The Transparent Tribe Vibe: APT36 Returns With CapraRAT Impersonating Viber

CloudSEK’s latest investigation uncovers how APT36 (aka Transparent Tribe) is using VPS provider Contabo to host malicious infrastructure linked to CapraRAT and Crimson RAT. One of their latest tactics? Disguising spyware as the popular messaging app Viber—armed with permissions to record calls, read messages, track location, and more. Read how we traced the infrastructure, identified key Indicators of Compromise, and uncovered the full extent of this Android surveillance campaign.

Koushik Pal
June 3, 2025
Green Alert
Last Update posted on
June 3, 2025
Proactive Monitoring of the Dark Web for your organization

Proactively monitor and defend against malware with CloudSEK XVigil Malware Logs module, ensuring the integrity of your digital assets

Schedule a Demo
Table of Contents
Author(s)
No items found.

Over the years, we have observed that APT36 prefers to use the hosting and DNS services provided by Contabo, a large VPS hosting provider. Almost a year ago, S1 released a report on APT36 attempting to deliver CapraRAT to their victims. CapraRAT is known to be a modified version of the open-source AndroRAT. 

In addition to android users, APT36 has had Crimson RAT in its arsenal for a long time, for targeting Windows users. Using this information, we ran a Censys query to find out any CrimsonRAT infrastructure using Contabo’s hosting/DNS services.

To validate if this belongs to APT36, we checked virustotal for any overlaps with Transparent Tribe TTPs.

Our first IP has been marked as a Crimson RAT C2 on Virustotal. It is important to note that this ASN(40021) has often been used by APT36 in the past for conducting malware operations.

Moving on to the second IP:

This one has comparatively lesser detections in the wild.

Upon checking communicating files, we noticed a few malicious APKs communicating with the IP. Virustotal quickly confirmed that these were CapraRAT payloads. 

2 out of the 3 malicious android APKs were found to have the package name “com.moves.media.tubes”

The same package name was mentioned in Transparent Tribe campaigns from 2023. Source

The third sample(md5:f73f1a694d2a5c7e6d04fbc866a916bd) was found to impersonate a popular VoIP and IM application known as Viber.

High-Risk Permissions:

  • android.permission.PROCESS_OUTGOING_CALLS - Call control/redirect
  • android.permission.RECORD_AUDIO - Audio recording
  • android.permission.READ_SMS - Read text messages
  • android.permission.RECEIVE_SMS - Intercept incoming SMS
  • android.permission.CAMERA - Camera access
  • android.permission.READ_CONTACTS - Contact data access
  • android.permission.READ_CALL_LOG - Call history access

Location Tracking:

  • android.permission.ACCESS_FINE_LOCATION - Precise GPS location
  • android.permission.ACCESS_COARSE_LOCATION - Approximate location

Device Access:

  • android.permission.READ_PHONE_STATE - Phone state/device info
  • android.permission.AUTHENTICATE_ACCOUNTS - Account management
  • android.permission.WRITE_EXTERNAL_STORAGE - Storage write access
  • android.permission.INTERNET - Network access

Diamond Model

Delivery Method

APT36, also known as Transparent Tribe, employs social engineering tactics to distribute their Android Remote Access Trojans (RATs). These lures are crafted to align with the theme of the RAT's disguise.

Indicators of Compromise - CloudSEK

Indicators of Compromise (IOCs)

Indicator Type Value Package Name
APK File Hash MD5 91f5009c786618bbbd798ee777b061e3 com.moves.media.tubes
APK File Hash MD5 34546a79de045b7ee4c0c8d4cbeb6778 com.moves.media.tubes
APK File Hash MD5 f73f1a694d2a5c7e6d04fbc866a916bd com.viber.updates.links
IP Address Command and Control 161.97.180[.]199 N.A.

Impact

  • Targeted Surveillance: Victims who install the fake Viber APK are exposed to extensive spying capabilities, including microphone access, location tracking, and message interception.
  • Credential Theft Risk: The malware can harvest sensitive user data, potentially including login credentials, personal messages, and contact lists.
  • Infrastructure Abuse: The continued use of common VPS providers like Contabo allows attackers to quickly spin up new malicious infrastructure, complicating takedown efforts.
  • Brand Trust Erosion: Impersonation of trusted apps like Viber undermines user confidence in legitimate communication platforms.

Mitigations

  • App Source Verification: Encourage users to install apps only from trusted sources like the Google Play Store and avoid downloading APKs from unknown websites.
  • Mobile Threat Detection: Deploy mobile threat defense (MTD) solutions that can detect spyware behaviors, including unusual permission usage or network communication patterns.
  • User Awareness Campaigns: Educate users about impersonation threats, especially around messaging apps, and how to recognize suspicious installation prompts or app behavior.

References

#Traffic Light Protocol - Wikipedia

Predict Cyber threats against your organization

Related Posts
No items found.

Join 10,000+ subscribers

Keep up with the latest news about strains of Malware, Phishing Lures,
Indicators of Compromise, and Data Leaks.

Take action now

Secure your organisation with our Award winning Products

CloudSEK Platform is a no-code platform that powers our products with predictive threat analytic capabilities.

Adversary Intelligence

6

min read

The Transparent Tribe Vibe: APT36 Returns With CapraRAT Impersonating Viber

CloudSEK’s latest investigation uncovers how APT36 (aka Transparent Tribe) is using VPS provider Contabo to host malicious infrastructure linked to CapraRAT and Crimson RAT. One of their latest tactics? Disguising spyware as the popular messaging app Viber—armed with permissions to record calls, read messages, track location, and more. Read how we traced the infrastructure, identified key Indicators of Compromise, and uncovered the full extent of this Android surveillance campaign.

Authors
Koushik Pal
Co-Authors
No items found.

Over the years, we have observed that APT36 prefers to use the hosting and DNS services provided by Contabo, a large VPS hosting provider. Almost a year ago, S1 released a report on APT36 attempting to deliver CapraRAT to their victims. CapraRAT is known to be a modified version of the open-source AndroRAT. 

In addition to android users, APT36 has had Crimson RAT in its arsenal for a long time, for targeting Windows users. Using this information, we ran a Censys query to find out any CrimsonRAT infrastructure using Contabo’s hosting/DNS services.

To validate if this belongs to APT36, we checked virustotal for any overlaps with Transparent Tribe TTPs.

Our first IP has been marked as a Crimson RAT C2 on Virustotal. It is important to note that this ASN(40021) has often been used by APT36 in the past for conducting malware operations.

Moving on to the second IP:

This one has comparatively lesser detections in the wild.

Upon checking communicating files, we noticed a few malicious APKs communicating with the IP. Virustotal quickly confirmed that these were CapraRAT payloads. 

2 out of the 3 malicious android APKs were found to have the package name “com.moves.media.tubes”

The same package name was mentioned in Transparent Tribe campaigns from 2023. Source

The third sample(md5:f73f1a694d2a5c7e6d04fbc866a916bd) was found to impersonate a popular VoIP and IM application known as Viber.

High-Risk Permissions:

  • android.permission.PROCESS_OUTGOING_CALLS - Call control/redirect
  • android.permission.RECORD_AUDIO - Audio recording
  • android.permission.READ_SMS - Read text messages
  • android.permission.RECEIVE_SMS - Intercept incoming SMS
  • android.permission.CAMERA - Camera access
  • android.permission.READ_CONTACTS - Contact data access
  • android.permission.READ_CALL_LOG - Call history access

Location Tracking:

  • android.permission.ACCESS_FINE_LOCATION - Precise GPS location
  • android.permission.ACCESS_COARSE_LOCATION - Approximate location

Device Access:

  • android.permission.READ_PHONE_STATE - Phone state/device info
  • android.permission.AUTHENTICATE_ACCOUNTS - Account management
  • android.permission.WRITE_EXTERNAL_STORAGE - Storage write access
  • android.permission.INTERNET - Network access

Diamond Model

Delivery Method

APT36, also known as Transparent Tribe, employs social engineering tactics to distribute their Android Remote Access Trojans (RATs). These lures are crafted to align with the theme of the RAT's disguise.

Indicators of Compromise - CloudSEK

Indicators of Compromise (IOCs)

Indicator Type Value Package Name
APK File Hash MD5 91f5009c786618bbbd798ee777b061e3 com.moves.media.tubes
APK File Hash MD5 34546a79de045b7ee4c0c8d4cbeb6778 com.moves.media.tubes
APK File Hash MD5 f73f1a694d2a5c7e6d04fbc866a916bd com.viber.updates.links
IP Address Command and Control 161.97.180[.]199 N.A.

Impact

  • Targeted Surveillance: Victims who install the fake Viber APK are exposed to extensive spying capabilities, including microphone access, location tracking, and message interception.
  • Credential Theft Risk: The malware can harvest sensitive user data, potentially including login credentials, personal messages, and contact lists.
  • Infrastructure Abuse: The continued use of common VPS providers like Contabo allows attackers to quickly spin up new malicious infrastructure, complicating takedown efforts.
  • Brand Trust Erosion: Impersonation of trusted apps like Viber undermines user confidence in legitimate communication platforms.

Mitigations

  • App Source Verification: Encourage users to install apps only from trusted sources like the Google Play Store and avoid downloading APKs from unknown websites.
  • Mobile Threat Detection: Deploy mobile threat defense (MTD) solutions that can detect spyware behaviors, including unusual permission usage or network communication patterns.
  • User Awareness Campaigns: Educate users about impersonation threats, especially around messaging apps, and how to recognize suspicious installation prompts or app behavior.

References

#Traffic Light Protocol - Wikipedia