CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◐ Insider Threat & DLP Mar 20, 2026

Detecting Oblivion Android RAT: Accessibility Abuse, OTP Interception, and Mobile Threat Behavior

Gurucul Archived Mar 20, 2026 ✓ Full text saved

Overview Oblivion is an Android Remote Access Trojan (RAT) advertised on underground forums as a comprehensive mobile surveillance and fraud toolkit. The malware is promoted with capabilities ranging from remote device interaction to credential theft and persistent access. This analysis correlates actor-provided claims with behavior observed from a captured sample. While several core functionalities—such as […]

Full text archived locally
✦ AI Summary · Claude Sonnet


    BLOG MARCH 17, 2026 Threat Research DETECTING OBLIVION ANDROID RAT: ACCESSIBILITY ABUSE, OTP INTERCEPTION, AND MOBILE THREAT BEHAVIOR IN THIS ARTICLE Overview Analysis Scope & Methodology Actor Advertisement & Ecosystem Advertised Capabilities (Actor Claims) Execution Flow Observed Capabilities (Validated Behavior) 1. Accessibility Service Abuse 2. SMS and Notification Interception 3. Input Monitoring (Keylogging-like Behavior) 4. Persistence Mechanisms 5. Social Engineering & Defense Evasion 6. Remote Interaction Capabilities 7. Permission Automation & Internal Logic 8. Configuration Initialization 9. Command-and-Control (C2) Observed Characteristics Indicators of Compromise (IOCs) : File Hashes (SHA-256) IP Address How Gurucul Helps Detect and Mitigate Oblivion Android RAT SIEM-Driven Telemetry Correlation Behavioral Detection with UEBA AI-Driven Threat Detection Models MITRE ATT&CK Alignment Network and Command-and-Control Detection Risk-Based Alerting and Investigation Conclusion Overview Oblivion is an Android Remote Access Trojan (RAT) advertised on underground forums as a comprehensive mobile surveillance and fraud toolkit. The malware is promoted with capabilities ranging from remote device interaction to credential theft and persistent access. This analysis correlates actor-provided claims with behavior observed from a captured sample. While several core functionalities—such as Accessibility Service abuse, SMS interception, and persistent execution—were validated during controlled testing, other advanced capabilities remain inferred from actor descriptions and may depend on operator usage or configuration. Analysis Scope & Methodology This research is based on: Actor advertisements and feature listings from underground forums Static analysis and limited dynamic execution of a captured APK sample Behavioral observation of permission usage and runtime activity Capabilities discussed in this report are categorized as: Observed – directly validated during analysis Inferred – supported by artifacts but not fully executed Claimed – based solely on actor-provided descriptions Actor Advertisement & Ecosystem The threat actor began advertising Oblivion RAT on underground forums in February, offering subscription-based access: 1 Month – $300 3 Months – $700 6 Months – $1300 1 Year – $1900 Lifetime – $2200 The listing positions the malware as a fully featured Android RAT designed for financial fraud, credential harvesting, and persistent surveillance. Figure : Underground forum post advertising Oblivion RAT, including pricing tiers and feature highlights. Advertised Capabilities (Actor Claims) According to the forum listing, the malware is advertised to support: Hidden remote interaction (marketed as “HVNC-like”) Automated permission granting Real-time interception of SMS, OTPs, and notifications Keylogging and credential harvesting Persistent access with resistance to removal These capabilities reflect actor claims and were not all independently validated during analysis. We observed the same post was advertised on other forums as well The actor’s profile was created on the above forums in the February month, and a post advertising the sale of this RAT was made on February 20. Execution Flow The observed execution chain combines social engineering with system-level abuse: User is presented with a fake update prompt Application requests Accessibility Service permissions Accessibility is leveraged to automate UI interactions Malware initializes configuration Background services establish persistence Device begins communication with C2 infrastructure Figure : Fake Google Play update interface used to trigger user interaction and initiate permission abuse. Observed Capabilities (Validated Behavior) 1. Accessibility Service Abuse The malware heavily relies on Accessibility Services to: Interact with UI elements programmatically Monitor on-screen content Simulate user gestures This enables automation of user actions and facilitates further permission abuse. Figure : Accessibility Service permissions granted to the application, enabling UI interaction and monitoring capabilities. 2. SMS and Notification Interception The sample demonstrates access to: SMS messages One-time passwords (OTPs) Authentication-related communications This behavior aligns with use cases such as banking fraud and account takeover. Figure : Permissions enabling access to SMS data, supporting interception of authentication messages. 3. Input Monitoring (Keylogging-like Behavior) Through Accessibility capabilities such as canRequestFilterKeyEvents, the malware can: Monitor user input events Capture sensitive credentials under certain conditions This behavior is consistent with credential harvesting workflows. Figure : Permissions enabling Keystroke Interception, Screen Capture and System-wide Surveillance 4. Persistence Mechanisms The malware maintains execution using a combination of: RECEIVE_BOOT_COMPLETED – restart after reboot FOREGROUND_SERVICE – reduce likelihood of termination WAKE_LOCK – sustain execution These mechanisms enable long-term presence on the device. 5. Social Engineering & Defense Evasion The malware uses deceptive interfaces to build user trust and mask malicious activity. Figure : Fake security verification interface designed to reassure users while malicious activity occurs in the background. 6. Remote Interaction Capabilities The actor advertises “HVNC-like” functionality. However, analysis indicates this is implemented through: Accessibility-driven UI interaction Screen monitoring and potential screen capture Rather than true hidden virtual desktop environments, this approach enables interaction within the active user session. Figure : Remote view of the infected device displaying a fake system update screen, likely used to mask attacker activity. 7. Permission Automation & Internal Logic The malware appears to coordinate permission handling using internal signaling mechanisms, likely implemented via BroadcastReceiver-like components. These mechanisms: Track system dialog states Trigger automated UI interactions via Accessibility Figure : Evidence of internal event-driven logic used to coordinate permission interaction workflows.   This behavior suggests automation of user interaction rather than true privilege escalation. OblivionRAT uses a custom BroadcastReceiver to coordinate its permission abuse via internal events like DEFAULT_SMS_DIALOG_VISIBLE and DEFAULT_SMS_RESULT. These signals track the SMS role prompt and trigger Accessibility-based automation to interact with system dialogs silently. This event-driven approach enhances stealth and reliability by enabling seamless coordination between components without user involvement. 8. Configuration Initialization Figure : Configuration Initialization and Enabling Stealth mode Oblivion RAT attempts to load its configuration from an embedded resource (config.json), indicating the use of externalized and potentially obfuscated settings. If loading fails, it dynamically generates a fallback configuration containing C2 server details (host/port) and operational parameters such as stealth mode and notification behavior. This redundancy ensures the malware remains functional even when the primary configuration is unavailable. Such design reflects resilience and flexibility in maintaining command-and-control communication. 9. Command-and-Control (C2) The malware loads configuration from an embedded resource (config.json). If unavailable, fallback configuration is generated dynamically. Observed Characteristics Configuration stored in Base64-encoded format (not encrypted) Contains: C2 server: 89.125.48.159:8888 Token identifier (prefix: OBL_) Application mode and landing URL The “webview” mode suggests potential for: Phishing content delivery Dynamic payload loading Figure : Decoded configuration revealing C2 infrastructure and operational parameters. Network protocol behavior (e.g., encryption or transport security) was not fully validated. Indicators of Compromise (IOCs) : File Hashes (SHA-256) IOC Filename 69a81fe8b53c1f5fa37363e32a2ed867a0c808776bdae155fc118c2de94a321a Yandex.Archive.apk d60d067c1239ec7db222ec18f7b8e20d85dd29ca5e8d4ddd86c55047374c3c48 payload.apk fecf484b0fb268b1a6867057769a3e805abfc0b506cd022d37e0e50a9401714e payload.apk IP Address C2 Server 89[.]125[.]48[.]159:8888 How Gurucul Helps Detect and Mitigate Oblivion Android RAT Gurucul’s Unified Security and Risk Analytics platform combines SIEM, User and Entity Behavior Analytics (UEBA), and AI-driven detection models to identify multi-stage mobile threats such as Oblivion RAT. By correlating telemetry across devices, users, and network activity, Gurucul enables early detection of Accessibility abuse, credential interception workflows, and command-and-control communication. SIEM-Driven Telemetry Correlation Gurucul SIEM ingests and correlates telemetry from multiple sources, including: Mobile device management (MDM) / EMM logs Application activity and permission changes Network traffic and DNS logs Identity and access events For threats like Oblivion RAT, SIEM enables detection of: Installation of suspicious or sideloaded applications Applications requesting high-risk permissions (Accessibility, SMS, overlay) Correlation between permission changes and subsequent anomalous behavior Network connections to known or suspicious external infrastructure By centralizing these signals, SIEM provides end-to-end visibility across the attack lifecycle. Behavioral Detection with UEBA Oblivion RAT relies heavily on abnormal user-device interactions rather than traditional exploits. Gurucul UEBA baselines normal behavior and detects deviations such as: Unauthorized use of Accessibility Services by non-assistive applications Rapid or automated interaction with system dialogs (permission granting patterns) Unusual combinations of permissions (Accessibility + SMS + foreground execution) Continuous background or foreground service activity without user context Abnormal interaction patterns indicative of scripted or automated behavior These deviations generate behavioral risk signals, helping identify compromised devices even when malware is previously unknown. AI-Driven Threat Detection Models Gurucul leverages machine learning and AI models to detect complex attack patterns that may not be visible through rules alone. For Oblivion RAT–like behavior, AI models help identify: Sequential patterns such as: App installation → Accessibility enablement → SMS access → network communication Correlation between data access (OTP/SMS) and outbound traffic Anomalous interaction frequency inconsistent with human usage patterns Behavioral clustering of suspicious applications across multiple devices These models enhance detection of low-and-slow or stealthy activity that may bypass traditional controls. MITRE ATT&CK Alignment Gurucul detection logic aligns with MITRE ATT&CK Mobile techniques observed in Oblivion RAT: Initial Access – Social engineering via fake update interfaces Execution – Malicious app deployment Privilege Abuse – Accessibility Service exploitation (T1626) Credential Access – Input capture and SMS interception (T1417, T1409) Defense Evasion – Abuse of legitimate OS features Command and Control – Application-layer communication (T1437) This alignment enables security teams to map detections to attacker behavior and validate defensive coverage. Network and Command-and-Control Detection By correlating SIEM and UEBA data with network telemetry, Gurucul detects: Outbound communication to suspicious infrastructure (e.g., 89.125.48.159:8888) Repeated beaconing or anomalous traffic patterns Applications generating network traffic inconsistent with declared functionality Temporal correlation between sensitive data access and network activity This provides visibility into active compromise and potential data exfiltration. Risk-Based Alerting and Investigation Gurucul aggregates weak signals across: Application and device behavior Permission abuse patterns Accessibility usage Network communication Identity and session context These signals are combined into a dynamic risk score, enabling: Prioritization of high-risk devices and users Context-rich alerts instead of isolated events Faster investigation and response with reduced alert fatigue Conclusion Oblivion RAT highlights how modern mobile threats leverage legitimate platform features, social engineering, and behavioral evasion to bypass traditional security controls. By combining SIEM-based telemetry correlation, UEBA-driven behavioral analytics, and AI-powered detection models, Gurucul enables early identification and mitigation of such threats—reducing the risk of credential compromise, financial fraud, and persistent device-level access. Contributors:   Abhishek Samdole Pandurang Terkar Rudra Pratap
    💬 Team Notes
    Article Info
    Source
    Gurucul
    Category
    ◐ Insider Threat & DLP
    Published
    Mar 20, 2026
    Archived
    Mar 20, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗