General

  • Target

    8157ddb2f2cf24cd6d0c9c59f8da5b2c741a35e248b687605cd110181b96eddc.bin

  • Size

    4.5MB

  • Sample

    250324-1xe26awzet

  • MD5

    71e5bb179194d1450f887a4c80004bc3

  • SHA1

    52c4e904ab6565da89f18030619ee9336490c3da

  • SHA256

    8157ddb2f2cf24cd6d0c9c59f8da5b2c741a35e248b687605cd110181b96eddc

  • SHA512

    2637b7db57c08f5d9cfd22d57374c521bf180b1303b0d89d14cd83f464d8ddc08ac45103bd2a456d13a830ec22e42f94cd448ea9510de0c9787b343ff1596a4f

  • SSDEEP

    98304:Q/O7d9Xwfy9P95P6Rh3YnjW+iTzPRo0FdWfEgoUca7Sk4jJfTh:Q/Oveul3jGiiOoUcxk4jJrh

Malware Config

Extracted

Family

tanglebot

C2

https://icq.im/AoLH58pXY8ejJTQiWg8

https://t.me/pempeppepepep

https://t.me/xpembeppep2p2

Targets

    • Target

      8157ddb2f2cf24cd6d0c9c59f8da5b2c741a35e248b687605cd110181b96eddc.bin

    • Size

      4.5MB

    • MD5

      71e5bb179194d1450f887a4c80004bc3

    • SHA1

      52c4e904ab6565da89f18030619ee9336490c3da

    • SHA256

      8157ddb2f2cf24cd6d0c9c59f8da5b2c741a35e248b687605cd110181b96eddc

    • SHA512

      2637b7db57c08f5d9cfd22d57374c521bf180b1303b0d89d14cd83f464d8ddc08ac45103bd2a456d13a830ec22e42f94cd448ea9510de0c9787b343ff1596a4f

    • SSDEEP

      98304:Q/O7d9Xwfy9P95P6Rh3YnjW+iTzPRo0FdWfEgoUca7Sk4jJfTh:Q/Oveul3jGiiOoUcxk4jJrh

    • TangleBot

      TangleBot is an Android SMS malware first seen in September 2021.

    • TangleBot payload

    • Tanglebot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks