General
-
Target
3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884.apk
-
Size
4.2MB
-
Sample
210714-lveh4zc7fa
-
MD5
44e2d7a1693d5cb0f6d29618da268bef
-
SHA1
061113dd942b26a9f9de86a80a0220f133721770
-
SHA256
3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884
-
SHA512
08926ff5752f5570c527e6946e868bc8321b70fabe320c2b3916a3f8ebff187d23c25637301d68ea222caeae93ec2376ae89b21046593783f847bbff9c1fdd5b
Static task
static1
Behavioral task
behavioral1
Sample
3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884.apk
Resource
android-x64-arm64
Malware Config
Extracted
teabot
http://178.32.130.175:84/api/
Targets
-
-
Target
3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884.apk
-
Size
4.2MB
-
MD5
44e2d7a1693d5cb0f6d29618da268bef
-
SHA1
061113dd942b26a9f9de86a80a0220f133721770
-
SHA256
3cf7026f6c0d5f0233c9fe030d5711fddb3caf3b91910a541a8c959ce6907884
-
SHA512
08926ff5752f5570c527e6946e868bc8321b70fabe320c2b3916a3f8ebff187d23c25637301d68ea222caeae93ec2376ae89b21046593783f847bbff9c1fdd5b
Score10/10-
TeaBot Payload
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-