

Oblivion is an Android Remote Access Trojan (RAT) advertised on underground forums as a comprehensive mobile surveillance and fraud toolkit. The malware is promoted with capabilities ranging from remote device interaction to credential theft and persistent access.
This analysis correlates actor-provided claims with behavior observed from a captured sample. While several core functionalities—such as Accessibility Service abuse, SMS interception, and persistent execution—were validated during controlled testing, other advanced capabilities remain inferred from actor descriptions and may depend on operator usage or configuration.
This research is based on:
Capabilities discussed in this report are categorized as:
The threat actor began advertising Oblivion RAT on underground forums in February, offering subscription-based access:
The listing positions the malware as a fully featured Android RAT designed for financial fraud, credential harvesting, and persistent surveillance.


Figure : Underground forum post advertising Oblivion RAT, including pricing tiers and feature highlights.
According to the forum listing, the malware is advertised to support:
These capabilities reflect actor claims and were not all independently validated during analysis.
We observed the same post was advertised on other forums as well


The actor’s profile was created on the above forums in the February month, and a post advertising the sale of this RAT was made on February 20.
The observed execution chain combines social engineering with system-level abuse:

Figure : Fake Google Play update interface used to trigger user interaction and initiate permission abuse.
The malware heavily relies on Accessibility Services to:
This enables automation of user actions and facilitates further permission abuse.

Figure : Accessibility Service permissions granted to the application, enabling UI interaction and monitoring capabilities.
The sample demonstrates access to:
This behavior aligns with use cases such as banking fraud and account takeover.

Figure : Permissions enabling access to SMS data, supporting interception of authentication messages.
Through Accessibility capabilities such as canRequestFilterKeyEvents, the malware can:
This behavior is consistent with credential harvesting workflows.

Figure : Permissions enabling Keystroke Interception, Screen Capture and System-wide Surveillance
The malware maintains execution using a combination of:
These mechanisms enable long-term presence on the device.
The malware uses deceptive interfaces to build user trust and mask malicious activity.

Figure : Fake security verification interface designed to reassure users while malicious activity occurs in the background.
The actor advertises “HVNC-like” functionality. However, analysis indicates this is implemented through:
Rather than true hidden virtual desktop environments, this approach enables interaction within the active user session.

Figure : Remote view of the infected device displaying a fake system update screen, likely used to mask attacker activity.
The malware appears to coordinate permission handling using internal signaling mechanisms, likely implemented via BroadcastReceiver-like components.
These mechanisms:

Figure : Evidence of internal event-driven logic used to coordinate permission interaction workflows.
This behavior suggests automation of user interaction rather than true privilege escalation.
OblivionRAT uses a custom BroadcastReceiver to coordinate its permission abuse via internal events like DEFAULT_SMS_DIALOG_VISIBLE and DEFAULT_SMS_RESULT. These signals track the SMS role prompt and trigger Accessibility-based automation to interact with system dialogs silently. This event-driven approach enhances stealth and reliability by enabling seamless coordination between components without user involvement.

Figure : Configuration Initialization and Enabling Stealth mode
Oblivion RAT attempts to load its configuration from an embedded resource (config.json), indicating the use of externalized and potentially obfuscated settings. If loading fails, it dynamically generates a fallback configuration containing C2 server details (host/port) and operational parameters such as stealth mode and notification behavior. This redundancy ensures the malware remains functional even when the primary configuration is unavailable. Such design reflects resilience and flexibility in maintaining command-and-control communication.
The malware loads configuration from an embedded resource (config.json). If unavailable, fallback configuration is generated dynamically.
The “webview” mode suggests potential for:

Figure : Decoded configuration revealing C2 infrastructure and operational parameters.
Network protocol behavior (e.g., encryption or transport security) was not fully validated.
| IOC | Filename |
| 69a81fe8b53c1f5fa37363e32a2ed867a0c808776bdae155fc118c2de94a321a | Yandex.Archive.apk |
| d60d067c1239ec7db222ec18f7b8e20d85dd29ca5e8d4ddd86c55047374c3c48 | payload.apk |
| fecf484b0fb268b1a6867057769a3e805abfc0b506cd022d37e0e50a9401714e | payload.apk |
| C2 Server |
| 89[.]125[.]48[.]159:8888 |
Gurucul’s Unified Security and Risk Analytics platform combines SIEM, User and Entity Behavior Analytics (UEBA), and AI-driven detection models to identify multi-stage mobile threats such as Oblivion RAT. By correlating telemetry across devices, users, and network activity, Gurucul enables early detection of Accessibility abuse, credential interception workflows, and command-and-control communication.
Gurucul SIEM ingests and correlates telemetry from multiple sources, including:
For threats like Oblivion RAT, SIEM enables detection of:
By centralizing these signals, SIEM provides end-to-end visibility across the attack lifecycle.
Oblivion RAT relies heavily on abnormal user-device interactions rather than traditional exploits. Gurucul UEBA baselines normal behavior and detects deviations such as:
These deviations generate behavioral risk signals, helping identify compromised devices even when malware is previously unknown.
Gurucul leverages machine learning and AI models to detect complex attack patterns that may not be visible through rules alone. For Oblivion RAT–like behavior, AI models help identify:
These models enhance detection of low-and-slow or stealthy activity that may bypass traditional controls.
Gurucul detection logic aligns with MITRE ATT&CK Mobile techniques observed in Oblivion RAT:
This alignment enables security teams to map detections to attacker behavior and validate defensive coverage.
By correlating SIEM and UEBA data with network telemetry, Gurucul detects:
This provides visibility into active compromise and potential data exfiltration.
Gurucul aggregates weak signals across:
These signals are combined into a dynamic risk score, enabling:
Oblivion RAT highlights how modern mobile threats leverage legitimate platform features, social engineering, and behavioral evasion to bypass traditional security controls.
By combining SIEM-based telemetry correlation, UEBA-driven behavioral analytics, and AI-powered detection models, Gurucul enables early identification and mitigation of such threats—reducing the risk of credential compromise, financial fraud, and persistent device-level access.
Contributors:
Abhishek Samdole

Pandurang Terkar

Rudra Pratap
