General
-
Target
90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016.apk
-
Size
4.3MB
-
Sample
210812-dcjtq8ynnj
-
MD5
78d04d8443fa48411244cc5f17b2b542
-
SHA1
234e413188f68b9cb4a63031331ddad7f9dd62d0
-
SHA256
90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016
-
SHA512
b5114922528010d0e5433aab4f921ce08d64262185e9d05447473a2ad6bc5974207e6f17b7660b0f0c0e718de2065129f20cf6f870ab5c016842f8964b2d89c5
Static task
static1
Behavioral task
behavioral1
Sample
90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016.apk
Resource
android-x64-arm64
Malware Config
Extracted
teabot
http://138.201.211.36:84/api/
Targets
-
-
Target
90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016.apk
-
Size
4.3MB
-
MD5
78d04d8443fa48411244cc5f17b2b542
-
SHA1
234e413188f68b9cb4a63031331ddad7f9dd62d0
-
SHA256
90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016
-
SHA512
b5114922528010d0e5433aab4f921ce08d64262185e9d05447473a2ad6bc5974207e6f17b7660b0f0c0e718de2065129f20cf6f870ab5c016842f8964b2d89c5
Score10/10-
Checks Android system properties for emulator presence.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-