PULSE NAME
ASO RAT: Arabic-Language Android Surveillance Platform Targeting Syria
WHITE AlienVault 2026-04-13 Modified: 2026-04-13
31
IOCs
MEDIUM VOLUME
ASO RAT is a custom Android Remote Access Trojan featuring comprehensive device compromise capabilities including SMS interception, camera access, GPS tracking, call logging, file exfiltration, and DDoS functionality. Operating from Frankfurt-based infrastructure with connections to Syria, the platform disguises itself as PDF readers and Syrian government applications. Investigation revealed two active C2 servers, four DDNS domains, eight malicious APK samples with the newest achieving 0/66 antivirus detections, and complete reverse-engineered panel architecture exposing 21 API endpoints. The multi-user panel with role-based access control suggests RAT-as-a-Service operations. Infrastructure includes historical VPS providers and Starlink satellite connections geolocated to Syria. The developer's Arabic-language interface and Syria-themed lures indicate targeting of opposition figures, journalists, and military personnel within the Syrian conflict theater.
MITRE ATT&CK & Malware Families
ATT&CK TECHNIQUES
MALWARE FAMILIES
ASO RAT
Indicators of Compromise (7 / 31 total)
All IPv4 CVE FileHash-MD5 FileHash-SHA1 FileHash-SHA256 URL hostname
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 050537a47b5463e96a9f3e7ba79c607017faceeb668cef8aa1d5e11a19ff4990 2026-04-13
FileHash-SHA256 2eda2c838ea696f6ab1e74d2a1fa3c265234a32416a666f0efa3d065d0185552 2026-04-13
FileHash-SHA256 39901ffa746a6f6ac3de2b36d9e61e0d60b221f4d9510436fd3cb3d2d7362130 2026-04-13
FileHash-SHA256 3b5adb76e37e4cc999e281068d1f3e6f82cab8055c6b46c2e6de1b6ea8499a7e 2026-04-13
FileHash-SHA256 86ebb2e4384e3c0d4aa973c07c1d237e3f4042c773f4b2aa5fcd19d8f7383172 2026-04-13
FileHash-SHA256 ee90df061740b8cf0cdce8dba04ff34c205adf3271695e5310d04723dd9a2a47 2026-04-13
FileHash-SHA256 ffcfee12bd160dc67f9b0fbd4462e46e5932840297c611ad2646139295ea019c 2026-04-13