Technical Analysis & Remediation
MITRE ATT&CK Mapping
TA0035
Collection
T1636.002
Protected User Data: Accounts
CVE Profile
N/A [CISA KEV Status: Inactive].
This threat model relies on manual user installation and the granting of broad system permissions rather than the remote exploitation of a specific CVE.
Telemetry
SHA256 Hash 2df29702c90b128dec46d5eb110ccc668622b90b4f69957c9edd369483ab9b1d
SHA256 Hash 2e6f85dfdcbadb7d0541bf1db57f68104441fdc5c12062366fcbb1798c175867
SHA256 Hash 865a177881c92997c00770c864284767e998f0af66bfd7b4c4e5305a9eeb1f50
Constraint
Because this malware exclusively targets Android platforms, the file container resembles an APK package that likely abuses Android Accessibility Services to achieve persistence and capture on-screen protected user data.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
Note
Due to the Environmental Reality Check, these actions are targeted at Mobile Device Management (MDM) infrastructure.
GOVERN (GV) – Crisis Management & Oversight
Command
Issue a fleet-wide advisory to mobile users regarding the risks of sideloading Android applications and navigating unsolicited links distributed via Telegram.
DETECT (DE) – Monitoring & Analysis
Command
Ingest the provided SHA256 telemetry into corporate MDM and Endpoint Detection and Response (EDR) mobile blocklists.
Command
Monitor network egress for anomalous, sustained large file downloads originating from Hugging Face domains on corporate mobile subnets.
RESPOND (RS) – Mitigation & Containment
Command
Isolate any managed Android device exhibiting unauthorized overlay windows, suspicious battery drain, or unexpected device performance throttling.
RECOVER (RC) – Restoration & Trust
Command
Perform a remote wipe/factory reset on compromised mobile hardware and re-provision via a known-clean MDM profile.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Restrict application installations exclusively to the Managed Google Play Store and enforce strict policies against "Unknown Sources" installations.
Remediation - THE HOME USER TRACK (Safety Focus)
Since the Environmental Reality Check confirms this vulnerability targets the Android OS, the threat to default Windows Home environments is Theoretical/Low. The following applies to Android users.
Priority 1: Safety
Command
Disconnect from the internet immediately (enable Airplane Mode) if you suspect a malicious app was recently sideloaded.
Command
Do not log into banking/email applications until the device is verified clean.
Priority 2: Identity
Command
Reset passwords and rotate MFA tokens for sensitive accounts using a known clean device (e.g., a Windows desktop or a separate secure phone).
Priority 3: Persistence
Command
Navigate to Settings > Accessibility and disable any unrecognized services with granted permissions.
Command
Boot the Android device into "Safe Mode" to prevent third-party applications from launching, then manually uninstall any suspicious applications.
Hardening & References
Baseline
CIS Benchmarks for Google Android.
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Cyble Research & Intelligence Labs
CRIL-ThreatIntelligence