Analysis
-
max time kernel
132s -
max time network
151s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
18-01-2025 22:11
Static task
static1
Behavioral task
behavioral1
Sample
ea7369f9b8662a2f779bcbdf3be1334188f18c6e9ecc358dce6ad54d45f28d85.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
ea7369f9b8662a2f779bcbdf3be1334188f18c6e9ecc358dce6ad54d45f28d85.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
ea7369f9b8662a2f779bcbdf3be1334188f18c6e9ecc358dce6ad54d45f28d85.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
ea7369f9b8662a2f779bcbdf3be1334188f18c6e9ecc358dce6ad54d45f28d85.apk
-
Size
1.1MB
-
MD5
1c53ceb007d50c7b490886941c2d8f02
-
SHA1
5562cc9684340a418bc43cfa26d13e055af64dd2
-
SHA256
ea7369f9b8662a2f779bcbdf3be1334188f18c6e9ecc358dce6ad54d45f28d85
-
SHA512
0833c07cdcbe57af44f57bf9daa16e0cdeae1ff67fcfbc1701818129de618059c6771dccd40765b9410e959e1af63e48262b511874d2fd5aa92e2e5450814831
-
SSDEEP
24576:u5LTefgARvpnFfVMZ9UcinaFl2oNzolTA:+LT2vnuKW2TA
Malware Config
Extracted
tanglebot
https://icq.im/AoLH58pXY8ejJTQiWg8
https://t.me/pempeppepepep
https://t.me/xpembeppep2p2
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral3/memory/4636-0.dex family_tanglebot2 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/yeysy.mueus.shshs/code_cache/secondary-dexes/base.apk.classes1.zip 4636 yeysy.mueus.shshs -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId yeysy.mueus.shshs -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener yeysy.mueus.shshs -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction yeysy.mueus.shshs -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo yeysy.mueus.shshs -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo yeysy.mueus.shshs
Processes
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD5c0fe95c99c94219fe57ff2bde5f6b70c
SHA1c4c9ec657d4c62b2ff17e5eaec543998274fb8b9
SHA25608a3e65979e82de02b660ba466f262da7275316e743d0cc8fe50b5d4ba2ad54e
SHA5129fb512e11eb97a9ad6e88cef5b850e8ca1d9ce006b906067cc2f4acf694faf2cba2965ccea39e7fa2fdd56be23eabe30da233e952c54a1b8e777908b56da187d
-
Filesize
949KB
MD502a5628408843dd833bd5e1848bd645f
SHA17e1dc581c7640899fde027c17009ae1ac321bbe3
SHA2568d524bc5c5da7f93974fc7306096ba88a9bbbcdeeb029f67a450ee5aae4755a5
SHA512607aeb56ec049b8248f2c5056670740d4cba307c408b7991ee672b01cf11367e02467a4dede23345130cd3ada0ec4688fd0070f2f90da044e4c30cf8d17dee5e