General

  • Target

    e951c1e88f32bb244d557a9a17a2b7a8260660b2c5189f18c586799aa56a6304.bin

  • Size

    4.5MB

  • Sample

    250323-1w1x8sxtbw

  • MD5

    dc50fc4cb38f3fc0a7306e6824f5b5f2

  • SHA1

    478d90e2c4b3b8020d51fb328c72a60a9332c35b

  • SHA256

    e951c1e88f32bb244d557a9a17a2b7a8260660b2c5189f18c586799aa56a6304

  • SHA512

    9a9c3611b542284c77bcf3edb5b318d5ab1424f03c30fed426b0d6ea9280044b5892c5c51fcd5754025e78fa273351d397545af6edab54dd7170c9cfc3b58fa8

  • SSDEEP

    98304:Q/O7d9Xwfy9P95P6Rh3YnjW+iTzPRo0FdWfEgoUca7Sk4jJfTG:Q/Oveul3jGiiOoUcxk4jJrG

Malware Config

Extracted

Family

tanglebot

C2

https://icq.im/AoLH58pXY8ejJTQiWg8

https://t.me/pempeppepepep

https://t.me/xpembeppep2p2

Targets

    • Target

      e951c1e88f32bb244d557a9a17a2b7a8260660b2c5189f18c586799aa56a6304.bin

    • Size

      4.5MB

    • MD5

      dc50fc4cb38f3fc0a7306e6824f5b5f2

    • SHA1

      478d90e2c4b3b8020d51fb328c72a60a9332c35b

    • SHA256

      e951c1e88f32bb244d557a9a17a2b7a8260660b2c5189f18c586799aa56a6304

    • SHA512

      9a9c3611b542284c77bcf3edb5b318d5ab1424f03c30fed426b0d6ea9280044b5892c5c51fcd5754025e78fa273351d397545af6edab54dd7170c9cfc3b58fa8

    • SSDEEP

      98304:Q/O7d9Xwfy9P95P6Rh3YnjW+iTzPRo0FdWfEgoUca7Sk4jJfTG:Q/Oveul3jGiiOoUcxk4jJrG

    • TangleBot

      TangleBot is an Android SMS malware first seen in September 2021.

    • TangleBot payload

    • Tanglebot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks