General

  • Target

    90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36.apk

  • Size

    4.3MB

  • Sample

    210817-4pvz7zwq2x

  • MD5

    59b04b5308afc74514cb5db99b1a564f

  • SHA1

    bf20d27842719e3cae5796f49d589c7b02fc313c

  • SHA256

    90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36

  • SHA512

    2106f0bb0d738fe5a9c56dbfc444cdf2b62a9a5d5015353178604f905dab8acc0acb49e7699d6e39e3002d293b1ad29e7a6452fbd3b5665b03c7b78a799fa2a5

Malware Config

Extracted

Family

teabot

C2

http://138.201.211.36:84/api/

Targets

    • Target

      90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36.apk

    • Size

      4.3MB

    • MD5

      59b04b5308afc74514cb5db99b1a564f

    • SHA1

      bf20d27842719e3cae5796f49d589c7b02fc313c

    • SHA256

      90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36

    • SHA512

      2106f0bb0d738fe5a9c56dbfc444cdf2b62a9a5d5015353178604f905dab8acc0acb49e7699d6e39e3002d293b1ad29e7a6452fbd3b5665b03c7b78a799fa2a5

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks