Android Malware Konfety Uses Malformed APKs to Evade Detection

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025 4 min read

Android malware Konfety uses malformed APKs to evade detection


Image courtesy of Zimperium

A new variant of the Konfety Android malware employs a malformed ZIP structure along with various obfuscation techniques to avoid detection and analysis. This malware masquerades as legitimate applications that mimic popular products available on the Google Play Store, although it fails to deliver the promised functionality.

The malware's capabilities include redirecting users to malicious sites, installing unwanted applications, and generating fake browser notifications. Instead of providing genuine services, it uses the CaramelAds SDK to serve hidden advertisements while exfiltrating sensitive data such as installed apps, network configuration, and system information.

Unwanted ads and redirects triggered by Konfety


Image courtesy of Zimperium

Despite not being classified as spyware or a RAT, Konfety includes an encrypted secondary DEX file within the APK. This file is decrypted and executed at runtime, enabling hidden services defined in the AndroidManifest file and allowing for the delivery of more dangerous capabilities post-infection.

Evasion Tactics

Researchers at mobile security platform Zimperium identified that Konfety utilizes multiple methods to obscure its true nature and activities. The malware tricks users into installation by imitating legitimate app names and branding, distributing through third-party stores. This tactic is known as the "evil twin" or "decoy twin" method, as described by researchers at Human Security.

The operators promote Konfety on third-party app stores, targeting users who seek free versions of premium apps while avoiding Google tracking. The dynamic loading of code and manipulation of APK files are significant evasion strategies that hinder static analysis and reverse engineering tools.

The malware sets the General Purpose Bit Flag to 'bit 0', indicating encryption, even when it is not. This misleads analysis tools, prompting false password requests that block access to the APK's contents. Moreover, critical files are declared using BZIP compression, which is unsupported by analysis tools like APKTool and JADX, resulting in parsing failures.

Analysis tools crashing when trying to parse the malicious APK


Image courtesy of Zimperium

Android defaults to its processing methods, allowing the malicious app to install and execute without issues. Once installed, Konfety hides its app icon and name, adapting its behavior based on the victim's location through geofencing.

CaramelAds SDK Abuse

The Konfety operation exploits the CaramelAds SDK, a mobile advertising tool, to facilitate its ad fraud activities. Satori researchers discovered that over 250 apps on the Google Play Store are linked to Konfety, each having an evil twin distributed outside official marketplaces. These evil twin apps utilize a modified version of the CaramelAds SDK to conduct fraudulent activities.

The SDK, while not inherently malicious, can be abused for ad rendering and sideloading additional APKs. The Satori Threat Intelligence Team noted that the peak volume of Konfety-related traffic reached 10 billion requests daily.

Diagram showing how Konfety apps are distributed and operate


Image courtesy of Human Security

Konfety's evil twin apps mimic their corresponding decoy twins by copying package names and publisher IDs. These apps are typically spread through malvertising campaigns targeting users seeking modified applications.

Unsupported Compression Methods

Researchers at Zimperium have identified 3,300 samples of Android malware utilizing unsupported compression methods to bypass detection. The technique involves tampering with the compression method field in APKs, which can hinder analysis and decompilation by common tools.

Older versions of Android handle APK compression differently, making it possible for unsupported methods to be installed on versions above Android 9. Many analysis tools fail to process these samples, leading to a reduced likelihood of detection and analysis.

JADX Analysis Tool


Image courtesy of Zimperium

The exploitation of these methodologies raises significant challenges for malware detection, as many antivirus engines do not adequately scan APKs with unsupported compression formats, allowing malicious applications to be installed unnoticed.

Recommendations for Users

To protect against threats like Konfety and other forms of Android malware, users should avoid sideloading apps from third-party stores. It is crucial to only download applications from trusted sources to minimize risk. Enabling Google Play Protect can add an additional layer of security by scanning for malware in existing and newly downloaded apps.

Furthermore, users should consider employing reliable antivirus solutions alongside Google Play Protect to enhance their defenses against malware threats.

For more insights on securing your Android device, consider exploring our services at undefined for comprehensive protection solutions against malware and other cyber threats.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

Instagram Vulnerability Exposes Private Data of Millions
Instagram security

Instagram Vulnerability Exposes Private Data of Millions

Instagram's private posts exposed, millions affected by data breaches, and new location features pose risks. Discover how Gopher Security's AI-powered Zero-Trust architecture protects your data. Learn more!

By Brandon Woo January 27, 2026 4 min read
common.read_full_article
Closing the Cloud Complexity Gap: Insights from 2026 Security Reports
cloud security

Closing the Cloud Complexity Gap: Insights from 2026 Security Reports

Navigate the escalating complexity of cloud security. Discover how AI, Zero-Trust, and unified ecosystems are essential to combatting modern threats. Learn more!

By Divyansh Ingle January 26, 2026 6 min read
common.read_full_article
AI-Driven Cybersecurity Innovations: The Future of Threat Prevention
AI agents security

AI-Driven Cybersecurity Innovations: The Future of Threat Prevention

AI agents are prime targets for cyberattacks. Discover evolving threats like prompt injection & AI-powered exploits, and learn how to fortify your defenses. Read now!

By Brandon Woo January 22, 2026 5 min read
common.read_full_article
GootLoader Malware Evades Detection Using Nested ZIP Archives
GootLoader

GootLoader Malware Evades Detection Using Nested ZIP Archives

GootLoader is back with advanced tricks, using malformed ZIPs to bypass security & target businesses. Learn how to detect and defend against this threat. Protect your assets!

By Edward Zhou January 21, 2026 3 min read
common.read_full_article