HomesecurityXHelper malware: reinstalled after resetting to factory settings

XHelper malware: reinstalled after resetting to factory settings


Malware XHelper, which affects devices that use the operating system Android, was first discovered in October 2019.

XHelper is very persistent, once installed on device, remains active even if the user deletes it and restores factory settings.

Android XHelper Malware

Malicious agents have introduced XHelper malware as an application for cleaning and accelerating the device. However, it does not have any such function.

Once the application XHelper on a victim's device simply disappears from the main screen or application menu.

Then one server which is controlled by the attacker, downloads the second malware, “Trojan-Dropper.AndroidOS.Agent.of” which decrypts the payload using the native library.

The next dropper is "Trojan-Dropper.AndroidOS.Helper.b", which launches "Trojan-Downloader.AndroidOS.Leech.p" for further infection.

Leech.p Downloads "HEUR: Trojan.AndroidOS.Triada.dd", which exploits vulnerabilities to escalate privileges on the victim's device.

"Malicious files are stored sequentially in the application's data folder, which is not accessible to other programs. "This allows malware creators to hide the trace and use malicious modules known in security solutions." Kaspersky.

Malicious XHelper software adds a number of files to the folder / system / bin and adds requests to install that makes Triada.dd run at startup systemic.

Some users have stated that they have disabled the XHelper activity by disabling the rights and locking them using software application lock. Others said they "tried to deny rights to XHelper without uninstalling, but re-enabled all rights".

Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement