GPT Trade Fake Google Play Store Drops BTMob Spyware and UAS... #1582
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
This blog post analyzes a modern Android malware campaign where a fake Google Play Store–like domain is used to distribute a malicious APK called GPT Trade, advertised as an AI-powered trading assistant and visually branded like official ChatGPT / OpenAI assets. The APK is served from
https://playgoogle-gpttrade[.]com/GPT%20Trade.apkand has package namecom.jxtfkrsl.bjtgsb. The campaign was initially detected by D3Lab via their Brand Monitor...🔧 Technical Details
Trick 1 – Using Fake App Store Domains and Brand Impersonation to Drive Sideloading
Threat actors register domains that closely resemble legitimate app stores (e.g.,
playgoogle-gpttrade[.]com) and dress them up with official-looking branding (here mimicking Google Play and ChatGPT/OpenAI). The site advertises an attractive app (GPT Trade) and provides a direct.apkdownload (GPT%20Trade.apk). Users are socially engineered into enabling installation from unknown sources and sideloading the APK. This general pattern can be reused with any brand: create a plausible fake store page, copy visual assets, and push APK downloads that bypass official store vetting.Trick 2 – Dropper as a Dynamic APK Generator with Split-APK Style Logic
Instead of embedding static malicious APK payloads, the dropper application behaves like a generic installer. It creates internal directories in its private storage, u...
🤖 Agent Actions
Updated
src/mobile-pentesting/android-app-pentesting/README.mdwith a new “Android Droppers, Packers & Malware-Style Persistence” section detailing how fake app stores deliver GPT Trade, how its split-APK dropper architecture operates (directories, SharedPreferences, dex2oat32 activity, PackageInstaller usage), how UASecurity Tools packer-as-a-service infrastructure is abused, and how the UASecurity Miner and BTMob payloads achieve persistence and permission-based surveillance. Added actionable adb/logcat triage commands, enumerated IoCs (packages, hashes, domains/IPs), and emphasized defensive heuristics. Appended the D3Lab campaign analysis to the References list. No tests were run (documentation-only change).This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.