Malware Analysis Report

2025-01-19 05:49

Sample ID 241207-dh1nzsykgj
Target 9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772.apk
SHA256 9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772
Tags
tanglebot evasion impact infostealer spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772

Threat Level: Known bad

The file 9032aa19547240ef5defddbdb1b4cabcacf4a3d1e95564ff8910289cf26b0772.apk was found to be: Known bad.

Malicious Activity Summary

tanglebot evasion impact infostealer spyware trojan

TangleBot payload

Tanglebot family

TangleBot

Loads dropped Dex/Jar

Attempts to obfuscate APK file format

Requests dangerous framework permissions

Uses Crypto APIs (Might try to encrypt user data)

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-07 03:01

Signatures

Attempts to obfuscate APK file format

Requests dangerous framework permissions

Description Indicator Process Target
Required to be able to connect to paired Bluetooth devices. android.permission.BLUETOOTH_CONNECT N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to request installing packages. android.permission.REQUEST_INSTALL_PACKAGES N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to post notifications. android.permission.POST_NOTIFICATIONS N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to read audio files from external storage. android.permission.READ_MEDIA_AUDIO N/A N/A
Allows an application to read image files from external storage. android.permission.READ_MEDIA_IMAGES N/A N/A
Allows an application a broad access to external storage in scoped storage. android.permission.MANAGE_EXTERNAL_STORAGE N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Allows an application to access any geographic locations persisted in the user's shared collection. android.permission.ACCESS_MEDIA_LOCATION N/A N/A
Allows an application to read video files from external storage. android.permission.READ_MEDIA_VIDEO N/A N/A
Allows an application to read image or video files from external storage that a user has selected via the permission prompt photo picker. android.permission.READ_MEDIA_VISUAL_USER_SELECTED N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-07 03:01

Reported

2024-12-07 03:03

Platform

android-x86-arm-20240624-en

Max time kernel

25s

Max time network

137s

Command Line

com.verify.weird

Signatures

TangleBot

trojan infostealer spyware tanglebot

TangleBot payload

Description Indicator Process Target
N/A N/A N/A N/A

Tanglebot family

tanglebot

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.verify.weird

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.verify.weird/app_mph_dex/oat/x86/apk.ijiami-v1.pro.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so --output-vdex-fd=42 --oat-fd=43 --oat-location=/data/user/0/com.verify.weird/app_mph_dex/oat/x86/apk.ijiami-v1.pro.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.213.10:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.213.10:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.200.46:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
GB 216.58.213.10:443 semanticlocation-pa.googleapis.com tcp

Files

/data/data/com.verify.weird/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫

MD5 6cd9bccdee0d6b29616c7ac8f4094390
SHA1 75c0583bbb438c5e17aee2b5bae1bdb3a2aacd58
SHA256 962ee98f3727a58162ba6d86c883c657ae1fafbaffc8980aa2bc25cd0d53c37b
SHA512 9fbfa7d37032640c0844ed240f6cb5295f36483c88654c9947ab6ccecf1ee61fa076a2a6f87b117873dcc53fb04378b3da8b7bcf25eaa8123fb3074773bac5a1

/data/data/com.verify.weird/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫.

MD5 24f8cfbdb83c65f3c9c44b23d948f4fc
SHA1 a77a883ca346e68369935b04a5dacbcc8eb6c98e
SHA256 3209388a21e9a22a9fb7634a3f3d6081ef051ad532adf8803617c39f152e4a90
SHA512 d4cb2d811a9d4ff4328d4c8076de4788956358e4ea36b99c119531e4b50fc74a68c40daae54fc30e2dbe6bf505218535c56e878cdfc533ae11b6a06103da40ae

/data/data/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so

MD5 f861bb3708b629fc1b6f5efef6c41e4e
SHA1 855344a28a37f055af28eff81b07094dd30521a9
SHA256 f8e056955eee9d2347199fdd0652f7e06ae98a2c3a319752654c250eb9175716
SHA512 d3c5bfa79f65bb06531e3ad606c87e422e6af9403b30cbae2df913eb0b2a2fdd5ea2d642c8ee08e622cad0068f4e652ae6c9fad2bb2e45663702291ec314040f

/data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so

MD5 823a36c4a9eb570dc342b019a9a31d80
SHA1 7aff5cf359313bc2097d52d972212ebdbab5c12c
SHA256 cd61e8cb613270df47ad8fa6d107fbb9dc3eca35d8920a6dd82d122c3b63fc4f
SHA512 a0034e91cd1994cc8fdd92be35dd07afbea1031960a4acce5cf82f20e1f4c0985f84643ac7a0077ceee94b7b64a1d1f01618a8d8cfb0b5c94c03616be1f6ef1e

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-07 03:01

Reported

2024-12-07 03:03

Platform

android-33-x64-arm64-20240624-en

Max time kernel

48s

Max time network

132s

Command Line

com.verify.weird

Signatures

TangleBot

trojan infostealer spyware tanglebot

TangleBot payload

Description Indicator Process Target
N/A N/A N/A N/A

Tanglebot family

tanglebot

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A
N/A /data/user/0/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Processes

com.verify.weird

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.200.36:443 udp
GB 142.250.200.36:443 tcp
GB 142.250.200.36:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.169.78:443 android.apis.google.com tcp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 rcs-acs-tmo-us.jibe.google.com udp
US 216.239.36.155:443 rcs-acs-tmo-us.jibe.google.com tcp
US 1.1.1.1:53 remoteprovisioning.googleapis.com udp
GB 142.250.180.10:443 remoteprovisioning.googleapis.com tcp
US 172.64.41.3:443 tcp
US 172.64.41.3:443 tcp
GB 172.217.16.227:443 tcp
US 172.64.41.3:443 udp
GB 172.217.16.227:443 udp
GB 142.250.200.36:443 tcp
GB 216.58.204.68:443 tcp
GB 216.58.204.68:443 tcp
GB 142.250.200.36:443 udp

Files

/data/data/com.verify.weird/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫

MD5 6cd9bccdee0d6b29616c7ac8f4094390
SHA1 75c0583bbb438c5e17aee2b5bae1bdb3a2aacd58
SHA256 962ee98f3727a58162ba6d86c883c657ae1fafbaffc8980aa2bc25cd0d53c37b
SHA512 9fbfa7d37032640c0844ed240f6cb5295f36483c88654c9947ab6ccecf1ee61fa076a2a6f87b117873dcc53fb04378b3da8b7bcf25eaa8123fb3074773bac5a1

/data/data/com.verify.weird/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫/ۦۖ۫.

MD5 24f8cfbdb83c65f3c9c44b23d948f4fc
SHA1 a77a883ca346e68369935b04a5dacbcc8eb6c98e
SHA256 3209388a21e9a22a9fb7634a3f3d6081ef051ad532adf8803617c39f152e4a90
SHA512 d4cb2d811a9d4ff4328d4c8076de4788956358e4ea36b99c119531e4b50fc74a68c40daae54fc30e2dbe6bf505218535c56e878cdfc533ae11b6a06103da40ae

/data/data/com.verify.weird/app_mph_dex/apk.ijiami-v1.pro.so

MD5 f861bb3708b629fc1b6f5efef6c41e4e
SHA1 855344a28a37f055af28eff81b07094dd30521a9
SHA256 f8e056955eee9d2347199fdd0652f7e06ae98a2c3a319752654c250eb9175716
SHA512 d3c5bfa79f65bb06531e3ad606c87e422e6af9403b30cbae2df913eb0b2a2fdd5ea2d642c8ee08e622cad0068f4e652ae6c9fad2bb2e45663702291ec314040f