Analysis
-
max time kernel
13s -
max time network
150s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
23/03/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
8d98fe4bd1c89baee1e11071a479aa939b2ef2c1fb680c61f44dbcc4abe4aeb1.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8d98fe4bd1c89baee1e11071a479aa939b2ef2c1fb680c61f44dbcc4abe4aeb1.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
8d98fe4bd1c89baee1e11071a479aa939b2ef2c1fb680c61f44dbcc4abe4aeb1.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
8d98fe4bd1c89baee1e11071a479aa939b2ef2c1fb680c61f44dbcc4abe4aeb1.apk
-
Size
4.2MB
-
MD5
925a0321513d7b315c83ef0c879af940
-
SHA1
cac3aa34bf00fc08fc0435c8fa64aa2c2ae87c73
-
SHA256
8d98fe4bd1c89baee1e11071a479aa939b2ef2c1fb680c61f44dbcc4abe4aeb1
-
SHA512
e5a327036ac01a5f32542b3d7e3bc97e8396a5bb18f65da7585535c702fde006171e05ad4bf11bf6ec1b29ebc3b6a22927c2ecb53858af99550544e24c966394
-
SSDEEP
98304:u38ZqvYrO/TcvKPjae6gTHLak9K8Zo6tKdkTMaTj2bzsOg1Ie:e8ZqvogqQa/gT2kAwtK2TMMj2XsOgSe
Malware Config
Extracted
tanglebot
https://icq.im/AoLH58pXY8ejJTQiWg8
https://t.me/pempeppepepep
https://t.me/xpembeppep2p2
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral2/memory/5066-0.dex family_tanglebot2 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/vzilx.posjx.lzsj/code_cache/secondary-dexes/base.apk.classes1.zip 5066 vzilx.posjx.lzsj -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener vzilx.posjx.lzsj -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction vzilx.posjx.lzsj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone vzilx.posjx.lzsj -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver vzilx.posjx.lzsj -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo vzilx.posjx.lzsj -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo vzilx.posjx.lzsj
Processes
-
vzilx.posjx.lzsj1⤵
- Loads dropped Dex/Jar
- Obtains sensitive information copied to the device clipboard
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:5066
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
455KB
MD5b3b1db556f71fba4dccaa628ddd376de
SHA109a30d9e31055eb81e549951d2e25e95be5308a7
SHA25640b02ba99ef1d1d3dd9255253a1b0a26b25df5852bc63fd8dfd7ac7f190ccccc
SHA51292b722f37d3ad3f3ff48ad2142c17d5f8645920b155aced4b641ed33d5b99a69105d1a7552af131382e22f01db9dac47258e3c7d5777da962d06480baa34db40
-
Filesize
951KB
MD5dcb9c27777d272b40d09e456bd1a360b
SHA18e697638bf96625fe30e68025de4a2274bcd7139
SHA25680ac5a65eaf7c4bbe553afc99e5fa4ca212f763243b253dafc5d0e3c02441225
SHA512d02e208e8398057ebeb3a43cf6772fe04f4d3e181a1a07e639550fbeeebd552a5220a1fb6e32a59102b444e14b4caaefacf1d348256673881d3baf07b49c9eeb