General
-
Target
Voicemail74.apk
-
Size
4.2MB
-
Sample
210722-7xsg6tnt52
-
MD5
238ca22d5900a4d7493b38a509343e48
-
SHA1
ed3bb001acd0b05dc9ee63395ab9b6b384f555c4
-
SHA256
20c320a93226dc886b24f98d72950da646e63914308f701412ce1dc684559c56
-
SHA512
caeee8b2ada37a1994073e26ceab817b3d0e9b06959fb78df666e269205443d00b65da5aa1a3a8154d9dc114d06fdecb51eed30da961445fee5a31244bd61bce
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail74.apk
Resource
android-x64
Malware Config
Extracted
teabot
http://178.32.130.175:84/api/
Targets
-
-
Target
Voicemail74.apk
-
Size
4.2MB
-
MD5
238ca22d5900a4d7493b38a509343e48
-
SHA1
ed3bb001acd0b05dc9ee63395ab9b6b384f555c4
-
SHA256
20c320a93226dc886b24f98d72950da646e63914308f701412ce1dc684559c56
-
SHA512
caeee8b2ada37a1994073e26ceab817b3d0e9b06959fb78df666e269205443d00b65da5aa1a3a8154d9dc114d06fdecb51eed30da961445fee5a31244bd61bce
Score10/10-
TeaBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-