Malware XHelper, which affects devices that use the operating system Android, was first discovered in October 2019.
XHelper is very persistent, once installed on device, remains active even if the user deletes it and restores factory settings.
Android XHelper Malware
Malicious agents have introduced XHelper malware as an application for cleaning and accelerating the device. However, it does not have any such function.
Once the application XHelper on a victim's device simply disappears from the main screen or application menu.
Then one server controlled by the intruder, downloads the second malicious element, "Trojan-Dropper.AndroidOS.Agent.of" which decrypts the payload using the native library.
The next dropper is "Trojan-Dropper.AndroidOS.Helper.b", which launches "Trojan-Downloader.AndroidOS.Leech.p" for further infection.
Leech.p downloads "HEUR: Trojan.AndroidOS.Triada.dd", which is being exploited vulnerabilities to escalate privileges on the victim's device.
“Malicious files are stored sequentially in the application's data folder, to which other programs do not have access. This allows malware developers to hide their tracks and use malicious operating systems known for security solutions, ”she said. Kaspersky.
Malicious XHelper software adds a number of files to the folder / system / bin and adds requests to install recovery.sh that makes Triada.dd run at startup systemic.
Some users have stated that they have disabled the XHelper activity by disabling the rights and locking them using software application lock. Others said they "tried to deny the rights to XHelper without removing the installation, but re-enabled all rights reserved".