Resubmissions
16-12-2024 22:36
241216-2h8xcssrgk 1016-12-2024 22:35
241216-2hwxsssren 1013-12-2024 22:04
241213-1za6zszkcx 10Analysis
-
max time kernel
46s -
max time network
160s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
16-12-2024 22:35
Static task
static1
Behavioral task
behavioral1
Sample
cbf2b3250d5228c6006c5edd0d42fff890f24b80d54525b5cba5e5dfc1e4de5b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
cbf2b3250d5228c6006c5edd0d42fff890f24b80d54525b5cba5e5dfc1e4de5b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
cbf2b3250d5228c6006c5edd0d42fff890f24b80d54525b5cba5e5dfc1e4de5b.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
cbf2b3250d5228c6006c5edd0d42fff890f24b80d54525b5cba5e5dfc1e4de5b.apk
-
Size
4.2MB
-
MD5
f159d49f84925f204549ffd7f742955c
-
SHA1
e536079d38b426dc9abb34ff2aa7fbfd8297a093
-
SHA256
cbf2b3250d5228c6006c5edd0d42fff890f24b80d54525b5cba5e5dfc1e4de5b
-
SHA512
258ef43c7e0ab8482a8f37c79fb59788b57facf4fa4eeb7aadf9d0803bd306c0f773478cf6fd559f04959a4254379465a1b4b1901203a75c434de8c989edad1b
-
SSDEEP
49152:7Ygrkl7d9SbMbwUzfr2+63lRWY5dO3hrXFTUgoxYkAn9tTQ:9rkl7dJzfr2+eF5cRrVYUnTQ
Malware Config
Extracted
tanglebot
https://icq.im/AoLH5bRXfAE6eCtbw1I
https://t.me/zedezededeed
https://twitter.com/doplghas
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral2/memory/5242-0.dex family_tanglebot2 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.dyuymkaiacl.zyshpnspmznlnqzzn/app_DynamicOptDex/cuaTZX.json 5242 com.dyuymkaiacl.zyshpnspmznlnqzzn -
Makes use of the framework's Accessibility service 4 TTPs 3 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.dyuymkaiacl.zyshpnspmznlnqzzn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId com.dyuymkaiacl.zyshpnspmznlnqzzn Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByText com.dyuymkaiacl.zyshpnspmznlnqzzn -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.dyuymkaiacl.zyshpnspmznlnqzzn -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.dyuymkaiacl.zyshpnspmznlnqzzn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.dyuymkaiacl.zyshpnspmznlnqzzn -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.dyuymkaiacl.zyshpnspmznlnqzzn -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.dyuymkaiacl.zyshpnspmznlnqzzn -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.dyuymkaiacl.zyshpnspmznlnqzzn
Processes
-
com.dyuymkaiacl.zyshpnspmznlnqzzn1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5242
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5860274d16f9b3f4109092163474b0673
SHA131d0fe9a2a0a4b39fe4748a532b43f71e294474d
SHA256540964e823ed651f95add5497ef4799a41f10db0b9fc6ecc8897bfba1d5d0501
SHA512e985cda84e254788a08f1cf6a14d86210ea66b7c3aac0ad11d579a3a1a48aa8225854d8dff23171455cbe80c5165755c6526c3e1b69677e44a777572e56fa995
-
Filesize
706KB
MD53b995b1416bc5a5d94b57293b57c87d7
SHA1b64684345756c30a4339b5cb7cab0bf0b7648272
SHA2566582356000bef473c5b300e929e2fe6d35855b549af946334f6e387348bed951
SHA5122fb0e09df6f67290b87d28ae5ed9eb888b52d6213a8deea9e96f824fb65a03623bfa5236e47475c8ab94f154418ea8d9ff64904dc8ed7af8240ef3043bf01c38
-
Filesize
1.5MB
MD505fa4ec5c772d2aed2c0b2183374315c
SHA113bb8c957f02eb3c9cc17782980ec68a17b146ea
SHA256c4744d90dde7eb8047a7db07e01ff3bceedecccfb27e86bdc773381e473cb568
SHA51268a494dd3f5429f6021fb6c3ef0bef1889829f0740ccede64dcad73cfa19386411e36c123a6cb057a3892f685663182280667161055bded48d7745f2efce1315