Malware News New MiningDropper framework turns Android apps into multi-stage delivery systems for miners, RATs, and banking trojans.

Khushal

Level 14
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
697
4,117
1,269
Cyble Research and Intelligence Labs (CRIL) has been monitoring a significant surge in the use of “MiningDropper”, a sophisticated Android malware delivery framework that combines cryptocurrency mining capabilities with the deployment of infostealers, Remote Access Trojans (RATs), and banking malware.
Key Takeaways
MiningDropper is a multi-stage Android malware delivery framework that combines cryptocurrency mining activity with the deployment of additional malicious payloads.
The recently identified MiningDropper variant leverages a trojanized version of the open-source Android application project “Lumolight”.
Dropper implements layered obfuscation (XOR + AES) and native code execution to evade detection and hinder analysis
Uses a state-driven payload execution, initially deploying a miner before transitioning to user-defined payloads
Actively used in phishing campaigns impersonating RTO services, banks, telecom providers, and popular applications
Delivers malware payloads, including infostealers and BTMOB RAT, capable of full device compromise
 
This is a useful report because it shows that Android malware campaigns are continuing to evolve beyond simple fake apps.

What stands out here

  • It is not just a single malware sample, but a delivery framework.
  • The miner appears to be only one part of the operation, with the more serious risk being the later deployment of infostealers, RATs, or banking trojans.
  • Using a trojanized open-source app is a common and effective tactic, because it gives attackers a legitimate-looking base application.
  • Layered obfuscation and native code usage can make static analysis and signature-based detection more difficult.

Why this matters in practice

A cryptocurrency miner on Android is already undesirable because it can drain battery, overheat the device, and degrade performance.

The larger concern is the multi-stage behavior. If the framework can move from mining to credential theft or remote access, the miner may function as a distraction, a monetization layer, or simply an early-stage payload before more damaging malware is delivered.

That makes this kind of threat more dangerous than a typical single-purpose Android miner.

Notable tactics mentioned

  • Phishing lures themed around RTO services, banks, telecom providers, and popular apps
  • State-based payload execution, which suggests controlled staging rather than dropping everything at once
  • Obfuscation with XOR and AES, plus native code execution
  • Use of additional payloads such as infostealers and BTMOB RAT

Security takeaway for Android users

  • Avoid installing APKs from links in SMS, messaging apps, or unofficial websites
  • Prefer Google Play or the official vendor’s site when software is genuinely needed
  • Review app permissions carefully, especially accessibility access, SMS access, notification access, and device admin-related prompts
  • Keep Google Play Protect enabled, while remembering that no single layer is perfect
  • If a banking, telecom, or government-themed app is involved, verify through the organization’s official website before installing anything

For analysts and defenders

This report also reinforces a broader point: open-source Android projects can be repackaged into malware very easily. That means trust should not be based on the app’s visible functionality alone. Distribution source, signing, code changes, network behavior, and post-install activity matter just as much.

Bottom line

If Cyble’s analysis is accurate, MiningDropper looks more significant as a modular Android malware platform than as a miner alone. The mining component may get attention, but the real danger is the staged delivery of credential theft, banking fraud, and remote device compromise.
 
  • Like
Reactions: Halp2001