General

  • Target

    8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee.apk

  • Size

    3.5MB

  • Sample

    210826-saq7qs3p4j

  • MD5

    4b653f33bb267bd7a3393bee0428ffe3

  • SHA1

    d781502ccc03cf1ad4e3c44dcae6541c9a0459b3

  • SHA256

    8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee

  • SHA512

    185249a9833548011f038937e933d156e10abc32c5a0a940c4b99d7b2269a403e61ef0dd78d4e7321a960c3a8eb4efefa36e5d0aafa400fbbaf3abdb2bcf8893

Malware Config

Extracted

Family

teabot

C2

http://138.201.211.36:84/api/

Targets

    • Target

      8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee.apk

    • Size

      3.5MB

    • MD5

      4b653f33bb267bd7a3393bee0428ffe3

    • SHA1

      d781502ccc03cf1ad4e3c44dcae6541c9a0459b3

    • SHA256

      8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee

    • SHA512

      185249a9833548011f038937e933d156e10abc32c5a0a940c4b99d7b2269a403e61ef0dd78d4e7321a960c3a8eb4efefa36e5d0aafa400fbbaf3abdb2bcf8893

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks