New Android Trojan executes malicious commands on your phone

New Android Trojan executes malicious commands on your phone

XLab researchers uncover “Wpeeper,” a new Android malware infiltrating systems to execute various malicious commands, posing a serious threat to users.

All about the new android trojan

Wpeeper’s distribution is cunning, spread through repackaged apps on UPtodown, a popular third-party store like Google Play. Attackers embed code into APKs, bypassing antivirus detection, resulting in zero detections on VirusTotal.

The malware’s network operations are highly sophisticated, utilizing a multi-level command-and-control (C2) architecture that depends on compromised WordPress sites as relay servers.

This method effectively hides the actual C2 server, increasing the difficulty for security researchers and authorities to trace and disrupt the operation.

Wpeeper, a typical backdoor Trojan for Android systems, supports various malicious functions, including gathering sensitive device data, file management, data uploading and downloading, and executing arbitrary commands.

Its standout feature is encryption and digital signatures safeguarding its network traffic and commands. AES encryption secures all communication between the malware and C2 servers, while elliptic curve signatures prevent unauthorized takeover or tampering with commands.

XLab researchers have been closely tracking Wpeeper’s actions and noticed a sudden cessation in the campaign on April 22nd.

The halt in C2 server and downloader activity raised suspicions among researchers, suggesting it might be a strategic move by the attackers. One theory is that they intentionally paused network activity to keep repackaged APKs undetected by antivirus software.

This tactic may allow the malware to boost its installation count and unveil its full capabilities later, potentially surprising security teams.

Although XLab lacks precise data on Wpeeper’s distribution scale, their analysis of Google and Passive DNS (PDNS) results indicates infections in the thousands without widespread propagation.

Yet, the researchers stress that the threat persists, with the pertinent samples consistently evading detection by security firms.

XLab researchers offer a thorough overview of the Wpeeper Android Trojan, showcasing its sophisticated design, wide-ranging capabilities, and potential broader scheme by the attackers.

They stress the ongoing threat and encourage peers and administrators of affected websites to share insights. In an evolving cybersecurity landscape, vigilance and collaboration among users, security professionals, and researchers are crucial in combating emerging threats such as Wpeeper.



APK 3dab5a687ab46dbbd80189d727637542

ELF 003577a70748ab4ed18af5aecbd0b529



C2 Redirectors



About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!