Analysis
-
max time kernel
25s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
07-12-2024 03:01
Static task
static1
Behavioral task
behavioral1
Sample
9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772.apk
Resource
android-x86-arm-20240624-en
General
-
Target
9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772.apk
-
Size
7.7MB
-
MD5
183930302ff091ae129b7915b2d67b86
-
SHA1
85352a01ab6691f3dbba73efc008febbcf695e74
-
SHA256
9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772
-
SHA512
eadafb67a3bb904afce07a7ac033b4f964dc76a467c773de39bb0365fc40fc9c1849e286266191fa411b68b3269bd7fef0db8ddd062032e771bef2aabe0a4554
-
SSDEEP
98304:uJTA+oE0tU+7Dy0mHDH+ArMLy+V1LyAJU1YyRGu3BVVyBe1X9OpRzBLFSSKd5PHx:uJTd9V+7m0mHDHJIG+V1GACPt2dFcfJ
Malware Config
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral1/files/fstream-3.dat family_tanglebot3 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 6 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so 4258 com.verify.weird /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so 4287 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.verify.weird/app_mph_dex/oat/x86/apk.ijiami-v1.pro.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so 4258 com.verify.weird /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so 4258 com.verify.weird /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so 4322 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.verify.weird/app_mph_dex/oat/x86/apk.ijiami-v1.pro.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so 4258 com.verify.weird -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.verify.weird
Processes
-
com.verify.weird1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4258 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.verify.weird/app_mph_dex/oat/x86/apk.ijiami-v1.pro.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4287
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.verify.weird/app_mph_dex/oat/x86/apk.ijiami-v1.pro.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4322
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.4MB
MD5f861bb3708b629fc1b6f5efef6c41e4e
SHA1855344a28a37f055af28eff81b07094dd30521a9
SHA256f8e056955eee9d2347199fdd0652f7e06ae98a2c3a319752654c250eb9175716
SHA512d3c5bfa79f65bb06531e3ad606c87e422e6af9403b30cbae2df913eb0b2a2fdd5ea2d642c8ee08e622cad0068f4e652ae6c9fad2bb2e45663702291ec314040f
-
Filesize
6.4MB
MD56cd9bccdee0d6b29616c7ac8f4094390
SHA175c0583bbb438c5e17aee2b5bae1bdb3a2aacd58
SHA256962ee98f3727a58162ba6d86c883c657ae1fafbaffc8980aa2bc25cd0d53c37b
SHA5129fbfa7d37032640c0844ed240f6cb5295f36483c88654c9947ab6ccecf1ee61fa076a2a6f87b117873dcc53fb04378b3da8b7bcf25eaa8123fb3074773bac5a1
-
Filesize
8B
MD524f8cfbdb83c65f3c9c44b23d948f4fc
SHA1a77a883ca346e68369935b04a5dacbcc8eb6c98e
SHA2563209388a21e9a22a9fb7634a3f3d6081ef051ad532adf8803617c39f152e4a90
SHA512d4cb2d811a9d4ff4328d4c8076de4788956358e4ea36b99c119531e4b50fc74a68c40daae54fc30e2dbe6bf505218535c56e878cdfc533ae11b6a06103da40ae
-
Filesize
4.4MB
MD5823a36c4a9eb570dc342b019a9a31d80
SHA17aff5cf359313bc2097d52d972212ebdbab5c12c
SHA256cd61e8cb613270df47ad8fa6d107fbb9dc3eca35d8920a6dd82d122c3b63fc4f
SHA512a0034e91cd1994cc8fdd92be35dd07afbea1031960a4acce5cf82f20e1f4c0985f84643ac7a0077ceee94b7b64a1d1f01618a8d8cfb0b5c94c03616be1f6ef1e