droppers

AppWizard
October 15, 2025
The GhostBat RAT campaign employs sophisticated malware distribution techniques, utilizing infection vectors such as WhatsApp, SMS with shortened URLs, GitHub-hosted APKs, and compromised websites to deliver malicious Android droppers. These droppers utilize multi-stage workflows, ZIP header manipulation, and string obfuscation to evade detection. The malware includes tools for stealing banking credentials and cryptocurrency miners, directing victims to phishing pages resembling the mParivahan app to collect sensitive information. SMS messages with banking keywords are exfiltrated to command and control servers, while incoming messages may be forwarded for OTP harvesting. Device registration occurs through a Telegram bot named GhostBatRat_bot. In July 2024, Android malware impersonating Regional Transport Office applications was documented, designed to steal contacts and SMS messages. Observations from September 2025 revealed over forty samples propagating through WhatsApp and SMS, ultimately delivering a malicious version of the mParivahan app. The malware initiates phishing activities by requesting SMS permissions and harvesting banking credentials. VirusTotal detections for the malware remain low due to its multi-layered dropper mechanisms and obfuscation techniques. The architecture of GhostBat RAT features multi-stage dropper workflows, native binary packing, and heavy string obfuscation. The first-stage dropper verifies device architecture and manufacturer, while subsequent stages decrypt and execute payloads, including a cryptominer library and a malicious APK for data theft. Victims encounter a counterfeit Google Play update page, leading to the installation of the malicious APK, which requests SMS permissions and presents a phishing interface. Users are prompted to enter their UPI PIN into a fake payment flow, which forwards the PIN to a Firebase endpoint. The campaign highlights the need for careful SMS permission management and vigilance against shortened URLs to combat emerging Android malware threats.
AppWizard
October 10, 2025
A spyware campaign is disguising itself as popular applications like TikTok, YouTube, and WhatsApp to lure users into downloading the ClayRat spyware. This campaign uses Telegram channels for distribution and employs fake download counts and testimonials on malicious websites. Discovered by Zimperium, the spyware requires users to set it as their default SMS application, allowing it to access sensitive information and spread further. The campaign is primarily targeting Russian users, with at least 600 samples and 50 droppers detected in the last 90 days. The malware uses obfuscation techniques to evade detection. Android users with Google Play Protect have some protection, but best practices for online safety are recommended, such as using reputable app sources and avoiding suspicious links.
AppWizard
October 9, 2025
A sophisticated Android spyware campaign called ClayRat is targeting users in Russia through Telegram channels and deceptive phishing websites that mimic popular applications like WhatsApp and TikTok. Once activated, ClayRat can exfiltrate sensitive data such as SMS messages and call logs, access device information, take photos, and send messages or make calls from the victim's device. It propagates by sending malicious links to all contacts in the victim's phone book. Over the past 90 days, Zimperium has identified over 600 samples and 50 droppers of ClayRat, which uses advanced obfuscation techniques to evade detection. The malware redirects users to fraudulent websites leading to Telegram channels, where they are lured into downloading APK files. Some samples function as droppers, displaying counterfeit Play Store update screens while concealing the actual payload. Once installed, ClayRat communicates with its command-and-control infrastructure and can capture sensitive content, making infected devices automated distribution nodes. Additionally, a study by researchers from the University of Luxembourg and Université Cheikh Anta Diop found that pre-installed applications on budget Android smartphones sold in Africa operate with elevated privileges, with 9% disclosing sensitive data and 16% exposing critical components without safeguards.
Winsage
September 5, 2025
A cybercrime group named GhostRedirector has infiltrated at least 65 Windows servers worldwide, using undocumented malware to manipulate Google search rankings for gambling sites. The group's activities began in December, with indications of operation since at least August 2024. They employ two malware variants, Rungan (a C++ backdoor) and Gamshen (an IIS trojan), to execute SEO fraud by altering website responses to Googlebot and creating fake backlinks. Most compromised servers are located in Brazil, Peru, Thailand, Vietnam, and the United States, with a focus on South America and South Asia. The initial breach likely occurred via an SQL injection vulnerability, followed by the use of PowerShell to download privilege escalation tools and malware from a server identified as 868id[.]com. Tools used include EfsPotato and BadPotato, which are signed with a certificate linked to Shenzhen Diyuan Technology. GhostRedirector also utilizes a custom library called Comdai for various backdoor functionalities and another tool named Zunput for gathering information about active websites. Rungan executes backdoor commands, while Gamshen facilitates the SEO manipulation process.
Search