General

  • Target

    5544cd6ad91d3455a859fca7f7d4bef4880ade24417da7b7d902ed07fea56711.apk

  • Size

    4.3MB

  • Sample

    210817-k95fg7qzja

  • MD5

    e00185fca0e0337042c9c11db10343db

  • SHA1

    af6a58827370bc4a61c409aa25163d7da9d0505e

  • SHA256

    5544cd6ad91d3455a859fca7f7d4bef4880ade24417da7b7d902ed07fea56711

  • SHA512

    97402181ef2e1eb2912066b8c6028600b0d5b5d2ffce762d07a79cabfedd1ff3096250d35442914fa35feb0574039cb8e1f2ee1a65cab342d13913cbc47248da

Malware Config

Extracted

Family

teabot

C2

http://138.201.211.36:84/api/

Targets

    • Target

      5544cd6ad91d3455a859fca7f7d4bef4880ade24417da7b7d902ed07fea56711.apk

    • Size

      4.3MB

    • MD5

      e00185fca0e0337042c9c11db10343db

    • SHA1

      af6a58827370bc4a61c409aa25163d7da9d0505e

    • SHA256

      5544cd6ad91d3455a859fca7f7d4bef4880ade24417da7b7d902ed07fea56711

    • SHA512

      97402181ef2e1eb2912066b8c6028600b0d5b5d2ffce762d07a79cabfedd1ff3096250d35442914fa35feb0574039cb8e1f2ee1a65cab342d13913cbc47248da

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks