General

  • Target

    Voicemail30.apk

  • Size

    4.4MB

  • Sample

    210722-eqce1q1y5a

  • MD5

    fc3000b5ab71b6e4ba11008952f50c89

  • SHA1

    475494b15530e53e09dafc548a2de1009aec8358

  • SHA256

    e8dc3622a9cc73faac2fb2837f197a4e25504f09fe399be7ef3cb9c51ed4b64f

  • SHA512

    79ef9967a8a38d0635dd9b2f663a35d012a1611eba0d02b4df0623225bd475427a95dd87f5d8bab33b8fb7d27717df8585a406e4d24de7165d3d3f5d4c0383cd

Malware Config

Extracted

Family

teabot

C2

http://178.32.130.175:84/api/

Targets

    • Target

      Voicemail30.apk

    • Size

      4.4MB

    • MD5

      fc3000b5ab71b6e4ba11008952f50c89

    • SHA1

      475494b15530e53e09dafc548a2de1009aec8358

    • SHA256

      e8dc3622a9cc73faac2fb2837f197a4e25504f09fe399be7ef3cb9c51ed4b64f

    • SHA512

      79ef9967a8a38d0635dd9b2f663a35d012a1611eba0d02b4df0623225bd475427a95dd87f5d8bab33b8fb7d27717df8585a406e4d24de7165d3d3f5d4c0383cd

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks