General
-
Target
Voicemail30.apk
-
Size
4.4MB
-
Sample
210722-eqce1q1y5a
-
MD5
fc3000b5ab71b6e4ba11008952f50c89
-
SHA1
475494b15530e53e09dafc548a2de1009aec8358
-
SHA256
e8dc3622a9cc73faac2fb2837f197a4e25504f09fe399be7ef3cb9c51ed4b64f
-
SHA512
79ef9967a8a38d0635dd9b2f663a35d012a1611eba0d02b4df0623225bd475427a95dd87f5d8bab33b8fb7d27717df8585a406e4d24de7165d3d3f5d4c0383cd
Static task
static1
Behavioral task
behavioral1
Sample
Voicemail30.apk
Resource
android-x64
Malware Config
Extracted
teabot
http://178.32.130.175:84/api/
Targets
-
-
Target
Voicemail30.apk
-
Size
4.4MB
-
MD5
fc3000b5ab71b6e4ba11008952f50c89
-
SHA1
475494b15530e53e09dafc548a2de1009aec8358
-
SHA256
e8dc3622a9cc73faac2fb2837f197a4e25504f09fe399be7ef3cb9c51ed4b64f
-
SHA512
79ef9967a8a38d0635dd9b2f663a35d012a1611eba0d02b4df0623225bd475427a95dd87f5d8bab33b8fb7d27717df8585a406e4d24de7165d3d3f5d4c0383cd
Score10/10-
TeaBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-