Case Study — Real Investigation

Loan App Malware Investigation:
7 Malicious APKs, Android Forensics,
Incident Resolved in 72 Hours

A real-world fraud investigation involving a sophisticated loan app malware attack. Covers Android forensics using ADB, malware behavioural analysis, evidence procedures, and victim support methodology. Published as a sanitised case study for fraud prevention professionals.

📅 Investigation completed: 2025 🔍 Type: Mobile Malware Fraud + Device Forensics 📍 Geography: India ⚡ Resolution: 72 hours

Investigation Outcomes

7
Malicious APKs identified & removed
72 hrs
Full device forensics completed
100%
Incident timeline reconstructed
0
Residual malware post-remediation

Background — What Was Reported

The victim reported receiving multiple loan app notifications from applications they did not recall installing. Bank transaction alerts were being received on a device that appeared to be operating independently — SMS messages, call logs, and contacts were being accessed without user initiation.

The device had previously been used to apply for a loan through an unofficial loan application downloaded from a third-party APK distribution source rather than the Google Play Store. Within days of installation, the device began exhibiting indicators of compromise.

Initial indicators: unauthorised SMS access, unknown outbound data transfers, new device admin privilege requests appearing during normal use. Classic markers of a loan app malware campaign designed for data exfiltration.

Attack Vector — How the Malware Operated

Loan app malware in India follows a predictable but effective pattern. The fraudulent application is designed to appear legitimate — complete with onboarding flows, KYC requests, and loan amount displays. The real purpose is harvesting the device's data during the "onboarding" phase, before the victim realises no loan will ever be disbursed.

Permissions Requested (Malicious Intent)

PermissionStated PurposeActual UseRisk
READ_SMSOTP verificationHarvest all SMS including bank OTPsCritical
READ_CONTACTSAuto-fill referralExtract full contact list for blackmailCritical
CALL_LOGNot statedMap financial relationships via call patternsCritical
CAMERAKYC selfieSilent background photo captureCritical
RECORD_AUDIONot statedEnvironmental audio surveillanceHigh
DEVICE_ADMINSecurity featurePrevent uninstallation, persist on deviceCritical
INSTALL_PACKAGESApp updatesInstall additional malware silentlyCritical

Investigation — Six-Step Forensic Process

The investigation followed a structured mobile forensics methodology using Android Debug Bridge (ADB) — the same approach used by incident response teams at enterprise level.

01
Device Triage
ADB connection established. Device information gathered: model, Android version, build fingerprint, battery state. Confirmed device was rooted, which had enabled the malware to gain elevated privileges.
02
Package Enumeration
All installed packages listed and cross-referenced. Third-party packages isolated. 7 packages identified as malicious — none present in the Google Play Store. Package names mimicking legitimate banking apps, using typosquatted bundle IDs.
03
Permission Audit
Each malicious package's declared permissions audited against Play Store policy. All 7 declared DEVICE_ADMIN. 5 declared READ_SMS without a legitimate use case. All had INSTALL_PACKAGES permissions, creating a self-propagating install chain.
04
Network Traffic Analysis
Outbound network connections logged during active device use. Data exfiltration to 3 distinct IP ranges confirmed — one registered to a cloud provider in Southeast Asia, two with no legitimate registration. SMS content and contact data confirmed as exfiltrated payloads.
05
Evidence Collection
Full logcat dump extracted. APK files preserved for analysis. Timeline of installation events, permission grants, and data transmission reconstructed with timestamps. Documentation prepared in format suitable for cybercrime complaint filing.
06
Remediation
Device admin privileges revoked for all 7 applications. Malicious APKs force-uninstalled via ADB. Factory reset performed after backup of legitimate data. Victim advised on post-incident steps: bank account monitoring, credit bureau freeze, cybercrime portal complaint.

Key Signals — What Made This Detectable

Several signals were present from the moment the first malicious APK was installed. These are the patterns that fraud and security teams should treat as immediate red flags:

Detection was possible because the victim noticed anomalous battery drain and unexpected notifications — classic post-compromise indicators. Most victims of this attack pattern do not notice for weeks, by which time significant data exfiltration has occurred.

What This Demonstrates

This investigation demonstrates several capabilities relevant to platform fraud teams and security practitioners:

Implications for Lending Platforms

Lending platforms in India face a specific problem: many of their victims and fraudsters operate on the same category of compromised devices. A user applying for a loan via a banking app on a device that is simultaneously running loan app malware creates a complex fraud surface:

Platforms that rely solely on SMS OTP for authentication and do not perform device integrity checks are operating with a significant blind spot in this threat environment.

Facing a fraud incident or unusual platform behaviour?

Zarelva provides structured fraud investigation, incident response, and platform risk assessment for fintech and AI-native products. Fixed fee. NDA from day one.