White Paper

Unveiling Maorrisbot: The Inner Workings of an Android Trojan Malware

Unveiling Maorrisbot: The Inner Workings of an Android Trojan Malware

Pages 16 Pages

CloudSEK's analysis of the Maorrisbot Android Trojan reveals that threat actors distribute this malware through fake challan messages on WhatsApp. Once installed, it steals contacts, SMS messages, and device data, forwarding them to attackers via a Telegram bot. The malware, part of the Wromba family, employs anti-analysis techniques to evade detection. CloudSEK successfully extracted the Telegram bot token used by the attackers, highlighting the sophisticated methods used to harvest sensitive information across the Asia-Pacific region.

Join for free to read