General

  • Target

    VoiceMail.apk

  • Size

    4.2MB

  • Sample

    210715-y21kcbk1xj

  • MD5

    c3b6d022bc7309e6d6893a7fc0dfbacb

  • SHA1

    1f95aa59be40fdb22e8238a86ce195ec67389395

  • SHA256

    217f17e47e1b9c9572b7a0e6a077b4a0b7bf1df8cce55bf9cebb5eccd6031b69

  • SHA512

    34eeddcfc65c4daad3c55423924bd7cc85ceeb43714a7186635b31b62eec89f262a4035a3ba27e8cefb1707a643698363c1c7219c3717b426ebb26fdef10dec1

Malware Config

Extracted

Family

teabot

C2

http://178.32.130.175:84/api/

Targets

    • Target

      VoiceMail.apk

    • Size

      4.2MB

    • MD5

      c3b6d022bc7309e6d6893a7fc0dfbacb

    • SHA1

      1f95aa59be40fdb22e8238a86ce195ec67389395

    • SHA256

      217f17e47e1b9c9572b7a0e6a077b4a0b7bf1df8cce55bf9cebb5eccd6031b69

    • SHA512

      34eeddcfc65c4daad3c55423924bd7cc85ceeb43714a7186635b31b62eec89f262a4035a3ba27e8cefb1707a643698363c1c7219c3717b426ebb26fdef10dec1

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks