<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Malware-as-a-Service — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/malware-as-a-service/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 16 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/malware-as-a-service/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mirax RAT Targeting Android Users in Europe</title><link>https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</link><pubDate>Thu, 16 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-mirax-rat/</guid><description>Mirax RAT, a new Android RAT distributed as MaaS, is targeting European users by turning infected devices into residential proxy nodes and enabling credential theft via overlay and notification injection.</description><content:encoded><![CDATA[<p>The Mirax RAT is a newly identified Android Remote Access Trojan (RAT) that has been actively targeting users in Europe since March 2026. It&rsquo;s offered as Malware-as-a-Service (MaaS) to a small group of affiliates, primarily Russian-speaking actors, through tiered subscription models. Since December 2025, Mirax has been promoted on underground forums and used in multiple campaigns. The RAT&rsquo;s distribution relies on malicious advertisements on Meta platforms like Facebook, Instagram, and Messenger, with over 200,000 users potentially exposed to these ads. The malware uses dropper pages hosted on GitHub and relies on APK sideloading for execution, bypassing the Google Play Store&rsquo;s security measures. Mirax&rsquo;s capabilities extend beyond typical RAT functions, including turning infected devices into residential proxy nodes via a SOCKS5 proxy.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker creates malicious ads on Facebook, Instagram, and Messenger promoting IPTV application services.</li>
<li>Users click on the advertisements, which redirect them to dropper pages hosted on GitHub.</li>
<li>The user is prompted to enable installation from unknown sources on their Android device.</li>
<li>The malicious IPTV application is installed via APK sideloading.</li>
<li>The application initiates a multi-stage infection process, utilizing Golden Encryption (Golden Crypt) to pack the payload.</li>
<li>The payload, an encrypted Dalvik Executable (.dex) file, is decrypted during installation using the RC4 stream cipher with a hardcoded key.</li>
<li>Mirax gains control of the device, enabling overlay and notification injection for credential theft.</li>
<li>Attackers can view the screen in real-time, navigate and control the device, manage applications, exfiltrate images and text, and launch a SOCKS5 proxy connection to proxy traffic through the infected device.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The Mirax RAT campaign has the potential to affect a large number of Android users in Europe. The malicious advertisements have already reached over 200,000 users. Successful infections can lead to credential theft, financial fraud, data exfiltration, and the compromised device being used as a residential proxy, potentially masking malicious activity and further expanding the attacker&rsquo;s reach. Banks and financial institutions are specifically highlighted as high-value targets.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for connections to GitHub domains associated with APK downloads, and correlate that with android device user agents (Network Connection and User Agent logs).</li>
<li>Implement detections for process creation events related to sideloaded APK installations, specifically looking for unusual parent-child process relationships (Process Creation Logs).</li>
<li>Deploy the Sigma rule provided below to detect the execution of applications from untrusted sources and tune for your environment.</li>
<li>Monitor network connections for SOCKS5 proxy traffic originating from Android devices, which may indicate compromised devices acting as residential proxies (Network Connection Logs).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>android</category><category>rat</category><category>mirax</category><category>malware-as-a-service</category><category>proxy</category></item></channel></rss>