Skip to main content

Android Cryptojacker Masquerades as Banking App to Mine Cryptocurrency on Locked Devices

Medium
Published: Fri Jul 18 2025 (07/18/2025, 13:03:31 UTC)
Source: AlienVault OTX General

Description

A new Android malware campaign has been discovered, disguising itself as a banking app to covertly mine cryptocurrency on locked devices. The malware, distributed through a phishing website impersonating Axis Bank, downloads and executes a modified version of XMRig, a popular cryptocurrency mining software. It monitors the device's lock state and battery level, initiating mining operations when the device is locked and stopping when unlocked. This stealthy approach allows for persistent mining, leading to excessive heat generation, battery drain, and potential hardware damage. The malware uses multiple hosting platforms to distribute its payload and connects to specific mining pools. Its impact on devices includes high CPU and memory usage, significant temperature increases, and overall performance degradation.

AI-Powered Analysis

AILast updated: 07/18/2025, 20:31:13 UTC

Technical Analysis

This threat involves a newly discovered Android malware campaign that masquerades as a legitimate banking application, specifically impersonating Axis Bank, to deceive users into installing it. The malware is distributed via phishing websites that mimic the bank's official site, tricking victims into downloading the malicious app. Once installed, the malware covertly downloads and executes a modified version of XMRig, a widely used cryptocurrency mining software. The malware is designed to monitor the device's lock state and battery level, initiating mining operations only when the device is locked and the battery is sufficiently charged, and ceasing mining when the device is unlocked. This stealthy behavior allows the malware to persistently mine cryptocurrency, primarily Monero, without immediate detection by the user. The mining activity results in excessive CPU and memory usage, leading to significant device overheating, rapid battery drain, and potential long-term hardware damage. The malware uses multiple hosting platforms to distribute its payload and connects to specific mining pools through domains such as getxapp.in and pool.uasecurity.org. Indicators of compromise include several file hashes and domains associated with the malware infrastructure. The campaign leverages phishing tactics combined with cryptojacking, exploiting user trust in banking apps and device idle states to maximize mining efficiency while minimizing user suspicion. Although no known exploits are currently reported in the wild, the threat demonstrates a medium severity level due to its potential to degrade device performance and cause hardware issues over time.

Potential Impact

For European organizations, the impact of this threat can be multifaceted. Employees using Android devices for work purposes may inadvertently install the malware, especially if they are targeted by phishing campaigns impersonating banks or financial institutions. The cryptojacking activity can degrade device performance, leading to reduced productivity and increased IT support costs. Overheating and battery drain may cause hardware failures, resulting in device replacement expenses and potential data loss if devices become inoperable. Additionally, compromised devices could serve as entry points for further attacks or data exfiltration if the malware evolves or is combined with other malicious payloads. The use of banking app impersonation may also erode trust in legitimate financial communications, complicating security awareness efforts. While the malware primarily affects individual devices, the cumulative effect on organizational mobile fleets could be significant, especially in sectors with high mobile device usage. The stealthy nature of the malware complicates detection, increasing the risk of prolonged infection periods. Although no direct data breach or credential theft is reported, the operational disruption and hardware damage risks warrant serious attention.

Mitigation Recommendations

To mitigate this threat, European organizations should implement targeted measures beyond generic mobile security advice: 1) Deploy advanced mobile threat defense (MTD) solutions capable of detecting cryptojacking behaviors and unauthorized mining software on Android devices. 2) Enforce strict application installation policies restricting users from installing apps outside official app stores or from untrusted sources, combined with mobile device management (MDM) controls to monitor and block suspicious apps. 3) Conduct focused phishing awareness training emphasizing the risks of banking app impersonation and instructing users to verify URLs and app sources carefully. 4) Monitor network traffic for connections to known malicious domains such as getxapp.in and pool.uasecurity.org, and block these at the firewall or DNS level. 5) Implement battery and CPU usage monitoring on corporate devices to detect abnormal spikes indicative of cryptojacking. 6) Encourage regular device updates and patching to minimize vulnerabilities that could be exploited by malware. 7) Establish incident response procedures for mobile device infections, including forensic analysis of suspicious apps and hashes provided. 8) Collaborate with financial institutions to raise awareness about phishing campaigns impersonating their brands. These steps will help detect, prevent, and respond to this specific cryptojacking threat effectively.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.seqrite.com/blog/android-cryptojacker-disguised-as-banking-app-exploits-device-lock-state/"]
Adversary
null
Pulse Id
687a4623c2156baa43917a90
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domaingetxapp.in
domainpool-proxy.uasecurity.org
domainpool.uasecurity.org

Hash

ValueDescriptionCopy
hash617be84b21428a5f7e137a95d073e077
hash7c3d7cddaf755343a9c32b30739db6e3
hashca99c4a78ca038780d6dcc79390388b4
hash7a47ff4d94420f91418af0a5459e62d60818ef4b
SHA1 of 7c3d7cddaf755343a9c32b30739db6e3
hash9e661480aa5cdd018b2bf93bb2834c9567d5cf95700dfce89ad93693f0bdb781
SHA256 of 7c3d7cddaf755343a9c32b30739db6e3

Threat ID: 687aaf02a83201eaacf67532

Added to database: 7/18/2025, 8:30:58 PM

Last enriched: 7/18/2025, 8:31:13 PM

Last updated: 8/20/2025, 1:48:22 PM

Views: 44

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats