General

  • Target

    3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884.apk

  • Size

    4.2MB

  • Sample

    210714-lveh4zc7fa

  • MD5

    44e2d7a1693d5cb0f6d29618da268bef

  • SHA1

    061113dd942b26a9f9de86a80a0220f133721770

  • SHA256

    3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884

  • SHA512

    08926ff5752f5570c527e6946e868bc8321b70fabe320c2b3916a3f8ebff187d23c25637301d68ea222caeae93ec2376ae89b21046593783f847bbff9c1fdd5b

Malware Config

Extracted

Family

teabot

C2

http://178.32.130.175:84/api/

Targets

    • Target

      3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884.apk

    • Size

      4.2MB

    • MD5

      44e2d7a1693d5cb0f6d29618da268bef

    • SHA1

      061113dd942b26a9f9de86a80a0220f133721770

    • SHA256

      3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884

    • SHA512

      08926ff5752f5570c527e6946e868bc8321b70fabe320c2b3916a3f8ebff187d23c25637301d68ea222caeae93ec2376ae89b21046593783f847bbff9c1fdd5b

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks