General
-
Target
b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989.apk
-
Size
4.3MB
-
Sample
210715-pa5jw9t5a6
-
MD5
71c9e6e982b4eebb9e0ab2c324903e71
-
SHA1
d7cd5c313b25f4824f73e147baae0eea098c7f37
-
SHA256
b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989
-
SHA512
e2170c9d7bbbbcd09bf192bffaf9d990f1b00fed435a61866f7c20b0571d3cc7b2e2f4ab808b044989616ab850df386e0cbf0b08d56b612ceb4349976ec9b295
Static task
static1
Behavioral task
behavioral1
Sample
b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989.apk
Resource
android-x64-arm64
Malware Config
Extracted
teabot
http://178.32.130.175:84/api/
Targets
-
-
Target
b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989.apk
-
Size
4.3MB
-
MD5
71c9e6e982b4eebb9e0ab2c324903e71
-
SHA1
d7cd5c313b25f4824f73e147baae0eea098c7f37
-
SHA256
b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989
-
SHA512
e2170c9d7bbbbcd09bf192bffaf9d990f1b00fed435a61866f7c20b0571d3cc7b2e2f4ab808b044989616ab850df386e0cbf0b08d56b612ceb4349976ec9b295
Score10/10-
TeaBot Payload
-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-