Skip to main content

Behind Random Words: DoubleTrouble Mobile Banking Trojan Revealed

Medium
Published: Fri Aug 01 2025 (08/01/2025, 14:03:28 UTC)
Source: AlienVault OTX General

Description

A sophisticated mobile banking trojan, DoubleTrouble, has evolved in distribution methods and capabilities. Initially spread through phishing websites impersonating European banks, it now utilizes Discord channels for distribution. The malware employs advanced obfuscation techniques, abuses Android's Accessibility Services, and features screen capture, keylogging, and application blocking capabilities. It uses fake overlays to steal credentials and leverages sophisticated screen recording techniques. The trojan can block specific applications, implement a highly advanced keylogger, and execute a wide range of commands received from its Command and Control server. The malware's extensive functionalities enable credential theft, device manipulation, and persistent control over infected devices.

AI-Powered Analysis

AILast updated: 08/01/2025, 14:32:43 UTC

Technical Analysis

DoubleTrouble is a sophisticated Android mobile banking Trojan that has evolved both in its distribution methods and technical capabilities. Originally distributed through phishing websites impersonating European banks, it now also propagates via Discord channels, indicating a shift towards leveraging popular social platforms for malware dissemination. The Trojan employs advanced obfuscation techniques to evade detection by security solutions and abuses Android's Accessibility Services, a powerful feature that, when misused, grants the malware extensive control over the infected device. Its capabilities include screen capturing, keylogging, and application blocking, which facilitate the theft of banking credentials and other sensitive information. DoubleTrouble uses fake overlay screens to trick users into entering their credentials, and it employs sophisticated screen recording techniques to capture user interactions. The malware can block specific applications, preventing users from accessing legitimate banking apps or security tools, and it features a highly advanced keylogger to capture keystrokes stealthily. Additionally, it can execute a wide range of commands from its Command and Control (C2) server, enabling persistent control and manipulation of the infected device. These functionalities allow attackers to maintain long-term access, steal credentials, and manipulate device behavior to further their objectives. The absence of known exploits in the wild suggests it is either newly discovered or not yet widely deployed, but its advanced features and evolving distribution methods indicate a significant threat to mobile banking users, particularly in Europe where the initial phishing campaigns targeted local banks.

Potential Impact

For European organizations, particularly banks and financial institutions, DoubleTrouble poses a substantial risk. The Trojan targets mobile banking users, potentially leading to widespread credential theft and unauthorized financial transactions. This can result in direct financial losses for customers and reputational damage for banks. The malware's ability to block legitimate applications and manipulate device behavior can disrupt normal banking operations and customer trust. Additionally, the use of Discord for distribution highlights a risk vector that may bypass traditional email and web filtering defenses, complicating detection and response efforts. The abuse of Accessibility Services can also lead to broader device compromise, threatening the confidentiality and integrity of sensitive corporate and personal data stored on mobile devices. Given the increasing reliance on mobile banking in Europe, the Trojan's capabilities could facilitate large-scale fraud campaigns, regulatory scrutiny, and increased operational costs for incident response and remediation.

Mitigation Recommendations

European organizations should implement multi-layered defenses specifically tailored to mobile banking threats. Banks should enhance user education campaigns to raise awareness about phishing attempts, especially those impersonating legitimate banking websites and the risks of installing apps from unofficial sources like Discord channels. Mobile security solutions with behavioral analysis and advanced detection capabilities should be deployed to identify obfuscated malware and abuse of Accessibility Services. Application allowlisting and restricting Accessibility Service permissions to only trusted apps can reduce the attack surface. Banks should implement multi-factor authentication (MFA) that does not rely solely on credentials susceptible to keylogging or overlay attacks, such as hardware tokens or biometric factors. Monitoring network traffic for unusual C2 communications and employing threat intelligence feeds to detect emerging malware variants like DoubleTrouble can improve early detection. Collaboration with Discord and other platform providers to identify and remove malicious distribution channels is also recommended. Finally, incident response plans should include specific procedures for mobile malware infections, including device isolation, forensic analysis, and credential resets.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://zimperium.com/blog/behind-random-words-doubletrouble-mobile-banking-trojan-revealed"]
Adversary
null
Pulse Id
688cc930986b98a3ca1be499
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash04458f7f74b36af9496b7c3258aab500
MD5 of 84faf02309080076fe526f8bc8c427fa6bb407c5da42c31866ba47c1478cbde9
hash06591f7f08dea97a2d49080d12951d27
MD5 of e3f84482977854a5c79d253f6dcca83b2911b8c1dc7cc76b533bdc7fc31255c9
hash12455c52b070fbe4a5a16ef02adc3f48
MD5 of 91f5a4164bd557b34442550d204ad5e024dc02e2d5febf86699a7feae0a38480
hash19e01afcfac407a82d8504067b96a468
MD5 of d002f0e354841d7090df5f20dd2b2b4c8b9d2216ce331690807bb58414390a29
hash1a519169642773fccbb0f6fe1240e149
MD5 of 64977c8e167609f52ebd89a4eda1a83282e3b9ea07115bf68acd7d9836e04a1b
hash305860b80927ee2aa0d527f56d921358
MD5 of 2f9d70c75330b49a1a97479587d5e0b6016cf8004e454badf2b021e8bbb28469
hash35f7bd6034dddecf9b4fc906e1629dc9
MD5 of d45cb00646d1ead9b54810be048323179414097087ef873d0b86d8d9bcf77217
hash37c178e12f292b5bd4c5a8dc9164cc4e
MD5 of b187a29d1e9e3e616f166d2fa3076bc22b9268d0b7b01b59ea8bd89f39a90010
hash4d46a7821e3759beaba6b3c8660cdfda
MD5 of c247d9ec3fa20803ba769308c66d2b4c836ca0ac90f71d68a07f44d57eb8a501
hash4efc193e763b6afcbce32e89e296baa5
MD5 of b9a13c4fe93d5b42dc38ae1c864d17388a32bcb89e7279f4bb649c92f67f1498
hash59369200b84b41c73decace8a57a154b
MD5 of 89060156441434da8f016bd872aeaa542d32820d49b3c00bce4426120110282e
hash7ba649f57d902924cd32a8eb7b9f8c46
MD5 of b7887187e30583b9e543af73640049f9e555a32a1691f6fde7b3a3ec7858dc7a
hash815d9609b1f86ba36c85dd983aadd6d5
MD5 of 5a11f0cc9e3d8a080f6721964d3414ea638edc0fd4d22d3901f469feae4a8fa4
hasha437de8932c9e00d0a4183a20858d364
MD5 of fd558205fddb4c681c3799a28c97903ab19dfc96776df55d81edd835051523ed
hashb745014a8b2f669bf02af0c7e9b29d5d
MD5 of 05e00998bc5b18e3ac71987eeed9009ee8ba65de3f07ee90e761ace8c62878e1
hashbbf1c55126b6441c9c2a01d14f6b0a0f
MD5 of 7903328e73a07a9d27a4d0ea954bed96385f37bbd4d9afd81faec443588ca890
hashc23998b83a22189e79a856a47e91c156
MD5 of e9c6cad185dac1513b7c0f62951a264165b75b40be61373c80835a9a10502579
hashc41e21d235e0f9bd61d0657992c0bb35
MD5 of d181f30e0404c3ff85af22833600c3666c54cf904cc6387b926c9ad321c1206e
hashd5e7c38ad44ef088f44446131962e8dd
MD5 of 93601b436ccd7a7abde1546bd346fab820fe046164262c9105235e15f92a11e4
hashdaa7bacd86aeeb450328f047cc201224
MD5 of b3d134eca184962eae23a8ade27b1faca5a48bd0211bc5a401ddecd045652cee
hashea0b9649eed6ac38f0ed099a6d71e227
MD5 of 3e3a5d35eb5e11c3bfd63e75abd7f5022e8ee7288bc76a041354813f6ca601ce
hash0fc40e271fae41bad72e94c021ad54e3bcd28a4c
SHA1 of b7887187e30583b9e543af73640049f9e555a32a1691f6fde7b3a3ec7858dc7a
hash103398d27d32a9aa20bc41dc65b260a3b0ffc35a
SHA1 of b187a29d1e9e3e616f166d2fa3076bc22b9268d0b7b01b59ea8bd89f39a90010
hash1141ec4f84353f7bb2eec9453a59de6c2c4d79cb
SHA1 of 3e3a5d35eb5e11c3bfd63e75abd7f5022e8ee7288bc76a041354813f6ca601ce
hash2639e2b36a46a754f1130c9e8ea460ad2566d6a4
SHA1 of c247d9ec3fa20803ba769308c66d2b4c836ca0ac90f71d68a07f44d57eb8a501
hash33631e463ef7d7e7244fcc4dbbb8457748ae3b5c
SHA1 of 89060156441434da8f016bd872aeaa542d32820d49b3c00bce4426120110282e
hash4b881db25233921ca5e9556540fd682edb95b62c
SHA1 of 7903328e73a07a9d27a4d0ea954bed96385f37bbd4d9afd81faec443588ca890
hash4f755ed5d5480331658cdb927a05b0813fa083c6
SHA1 of e3f84482977854a5c79d253f6dcca83b2911b8c1dc7cc76b533bdc7fc31255c9
hash513784631656984cd27f5c2ec8defd9f403ba350
SHA1 of d002f0e354841d7090df5f20dd2b2b4c8b9d2216ce331690807bb58414390a29
hash513dbd1ed041e1c6e2cc8ee6afca40be17ec291e
SHA1 of d45cb00646d1ead9b54810be048323179414097087ef873d0b86d8d9bcf77217
hash59e6ababb1c3780274c68d54bbdfa0ca261fac24
SHA1 of e9c6cad185dac1513b7c0f62951a264165b75b40be61373c80835a9a10502579
hash67138c5204918955e76397f39ef4dc745cb761af
SHA1 of 5a11f0cc9e3d8a080f6721964d3414ea638edc0fd4d22d3901f469feae4a8fa4
hash6c6309b91f221f004cce88a24a9e8301ab3de8df
SHA1 of 05e00998bc5b18e3ac71987eeed9009ee8ba65de3f07ee90e761ace8c62878e1
hash714eac015d0de59380f1d8cccc50097f15b39e1e
SHA1 of 91f5a4164bd557b34442550d204ad5e024dc02e2d5febf86699a7feae0a38480
hash716dd46ab31236f24186aa55d68a506554a2683a
SHA1 of 2f9d70c75330b49a1a97479587d5e0b6016cf8004e454badf2b021e8bbb28469
hash73e54f69a41325dd2a689b4c07cb35384e4d263c
SHA1 of 93601b436ccd7a7abde1546bd346fab820fe046164262c9105235e15f92a11e4
hash895b293ab6a577396593987ce0802380ce8d62a9
SHA1 of 84faf02309080076fe526f8bc8c427fa6bb407c5da42c31866ba47c1478cbde9
hashce75f1da0d8c41771d3df015d70af81e27e4263f
SHA1 of 64977c8e167609f52ebd89a4eda1a83282e3b9ea07115bf68acd7d9836e04a1b
hashd99dbea003044d6c6848b74838e03fb0b40d3c86
SHA1 of fd558205fddb4c681c3799a28c97903ab19dfc96776df55d81edd835051523ed
hashdb9cabd798138f20c08c2a10a8741fba14e52434
SHA1 of d181f30e0404c3ff85af22833600c3666c54cf904cc6387b926c9ad321c1206e
hashdec403296d45930f8fbc18c0e74889dba0e57033
SHA1 of b9a13c4fe93d5b42dc38ae1c864d17388a32bcb89e7279f4bb649c92f67f1498
hashe6b41a269a2f46e0a8f72e4ff7bbb025e6e921df
SHA1 of b3d134eca184962eae23a8ade27b1faca5a48bd0211bc5a401ddecd045652cee
hash02e920d427b73d96a941d9eb47efaa9c55b8c43afbc111a28407184046feecfd
hash05e00998bc5b18e3ac71987eeed9009ee8ba65de3f07ee90e761ace8c62878e1
hash099a7a5bcceac0f91c63ac52b04213001b21afaeeac161b9adb2131fa62b4c57
hash20db498b222a36896b92ed67fce902e45fb90f967d8a10786f1d0a55e03c2c31
hash2f9d70c75330b49a1a97479587d5e0b6016cf8004e454badf2b021e8bbb28469
hash2fb9ea57928223260abaffcbdbc11c01513d0f49c20c8e850113de3e7b339946
hash3e3a5d35eb5e11c3bfd63e75abd7f5022e8ee7288bc76a041354813f6ca601ce
hash5a11f0cc9e3d8a080f6721964d3414ea638edc0fd4d22d3901f469feae4a8fa4
hash64977c8e167609f52ebd89a4eda1a83282e3b9ea07115bf68acd7d9836e04a1b
hash6bb0b6996adf1ebfd2291aca16622885c5072350e71740f9f0046f66c65bec5c
hash73ca0eb7bbaabb7f56cda98b28a483901527710fc1b6d4326503eda0cc884ba3
hash7903328e73a07a9d27a4d0ea954bed96385f37bbd4d9afd81faec443588ca890
hash7a924c7bdb1fd32cfc838f3cdd624abc10da19713c123b84a0f2325fef3d2bbc
hash7eb4305dbc23c5acc2c35e0d4ccd417e9448be27facca1a1d42408464e156825
hash84faf02309080076fe526f8bc8c427fa6bb407c5da42c31866ba47c1478cbde9
hash882b635024acbedb7b280ff6e7c2a3c334228770509a0855639073d9974ab03b
hash89060156441434da8f016bd872aeaa542d32820d49b3c00bce4426120110282e
hash91f5a4164bd557b34442550d204ad5e024dc02e2d5febf86699a7feae0a38480
hash93601b436ccd7a7abde1546bd346fab820fe046164262c9105235e15f92a11e4
hashb187a29d1e9e3e616f166d2fa3076bc22b9268d0b7b01b59ea8bd89f39a90010
hashb3d134eca184962eae23a8ade27b1faca5a48bd0211bc5a401ddecd045652cee
hashb7887187e30583b9e543af73640049f9e555a32a1691f6fde7b3a3ec7858dc7a
hashb9a13c4fe93d5b42dc38ae1c864d17388a32bcb89e7279f4bb649c92f67f1498
hashc247d9ec3fa20803ba769308c66d2b4c836ca0ac90f71d68a07f44d57eb8a501
hashcbfe190a81f5f10f4d7b5746fec7af51f8f02900e17f45b423aa768d1d013bb4
hashcefc92b5fecf162a2840d2c42d9411899b45704a1ee5a60cf2bc093a01e46c4d
hashd002f0e354841d7090df5f20dd2b2b4c8b9d2216ce331690807bb58414390a29
hashd181f30e0404c3ff85af22833600c3666c54cf904cc6387b926c9ad321c1206e
hashd45cb00646d1ead9b54810be048323179414097087ef873d0b86d8d9bcf77217
hashe3f84482977854a5c79d253f6dcca83b2911b8c1dc7cc76b533bdc7fc31255c9
hashe8e3f3846f2319b7b739f04eb1b83b043e815d7a06fcc759b6c07c1371d3f6d6
hashe9c6cad185dac1513b7c0f62951a264165b75b40be61373c80835a9a10502579
hashf22f8a8cbe73248e04e5e5271df969d087967719f3aca6af58ef00dfd2f35f31
hashfd558205fddb4c681c3799a28c97903ab19dfc96776df55d81edd835051523ed

Ip

ValueDescriptionCopy
ip104.238.34.15
CC=US ASN=AS8100 quadranet enterprises llc
ip41.216.183.248
CC=PL ASN=AS400377 serverion llc
ip82.115.223.2
CC=RU ASN=AS209821 ao mirs

Domain

ValueDescriptionCopy
domainbegans.cfd
domainunicredit.appaggiornamento.com
domainvolksbank.applogininfo.com

Threat ID: 688ccc87ad5a09ad00c9789d

Added to database: 8/1/2025, 2:17:43 PM

Last enriched: 8/1/2025, 2:32:43 PM

Last updated: 8/2/2025, 6:26:13 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats