Analysis
-
max time kernel
115s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
12-01-2025 22:05
Static task
static1
Behavioral task
behavioral1
Sample
5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983.apk
-
Size
2.5MB
-
MD5
49fb98fd47f9278d440174ce34b56595
-
SHA1
6bd28b45e0f4d1c92bf5e89aaa569af8f16f4c85
-
SHA256
5ed0ef191a28db3cd6a949a954f4ce86a764f8a1e94178a3c35b70f955683983
-
SHA512
1fc8a30c1d9323d877e8b508b1d6881f8ae84288ce4f904da37986680c92606dbd87766b845da1cea381a1a975d47fb4f60704a9e09acfe61a12bf968926291e
-
SSDEEP
49152:ggpUSMoVDd2DmxHt3qc4XCavKg3fcGomJi38CiqlvNVPmSkh:gWUdoV86d3qKggmJi3WwVPU
Malware Config
Extracted
tanglebot
https://icq.im/AoLH58xYS0_leBOpXFI
https://t.me/unk22k2k2k2
https://t.me/unkppapeppappe
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral2/memory/5071-0.dex family_tanglebot2 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.olqoiyegqqjlqc.ftduknecm/code_cache/secondary-dexes/base.apk.classes1.zip 5071 com.olqoiyegqqjlqc.ftduknecm -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId com.olqoiyegqqjlqc.ftduknecm -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener com.olqoiyegqqjlqc.ftduknecm -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction com.olqoiyegqqjlqc.ftduknecm -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.olqoiyegqqjlqc.ftduknecm -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.olqoiyegqqjlqc.ftduknecm -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo com.olqoiyegqqjlqc.ftduknecm -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo com.olqoiyegqqjlqc.ftduknecm
Processes
-
com.olqoiyegqqjlqc.ftduknecm1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5071
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
2Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.olqoiyegqqjlqc.ftduknecm/code_cache/secondary-dexes/tmp-base.apk.classes4724246479537117644.zip
Filesize455KB
MD5ce8f56802d4f041c0b6aaa0c6591c7dd
SHA10d71ae5faedc6c1c53188cb4fc3a26d684127351
SHA2569d8e9927d2ab3027bbe96423b9b23aa6f0fb5cbc0cf07b87459b5fb2e5a781ea
SHA5123f0ec5b98f11ae2a517657ebacde1e2af809242310bcc587b5dea208dbbd3fb189e592b023009e2441df1946cd04d2177bfdde2339526e01c68ac122d2ebe63d
-
Filesize
949KB
MD581b888a194d11f4bce291b43f3e0ebef
SHA1b930d0a5e261b8d5de002e9c5b75dd442fbe1085
SHA25610cc067d279d0005ed9d0af08d607ac9f76c329f2c9f173a29e0dfa5d931b2f6
SHA512196e354d919a87d45c4a21a1b4439a519b68dbbeda94b9f3abfe729c0c58c5c44edca2163e56bef365f5761f167406448fdeed9de6593301f87ed789e8d978cf