Mirax Android malware turns infected phones into residential proxy nodes


A newly documented Android malware family called Mirax is targeting users through fake streaming and IPTV lures spread with paid ads on Meta platforms. Cleafy says the malware has appeared in campaigns since March 2026 and can steal credentials, take control of devices, and turn infected phones into residential proxy nodes that route attacker traffic through the victim’s home IP address.

That proxy feature is what makes Mirax stand out. Cleafy says the malware uses SOCKS5 support with Yamux multiplexing over WebSocket channels, which lets attackers push different kinds of traffic through an infected device while making it look like activity from a normal residential user.

The campaign also shows how mobile malware operators keep adapting their delivery methods. Researchers say Mirax has been marketed since December 19, 2025, as a malware-as-a-service offering for a small number of trusted affiliates, mainly Russian-speaking actors, rather than as a widely sold crimeware kit.

How the attack works

According to Cleafy, the infection chain starts with social media ads that lead users to phishing pages posing as streaming or IPTV services. Victims then download an Android package hosted on GitHub Releases instead of the Play Store, which fits the scam because users already expect unofficial streaming apps to require sideloading.

Once installed, the dropper decrypts and delivers the final payload, disguises itself as a video playback utility, and asks for Accessibility Services. Cleafy says the app then runs in the background while showing a fake error page so the victim believes the install failed.

Researchers also say the operators rotate package hashes daily on GitHub Releases even when the underlying app content does not change. That helps the malware avoid simple hash-based detection without forcing the attackers to rebuild the whole package every day.

Why defenders should pay attention

Mirax does more than run classic banking-trojan tricks. Security reporting based on the Cleafy research says the campaigns reached more than 220,000 accounts across Facebook, Instagram, Messenger, and Threads, which suggests the operators are willing to spend on scale while keeping distribution controlled.

The proxy function creates a second revenue stream for the attackers. By routing traffic through compromised phones, they can hide malicious activity behind real residential IP addresses, which may help them bypass geolocation filters, fraud controls, and reputation-based defenses. That last point is an inference drawn from the residential proxy capability described by Cleafy.

Cleafy also says Mirax can still activate its proxy module even if the victim refuses the Accessibility Services request. That means the attackers may still profit from partially compromised devices, even when full device-control features do not activate.

Mirax at a glance

ItemDetails
Malware familyMirax
PlatformAndroid
First forum appearanceDecember 19, 2025
Active campaigns observedMarch 2026 onward
Main lureFake IPTV and sports streaming apps
DeliveryPhishing sites and sideloaded APKs via GitHub Releases
Key capabilityResidential proxy via SOCKS5 and Yamux over WebSocket
Secondary capabilityCredential theft and remote access features

Source: Cleafy research and follow-up reporting.

What users and security teams should do

  • Avoid sideloading Android apps from links in social media ads, especially streaming or IPTV offers.
  • Review Accessibility permissions and remove access for unknown or suspicious apps.
  • Check devices for recently installed apps disguised as video or playback tools.
  • Monitor for unusual proxy-like traffic from mobile devices connected to corporate services.
  • Block or review GitHub Releases downloads tied to known phishing delivery chains when that fits your environment.

These are defensive recommendations based on the delivery and behavior described in the Cleafy report.

FAQ

What makes Mirax different from a normal Android banking trojan?

Its biggest differentiator is the residential proxy feature. Cleafy says Mirax does not just steal data or control the device. It can also let attackers relay traffic through the victim’s real IP address.

How does Mirax spread?

Researchers say it spreads through fake streaming and IPTV pages promoted with paid ads on Meta platforms, then pushes users to sideload APK files hosted on GitHub Releases.

Does Mirax still work if the victim denies Accessibility access?

Partly, yes. Cleafy says the malware can still enable its proxy module with fewer permissions, even when the full Accessibility request fails.

Who is behind Mirax?

Cleafy says Mirax is offered as a controlled malware-as-a-service product to a small number of trusted affiliates, with preference for Russian-speaking actors on underground forums.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages