General

  • Target

    shrimp.paddle.merit.apk

  • Size

    3.7MB

  • Sample

    210511-xpcr2ddy3n

  • MD5

    49e960105bd79e726d5e89824798712d

  • SHA1

    b6d825471c3045d62e8548d66efb836716930147

  • SHA256

    d778c50ddf8ccd41c7f9cdd913c38d90c7d0a59cb44e650068e671db6ce3e5ab

  • SHA512

    14c547c15c2ab9adc09e6a352b4f6887196c3a64a42ca5e8b9cbac5957916201448df714d8cbdbfa803a626d9a099244bfb606354f30ad392ea47a9460d04d17

Malware Config

Extracted

Family

teabot

C2

http://lukabukazykasas.top:80/api/

http://lokaspitroaksi.top:80/api/

Targets

    • Target

      shrimp.paddle.merit.apk

    • Size

      3.7MB

    • MD5

      49e960105bd79e726d5e89824798712d

    • SHA1

      b6d825471c3045d62e8548d66efb836716930147

    • SHA256

      d778c50ddf8ccd41c7f9cdd913c38d90c7d0a59cb44e650068e671db6ce3e5ab

    • SHA512

      14c547c15c2ab9adc09e6a352b4f6887196c3a64a42ca5e8b9cbac5957916201448df714d8cbdbfa803a626d9a099244bfb606354f30ad392ea47a9460d04d17

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks