Marcher

Description

(ZScaler) Upon infection, Marcher would inspect the victim’s device and send a list of all installed apps to its command and control (C&C) server. If the malware found any German financial apps installed in the device, it would show a fake page asking for credentials of that particular institution. Unaware that the login page is a fake, the victim would provide their credentials where they would then be sent to the malware’s C&C. The malware would also show a fake Google Play payment page if the infected device did not have any German financial firm apps.

Names

Name
Marcher

Category

Malware

Type

  • Banking trojan
  • Credential stealer

Information

Mitre Attack

Malpedia

Alienvault Otx

Other Information

Uuid

7edce969-8cb1-410a-abb1-1612803b3e35

Last Card Change

2022-12-30