Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

April 17, 2026

OpenClaw Exposes the Real Cybersecurity Risks of Agentic AI

April 17, 2026

DDoS-For-Hire Services Disrupted by International Police Action

April 17, 2026
Facebook X (Twitter) Instagram
Saturday, April 18
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»APK Malformation Found in Thousands of Android Malware Samples
News

APK Malformation Found in Thousands of Android Malware Samples

Team-CWDBy Team-CWDApril 17, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Android Package (APK) malformation has emerged as a standard Android malware evasion tactic, with the technique identified in more than 3000 malicious samples across families including Teabot, TrickMo, Godfather and SpyNote.

According to new research from Cleafy’s Threat Intelligence and Incident Response team, the APK malformation involves the deliberate creation of broken or non-standard APK structures that still install and run on devices but cause static analysis tools to crash or misinterpret the file.

The researchers said attackers are exploiting the leniency of an Android installer that tolerates inconsistencies strict parsers cannot, allowing malicious apps to function normally while frustrating reverse engineering efforts.

How APK Malformation Bypasses Static Analysis

An APK is essentially a ZIP archive containing the code, resources and manifest required to run an Android app.

Each file inside the archive sits behind a Local File Header, and a Central Directory near the end of the package acts as a table of contents. Attackers introduce conflicts between those two structures. Tools such as JADX crash on the inconsistency, while the Android installer quietly proceeds with the app.

In their analysis, the researchers cataloged several techniques currently in active use:

  • Directory-file name collisions that confuse parsers about which entry to load

  • Unsupported compression methods that Android safely treats as uncompressed, but cause analysis tools to fail

  • False password protection flags placed inconsistently across headers

  • Mismatched checksums, file sizes and offset references between header structures

  • AndroidManifest.xml corruption through magic header changes, string pool manipulation and malicious offset injection

Read more on Android malware evasion: New Android Malware Uses .NET MAUI to Evade Detection

Another method abuses the assets/directory by storing payloads under filenames containing non-ASCII or control characters, triggering path traversal errors during decompilation. Researchers said the technique forces analysts to manually extract and inspect archive contents.

Defenders Push Back With Open-Source Tooling

In response, the Cleafy team has released Malfixer, a Python utility that detects and repairs malformed APKs and rebuilds them into a form conventional reverse engineering tools can parse.

The project, published on GitHub, was developed after the analysis of more than 70 malformed samples drawn primarily from the TrickMo, Teabot, Godfather and SpyNote families.

The release reflects a wider arms race between Android malware developers and analysts. Cleafy noted that earlier incidents had failed to classify samples later linked to TrickMo precisely because malformation techniques prevented standard static analysis from processing the file.

“As defenders, we must evolve our tools and techniques to counter these evasive tactics,” the researchers wrote, urging the community to contribute new samples and malformation methods as they emerge in the wild.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleN. Korean Hackers Spread 1,700 Malicious Packages Across npm, PyPI, Go, Rust
Next Article Systemic Flaw in MCP Protocol Could Expose 150 Million Downloads
Team-CWD
  • Website

Related Posts

News

Masjesu Botnet Emerges as DDoS-for-Hire Service Targeting Global IoT Devices

April 17, 2026
News

DDoS-For-Hire Services Disrupted by International Police Action

April 17, 2026
News

APT28 Deploys PRISMEX Malware in Campaign Targeting Ukraine and NATO Allies

April 17, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views

Cyber M&A Roundup: Cyber Giants Strengthen AI Security Offerings

December 1, 20258 Views

Why the Identity Security Fabric is Essential for Securing AI and Non-Human Identities

November 27, 20258 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

Why SOC Burnout Can Be Avoided: Practical Steps

November 14, 20259 Views
Our Picks

The hidden risks of browser extensions – and how to avoid them

September 13, 2025

What’s at stake if your employees post too much online

December 1, 2025

‘What happens online stays online’ and other cyberbullying myths, debunked

September 11, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.