Skip to main content

The Transparent Tribe Vibe: APT36 Returns With CapraRAT Impersonating Viber

Medium
Published: Tue Jun 03 2025 (06/03/2025, 18:25:37 UTC)
Source: AlienVault OTX General

Description

APT36, also known as Transparent Tribe, has been observed using VPS provider Contabo to host malicious infrastructure for CapraRAT and Crimson RAT. Their latest tactic involves disguising spyware as the popular messaging app Viber, granting extensive permissions to record calls, read messages, and track location. The investigation traced the infrastructure, identified key Indicators of Compromise, and uncovered the full extent of this Android surveillance campaign. The threat actor employs social engineering tactics to distribute their Android Remote Access Trojans, with lures crafted to align with the RAT's disguise. The malware's capabilities include targeted surveillance, credential theft, and infrastructure abuse, potentially eroding brand trust in legitimate communication platforms.

AI-Powered Analysis

AILast updated: 07/04/2025, 16:57:18 UTC

Technical Analysis

APT36, also known as Transparent Tribe, has re-emerged with a sophisticated Android malware campaign involving two Remote Access Trojans (RATs): CapraRAT and Crimson RAT. The threat actor leverages social engineering techniques to distribute these RATs by impersonating the popular messaging application Viber. This impersonation is designed to deceive users into installing the spyware, which requests extensive permissions on Android devices. Once granted, the malware can record calls, read messages, track user location, and steal credentials, enabling comprehensive surveillance and espionage capabilities. The malicious infrastructure supporting this campaign is hosted on VPS services provided by Contabo, complicating takedown efforts due to the legitimate nature of the hosting provider. The campaign uses spearphishing via malicious links (MITRE ATT&CK T1566.001) and user execution (T1204) tactics to lure victims. Indicators of compromise include multiple file hashes associated with the malware samples, which can be used for detection and blocking. Although no known exploits in the wild have been reported, the persistent and targeted nature of this campaign highlights the evolving tactics of APT36 in exploiting mobile platforms for espionage and data theft. The impersonation of a trusted communication platform like Viber also risks eroding user trust in legitimate apps, potentially impacting broader communication security ecosystems.

Potential Impact

For European organizations, this threat poses significant risks, especially for sectors handling sensitive information such as government, defense, critical infrastructure, and strategic private enterprises. The spyware’s ability to record calls, read messages, and track locations can lead to severe breaches of confidentiality and privacy. Credential theft facilitated by the malware can enable lateral movement within corporate networks, increasing the risk of broader compromise. The use of Viber impersonation is particularly concerning given Viber's popularity in Europe, increasing the likelihood of successful social engineering attacks. The abuse of VPS infrastructure for command and control complicates detection and mitigation efforts, potentially allowing prolonged undetected surveillance. Mobile endpoints, often less protected than traditional desktops, become critical attack vectors, underscoring the need for enhanced mobile security. The campaign could lead to data leakage, espionage, reputational damage, and erosion of trust in communication platforms, disrupting secure communications and compromising organizational data integrity across European entities.

Mitigation Recommendations

1. Deploy Mobile Threat Defense (MTD) solutions capable of detecting and blocking malicious Android applications, particularly those impersonating legitimate apps like Viber. 2. Enforce strict application installation policies on corporate-managed devices, restricting installations to trusted sources such as the Google Play Store and verified enterprise app stores. 3. Conduct targeted user awareness training focused on recognizing social engineering tactics, especially spearphishing and malicious link risks. 4. Implement Mobile Device Management (MDM) solutions to monitor and restrict app permissions, preventing excessive permission grants that enable spyware functionalities. 5. Monitor network traffic for connections to known malicious VPS providers such as Contabo, and block or flag suspicious command and control communications. 6. Integrate threat intelligence feeds containing the provided malware hashes and indicators of compromise into security monitoring tools for proactive detection. 7. Enforce multi-factor authentication (MFA) across all critical systems to mitigate risks from credential theft. 8. Regularly audit and review app permissions on employee devices to identify and remove suspicious or unauthorized applications. 9. Collaborate with mobile security vendors to implement behavioral analytics capable of detecting RAT activities on Android devices. 10. Develop and regularly update incident response plans that include scenarios involving mobile device compromise to ensure rapid containment and remediation.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.cloudsek.com/blog/the-transparent-tribe-vibe-apt36-returns-with-caprarat-impersonating-viber"]
Adversary
APT36
Pulse Id
683f3e21d4bf7a5db1887800
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash34546a79de045b7ee4c0c8d4cbeb6778
hash91f5009c786618bbbd798ee777b061e3
hashf73f1a694d2a5c7e6d04fbc866a916bd
hash184e40229e2c62087aa182075c6efc748953df0a
hash555128ccc53e6beae6f695b5ea903daab4a41250
hashf8f63044cfe387aff0b245da80f407570aedd660
hash256f4e0fc5ac1d12c77223673088536acbbe02757aa3d5d3fc6c45958768c2c1
hash600781bc13875d80026910e12f80b88ba474fe88017daf117ee6240d944b08d2
hashe11e509039bb45fb827f6a36c804fcd8220338672c847d3abef3b21885253759

Threat ID: 683f6564182aa0cae28d1a40

Added to database: 6/3/2025, 9:13:08 PM

Last enriched: 7/4/2025, 4:57:18 PM

Last updated: 7/31/2025, 4:48:42 AM

Views: 8

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats