General
-
Target
8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee.apk
-
Size
3.5MB
-
Sample
210826-saq7qs3p4j
-
MD5
4b653f33bb267bd7a3393bee0428ffe3
-
SHA1
d781502ccc03cf1ad4e3c44dcae6541c9a0459b3
-
SHA256
8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee
-
SHA512
185249a9833548011f038937e933d156e10abc32c5a0a940c4b99d7b2269a403e61ef0dd78d4e7321a960c3a8eb4efefa36e5d0aafa400fbbaf3abdb2bcf8893
Static task
static1
Behavioral task
behavioral1
Sample
8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee.apk
Resource
android-x64
Malware Config
Extracted
teabot
http://138.201.211.36:84/api/
Targets
-
-
Target
8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee.apk
-
Size
3.5MB
-
MD5
4b653f33bb267bd7a3393bee0428ffe3
-
SHA1
d781502ccc03cf1ad4e3c44dcae6541c9a0459b3
-
SHA256
8bbd6a9dc2ad0ba05d95609d1fd16ae93877e64a948cdff10135cc7cf6e981ee
-
SHA512
185249a9833548011f038937e933d156e10abc32c5a0a940c4b99d7b2269a403e61ef0dd78d4e7321a960c3a8eb4efefa36e5d0aafa400fbbaf3abdb2bcf8893
Score10/10-
TeaBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-