General
-
Target
017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6.apk
-
Size
4.2MB
-
Sample
210715-sc47kk9n5n
-
MD5
8b412c1f37523aed36b362d083fb414b
-
SHA1
196eeff4a7dacd29744004630964a4cce314575f
-
SHA256
017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6
-
SHA512
e0f6d6ec97614869b1a5dbd0ad79e48752e866b182ec3fbe3990f996989556feb87b1d5159dab9991c3f3ca8b0be6e540c0252cf2a35cc05c34c310420043769
Static task
static1
Behavioral task
behavioral1
Sample
017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6.apk
Resource
android-x64
Malware Config
Extracted
teabot
http://178.32.130.175:84/api/
Targets
-
-
Target
017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6.apk
-
Size
4.2MB
-
MD5
8b412c1f37523aed36b362d083fb414b
-
SHA1
196eeff4a7dacd29744004630964a4cce314575f
-
SHA256
017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6
-
SHA512
e0f6d6ec97614869b1a5dbd0ad79e48752e866b182ec3fbe3990f996989556feb87b1d5159dab9991c3f3ca8b0be6e540c0252cf2a35cc05c34c310420043769
Score10/10-
TeaBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-