Mirax Android RAT Turns Devices into SOCKS5 Proxies, Reaching 220,000 via Meta Ads
嗯,用户让我帮忙总结一篇文章,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我得仔细阅读这篇文章,理解它的主要内容。 文章讲的是一个叫Mirax的新型安卓远程访问木马,主要针对说西班牙语的国家。通过Meta平台的广告传播,影响了超过22万个社交媒体账户。Mirax不仅有传统的RAT功能,还能将受感染设备变成代理节点,利用SOCKS5协议和Yamux多路复用技术建立持久的代理通道。攻击者可以利用这些通道绕过地理限制,逃避检测,并进行账户接管或交易欺诈。 此外,Mirax通过Meta广告分发恶意软件,使用GitHub托管恶意APK文件,并采用多种检查机制防止被扫描发现。安装后会伪装成视频播放工具,并提示用户启用辅助功能以在后台运行。它还建立了多个双向C2通道用于任务管理和数据外泄。 总的来说,这篇文章详细描述了Mirax的功能、传播方式以及其对网络安全的影响。用户可能需要一个简洁明了的摘要,用于快速了解主要内容。 现在我要把这些信息浓缩到100字以内。要突出Mirax的功能、传播途径、代理功能以及其带来的威胁。确保语言简洁明了,不使用复杂的术语。 最后检查一下字数是否符合要求,并确保没有遗漏关键点。 </think> Mirax是一种新型安卓远程访问木马,针对西班牙语国家通过Meta广告传播至超22万社交媒体账户。该恶意软件不仅具备传统RAT功能(如键盘记录、照片窃取、实时控制等),还能将感染设备转化为代理节点,利用SOCKS5协议和Yamux技术建立持久代理通道,使攻击者通过受害者真实IP地址匿名化操作。其传播链利用Meta广告推广恶意应用,并通过GitHub托管APK文件以规避检测。 2026-4-14 10:20:0 Author: thehackernews.com(查看原文) 阅读量:10 收藏

A nascent Android remote access trojan called Mirax has been observed actively targeting Spanish-speaking countries, with campaigns reaching more than 220,000 accounts on Facebook, Instagram, Messenger, and Threads through advertisements on Meta.

"Mirax integrates advanced Remote Access Trojan (RAT) capabilities, allowing threat actors to fully interact with compromised devices in real time," Italian online fraud prevention firm Cleafy said.

"Beyond traditional RAT behavior, Mirax enhances its operational value by turning infected devices into residential proxy nodes. Leveraging SOCKS5 protocol support and Yamux multiplexing, it establishes persistent proxy channels that allow attackers to route their traffic through the victim's real IP address."

Details of Mirax first emerged last month when Outpost24's KrakenLabs revealed that a threat actor going by the name "Mirax Bot" has been advertising a private malware-as-a-service (MaaS) offering on underground forums for $2,500 for a three-month subscription. Also available for $1,750 per month is a lightweight variant that removes certain features like the proxy and the ability to bypass Google Play Protect using a crypter.

Like other Android malware, Mirax supports the ability to capture keystrokes, steal photos, gather lock screen details, run commands, navigate the user interface, and monitor user activity on the compromised device. It can also dynamically fetch HTML overlay pages from a command-and-control (C2) server to be rendered over legitimate applications for credential theft.

The incorporation of a SOCKS proxy, on the other hand, is a relatively lesser-known feature that sets it apart from conventional RAT behavior. The proxy botnet offers several advantages in that it allows threat actors to get around geolocation-based restrictions, evade fraud detection systems, and conduct account takeovers or transaction fraud under the guise of increased anonymity and legitimacy.

"Unlike typical MaaS offerings, Mirax is distributed through a highly controlled and exclusive model, limited to a small number of affiliates," researchers Alberto Giust, Alessandro Strino, and Federico Valentini said. "Access appears to be prioritized for Russian-speaking actors with established reputations in underground communities, indicating a deliberate effort to maintain operational security and campaign effectiveness."

Attack chains distributing the malware use Meta ads to promote dropper app web pages, tricking unsuspecting users into downloading them. As many as six ads have been observed actively advertising a streaming service with free access to live sports and movies. Of these, five ads are directed against users in Spain. One of the ads, which started running on April 6, 2026, has a reach of 190,987 accounts.

The dropper app URLs implement a number of checks to ensure that they are accessed from mobile devices and to prevent automated scans from revealing their true color. The names of the malicious apps are listed below -

  • StreamTV (org.lgvvfj.pluscqpuj or org.dawme.secure5ny) - Dropper app
  • Reproductor de video (org.yjeiwd.plusdc71 or org.azgaw.managergst1d) - Mirax

A notable aspect of the campaign is the use of GitHub to host the malicious dropper APK files. In addition, the builder panel offers the ability to choose between two crypters – Virbox and Golden Crypt (aka Golden Encryption) – for enhanced APK protection.

Once installed, the dropper instructs users to allow installation from unknown sources to deploy the malware. The process of extracting the final payload is a "sophisticated, multi-stage operation" that's designed to sidestep security analysis and automated sandboxing tools.

The malware, after getting installed on the device, masquerades as a video playback utility and prompts the victim to enable accessibility services, thereby allowing it to run in the background, display a fake error message stating the installation was unsuccessful, and serve bogus overlays to conceal malicious activities.

It also establishes multiple bidirectional C2 channels for tasking and data exfiltration -

  • WebSocket on port 8443, to manage remote access and execute remote commands.
  • WebSocket on port 8444, to manage remote streaming and data exfiltration.
  • WebSocket on port 8445 (or a custom port), to set up the residential proxy using SOCKS5.

"This convergence of RAT and proxy capabilities reflects a broader shift in the threat landscape," Cleafy said. "While residential proxy abuse has historically been associated with compromised IoT devices and low-cost Android hardware such as smart TVs, Mirax marks a new phase by embedding this functionality within a full-featured banking trojan."

"This approach not only increases the monetization potential of each infection but also expands the operational scope of attackers, who can now leverage compromised devices for both direct financial fraud and as infrastructure for wider cybercriminal activities."

The disclosure comes as Breakglass Intelligence detailed an Arabic-language Android RAT called ASO RAT that's distributed via apps disguised as PDF readers and Syrian government applications.

"The platform provides full device compromise capabilities – SMS interception, camera access, GPS tracking, call logging, file exfiltration, and DDoS launching from victim devices," the company said. "A multi-user panel with role-based access control suggests this operates as a RAT-as-a-Service or supports a multi-operator team."

It's currently not known what the exact end goals of the campaign are, but Syria-themed lures for the apps (e.g., SyriaDefenseMap and GovLens) suggest that it may be targeting individuals with an interest in Syrian military or governance matters as part of what's suspected to be a surveillance operation.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/04/mirax-android-rat-turns-devices-into.html
如有侵权请联系:admin#unsafe.sh