Analysis
-
max time kernel
145s -
max time network
152s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
25/03/2025, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
af93d22ba400051acbcd0ca569d310f75cb7885fefa85cb4e9e5fabfdc951028.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
af93d22ba400051acbcd0ca569d310f75cb7885fefa85cb4e9e5fabfdc951028.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
af93d22ba400051acbcd0ca569d310f75cb7885fefa85cb4e9e5fabfdc951028.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
af93d22ba400051acbcd0ca569d310f75cb7885fefa85cb4e9e5fabfdc951028.apk
-
Size
4.8MB
-
MD5
dc5fe3621b9d0f1bfee759d3ee776c2e
-
SHA1
8295d2bdba7f7ff722dcf6570474eac60905b93b
-
SHA256
af93d22ba400051acbcd0ca569d310f75cb7885fefa85cb4e9e5fabfdc951028
-
SHA512
0c510b2702de550994fb8c8e6c7ceffb6a7abf10c063b59586ce3ed9712766d99a06d00ffc3e1075f8ef76e7f83513677792208fc5a8b2fe7655c2d5fde1b541
-
SSDEEP
98304:NGW5N5cOMtxhRf/hdw6JcVadNPH2HjPY13Ab5khsyBL5O:jj5cOMPhRfpdwMawIPY9AbEsMO
Malware Config
Extracted
tanglebot
https://t.me/+LFAFYjStX6wzZmFk
https://t.me/+s8bf3BX_dUYxMzU0
https://t.me/+sklwiGKlByJhZGM0
Signatures
-
TangleBot
TangleBot is an Android SMS malware first seen in September 2021.
-
TangleBot payload 1 IoCs
resource yara_rule behavioral3/memory/4790-0.dex family_tanglebot2 -
Tanglebot family
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/bzvix.mnziz.minimiz/code_cache/secondary-dexes/base.apk.classes1.zip 4790 bzvix.mnziz.minimiz -
Makes use of the framework's Accessibility service 4 TTPs 1 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId bzvix.mnziz.minimiz -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener bzvix.mnziz.minimiz -
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
-
Performs UI accessibility actions on behalf of the user 1 TTPs 1 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction bzvix.mnziz.minimiz -
Reads information about phone network operator. 1 TTPs
-
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo bzvix.mnziz.minimiz -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo bzvix.mnziz.minimiz
Processes
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
2System Network Configuration Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/bzvix.mnziz.minimiz/code_cache/secondary-dexes/tmp-base.apk.classes9012970034943362316.zip
Filesize455KB
MD5cb172a4ce8c9b97a8489ced5e204f59c
SHA1d0e9d07f9476625526a9bfea6ded860db6d77aea
SHA256ed1ca998ca7a5b7eb8ee90434726a17e8760f44c000161006010fe4386aa0ab2
SHA512a94c835ed6993af28018fa7bb60e6b5019c516c48e7d94f5a4ddb3241654ad274a567c3aa2355d8bf826172a68474cb95e5ee5c6dc91cdc3706785ef0ba32a9f
-
Filesize
951KB
MD5227cf60b8041a24a237a2d4c41bde035
SHA12de3237bed0082cd7d8a4f01d44e4689f909f2fd
SHA25680002805d7ec3641f2a632acd3efdf8ec099a94c5ea2895db0fa5a0750988aed
SHA5120ae93b4517b9f19d628b57ff346fe75cd6d75a60a97da40d1377a8dc4575a6435d23920e0027188b24d28690dd869063e11d016a44f73cafcf726ca69b971d49