General

  • Target

    b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989.apk

  • Size

    4.3MB

  • Sample

    210715-pa5jw9t5a6

  • MD5

    71c9e6e982b4eebb9e0ab2c324903e71

  • SHA1

    d7cd5c313b25f4824f73e147baae0eea098c7f37

  • SHA256

    b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989

  • SHA512

    e2170c9d7bbbbcd09bf192bffaf9d990f1b00fed435a61866f7c20b0571d3cc7b2e2f4ab808b044989616ab850df386e0cbf0b08d56b612ceb4349976ec9b295

Malware Config

Extracted

Family

teabot

C2

http://178.32.130.175:84/api/

Targets

    • Target

      b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989.apk

    • Size

      4.3MB

    • MD5

      71c9e6e982b4eebb9e0ab2c324903e71

    • SHA1

      d7cd5c313b25f4824f73e147baae0eea098c7f37

    • SHA256

      b3f5b11fef9cffe0a3f77b739c14d726087f23fa139167ec14b7cb84959d2989

    • SHA512

      e2170c9d7bbbbcd09bf192bffaf9d990f1b00fed435a61866f7c20b0571d3cc7b2e2f4ab808b044989616ab850df386e0cbf0b08d56b612ceb4349976ec9b295

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks