General
-
Target
90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36.apk
-
Size
4.3MB
-
Sample
210817-4pvz7zwq2x
-
MD5
59b04b5308afc74514cb5db99b1a564f
-
SHA1
bf20d27842719e3cae5796f49d589c7b02fc313c
-
SHA256
90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36
-
SHA512
2106f0bb0d738fe5a9c56dbfc444cdf2b62a9a5d5015353178604f905dab8acc0acb49e7699d6e39e3002d293b1ad29e7a6452fbd3b5665b03c7b78a799fa2a5
Static task
static1
Behavioral task
behavioral1
Sample
90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36.apk
Resource
android-x64
Malware Config
Extracted
teabot
http://138.201.211.36:84/api/
Targets
-
-
Target
90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36.apk
-
Size
4.3MB
-
MD5
59b04b5308afc74514cb5db99b1a564f
-
SHA1
bf20d27842719e3cae5796f49d589c7b02fc313c
-
SHA256
90c94c856014f9890492be149706daa09de9167948e06620162f9c979912ee36
-
SHA512
2106f0bb0d738fe5a9c56dbfc444cdf2b62a9a5d5015353178604f905dab8acc0acb49e7699d6e39e3002d293b1ad29e7a6452fbd3b5665b03c7b78a799fa2a5
Score10/10-
TeaBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-