Hackers Deploy APK Malware with Remote Command Execution via 607 Malicious Domains

A sophisticated Android malware campaign has been uncovered by PreCrime™ Labs, the threat research division at BforeAI, involving at least 607 malicious domains registered through Gname.

These domains, predominantly Chinese-language and utilizing a variety of typosquatted names such as “teleqram” and “telegramapp,” are engaged in distributing fake Telegram Messenger APKs to unwitting users, leveraging deceptive branding and aggressive search engine optimization (SEO) tactics.

Remote Command Execution
Telegram APK download site featured in Chinese language

Deceptive Distribution

Victims are lured into downloading either a 60MB or 70MB Android APK masquerading as Telegram, often through QR codes embedded on the phishing domains.

Scanning these codes directs visitors to zifeiji[.]asia, a centralized distribution hub that replicates Telegram’s branding assets, including the favicon, download options, and design motifs, to foster user trust.

The site titles, rendered entirely in Chinese, further obfuscate their intent by repetitively referencing the so-called “Paper Plane Official Website” a tactic aimed at both boosting SEO rankings and distracting from the illicit nature of the operation.

The campaign employs a blog-like webpage layout to appear legitimate and trustworthy. Analysis of the distributed APKs reveals they are signed using only the v1 signature scheme, thus exposing devices running Android 5.0 to 8.0 to the infamous Janus vulnerability.

Remote Command Execution
Blog-like appearance of a phishing site distributing the malicious Telegram APK

By exploiting this outdated signing method, attackers can repackage legitimate APKs with malicious payloads, retaining the original signature and bypassing conventional security checks on vulnerable devices.

Disassembled samples show the rogue APKs requesting broad permissions for external storage access (such as READ_EXTERNAL_STORAGE and WRITE_EXTERNAL_STORAGE), enabling invasive data theft.

The apps utilize outdated cleartext protocols (HTTP/FTP/DownloadManager), which compromise secure data transmission and expose users to further interception risks.

Embedded within the application logic, MediaPlayer functions and socket-based callbacks facilitate the remote execution of arbitrary commands allowing attackers to establish a persistent control channel for real-time surveillance, exfiltration of files, and further exploitation.

Further analysis links parts of the infrastructure to the JavaScript file hosted at telegramt.net/static/js/ajs.js?v=3.

This script fingerprints visitor platforms (Android, iOS, PC), collects browsing data, and forwards the captured information to dszb77[.]com.

While the script currently only logs analytics, commented-out code sections indicate intentions to aggressively target Android users with persistent in-app download prompts.

Abuse Potential via Firebase

The campaign has also revealed critical risks tied to Firebase misconfigurations. The APKs attempt connections to the now-inactive Firebase instance “tmessages2.firebaseio.com.”

Security researchers warn that adversaries can essentially hijack abandoned Firebase endpoints: by registering a new Firebase project under the same name, all previously distributed apps attempting to reach “tmessages2[.]firebaseio[.]com” would seamlessly connect to the attackers’ infrastructure, maintaining the campaign’s viability even after the original operators cease activity.

PreCrime Labs strongly advises enterprises and end-users to avoid downloading APKs from unofficial sources, especially third-party blogs or mirrored websites offering “official” messaging apps.

Automated threat monitoring, swift takedown procedures, and the use of diverse threat intelligence solutions to identify malicious indicators such as APK hashes, domains, and URLs remain critical countermeasures.

The bulk of these malicious domains utilize .com, .top, .xyz, .online, and .site TLDs, accelerating their proliferation across search engine and social media results.

With remote command execution capabilities and data exfiltration at the core of these malicious APKs, the campaign represents a substantial supply chain threat to both businesses and individuals relying on Android devices.

Indicators of Compromise (IOC)

TypeValueNotes
Domain(s)[Full list available online]607 domains (main site: zifeiji[.]asia)
TLDs observed.com, .top, .xyz, .online, .site
Hash: MD5acff2bf000f2a53f7f02def2f105c196Malicious Telegram APK variant 1
Hash: MD5efddc2dddc849517a06b89095b344647Malicious Telegram APK variant 2
Hash: SHA-19650ae4f4cb81602700bafe81d96e8951aeb6aa5Malicious Telegram APK variant 1
Hash: SHA-16f643666728ee9bc1c48b497f84f5c4d252fe1bcMalicious Telegram APK variant 2
Malicious JShttps://telegramt.net/static/js/ajs.js?v=3Device tracking and targeting
C2/Analytics Domaindszb77[.]comReceives device/browser data
Typosquat Patternsteleqram, telegramapp, telegramdl, apktelegram, etc.
Firebase Endpointtmessages2[.]firebaseio[.]comAbandoned, at high risk of hijacking

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

Mandvi
Mandvi
Mandvi is a Security Reporter covering data breaches, malware, cyberattacks, data leaks, and more at Cyber Press.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here