed as of January 2025, focusing on expanding its victim pool and financial fraud.

Date

  • Created: Jan. 30, 2025, 5:08 p.m.
  • Published: Jan. 30, 2025, 5:08 p.m.
  • Modified: Jan. 30, 2025, 5:33 p.m.

Indicators

  • c7721857e90a5c0f97c0b62c7fe06b19d1bde18a08e57127785687b5aa7c65da
  • 63c971652d9313665df835836d1d36e602b7dbfef4ed21083f1adf8e4dceac74
  • 43789dee64640abe2d08cb89e99b39b58bb297d8e1cea9bdc0a2aedbf7c7a46e

Attack Patterns

  • Tria Stealer
  • T1412
  • T1094
  • T1582

Additional Informations

  • Brunei Darussalam
  • Malaysia