Mirax malware campaign hits 220K accounts, enables full remote control


Mirax malware campaign hits 220K accounts, enables full remote control

Pierluigi Paganini
April 15, 2026

Mirax, a new Android RAT, spread via Meta ads, infected 220,000 users and turns devices into SOCKS5 proxies, giving attackers full remote control.

Mirax is a new Android remote access trojan spreading through ads on Meta platforms, targeting mainly Spanish-speaking users and reaching over 220,000 accounts. The malicious code lets attackers fully control infected devices in real time and goes further by turning them into SOCKS5 proxy nodes, routing malicious traffic through victims’ IPs.

The Android RAT is sold as malware-as-a-service, and shows how mobile threats are evolving in scale and sophistication.

Mirax is a newly identified Android Remote Access Trojan (RAT) and banking malware that has rapidly gained traction within the cybercriminal ecosystem. Publicly promoted on underground forums since December 19, 2025, it has been actively monitored by the Cleafy Threat Intelligence team since March 2026, when multiple campaigns targeting primarily Spanish-speaking regions were observed.” reads the report published by Cleafy. “Unlike typical MaaS offerings, Mirax is distributed through a highly controlled and exclusive model, limited to a small number of affiliates. “

Mirax is distributed through a multi-stage campaign using Meta ads on platforms like Facebook and Instagram to lure users into downloading malicious apps. Victims are redirected to phishing sites offering fake services, such as illegal sports streaming apps, exploiting users’ привычка to sideload APKs. The sites restrict access to mobile devices to avoid detection.

The malware is delivered via droppers hosted on GitHub Releases, frequently updated and repacked to evade security checks. Once installed, the dropper unpacks the payload, applies strong obfuscation, and connects via WebSockets. Attackers also reuse existing GitHub releases instead of creating new ones, making detection harder.

The campaign reached over 200,000 users and reflects a growing trend of abusing legitimate platforms, combining social engineering, evasive techniques, and scalable distribution methods.

Mirax uses a two-stage infection chain with a dropper designed to hide the real malware and its permissions. The malicious code is disguised as an IPTV app and tricks users into enabling installation from unknown sources. The dropper contains an encrypted .dex file hidden deep in the app structure, using obfuscation and uncommon paths to evade analysis. Once executed, it extracts and decrypts the payload using RC4 with a hardcoded key, revealing the malicious code.

The final payload is another encrypted APK stored inside the app, decrypted via XOR and then installed. In some cases, it could also be downloaded remotely. The malware relies on packers like Golden Encryption to avoid detection and uses dynamic loading to stay hidden.

“One interesting section of the documentation explains the different packer options that the builder offers: Virbox and Golden Encryption. While the former is easy to detect thanks to multiple indicators in the code, Golden Encryption (also known as Golden Crypt) is not well documented but is widely used and promoted on underground malware forums.” continues the report. “This packer was also used in Albiriox“.

After installation, it poses as a video app and requests Accessibility permissions. Once granted, it runs in the background, displays fake error pages, and uses overlays to bypass security controls and maintain persistence.

After installation, the malware mimics a video app and requests Accessibility permissions to gain control.

With these permissions, Mirax runs silently, using overlays and fake pages to steal credentials and bypass protections. It offers full RAT capabilities, including screen control, data theft, app management, and spyware functions.

It communicates with command-and-control servers via WebSockets, enabling real-time control and data exfiltration. A key feature is its ability to turn infected devices into SOCKS5 residential proxies, masking attacker activity and enabling broader attacks like fraud, lateral movement, and DDoS.

Mirax highlights the evolution of Android malware, shifting from broad malware-as-a-service to a more restricted “private MaaS” model. By limiting access to trusted actors, attackers reduce the risk of leaks and detection. This approach allows the malware to operate more stealthily and remain active for longer periods without attracting attention.

Attackers abuse trusted platforms to spread malware at scale, using evasion tricks to bypass detection and reach hundreds of thousands of users quickly.

“The introduction of SOCKS5 and residential proxy functionality into an Android RAT is groundbreaking for several reasons. Firstly, malware developers recognize the profitability of residential proxies, as they can obscure the origin IP address, making it appear to originate from legitimate subnets.” concludes the report. “Furthermore, a residential proxy application needs fewer permissions than a Remote Access Trojan (RAT). This reduced requirement allows the threat actor to deploy it even if the full infection process is incomplete. Consequently, the actor avoids losing these devices entirely and can maintain their inclusion in the botnet.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, Mirax Android RAT)







Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Remember those moments when a tech giant throws a curveball, only for the underdog to dodge it with style? That’s exactly what just went down with Anything. For those of you unaware, it’s an AI-powered app builder that lets users whip up mobile and web apps using simple text prompts.

Last week, Apple yanked the app from the App Store, citing its usual guideline around code execution and keeping apps “self-contained.” The move felt like part of a broader side-eye toward so-called “vibe coding” tools, where building software is starting to feel as casual as texting a friend.

Apple pulled the app… and Anything got creative

Instead of backing down, the Anything team went full chaos mode, and in a good way. They rebuilt the core experience inside iMessage, effectively turning a messaging app into an app-building tool. Yes, actual app creation… through texts.

BREAKING: Apple is scared of vibe coding

they removed Anything from the App Store so we moved app building to iMessage

good luck removing this one, Apple pic.twitter.com/QrZ2oRk6ha

— Anything (@anything) April 2, 2026

It didn’t just work, it blew up. The workaround went viral, people loved the ingenuity, and the narrative flipped almost instantly. What started as “Apple said no” quickly turned into “wait, this is actually genius.” Memes followed, timelines filled up, and suddenly it felt like Apple had been outplayed at its own game.

And now, just like that, it’s back

Just days later, Apple quietly brought Anything back to the App Store with a few tweaks, but the core idea remains the same: build apps using simple text prompts, preview them instantly, and ship them straight from a phone. The comeback also feels like a subtle shift in momentum. AI is making creation faster, easier, and way more accessible. And when developers can route around restrictions using something as basic as iMessage, it becomes harder to hold that line.

As AI makes creation effortless, even tightly controlled platforms are being forced to adapt. And if this saga proves anything, it’s that creativity will always find a way around the rules.



Source link