Zimperium zLabs discovers Konfety malware variant

Zimperium-zLabs-discovers-Konfety-malware-variant

Share this content

Facebook
Twitter
LinkedIn

Zimperium has announced the discovery of a new, highly evasive variant of the Konfety malware targeting Android devices.

Identified by Zimperium’s zLabs team, this latest version leverages advanced obfuscation and ZIP-level evasion techniques, making it significantly more difficult to detect and analyze than previous iterations, Zimperium adds.

Konfety malware

The company says that the Konfety malware campaign uses a deceptive dual-app strategy, leveraging the same package name for both a benign Play Store app and a malicious version distributed via third-party sources, to trick users and bypass traditional detection methods.

It further evades analysis by tampering with the APK’s structure, including:

  • Declaring unsupported compression formats
  • Manipulating ZIP headers to confuse security tools

Zimperium explains that Konfety manipulates Android’s APK ZIP structure in a way that causes popular reverse engineering tools to crash entirely, demonstrating a new level of sophistication in mobile malware evasion.

The company’s analysis confirmed Konfety leverages the CaramelAds SDK to silently deliver payloads, push persistent spam-like browser notifications and facilitate fraud.

The campaign uses region-specific behaviors, geofencing European users away from suspicious sites while targeting others more aggressively.

Tactics

Zimperium notes that among the most alarming tactics is:

  • Dynamic Code Loading: Malicious code is decrypted and executed only at runtime, hidden from traditional scans
  • Fake App Behavior: The malware suppresses its icon, mimics legitimate app metadata and redirects users through ad fraud infrastructure
  • ZIP-Level Obfuscation: Techniques cause common analysis tools to crash or misinterpret the APK as password-protected or malformed

“Outsmart analysts and evade automated tools”

Nico Chiaraviglio, Chief Scientist at Zimperium commented: “This isn’t just a recycled threat, it’s a deeply engineered update designed to outsmart analysts and evade automated tools.

“The threat actors are actively modifying their tactics to stay ahead and Konfety is a prime example of how mobile malware is evolving,” he concluded.