General

  • Target

    5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983.bin

  • Size

    2.5MB

  • Sample

    250112-1zgc1a1pgs

  • MD5

    49fb98fd47f9278d440174ce34b56595

  • SHA1

    6bd28b45e0f4d1c92bf5e89aaa569af8f16f4c85

  • SHA256

    5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983

  • SHA512

    1fc8a30c1d9323d877e8b508b1d6881f8ae84288ce4f904da37986680c92606dbd87766b845da1cea381a1a975d47fb4f60704a9e09acfe61a12bf968926291e

  • SSDEEP

    49152:ggpUSMoVDd2DmxHt3qc4XCavKg3fcGomJi38CiqlvNVPmSkh:gWUdoV86d3qKggmJi3WwVPU

Malware Config

Extracted

Family

tanglebot

C2

https://icq.im/AoLH58xYS0_leBOpXFI

https://t.me/unk22k2k2k2

https://t.me/unkppapeppappe

Targets

    • Target

      5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983.bin

    • Size

      2.5MB

    • MD5

      49fb98fd47f9278d440174ce34b56595

    • SHA1

      6bd28b45e0f4d1c92bf5e89aaa569af8f16f4c85

    • SHA256

      5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983

    • SHA512

      1fc8a30c1d9323d877e8b508b1d6881f8ae84288ce4f904da37986680c92606dbd87766b845da1cea381a1a975d47fb4f60704a9e09acfe61a12bf968926291e

    • SSDEEP

      49152:ggpUSMoVDd2DmxHt3qc4XCavKg3fcGomJi38CiqlvNVPmSkh:gWUdoV86d3qKggmJi3WwVPU

    • TangleBot

      TangleBot is an Android SMS malware first seen in September 2021.

    • TangleBot payload

    • Tanglebot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks