Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
99s -
max time network
157s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
15/01/2025, 22:09
Static task
static1
Behavioral task
behavioral1
Sample
0d76a35c2701b2d6d49631cdd3f9e2972c2c020c60400aff1f7bf59d40493d83.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
0d76a35c2701b2d6d49631cdd3f9e2972c2c020c60400aff1f7bf59d40493d83.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
0d76a35c2701b2d6d49631cdd3f9e2972c2c020c60400aff1f7bf59d40493d83.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
0d76a35c2701b2d6d49631cdd3f9e2972c2c020c60400aff1f7bf59d40493d83.apk
-
Size
1.0MB
-
MD5
9604082a03dcbac0d45fbe86cf1285f8
-
SHA1
11c5812b86bfc1d11bd809d25cc032365865f510
-
SHA256
0d76a35c2701b2d6d49631cdd3f9e2972c2c020c60400aff1f7bf59d40493d83
-
SHA512
01cfe43f07f4086ac45b8927f800de516855effdfcde3ebeaec9b7a463951c5853fdae3330f28b269c341e18a3508d4109e99f1b7090e0c2f94932b2818b9571
-
SSDEEP
24576:vVLTchSsugwcBuHFJ3HAstOVhrmSVNUktLxTRw:9LT7qi7gGOVQS/nTRw
Malware Config
Extracted
tanglebot
https://icq.im/AoLH58pXY8ejJTQiWg8
https://t.me/pempeppepepep
https://t.me/xpembeppep2p2
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral3/memory/4791-0.dex family_tanglebot2 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/vbxk.jdjz.diidei/code_cache/secondary-dexes/base.apk.classes1.zip 4791 vbxk.jdjz.diidei -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId vbxk.jdjz.diidei -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener vbxk.jdjz.diidei -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction vbxk.jdjz.diidei -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo vbxk.jdjz.diidei -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo vbxk.jdjz.diidei
Processes
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD5b75abf3f52014c343bcc2dfcdeafed29
SHA1d08e9114ba1baaa49a53831693fca91c47929ea1
SHA2568e2b9b6035a832f44d954e8d3b0bbf2668d8730a6b0172614261de810a64d246
SHA512bec51b1b1ca25c05cbef5467f8e6d2a90a372e2c9d5dcddec63bd7362b59ac6e48a209610a45680e1893a3c3cdc73953797286ea60aa6705fa2d9d80c2ebf4d0
-
Filesize
949KB
MD52f525a3efc9613e8aec6fac7c630e02e
SHA1f0082ce7f15cdd83c52a75582d69541c81f5f2d2
SHA25647eb3f02adcb2494d2b724cff212f6d776d0fd398c8b272f470ad961d7cd59e9
SHA512ed73860c09c8d5eee84d15bd10675f49e868c6abffd25f906f51dc7303ada1a2e283a31654b6173b53bca0dbd1b379866ba52ddee4c1d52a35a190787a7b1f0b