General

  • Target

    90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016.apk

  • Size

    4.3MB

  • Sample

    210812-dcjtq8ynnj

  • MD5

    78d04d8443fa48411244cc5f17b2b542

  • SHA1

    234e413188f68b9cb4a63031331ddad7f9dd62d0

  • SHA256

    90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016

  • SHA512

    b5114922528010d0e5433aab4f921ce08d64262185e9d05447473a2ad6bc5974207e6f17b7660b0f0c0e718de2065129f20cf6f870ab5c016842f8964b2d89c5

Malware Config

Extracted

Family

teabot

C2

http://138.201.211.36:84/api/

Targets

    • Target

      90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016.apk

    • Size

      4.3MB

    • MD5

      78d04d8443fa48411244cc5f17b2b542

    • SHA1

      234e413188f68b9cb4a63031331ddad7f9dd62d0

    • SHA256

      90521e486f93b575beec1df79c5a1d11a42390c48d2db86c80bb86645a8dd016

    • SHA512

      b5114922528010d0e5433aab4f921ce08d64262185e9d05447473a2ad6bc5974207e6f17b7660b0f0c0e718de2065129f20cf6f870ab5c016842f8964b2d89c5

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks