General

  • Target

    Voicemail74.apk

  • Size

    4.2MB

  • Sample

    210722-7xsg6tnt52

  • MD5

    238ca22d5900a4d7493b38a509343e48

  • SHA1

    ed3bb001acd0b05dc9ee63395ab9b6b384f555c4

  • SHA256

    20c320a93226dc886b24f98d72950da646e63914308f701412ce1dc684559c56

  • SHA512

    caeee8b2ada37a1994073e26ceab817b3d0e9b06959fb78df666e269205443d00b65da5aa1a3a8154d9dc114d06fdecb51eed30da961445fee5a31244bd61bce

Malware Config

Extracted

Family

teabot

C2

http://178.32.130.175:84/api/

Targets

    • Target

      Voicemail74.apk

    • Size

      4.2MB

    • MD5

      238ca22d5900a4d7493b38a509343e48

    • SHA1

      ed3bb001acd0b05dc9ee63395ab9b6b384f555c4

    • SHA256

      20c320a93226dc886b24f98d72950da646e63914308f701412ce1dc684559c56

    • SHA512

      caeee8b2ada37a1994073e26ceab817b3d0e9b06959fb78df666e269205443d00b65da5aa1a3a8154d9dc114d06fdecb51eed30da961445fee5a31244bd61bce

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks