General

  • Target

    17e9149885aa518abba17a8b1d674ae3b9da34c66cdb5e59e31cee051a227c96.bin

  • Size

    2.7MB

  • Sample

    250323-1ye4js1m14

  • MD5

    6b5a6df7fef23ce3cae8c6e46f15a028

  • SHA1

    f2f0cfe1a5c725cfc5c2b78601d7725fec97c850

  • SHA256

    17e9149885aa518abba17a8b1d674ae3b9da34c66cdb5e59e31cee051a227c96

  • SHA512

    edf2fc515d5fa970e9b6f2aae6d48f26f6c4ae3d9e7134e63c52398a4e126e799df1002e160ab1f43ed33aa5cc913bd8edad897be69f984cf391310d8a170936

  • SSDEEP

    49152:lLTk25NTUI+vBovne7MyL4WDqrdB6GByVUx5i6dpzaW1cwYwmJPM0:1TUHvyfe79MWqJ/taW1cQ8PM0

Malware Config

Extracted

Family

tanglebot

C2

https://icq.im/AoLH58pXY8ejJTQiWg8

https://t.me/pempeppepepep

https://t.me/xpembeppep2p2

Targets

    • Target

      17e9149885aa518abba17a8b1d674ae3b9da34c66cdb5e59e31cee051a227c96.bin

    • Size

      2.7MB

    • MD5

      6b5a6df7fef23ce3cae8c6e46f15a028

    • SHA1

      f2f0cfe1a5c725cfc5c2b78601d7725fec97c850

    • SHA256

      17e9149885aa518abba17a8b1d674ae3b9da34c66cdb5e59e31cee051a227c96

    • SHA512

      edf2fc515d5fa970e9b6f2aae6d48f26f6c4ae3d9e7134e63c52398a4e126e799df1002e160ab1f43ed33aa5cc913bd8edad897be69f984cf391310d8a170936

    • SSDEEP

      49152:lLTk25NTUI+vBovne7MyL4WDqrdB6GByVUx5i6dpzaW1cwYwmJPM0:1TUHvyfe79MWqJ/taW1cQ8PM0

    • TangleBot

      TangleBot is an Android SMS malware first seen in September 2021.

    • TangleBot payload

    • Tanglebot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks