During D3Lab’s continuous monitoring of newly registered domains through our Brand Monitor service, we identified a domain crafted to impersonate the Google Play Store.

The site advertises a supposed application called “GPT Trade”, presented as an AI-powered trading assistant and visually styled to resemble official ChatGPT / OpenAI branding. Unsuspecting users are encouraged to download an APK directly from the page: https://playgoogle-gpttrade[.]com/GPT%20Trade.apk
Our investigation revealed that GPT Trade is not a legitimate application, but a sophisticated Android dropper engineered to generate, prepare, and install multiple secondary malware payloads, including:
The overall structure of the attack shows a modern, modular approach where threat actors rely on packer-as-a-service platforms, Telegram bots, and impersonation techniques to distribute malware effectively.

Once installed and opened, the GPT Trade application displays a fake captcha screen. To the user, this appears to be a benign verification step. In the background, however, the application immediately begins its real activity.
During this stage, the dropper:
Two XML preference files reveal the dropper’s behavior clearly:
/shared_prefs/SplitApkInstallerminer.xml /shared_prefs/SplitApkInstalleruser.xml
These files contain paths to dynamically created payloads, confirming that GPT Trade acts as a multi-stage dropper, not a standalone app.
Once the captcha is completed, the app triggers several dex2oat32 processes to finalize the generated APKs and silently installs both malware packages:
Finally, it opens chatgpt.com in the system browser — a social engineering technique intended to reinforce user trust and mask the compromise.
Package: com.xenlyqw.jkkcyubcust
SHA256: 918f002a41f9551d48ece999ccba504fcf7596017d9566c07c5335fe0081effe
This component communicates with:
Notably, the domain aptabase[.]fud2026[.]xyz resolves to the same IP, indicating a dedicated C2 server.
The manifest shows services designed for continuous persistence, including:
Combined, these elements suggest a component dedicated to maintaining remote control and telemetry collection.
Package: mooz.balkcigol.rotinom
SHA256: 7f005c10f80372311e9c038526d81d931672d15c644fef2a77eefd67c6235917
BTMob is a well-known and highly invasive Android spyware family. In this case, the sample contacts:
The manifest includes an extremely broad set of permissions, such as:
This extensive set enables complete device takeover: credential theft, overlay attacks, keylogging, call or screen interception, and persistent surveillance.

Before installing the secondary malware, the GPT Trade dropper contacts: timeserver[.]uasecurity[.]org (207[.]90[.]195[.]25) – port 2000
This domain is part of UASecurity Tools, a service that has been active since August 2025 and offers Android APK “protection” through a website and a Telegram bot.
The UASecurity platform provides APK packing and obfuscation services. Despite presenting itself as a legitimate “intellectual property protection” tool, its packer is clearly being abused by malware developers.
The behavior of GPT Trade — generating “original” and “processed” directories, producing installers dynamically, and using a captcha trigger — strongly matches installers created by this packer.
There is no evidence that UASecurity Tools directly distributes malware. However, the misuse of their service within this campaign highlights how “developer tools” can be co-opted to support malicious operations.
The GPT Trade campaign demonstrates a mature and modular Android attack chain:
This approach reflects a growing trend in the Android threat landscape: attackers increasingly rely on outsourced infrastructure, Telegram-based distribution systems, and packer-as-a-service tools to streamline and scale their operations.
D3Lab will continue to monitor the evolution of these techniques and their associated infrastructures.
Installing applications from untrusted sources poses significant security risks.
Always download mobile applications exclusively from official and verified app stores, and avoid APK files distributed through websites, links, or third-party channels.
Dropper – GPT Trade (com.jxtfkrsl.bjtgsb)
Payload #1 – UASecurity Miner (com.xenlyqw.jkkcyubcust)
Payload #2 – BTMob Spyware (mooz.balkcigol.rotinom)