General

  • Target

    017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6.apk

  • Size

    4.2MB

  • Sample

    210715-sc47kk9n5n

  • MD5

    8b412c1f37523aed36b362d083fb414b

  • SHA1

    196eeff4a7dacd29744004630964a4cce314575f

  • SHA256

    017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6

  • SHA512

    e0f6d6ec97614869b1a5dbd0ad79e48752e866b182ec3fbe3990f996989556feb87b1d5159dab9991c3f3ca8b0be6e540c0252cf2a35cc05c34c310420043769

Malware Config

Extracted

Family

teabot

C2

http://178.32.130.175:84/api/

Targets

    • Target

      017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6.apk

    • Size

      4.2MB

    • MD5

      8b412c1f37523aed36b362d083fb414b

    • SHA1

      196eeff4a7dacd29744004630964a4cce314575f

    • SHA256

      017f5325340d81769765b7996f75c4f350efff6c23b115c71697b7b27b8a3cc6

    • SHA512

      e0f6d6ec97614869b1a5dbd0ad79e48752e866b182ec3fbe3990f996989556feb87b1d5159dab9991c3f3ca8b0be6e540c0252cf2a35cc05c34c310420043769

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks