New Malware called BeatBanker was detected. It was said to target Pix payments, banking apps, and crypto wallets using a multi-layered distribution strategy built on impersonation and trust, while it also has a banking module that monitors the following browsers installed on the victim’s Android device.
Chrome
Firefox
sBrowser
Brave
Opera
DuckDuckGo
Dolphin Browser
Edge
Attackers were said to create fake Google Play Store hosted using the domains they control. The Google Play Store pages are perfect replicas of legitimate Play Store listings, with complete apps, descriptions, ratings, and the “Install” button. The difference is that instead of directing users to the real Play Store,
the button downloads a malicious APK.
Note: If you get this response or APK download when trying to install an app using Google Play Store, it's the BeatBanker. Although the attacker was said to currently focus on Brazil, that doesn't mean they won't shift attack location as we speak.

The BeatBanker malware allows attackers to watch the victim's screen in real time and navigate it. They see the victim type in a recipient's PIX key and similar details.

When the user tries to make a transaction, BeatBanker creates overlay pages for Binance, Trust Wallet, etc, covertly replacing the destination address with its own wallet address.
Source