Konfety Returns: Evasive Android Malware Using Malformed APKs

Edward Zhou
Edward Zhou

CEO & Co-Founder

 
July 17, 2025
2 min read

Konfety Malware Overview

The Konfety malware has resurfaced with advanced evasion techniques designed to target Android devices, complicating detection for security professionals. This malware utilizes an “evil-twin” method, where it creates two variants of an application with the same package name—one benign and the other malicious. Key tactics include dual-app deception, ZIP-level evasion, dynamic code loading, stealth techniques, and ad fraud infrastructure.

Malware Techniques

Image courtesy of Zimperium

Evasion Techniques

The Konfety malware employs sophisticated methods to evade detection. Notably, it uses:

  • General Purpose Flag: Setting the General Purpose Flag to indicate encryption, misleading analysis tools into requesting a password for decompression.
  • Unsupported Compression Method: Declaring a BZIP compression method in the AndroidManifest.xml, which is not actually used, causing analysis tools to parse the file incorrectly.

APK Analysis

Image courtesy of Zimperium

These techniques effectively block access to the APK’s contents and hinder deeper inspection by causing analysis tools to crash.

Dynamic Code Loading

Konfety utilizes dynamic code loading, where critical functionality is concealed in an encrypted DEX file. This file is decrypted and executed at runtime, allowing the malware to hide its operations from initial scans.

Dynamic Code Loading

Image courtesy of Zimperium

The hidden DEX file contains essential app components, which were not visible during a standard APK inspection, raising flags during analysis.

User Impact and Network Behavior

The malware redirects users to malicious sites, prompting unwanted app installations and triggering persistent spam notifications. Network analysis of Konfety reveals that after the User Agreement is accepted, it opens browser instances that connect to attacker-controlled servers.

User Impact

Image courtesy of Zimperium

Zimperium's Defense Against Konfety

Zimperium offers robust protection against Konfety through its Mobile Threat Defense (MTD) solution. This on-device technology continuously monitors and adapts to evolving threats, ensuring comprehensive protection for mobile devices.

MITRE ATT&CK Techniques

Zimperium has mapped the Konfety malware to specific MITRE ATT&CK techniques for better understanding and defense:

  • Persistence: Event Triggered Execution using Broadcast Receivers.
  • Defense Evasion: Masquerading by matching legitimate app names.
  • Discovery: Gathering information about installed applications and network configuration.

Indicators of Compromise (IOCs)

Indicators of compromise for this malware can be found in the Zimperium repository.

Conclusion

Zimperium's advanced detection capabilities ensure that customers are protected against the sophisticated techniques employed by Konfety malware. For more information or to explore our services, visit Gopher Security.

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits
vulnerability exploits

2026 Cybersecurity Trends: Dominance of Vulnerability Exploits

Vulnerability exploits now account for 40% of cyber intrusions, surpassing phishing. Learn how shrinking patch windows and edge device targets are changing security.

By Brandon Woo April 6, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026
cybersecurity trends 2026

Surge in Vulnerability Exploits: Cyber Intrusions Trends 2026

Vulnerability exploits now drive 40% of cyberattacks as hackers weaponize flaws within hours. Learn why traditional patching is failing and how to adapt. Read more.

By Divyansh Ingle March 30, 2026 3 min read
common.read_full_article
Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions
Vulnerability Exploitation

Surge in Vulnerability Exploits Dominates 2026 Cyber Intrusions

Hackers are weaponizing zero-days within hours of disclosure, leaving traditional patch cycles in the dust. Learn how to bridge the security gap with MFA and Zero-Trust.

By Alan V Gutnov March 23, 2026 4 min read
common.read_full_article
Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends
vulnerability exploits

Vulnerability Exploits Dominate Cyber Intrusions in 2026 Trends

Exploits are the leading cause of cyber intrusions, outpacing phishing. Discover the latest trends and essential strategies to protect your organization. Read now!

By Brandon Woo March 16, 2026 3 min read
common.read_full_article