General
-
Target
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48.bin
-
Size
2.7MB
-
Sample
241212-11dy9s1kel
-
MD5
1f959e7e73080b227b4c372b64c94909
-
SHA1
818c17459f847245b7fec9ffba8cb6cd484fd350
-
SHA256
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48
-
SHA512
ef364dc04a8f7b831153f5fe971aa929e5fde889d7639d63d499ff15c81b6cf7b242ee1065a5f1017a50077a3d9e17dc82388bfc96058fa5915926d59d122b82
-
SSDEEP
49152:kTSkq2uw1WTAZoaN7lJ3GpBmEAU7CsTMY9Jl7kx84mZ9aNq1vT1c3kpob4:kgwWT6v2poTEFMIlguRbm8vT63bc
Static task
static1
Behavioral task
behavioral1
Sample
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Extracted
tanglebot
https://icq.im/AoLH58pXY8ejJTQiWg8
https://t.me/pempeppepepep
https://t.me/xpembeppep2p2
Targets
-
-
Target
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48.bin
-
Size
2.7MB
-
MD5
1f959e7e73080b227b4c372b64c94909
-
SHA1
818c17459f847245b7fec9ffba8cb6cd484fd350
-
SHA256
674cc3ce29a739e42e84453cfc5a56131af7729999f89bd695cf144a649caa48
-
SHA512
ef364dc04a8f7b831153f5fe971aa929e5fde889d7639d63d499ff15c81b6cf7b242ee1065a5f1017a50077a3d9e17dc82388bfc96058fa5915926d59d122b82
-
SSDEEP
49152:kTSkq2uw1WTAZoaN7lJ3GpBmEAU7CsTMY9Jl7kx84mZ9aNq1vT1c3kpob4:kgwWT6v2poTEFMIlguRbm8vT63bc
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload
-
Tanglebot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2