RatOn Trojan Gains Control of Bank Accounts and Triggers Auto-Payments

Security researchers at ThreatFabric MTI have uncovered a sophisticated new Android banking trojan, dubbed RatOn, which merges classic overlay and NFC relay tactics with full remote access and Automated Transfer System (ATS) capabilities.

Emerging on July 5, 2025, and evolving through August 29, 2025, RatOn represents the first known integration of NFC relay attacks into a Remote Access Trojan framework delivering low-latency, text-based control alongside traditional screen casting for rapid operator-driven fraud.

Multi-Stage Infection and RAT Features

The attack chain begins when victims download a malicious dropper APK from Czech and Slovak adult-themed domains masquerading as third-party app installers.

Once sideloaded, the dropper loads a WebView interface that invokes its installApk API, seamlessly installing a second-stage payload.

This payload immediately prompts users via another WebView to grant Accessibility Service and Device Admin privileges. With these permissions, RatOn auto-accepts additional requests for contacts and system settings access, then operates stealthily in the background.

Leveraging Accessibility APIs, RatOn continually monitors the device’s foreground state, sending both full screenshots and bandwidth-efficient text-based “pseudo-screen” descriptions of UI elements to its control server.

Operators can issue over 50 JSON-driven commands such as display to toggle screen casting, txt_screen for one-time text snapshots, and record for live stream permissions enabling real-time interaction without resource-heavy graphic streaming.

RatOn’s overlay module supports loading remote HTML templates or rendering raw HTML via WebView. Researchers recovered one template styled as a ransom note in Czech and English, likely designed to coerce cryptocurrency users into revealing PINs.

On demand, a third-stage payload, NFSkate, can be dropped or downloaded to carry out NFC relay attacks against contactless payment cards, turning infected devices into active relays for unauthorized transactions.

Automated Transfers and Crypto Exploits

RatOn’s standout ATS feature targets the Czech bank George Česko. Upon receiving a transfer command containing recipient JSON details, the trojan launches the bank’s app and navigates its UI by matching localized labels (“Nová platba,” “Domácí číslo účtu,” “Odeslat”) or tapping hardcoded coordinates.

It populates recipient fields, checks, and adjusts transaction limits via check_limit and limit commands, and inputs previously intercepted PIN codes to finalize transfers—all autonomously.

In addition to traditional banking fraud, RatOn exploits major cryptocurrency wallets—MetaMask, Trust Wallet, Blockchain.com, and Phantom.

Employing Accessibility-driven automation, it unlocks wallets with stolen PINs, navigates to security settings, and extracts recovery phrases for exfiltration. Multi-language support (English, Russian, Czech, Slovak) ensures a broad international reach and effectiveness.

By fusing NFC relay techniques, text-based RAT control, overlay extortion, and ATS capabilities, RatOn emerges as a groundbreaking mobile malware with dual-pronged objectives: localized large-scale theft via money mules and global cryptocurrency compromise.

Organizations should monitor for anomalous Accessibility and WebView behaviors and enforce robust multi-factor authentication to defend against this advanced threat.

Indicators of Compromise

Control server domains:

  • marvelcore[.]top
  • evillab[.]world
  • www-core[.]top
  • tiktok18[.]world
  • evillab[.]world

SHA256 file hashes:

  • bf82609c55304c468996244d3ecc16348d9bea0891482ca724ffefcfaded8b66
  • bba15ecc8404698530761a122d3f03310b5e775f2e1552b645135fefd27e625c
  • 98c711801e9b89b4d0b4fb6c6fc5e8310ef3da226c7ac7261f04505384cd488a
  • 98e09a8f01980d11177549eea9598ffd573e1be355a05ef7d31b85c6be9a38ce
  • bbc7f2b5c17f90e4c054bc525d85cb96a791a9fe8c8295894fac50a9722fc908

Find this Story Interesting! Follow us on Google News , LinkedIn and X to Get More Instant Updates

Priya
Priya
Priya is a Security Reporter who tracks malware campaigns, exploit kits, and ransomware operations. Her reporting highlights technical indicators and attack patterns that matter to defenders

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here