Dec 10, 2025

Total Takeover: DroidLock Hijacks Your Device

Executive Summary

The zLabs research team has identified a new threat campaign targeting Spanish Android users. DroidLock, a malware more accurately classified as ransomware, propagates via phishing websites. It has the ability to lock device screens with a ransomware-like overlay and illegally acquire app lock credentials, leading to a total takeover of the compromised device.

It employs deceptive system update screens to trick victims and can stream and remotely control devices via VNC. The malware also exploits device administrator privileges to lock or erase data, capture the victim's image with the front camera, and silence the device. Overall, it utilizes 15 distinct commands to interact with its C2 panel.

Technical Analysis

The infection starts with a dropper that deceives the user into installing the secondary payload that contains the actual malware (Figure 1). Using this technique the malware can bypass Android restriction to exploit Accessibility services.

Once the victim grants accessibility permission (Figure 2), the malware automatically approves additional permissions, such as those for accessing SMS, call logs, contacts, and audio.


1Takeover2Takeover3Takeover

Fig. 1: Dropper installs the second stage

4Takeover5Takeover6Takeover

Fig. 2:  Requesting accessibility services to perform fraud

C2 Communication

The malware leverages both websocket and HTTP communication in order to talk with its C2 (Command & Control server). In the first phase it uses the HTTP connection (Figure 3) to send basic information of the device for analytics. In a second phase, it uses websocket communication for receiving commands and sending data.

7Takeover

Fig. 3: Basic data sent to the server via http communication

Ransomware Capabilities

Scary Overlay

One of the malware’s capabilities include its ability to display a full screen overlay using webview on the victim's device upon receiving a Ransomware command from the C2. The overlay instructs immediate contact with the threat actor through email, requiring the device ID.

It issues a severe warning, failure to comply before 24 hours will result in the destruction of all files in the device. Unlike typical ransomware, this malware version does not actually encrypt files, however, it does have the capabilities to wipe the device entirely. Also, the full-screen warning (Figure 4) is highly alarming to the average internet user to pay the demanded ransom to the attacker.

8Takeover

Fig. 4: Ransomware style overly and admin contact details

Lock the User Out 

The malware requests Device Admin Permission, along with the Accessibility Services Permission at the beginning of the installation. The malware uses this permission to have the ability to perform various fraudulent activities such as:

  • Wiping data from the victim’s device, effectively performing a factory reset.
  • Lock the device.
  • Change the PIN, password or biometric information for preventing user’s access to the device.

Based on the command received from the C2 itself, the attacker can compromise the device indefinitely and lock the user out from accessing the device.

Accepted Commands

The malware maintains continuous communication with the C2 server while awaiting instructions from the threat actor. The analysis successfully identified all commands the malware accepts, which are detailed in the table below along with brief explanations.

Command 

Description

DEVICE_ADMIN

Requests device admin permission 

BLACK_SCREEN

Black screen overlay on top of the screen

NOTIFICATION

Sends a notification with particular title, package name and icon

BLOCK_BIOMETRIC

Locks the device with the help of device admin privileges

BLACK_SCREEN_UPDATE_SYSTEM

Shows an update screen overlay on top of the device and blocks user interactions

VNC

Sets the VNC flag to true

MUTE

Mutes the device

WIPE

Factory reset the device

RANSOMWARE

Shows ransomware overlay on top 

APP_BLOCK

Updates a stored list of blocked package names

APP_BLOCK_LOCK_PATTERN

Updates a list of package names that will be used for stealing lock pattern 

TURNSCREENON

Turns the screen on using wakelock

CAMERA

Sets the camera flag to true

UNINSTALL_APP

Uninstalls a specific app received from the server

INJECT_APP

Overlay on top of the targeted app to steal credentials, stores the overlays in the database to retrieve them dynamically

 

Dual Overlay Mechanisms for Credentials and Lock Pattern Theft

DroidLock malware leverages Accessibility Services to create overlays on targeted applications. When an AccessibilityEvent, specifically TYPE_WINDOW_STATE_CHANGED, originates from a package on the attacker's target list, the malware employs two primary overlay methods.

One method involves a fast, in-memory Lock Pattern overlay which is present in the assets folder of the APK. This presents a pattern-drawing UI to capture device unlock patterns (Figure.5). These overlay targets are managed by the APP_BLOCK_LOCK_PATTERN command, which includes targeted applications along with their package names and icons, all received from the server. 

The second technique involves a WebView overlay. This overlay loads attacker-controlled HTML content stored locally in a database (Figure.6) that maps package names to their corresponding HTML. Whenever an application is opened, the malware queries the database for the specific package name. If a match is found it launches a full-screen WebView overlay that renders the stored HTML.

9Takeover

Fig. 5: Lock screen overlay placed on top of the screen

10Takeover

Fig. 6: Queries injections from the database

Keep the User Away

The malware employs a deceptive Android update screen (Figure 6), instructing victims not to power off or restart their devices. The overlay is put on top upon receiving the BLACK_SCREEN_UPDATE_SYSTEM command from the C2 server. This technique is commonly used by attackers to prevent user interaction while malicious activities are carried out in the background.

11Takeover

Fig. 6: Fake android update overlay

Screen Recording Feature

Another feature that the malware presents is the ability to secretly capture and transmit all screen activity to a remote server. It operates as a persistent foreground service, leveraging MediaProjection and VirtualDisplay to capture screen images. 

These images are subsequently processed, converted to base64-encoded JPEG format, and dispatched to the server. This highly dangerous functionality could facilitate the theft of any sensitive information shown on the device’s display, including credentials, MFA codes, etc.

Zimperium vs DroidLock

Despite DroidLock’s wide range of takeover capabilities — including device-admin abuse, lock-screen manipulation, credential-stealing overlays, remote control, and full screen recording — Zimperium’s Mobile Threat Defense (MTD) and Mobile Application Runtime (zDefend) detect all found samples in a zero-day fashion using our on-device dynamic detection engine. 

For enterprises, this matters. Once installed, DroidLock can wipe devices, change PINs, intercept OTPs, and remotely control the user interface, turning an infected phone into a hostile endpoint inside a corporate environment. Zimperium MTD provides protection even when devices are offline or operating outside managed networks, ensuring attacks like DroidLock are stopped before they lead to account compromise or operational disruption.

MITRE ATT&CK Techniques

Tactic

ID

Name

Description

Initial Access

T1660

Phishing

Adversaries host phishing websites to spread malicious Apk’s

Persistance

T1624.001

Event Triggered Execution: Broadcast Receivers

It creates a broadcast receiver to receive SMS events

Privilege Escalation

T1626.001

Abuse Elevation Control Mechanism: Device Administrator Permissions

Malware is capable of factory reset, Disable lockscreen

Defense Evasion

T1655.001

Masquerading: Match Legitimate Name or Location

Malware pretending to be apps such as Orange

 T1629.002

Device Lockout

Malware can lockout victim through the device by DevicePolicyManager.lockNow()

T1516

Input Injection

Malware can mimic user interaction, perform clicks and various gestures, and input data

Credential Access


 

T1517

Access Notifications

The malware leverages Android NotificationListenerService to intercept OTPs

T1414

Clipboard Data

It extracts data stored on the clipboard

T1417.001

Input Capture: Keylogging

It has a keylogger feature

T1417.002

Input Capture: GUI Input Capture

It is able to get the shown UI.

Discovery


 

T1430

Location Tracking Malware can track the victim's location

T1418

Software Discovery

Malware collects installed application package list

T1426

System Information Discovery

The malware collects basic device info.

Collection

T1517

Access Notifications

It registers a receiver to monitor incoming SMS messages

T1513

Screen Capture

Malware can record screen content

T1512

Capture Camera

Malware opens camera and takes pictures

T1429

Audio Capture

Malware can mute the device

T1636.004

Protected User Data: SMS Messages

Steals SMSs from the infected device

T1417.001

Input Capture: Keylogging

Malware can capture keystrokes

T1417.002

Input Capture: GUI Input Capture

It is able to get the shown UI.

T414

Clipboard Data

It has the ability to steal data from the clipboard

Command and Control

T1481.002

Web Service: Bidirectional Communication

It uses websocket communication to poll the TA’s server and get the commands to execute.

Exfiltration

T1646

Exfiltration Over C2 Channel

Sending exfiltrated data over C&C server

Impact

T1516

Input Injection

It displays inject payloads like pattern lock and mimics banking apps login screen through overlay and steal credentials.

T1582

SMS Control

It can read and send SMS

Indicators of Compromise

The full list of IOCs can be found in this repository.