Android Cryptojacker Masquerades as Banking App to Mine Cryptocurrency on Locked Devices
A new Android malware campaign has been discovered, disguising itself as a banking app to covertly mine cryptocurrency on locked devices. The malware, distributed through a phishing website impersonating Axis Bank, downloads and executes a modified version of XMRig, a popular cryptocurrency mining software. It monitors the device's lock state and battery level, initiating mining operations when the device is locked and stopping when unlocked. This stealthy approach allows for persistent mining, leading to excessive heat generation, battery drain, and potential hardware damage. The malware uses multiple hosting platforms to distribute its payload and connects to specific mining pools. Its impact on devices includes high CPU and memory usage, significant temperature increases, and overall performance degradation.
AI Analysis
Technical Summary
This threat involves a newly discovered Android malware campaign that masquerades as a legitimate banking application, specifically impersonating Axis Bank, to deceive users into installing it. The malware is distributed via phishing websites that mimic the bank's official site, tricking victims into downloading the malicious app. Once installed, the malware covertly downloads and executes a modified version of XMRig, a widely used cryptocurrency mining software. The malware is designed to monitor the device's lock state and battery level, initiating mining operations only when the device is locked and the battery is sufficiently charged, and ceasing mining when the device is unlocked. This stealthy behavior allows the malware to persistently mine cryptocurrency, primarily Monero, without immediate detection by the user. The mining activity results in excessive CPU and memory usage, leading to significant device overheating, rapid battery drain, and potential long-term hardware damage. The malware uses multiple hosting platforms to distribute its payload and connects to specific mining pools through domains such as getxapp.in and pool.uasecurity.org. Indicators of compromise include several file hashes and domains associated with the malware infrastructure. The campaign leverages phishing tactics combined with cryptojacking, exploiting user trust in banking apps and device idle states to maximize mining efficiency while minimizing user suspicion. Although no known exploits are currently reported in the wild, the threat demonstrates a medium severity level due to its potential to degrade device performance and cause hardware issues over time.
Potential Impact
For European organizations, the impact of this threat can be multifaceted. Employees using Android devices for work purposes may inadvertently install the malware, especially if they are targeted by phishing campaigns impersonating banks or financial institutions. The cryptojacking activity can degrade device performance, leading to reduced productivity and increased IT support costs. Overheating and battery drain may cause hardware failures, resulting in device replacement expenses and potential data loss if devices become inoperable. Additionally, compromised devices could serve as entry points for further attacks or data exfiltration if the malware evolves or is combined with other malicious payloads. The use of banking app impersonation may also erode trust in legitimate financial communications, complicating security awareness efforts. While the malware primarily affects individual devices, the cumulative effect on organizational mobile fleets could be significant, especially in sectors with high mobile device usage. The stealthy nature of the malware complicates detection, increasing the risk of prolonged infection periods. Although no direct data breach or credential theft is reported, the operational disruption and hardware damage risks warrant serious attention.
Mitigation Recommendations
To mitigate this threat, European organizations should implement targeted measures beyond generic mobile security advice: 1) Deploy advanced mobile threat defense (MTD) solutions capable of detecting cryptojacking behaviors and unauthorized mining software on Android devices. 2) Enforce strict application installation policies restricting users from installing apps outside official app stores or from untrusted sources, combined with mobile device management (MDM) controls to monitor and block suspicious apps. 3) Conduct focused phishing awareness training emphasizing the risks of banking app impersonation and instructing users to verify URLs and app sources carefully. 4) Monitor network traffic for connections to known malicious domains such as getxapp.in and pool.uasecurity.org, and block these at the firewall or DNS level. 5) Implement battery and CPU usage monitoring on corporate devices to detect abnormal spikes indicative of cryptojacking. 6) Encourage regular device updates and patching to minimize vulnerabilities that could be exploited by malware. 7) Establish incident response procedures for mobile device infections, including forensic analysis of suspicious apps and hashes provided. 8) Collaborate with financial institutions to raise awareness about phishing campaigns impersonating their brands. These steps will help detect, prevent, and respond to this specific cryptojacking threat effectively.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Poland, Belgium
Indicators of Compromise
- domain: getxapp.in
- domain: pool-proxy.uasecurity.org
- domain: pool.uasecurity.org
- hash: 617be84b21428a5f7e137a95d073e077
- hash: 7c3d7cddaf755343a9c32b30739db6e3
- hash: ca99c4a78ca038780d6dcc79390388b4
- hash: 7a47ff4d94420f91418af0a5459e62d60818ef4b
- hash: 9e661480aa5cdd018b2bf93bb2834c9567d5cf95700dfce89ad93693f0bdb781
Android Cryptojacker Masquerades as Banking App to Mine Cryptocurrency on Locked Devices
Description
A new Android malware campaign has been discovered, disguising itself as a banking app to covertly mine cryptocurrency on locked devices. The malware, distributed through a phishing website impersonating Axis Bank, downloads and executes a modified version of XMRig, a popular cryptocurrency mining software. It monitors the device's lock state and battery level, initiating mining operations when the device is locked and stopping when unlocked. This stealthy approach allows for persistent mining, leading to excessive heat generation, battery drain, and potential hardware damage. The malware uses multiple hosting platforms to distribute its payload and connects to specific mining pools. Its impact on devices includes high CPU and memory usage, significant temperature increases, and overall performance degradation.
AI-Powered Analysis
Technical Analysis
This threat involves a newly discovered Android malware campaign that masquerades as a legitimate banking application, specifically impersonating Axis Bank, to deceive users into installing it. The malware is distributed via phishing websites that mimic the bank's official site, tricking victims into downloading the malicious app. Once installed, the malware covertly downloads and executes a modified version of XMRig, a widely used cryptocurrency mining software. The malware is designed to monitor the device's lock state and battery level, initiating mining operations only when the device is locked and the battery is sufficiently charged, and ceasing mining when the device is unlocked. This stealthy behavior allows the malware to persistently mine cryptocurrency, primarily Monero, without immediate detection by the user. The mining activity results in excessive CPU and memory usage, leading to significant device overheating, rapid battery drain, and potential long-term hardware damage. The malware uses multiple hosting platforms to distribute its payload and connects to specific mining pools through domains such as getxapp.in and pool.uasecurity.org. Indicators of compromise include several file hashes and domains associated with the malware infrastructure. The campaign leverages phishing tactics combined with cryptojacking, exploiting user trust in banking apps and device idle states to maximize mining efficiency while minimizing user suspicion. Although no known exploits are currently reported in the wild, the threat demonstrates a medium severity level due to its potential to degrade device performance and cause hardware issues over time.
Potential Impact
For European organizations, the impact of this threat can be multifaceted. Employees using Android devices for work purposes may inadvertently install the malware, especially if they are targeted by phishing campaigns impersonating banks or financial institutions. The cryptojacking activity can degrade device performance, leading to reduced productivity and increased IT support costs. Overheating and battery drain may cause hardware failures, resulting in device replacement expenses and potential data loss if devices become inoperable. Additionally, compromised devices could serve as entry points for further attacks or data exfiltration if the malware evolves or is combined with other malicious payloads. The use of banking app impersonation may also erode trust in legitimate financial communications, complicating security awareness efforts. While the malware primarily affects individual devices, the cumulative effect on organizational mobile fleets could be significant, especially in sectors with high mobile device usage. The stealthy nature of the malware complicates detection, increasing the risk of prolonged infection periods. Although no direct data breach or credential theft is reported, the operational disruption and hardware damage risks warrant serious attention.
Mitigation Recommendations
To mitigate this threat, European organizations should implement targeted measures beyond generic mobile security advice: 1) Deploy advanced mobile threat defense (MTD) solutions capable of detecting cryptojacking behaviors and unauthorized mining software on Android devices. 2) Enforce strict application installation policies restricting users from installing apps outside official app stores or from untrusted sources, combined with mobile device management (MDM) controls to monitor and block suspicious apps. 3) Conduct focused phishing awareness training emphasizing the risks of banking app impersonation and instructing users to verify URLs and app sources carefully. 4) Monitor network traffic for connections to known malicious domains such as getxapp.in and pool.uasecurity.org, and block these at the firewall or DNS level. 5) Implement battery and CPU usage monitoring on corporate devices to detect abnormal spikes indicative of cryptojacking. 6) Encourage regular device updates and patching to minimize vulnerabilities that could be exploited by malware. 7) Establish incident response procedures for mobile device infections, including forensic analysis of suspicious apps and hashes provided. 8) Collaborate with financial institutions to raise awareness about phishing campaigns impersonating their brands. These steps will help detect, prevent, and respond to this specific cryptojacking threat effectively.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.seqrite.com/blog/android-cryptojacker-disguised-as-banking-app-exploits-device-lock-state/"]
- Adversary
- null
- Pulse Id
- 687a4623c2156baa43917a90
- Threat Score
- null
Indicators of Compromise
Domain
Value | Description | Copy |
---|---|---|
domaingetxapp.in | — | |
domainpool-proxy.uasecurity.org | — | |
domainpool.uasecurity.org | — |
Hash
Value | Description | Copy |
---|---|---|
hash617be84b21428a5f7e137a95d073e077 | — | |
hash7c3d7cddaf755343a9c32b30739db6e3 | — | |
hashca99c4a78ca038780d6dcc79390388b4 | — | |
hash7a47ff4d94420f91418af0a5459e62d60818ef4b | SHA1 of 7c3d7cddaf755343a9c32b30739db6e3 | |
hash9e661480aa5cdd018b2bf93bb2834c9567d5cf95700dfce89ad93693f0bdb781 | SHA256 of 7c3d7cddaf755343a9c32b30739db6e3 |
Threat ID: 687aaf02a83201eaacf67532
Added to database: 7/18/2025, 8:30:58 PM
Last enriched: 7/18/2025, 8:31:13 PM
Last updated: 8/20/2025, 1:48:22 PM
Views: 44
Related Threats
CryptoJacking is dead: long live CryptoJacking
MediumMicrosoft 365 Direct Send Abuse: Phishing Risks & Security Recommendations
MediumGmail Phishing Campaign Analysis – “New Voicemail” Email with Dynamics Redirect + Captcha
MediumPolice Bust Crypto Money Laundering Group, Nab Smishing SMS Blaster Operator
Medium'Blue Locker' Analysis: Ransomware Targeting Oil & Gas Sector in Pakistan
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.