{"id":210987,"date":"2025-03-24T21:01:31","date_gmt":"2025-03-25T04:01:31","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=210987"},"modified":"2025-06-02T23:43:39","modified_gmt":"2025-06-03T06:43:39","slug":"new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/","title":{"rendered":"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0"},"content":{"rendered":"<p><i><span data-contrast=\"none\">Authored by Dexter Shin<\/span><\/i><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559739&quot;:160}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Summary<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/h2>\n<p><span class=\"TextRun SCXW117415899 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW117415899 BCX0\">Cybercriminals are <\/span><span class=\"NormalTextRun SCXW117415899 BCX0\">constantly evolving their techniques to bypass security measures. Recently, <\/span><span class=\"NormalTextRun SCXW117415899 BCX0\">the <\/span><span class=\"NormalTextRun SCXW117415899 BCX0\">McAfee Mobile Research Team<\/span><span class=\"NormalTextRun SCXW117415899 BCX0\"> discovered malware campaigns abusing .NET MAUI, a cross-platform development framework, to evade detection. These threats disguise themselves as legitimate apps, targeting users to steal sensitive information. This blog highlights <\/span><span class=\"NormalTextRun SCXW117415899 BCX0\">how <\/span><span class=\"NormalTextRun SCXW117415899 BCX0\">these malware<\/span> <span class=\"NormalTextRun SCXW117415899 BCX0\">operate<\/span><span class=\"NormalTextRun SCXW117415899 BCX0\">, their evasion techniques, and key recommendations for staying protected.<\/span><\/span><span class=\"EOP SCXW117415899 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559731&quot;:800}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Background<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/h2>\n<p>In recent years, cross-platform mobile development frameworks have grown in popularity. Many developers use tools like Flutter and React Native to build apps that work on both Android and iOS. Among these tools, Microsoft provides a framework based on C#, called Xamarin. Since Xamarin is well-known, cybercriminals sometimes use it to develop malware. We have <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/stealth-backdoor-android-xamalicious-actively-infecting-devices\/\">previously found malware related to this framework<\/a>. However, Microsoft ended support for Xamarin in May 2024 and introduced .NET MAUI as its replacement.<\/p>\n<p>Unlike Xamarin, .NET MAUI expands platform support beyond mobile to include Windows and macOS. It also runs on .NET 6+, replacing the older .NET Standard, and introduces performance optimizations with a lightweight handler-based architecture instead of custom renderers.<\/p>\n<p>As technology evolves, cybercriminals adapt as well. Reflecting this trend, we recently discovered new Android malware campaigns developed using .NET MAUI. These Apps have their core functionalities written entirely in C# and stored as blob binaries. This means that unlike traditional Android apps, their functionalities do not exist in DEX files or native libraries. However, many antivirus solutions focus on analyzing these components to detect malicious behavior. As a result, .NET MAUI can act as a type of packer, allowing malware to evade detection and remain active on devices for a long time.<\/p>\n<p>In the following sections, we will introduce two Android malware campaigns that use .NET MAUI to evade detection. These threats disguise themselves as legitimate services to steal sensitive information from users. We will explore how they operate and why they pose a significant risk to mobile security.<\/p>\n<h2><span data-contrast=\"none\">Am I protected?<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">McAfee Mobile Security already detects all of these apps as <\/span><b><span data-contrast=\"auto\">Android\/FakeApp<\/span><\/b><span data-contrast=\"auto\"> and protects users from these threats. For more information about our Mobile Product, visit <\/span><a href=\"https:\/\/mcas-proxyweb.mcas.ms\/certificate-checker?login=false&amp;originalUrl=https%3A%2F%2Fwww.mcafee.com.mcas.ms%2Fen-us%2Fantivirus%2Fmobile.html%3Fpath%3Dblogs%26McasTsid%3D15600&amp;McasCSRF=da8e89e6f90497983f386336803562fee9767e2520e46693c5be81abd344aa5d\"><span data-contrast=\"none\">McAfee Mobile Security<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559731&quot;:800}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><span data-contrast=\"none\">Technical Findings<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h2>\n<p><span data-contrast=\"auto\">While we found multiple versions of these malicious apps, the following two examples are used to demonstrate how they evade detection.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">First off, where are users finding these malicious apps? Often, these apps are distributed through unofficial app stores. Users are typically directed to such stores by clicking on phishing links made available by untrusted sources on messaging groups or text messages. This is why we recommend at McAfee that users avoid clicking on untrusted links.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">Example 1: Fake Bank App<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/h4>\n<p><span class=\"TextRun SCXW258931702 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258931702 BCX0\">Th<\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">e first<\/span><span class=\"NormalTextRun SCXW258931702 BCX0\"> fake app<\/span><span class=\"NormalTextRun SCXW258931702 BCX0\"> we <\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">found <\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">disguises itself as IndusInd Bank, specifically targeting Indian users. <\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">When a user launches the app, it prompts them to <\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">input<\/span> <span class=\"NormalTextRun SCXW258931702 BCX0\">personal and financial details, including their name, phone number, email, date of birth, and banking information.<\/span><span class=\"NormalTextRun SCXW258931702 BCX0\"> Once the user <\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">submits<\/span><span class=\"NormalTextRun SCXW258931702 BCX0\"> this data, it is <\/span><span class=\"NormalTextRun SCXW258931702 BCX0\">immediately<\/span><span class=\"NormalTextRun SCXW258931702 BCX0\"> sent to the attacker&#8217;s C2 (Command and Control) server.<\/span><\/span><span class=\"EOP SCXW258931702 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559731&quot;:800}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211020\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-457x1024.png\" alt=\"\" width=\"457\" height=\"1024\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-457x1024.png 457w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-134x300.png 134w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM-58x129.png 58w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.30-PM.png 604w\" sizes=\"auto, (max-width: 457px) 100vw, 457px\" \/>\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>1<\/b><b>. Fake IndusInd Bank app&#8217;s screen requesting user information <\/b><\/em><\/p>\n<p><span class=\"TextRun SCXW150508897 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW150508897 BCX0\">As mentioned earlier, this is not a traditional Android malware. Unlike typical malicious apps, there are no obvious traces of harmful code in <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW150508897 BCX0\">the Java<\/span><span class=\"NormalTextRun SCXW150508897 BCX0\"> or native code. Instead, the malicious <\/span><span class=\"NormalTextRun SCXW150508897 BCX0\">code<\/span><span class=\"NormalTextRun SCXW150508897 BCX0\"> is hidden within blob files <\/span><span class=\"NormalTextRun SCXW150508897 BCX0\">located<\/span><span class=\"NormalTextRun SCXW150508897 BCX0\"> inside the <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW150508897 BCX0\">assemblies<\/span><span class=\"NormalTextRun SCXW150508897 BCX0\"> directory.<\/span><\/span><span class=\"EOP SCXW150508897 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211035\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.58-PM-1024x605.png\" alt=\"\" width=\"1024\" height=\"605\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.58-PM-1024x605.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.58-PM-300x177.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.58-PM-768x454.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.58-PM-205x121.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.51.58-PM.png 1192w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>2<\/b><b>. Blob contains malicious code<\/b>\u00a0<\/em><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><span data-contrast=\"auto\">The following code snippet reveals how the app collects and transmits user data to the C2 server. Based on the code, the app structures the required information as parameters before sending it to the C2 server.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211050\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.53.23-PM-1024x756.png\" alt=\"\" width=\"1024\" height=\"756\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.53.23-PM-1024x756.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.53.23-PM-300x222.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.53.23-PM-768x567.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.53.23-PM-175x129.png 175w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.53.23-PM.png 1522w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>3<\/b><b>. C# code responsible for stealing user data and sending it to the C2 server<\/b><\/em><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:true}\">\u00a0<\/span><\/p>\n<h4 aria-level=\"3\"><\/h4>\n<h4 aria-level=\"3\"><span data-contrast=\"none\">Example 2: Fake SNS App<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/h4>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"><span class=\"TextRun SCXW81915952 BCX0\" lang=\"EN-CA\" xml:lang=\"EN-CA\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW81915952 BCX0\">In contrast to<\/span><span class=\"NormalTextRun SCXW81915952 BCX0\"> the <\/span><span class=\"NormalTextRun SCXW81915952 BCX0\">first fake<\/span><span class=\"NormalTextRun SCXW81915952 BCX0\"> app,<\/span><\/span><span class=\"TextRun SCXW81915952 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW81915952 BCX0\"> this <\/span><span class=\"NormalTextRun SCXW81915952 BCX0\">second<\/span><span class=\"NormalTextRun SCXW81915952 BCX0\"> malware is even more difficult <\/span><span class=\"NormalTextRun SCXW81915952 BCX0\">for security <\/span><span class=\"NormalTextRun CommentStart SCXW81915952 BCX0\">software<\/span> <span class=\"NormalTextRun SCXW81915952 BCX0\">to analyze. It specifically targets Chinese-speaking users and <\/span><span class=\"NormalTextRun SCXW81915952 BCX0\">attempts<\/span><span class=\"NormalTextRun SCXW81915952 BCX0\"> to steal contacts, SMS messages, and photos from their devices.<\/span><span class=\"NormalTextRun SCXW81915952 BCX0\"> In China, where access to the Google Play Store is restricted, such apps are often distributed through third-party websites or alternative app stores. This allows attackers to spread their malware more easily, especially in regions with limited access to official app stores.<\/span><\/span><span class=\"EOP SCXW81915952 BCX0\" data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-211065\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.09-PM.png\" alt=\"\" width=\"1000\" height=\"551\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.09-PM.png 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.09-PM-300x165.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.09-PM-768x423.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.09-PM-205x113.png 205w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>4<\/b><b>. Distribution site and fake X app targeting Chinese-speaking users<\/b>\u00a0<\/em><\/p>\n<p><span data-contrast=\"auto\">One of the key techniques this malware uses to remain undetected is <\/span><i><span data-contrast=\"auto\">multi-stage dynamic loading<\/span><\/i><span data-contrast=\"auto\">. Instead of directly embedding its malicious payload in an easily accessible format, it encrypts and loads its DEX files in three separate stages, making analysis significantly more difficult.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">In the first stage, the app&#8217;s main activity, defined in AndroidManifest.xml, decrypts an XOR-encrypted file and loads it dynamically. This initial file acts as a loader for the next stage. In the second stage, the dynamically loaded file decrypts another AES-encrypted file and loads it. This second stage still does not reveal the core malicious behavior but serves as another layer of obfuscation. Finally, in the third stage, the decrypted file contains code related to the .NET MAUI framework, which is then loaded to execute the main payload.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-211080\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.35-PM.png\" alt=\"\" width=\"1000\" height=\"598\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.35-PM.png 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.35-PM-300x179.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.35-PM-768x459.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.54.35-PM-205x123.png 205w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>5<\/b><b>. Multi-stage dynamic loading<\/b>\u00a0<\/em><\/p>\n<p><span data-contrast=\"auto\">The main payload is ultimately hidden within the C# code. When the user interacts with the app, such as pressing a button, the malware silently steals their data and sends it to the C2 server.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211095\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM-1024x398.png\" alt=\"\" width=\"1024\" height=\"398\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM-1024x398.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM-300x117.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM-768x298.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM-1536x597.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM-205x80.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.06-PM.png 1776w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><br \/>\n<\/span><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>6<\/b><b>. C# code responsible for stealing images, contacts, and SMS data<\/b>\u00a0<\/em><\/p>\n<p><span data-contrast=\"auto\">Beyond multi-stage dynamic loading, this malware also employs additional tricks to make analysis more difficult. One technique is <\/span><i><span data-contrast=\"auto\">manipulating the AndroidManifest.xml file<\/span><\/i><span data-contrast=\"auto\"> by adding an excessive number of unnecessary permissions. These permissions include large amounts of meaningless, randomly generated strings, which can cause errors in certain analysis tools. This tactic helps the malware evade detection by disrupting automated scanners and static analysis.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-211110\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.29-PM.png\" alt=\"\" width=\"1000\" height=\"630\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.29-PM.png 1000w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.29-PM-300x189.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.29-PM-768x484.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.57.29-PM-205x129.png 205w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/>\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>7<\/b><b>. AndroidManifest.xml file with excessive random permissions<\/b><\/em><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Another key technique is <\/span><i><span data-contrast=\"auto\">encrypted socket communication<\/span><\/i><span data-contrast=\"auto\">. Instead of using standard HTTP requests, which are easier to intercept, the malware relies on TCP socket connections to transmit data. This approach makes it difficult for traditional HTTP proxy tools to capture network traffic. Additionally, the malware encrypts the data before sending it, meaning that even if the packets are intercepted, their contents remain unreadable.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">One more important aspect to note is that this malware adopts various themes to attract users. In addition to the fake X app, we also discovered several dating apps that use the same techniques. These apps had different background images but shared the same structure and functionality, indicating that they were likely created by the same developer as the fake X app. The continuous emergence of similar apps suggests that this malware is being widely distributed among Chinese-speaking users.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335551550&quot;:2,&quot;335551620&quot;:2}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211125\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png\" alt=\"\" width=\"1024\" height=\"329\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1024x329.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-300x96.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-768x246.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-1536x493.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM-205x66.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.59.17-PM.png 1776w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/span><\/p>\n<p style=\"text-align: center;\"><em><b>Figure <\/b><b>8<\/b><b>. Various fake apps using the same technique<\/b>\u00a0<\/em><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<h3 aria-level=\"2\"><span data-contrast=\"none\">Recommendations and Conclusion<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/h3>\n<p><span data-contrast=\"auto\">The rise of .NET MAUI-based malware highlights how cybercriminals are evolving their techniques to avoid detection. Some of the techniques described include:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:828,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">hiding code blobs within assemblies<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:828,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">multi-stage dynamic loading<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:828,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">encrypted communications<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"6\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559685&quot;:828,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-contrast=\"auto\">excessive obfuscation<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">With these evasion techniques, the threats can remain hidden for long periods, making analysis and detection significantly more challenging. Furthermore, the discovery of multiple variants using the same core techniques suggests that this type of malware is becoming increasingly common.\u00a0<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559731&quot;:468}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Users should always be cautious when downloading and installing apps from unofficial sources, as these platforms are often exploited by attackers to distribute malware. This is especially concerning in countries like China, where access to official app stores is restricted, making users more vulnerable to such threats.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559731&quot;:800}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">To keep up with the rapid evolution of cybercriminal tactics, users are strongly advised to install security software on their devices and keep it up to date at all times. Staying vigilant and ensuring that security measures are in place can help protect against emerging threats. By using McAfee Mobile Security, users can enhance their device protection and detect threats related to this type of malware in real-time.<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Glossary of Terms<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\"> <img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-211005\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.45.56-PM-1024x510.png\" alt=\"\" width=\"1024\" height=\"510\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.45.56-PM-1024x510.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.45.56-PM-300x149.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.45.56-PM-768x382.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.45.56-PM-205x102.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.45.56-PM.png 1386w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\">\u00a0<\/span><\/p>\n<p aria-level=\"2\"><span data-contrast=\"none\">Indicators of Compromise (IOCs)<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><span data-contrast=\"none\">APKs:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;134245417&quot;:false}\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-210990\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM-1024x449.png\" alt=\"\" width=\"1024\" height=\"449\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM-1024x449.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM-300x132.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM-768x337.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM-1536x674.png 1536w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM-205x90.png 205w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/03\/Screen-Shot-2025-03-21-at-12.44.45-PM.png 1870w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\u00a0<\/span><\/p>\n<p aria-level=\"3\"><span data-contrast=\"none\">C2:<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:40}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"0\" data-aria-level=\"1\"><span data-contrast=\"auto\">tcp[:\/\/]120.27.233.135:1833<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"5\" data-list-defn-props=\"{&quot;335551671&quot;:0,&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">https[:\/\/]onlinedeskapi.com<\/span><span data-ccp-props=\"{&quot;134245417&quot;:false,&quot;335559795&quot;:0}\">\u00a0<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile Research&#8230;<\/p>\n","protected":false},"author":695,"featured_media":209689,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,442],"tags":[],"coauthors":[4136],"class_list":["post-210987","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-25T04:01:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T06:43:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0\",\"datePublished\":\"2025-03-25T04:01:31+00:00\",\"dateModified\":\"2025-06-03T06:43:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\"},\"wordCount\":1314,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png\",\"articleSection\":[\"Internet Security\",\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\",\"name\":\"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png\",\"datePublished\":\"2025-03-25T04:01:31+00:00\",\"dateModified\":\"2025-06-03T06:43:39+00:00\",\"description\":\"Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0 | McAfee Blog","description":"Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0 | McAfee Blog","og_description":"Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2025-03-25T04:01:31+00:00","article_modified_time":"2025-06-03T06:43:39+00:00","og_image":[{"width":600,"height":400,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0","datePublished":"2025-03-25T04:01:31+00:00","dateModified":"2025-06-03T06:43:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/"},"wordCount":1314,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png","articleSection":["Internet Security","McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/","name":"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png","datePublished":"2025-03-25T04:01:31+00:00","dateModified":"2025-06-03T06:43:39+00:00","description":"Authored by Dexter Shin\u00a0 Summary\u00a0 Cybercriminals are constantly evolving their techniques to bypass security measures. Recently, the McAfee Mobile","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/02\/300x200_Blog_Protect-Yourself-Deepfake-Scams.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/new-android-malware-campaigns-evading-detection-using-cross-platform-framework-net-maui\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"New Android Malware Campaigns Evading Detection Using Cross-Platform Framework .NET MAUI\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/210987","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=210987"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/210987\/revisions"}],"predecessor-version":[{"id":214997,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/210987\/revisions\/214997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/209689"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=210987"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=210987"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=210987"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=210987"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}