General

  • Target

    9353775f44ad8d6f7c687bff942bbda6836196a2218edbc5491fba7e8b02a741.bin

  • Size

    1.8MB

  • Sample

    241219-12k4za1rbk

  • MD5

    191c5458cee2fd98aa6183bac62d9325

  • SHA1

    9feb0f47afebd9e329edc688fe05f865fc46f5d2

  • SHA256

    9353775f44ad8d6f7c687bff942bbda6836196a2218edbc5491fba7e8b02a741

  • SHA512

    785f2b6785783dcc44d63fefc5c7ee160ff856f1ea95b7e5448421b97103a8d3f81127e46cb3560f410b3d8a0af7cff4b455e1138d9e1f93a2467d9bfab7aeb9

  • SSDEEP

    24576:aSkHeuJgMiBvHIIJlAXA4+T2hosWAP7rTmxHV01zzZ6X2+HtfsT/9YkgjgQ7hMzm:aSkOMyoIH2DmxH8ZjXT/VgjbhG/fm

Malware Config

Extracted

Family

tanglebot

C2

https://icq.im/AoLH58xYS0_leBOpXFI

https://t.me/unk22k2k2k2

https://t.me/unkppapeppappe

Targets

    • Target

      9353775f44ad8d6f7c687bff942bbda6836196a2218edbc5491fba7e8b02a741.bin

    • Size

      1.8MB

    • MD5

      191c5458cee2fd98aa6183bac62d9325

    • SHA1

      9feb0f47afebd9e329edc688fe05f865fc46f5d2

    • SHA256

      9353775f44ad8d6f7c687bff942bbda6836196a2218edbc5491fba7e8b02a741

    • SHA512

      785f2b6785783dcc44d63fefc5c7ee160ff856f1ea95b7e5448421b97103a8d3f81127e46cb3560f410b3d8a0af7cff4b455e1138d9e1f93a2467d9bfab7aeb9

    • SSDEEP

      24576:aSkHeuJgMiBvHIIJlAXA4+T2hosWAP7rTmxHV01zzZ6X2+HtfsT/9YkgjgQ7hMzm:aSkOMyoIH2DmxH8ZjXT/VgjbhG/fm

    • TangleBot

      TangleBot is an Android SMS malware first seen in September 2021.

    • TangleBot payload

    • Tanglebot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks