Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

DoubleTrouble

171
Global rank
139 infographic chevron month
Month rank
113 infographic chevron week
Week rank
0
IOCs

DoubleTrouble is a new-generation Android malware designed to quietly infiltrate mobile devices, harvest sensitive data, hijack financial operations, and maintain long-term persistence. Unlike commodity Android trojans, it blends advanced evasion, dual-stage infection, and dynamic payload updates, making it a rising mobile threat for both consumers and organizations.

Trojan
Type
Unknown
Origin
1 June, 2025
First seen
19 November, 2025
Last seen

How to analyze DoubleTrouble with ANY.RUN

Type
Unknown
Origin
1 June, 2025
First seen
19 November, 2025
Last seen

IOCs

Domains
begans.cfd
unicredit.appaggiornamento.com
volksbank.applogininfo.com
Last Seen at

Recent blog posts

post image
How to See Critical Incidents in Alert Overlo...
watchers 15
comments 0
post image
Detected in 60 Seconds: How to Identify Phish...
watchers 713
comments 0
post image
LOLBin Attacks Explained with Examples: Every...
watchers 3849
comments 0

DoubleTrouble: The Discord-Lurking Android Thief Emptying Wallets in Real-Time

Key Takeaways

  1. DoubleTrouble is a dual-stage, modular Android malware family focused on credential theft, fraud, and long-term persistence. The malware's abuse of Android Accessibility Services highlights a fundamental security challenge in mobile platforms.
  2. Its primary infection vector is smishing and malicious APK sideloading, often disguised as banking or delivery apps. The shift from phishing websites to Discord-hosted distribution shows threat actors continuously adapt to evade detection
  3. Businesses with BYOD environments face elevated risks, including account takeover and internal system compromise. Users in Europe and SE Asia, beware: Over 4,500 devices hit, targeting banks like ING and crypto apps.
  4. Detecting DoubleTrouble requires attention to accessibility permissions, network anomalies, and suspicious overlays. Prevention hinges on strong MDM policies, user education, and restricted sideloading.
  5. Evasion Evolution: obfuscated code and fake blocks dodge AV — layer defenses with behavioral monitoring.
  6. Dive into threat details fast with ANY.RUN’s Threat Intelligence Lookup — search "DoubleTrouble" or explore mobile banking trojans in their variety for IOCs, variants, and tailored defenses to stay ahead of campaigns.

Mobile banker samples found via TI Lookup Mobile banker sample analyses found via TI Lookup

  1. ANY.RUN's Interactive Sandbox with Android OS support helps detonate and analyze APK files to unpack behaviors safely and build custom detections. View analysis

DoubleTrouble sample in the Sandbox DoubleTrouble live sample detonated in ANY.RUN’s Sandbox

What is DoubleTrouble Malware?

DoubleTrouble is an evolving Android malware family built around modular components. It typically arrives disguised as a legitimate app, uses multiple layers of obfuscation, and deploys two coordinated modules (“double trouble”) that work together to:

  • Escalate privileges
  • Intercept device communications
  • Deploy specialized payloads based on attacker objectives

Its architecture allows operators to update capabilities in real time. Some variants behave like banking trojans; others serve as full-fledged spyware; more advanced strains use remote access tooling to turn a smartphone into a controllable endpoint.

What started as a phishing-driven menace impersonating European banks has morphed into a Discord-fueled nightmare, hosting malicious APKs that blend seamlessly into gaming and community chats. At its core, DoubleTrouble hijacks Android's Accessibility Services, granting it god-like control over the device without raising immediate alarms. This permission, often requested innocently for "app enhancements," lets the malware spy, steal, and sabotage in real-time.

Its sophisticated command-and-control architecture is what makes DoubleTrouble particularly dangerous. The malware can receive and execute dozens of commands from its C2 server, including simulating touch gestures, managing screen captures, injecting HTML overlays, blocking specific applications, and manipulating system settings. The malware also employs advanced anti-analysis techniques, uses dynamic overlays, and implements real-time visual capture to evade detection and maximize data exfiltration.

The malware is commonly distributed via rogue app stores, phishing campaigns, and malicious SMS messages. In 2025, several campaigns showed DoubleTrouble integrating MFA interception, credential theft, and automated transaction manipulation — expanding its role from pure data theft to active financial fraud.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

DoubleTrouble Trojan Victimology

DoubleTrouble primarily targets Android users throughout Europe, with campaigns specifically focusing on customers of major European banking institutions. The victimology extends beyond individual consumers to include:

  • Mobile banking users: Anyone using Android devices for financial transactions, particularly customers of European banks.
  • Enterprise employees: Corporate users accessing company banking systems or financial applications on Android devices.
  • Cryptocurrency holders: Users with cryptocurrency wallet applications on their mobile devices.
  • Small business owners: Individuals managing business finances through mobile banking applications.

The malware's shift to Discord-based distribution broadens its potential victim pool to include younger, tech-savvy users who frequent social media platforms and gaming communities.

How DoubleTrouble Malware Functions

The banker works through a multi-stage infection and operation process.

Initial Installation: The malware arrives disguised as a legitimate application, using the Google Play icon to establish trust. During installation, the actual malicious payload remains hidden within the app's Resources/raw directory, employing a session-based installation method to bypass permission restrictions.

Permission Acquisition: Upon first launch, the application prompts users to enable Android Accessibility Services: a powerful permission that grants extensive control over device functions. The request appears legitimate due to the convincing interface and trusted icon, leading many users to grant access without suspicion.

C2 Communication Establishment: Once activated, DoubleTrouble establishes communication with its command-and-control server. The malware receives instructions through a number of commands that enable remote operators to control infected devices.

Data Collection Infrastructure: The trojan implements multiple data collection mechanisms operating simultaneously:

  • A keylogger monitoring all text input
  • Screen recording capturing visual information
  • Application monitoring tracking which apps are launched and installed
  • Fake UI overlays harvesting credentials directly

Adaptive Evasion: DoubleTrouble employs sophisticated obfuscation techniques, using random two-word method names to hinder reverse engineering. The malware includes anti-analysis capabilities (start_anti and stop_anti commands) that scan UI elements for threats and can detect sandbox environments.

Exfiltration Process: Captured data is packaged into JSON payloads and transmitted to the C2 server. Screen captures are base64-encoded within these payloads, while keystroke logs and application lists are stored in XML files before exfiltration. This systematic approach ensures comprehensive data theft while maintaining stealth.

Persistent Operation: The malware maintains persistence through its accessibility service permissions, which are difficult for users to revoke once granted. It can block security applications that might detect and remove it, creating a self-protecting ecosystem that ensures continued operation.

Sandbox Analysis of a DoubleTrouble Banking Trojan Sample

ANY.RUN’s Interactive Sandbox provides isolated, instrumented environments where security researchers and analysts can safely execute suspicious files without risking production systems.

View a DoubleTrouble sample analysis

DoubleTrouble Sandbox analysis DoubleTrouble Android banker detonated in the Interactive Sandbox

In the analyzed sample, the initial reconnaissance and preparation phase is clearly visible, including telemetry collection and establishing persistence on the device. Let’s view the process tree revealed during the sandbox analysis:

DoubleTrouble process tree DoubleTrouble's processes

Immediately after launch, the application creates a service and moves it into what is known as foreground mode. This is a special type of background service in Android: the system treats it as “visible” to the user (it must display a persistent notification), so it assigns the service maximum priority and almost never terminates it, even under memory pressure. Power-saving restrictions also barely apply to such services. As a result, the malware achieves a very stable presence on the device.

At the same time, the application acquires a wake lock — a mechanism that prevents the phone from going into sleep mode. This allows the device to remain active for hours even when the screen is off.

Next, the telemetry collection begins. The malware extracts the phone number, the ISO code of the current network’s country, and the SIM card operator’s MCC and MNC. It then performs an HTTP GET request to the public ip-api service — a way to determine the victim’s geolocation based on their external IP.

The application checks whether the lock screen is currently displayed, monitors the user’s physical activity via sensors, tracks battery level and charging status, and subscribes to airplane mode change events. All of this helps the malware determine whether the device is actively in use at the moment and whether heavy operations can be executed without being noticed.

DoubleTrouble enumerates all installed applications, reads from and writes to SharedPreferences, and accesses protected system settings. It also dynamically registers a broadcast receiver and uses reflection. Calls to standard Android cryptographic APIs are visible as well.

The malware patiently establishes persistence, gathers context about the victim and the environment, bypasses system restrictions, and only then decides whether to activate its payload. Such cautious, multi-stage logic is typical of the new generation of mobile threats.

What DoubleTrouble can do to an endpoint device

Once installed, DoubleTrouble is capable of:

  • Keylogging and credential harvesting
  • Capturing SMS, messenger chats, notifications
  • Intercepting or bypassing 2FA/MFA codes
  • Screen recording and screenshot capture
  • Overlay attacks on banking/crypto apps
  • Remote access to device files and settings
  • Contact list scraping for further propagation
  • Voice call interception (in advanced variants)
  • Device lock manipulation for ransom scenarios
  • Silent installation of additional payloads
  • Some variants even disable antivirus apps and hide their own icon to avoid detection.

How DoubleTrouble threatens businesses and organizations

For organizations, DoubleTrouble poses risks far beyond individual device compromise:

  • Credential theft → account takeover → data breaches
  • Access to corporate email and messengers → internal compromise
  • Interception of MFA codes → bypassing zero-trust controls
  • Compromise of BYOD devices → lateral movement
  • Financial fraud via corporate banking apps
  • Leakage of sensitive internal documents
  • Corporate espionage via camera/microphone access

Mobile malware is increasingly becoming a preferred entry point for attackers because corporate mobile security is still underfunded and under-monitored compared to workstation security.

Gathering Threat Intelligence on DoubleTrouble Malware

Threat intelligence platforms enable teams to: -Track DoubleTrouble campaigns -Map IOCs to regions, industries, and TTPs -Block malicious IPs, hashes, and domains -Enrich SIEM/SOAR alerts with mobile-specific context

Sandbox analysis + threat intelligence gives defenders both behavioral and contextual visibility.

Use Threat Intelligence Lookup to check suspicious artifacts and view recent analysis sessions run by a community of 15,000 SOC teams.

SHA256:"657a08262d88b16624e99ddf95289537f264eb38e79de387643abc9b63ab124a".

File hash detecting DoubleTrouble via TI Lookup File hash detected as DoubleTrouble indicator via TI Lookup

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

DoubleTrouble is a fast-evolving Android threat that weaponizes accessibility abuse, overlay attacks, and modular payloads to steal credentials, bypass MFA, and enable financial fraud. For businesses relying on BYOD and remote work, it introduces significant risks — from account takeover to full corporate compromise.

To stay ahead, organizations need a combination of user education, MDM controls, mobile threat intelligence, and dynamic malware analysis. The earlier you identify malicious APKs in your environment, the faster you can break an attack chain and prevent financial or reputational damage.

Trial TI Lookup to start gathering actionable threat intelligence on mobile malware: just sign up to ANY.RUN.

HAVE A LOOK AT

Cactus Ransomware screenshot
Cactus ransomware-as-a-service (RaaS) was first caught in March 2023 targeting corporate networks. It became known for its self-encrypting payload and double extortion tactics. Cactus primarily targets large enterprises across industries in finance, manufacturing, IT, and healthcare. It is known for using custom encryption techniques, remote access tools, and penetration testing frameworks to maximize damage.
Read More
DarkVision screenshot
DarkVision
darkvision
DarkVision RAT is a low-cost, modular Remote Access Trojan that gives attackers remote control of infected Windows hosts. Initially observed around 2020 and sold in underground marketplaces, DarkVision has become notable for its full feature set (keylogging, screen capture, file theft, remote command execution and plugin support) and for being distributed via multi-stage loaders in recent campaigns.
Read More
Mamba 2FA screenshot
Mamba 2FA
mamba
Mamba 2FA is an advanced phishing-as-a-service (PhaaS) platform designed to bypass multi-factor authentication (MFA) and target Microsoft 365 accounts. It focuses on intercepting authentication flows in real-time and enables threat actors to hijack user sessions and access sensitive systems even when additional security measures are in place.
Read More
MassLogger screenshot
MassLogger
masslogger
MassLogger is a credential stealer and keylogger first identified in April 2020. It has been actively used in cyber campaigns to exfiltrate sensitive information from compromised systems. It is designed for easy use by less tech-savvy actors and is prominent for the capability of spreading via USB drives. It targets both individuals and organizations in various industries, mostly in Europe and the USA.
Read More
PureCrypter screenshot
PureCrypter
purecrypter
First identified in March 2021, PureCrypter is a .NET-based loader that employs obfuscation techniques, such as SmartAssembly, to evade detection. It has been used to distribute malware families including AgentTesla, RedLine Stealer, and SnakeKeylogger. The malware is typically delivered through phishing campaigns and malicious downloads, often masquerading as legitimate files with extensions like .mp4 or .pdf. PureCrypter utilizes encryption and compression to conceal its payloads and can inject malicious code into legitimate processes to maintain persistence on the infected system.
Read More
Remcos screenshot
Remcos
remcos trojan rat stealer
Remcos is a RAT type malware that attackers use to perform actions on infected machines remotely. This malware is extremely actively caped up to date with updates coming out almost every single month.
Read More