General

  • Target

    47128438463482dfe3648b2e09769e0d1e73c04340dd438a94b95e82fd536096.apk

  • Size

    4.1MB

  • Sample

    211012-xtcabadbd9

  • MD5

    cab571bcb4f744d178f83b996047a048

  • SHA1

    fa7403d21f1f8c43667ce9be77f39f1d9bd5df6b

  • SHA256

    47128438463482dfe3648b2e09769e0d1e73c04340dd438a94b95e82fd536096

  • SHA512

    5a665010a8e7a67773163c910cdd0dd50dfb6c2ed284b9904f34402b6af871df6542c3293aa31a0bf0bc956ae95a1b6b9cbc9c1da35583a388c7c9f8d6a8fd7e

Malware Config

Extracted

Family

teabot

C2

http://194.156.99.19:80/api/

Targets

    • Target

      47128438463482dfe3648b2e09769e0d1e73c04340dd438a94b95e82fd536096.apk

    • Size

      4.1MB

    • MD5

      cab571bcb4f744d178f83b996047a048

    • SHA1

      fa7403d21f1f8c43667ce9be77f39f1d9bd5df6b

    • SHA256

      47128438463482dfe3648b2e09769e0d1e73c04340dd438a94b95e82fd536096

    • SHA512

      5a665010a8e7a67773163c910cdd0dd50dfb6c2ed284b9904f34402b6af871df6542c3293aa31a0bf0bc956ae95a1b6b9cbc9c1da35583a388c7c9f8d6a8fd7e

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

MITRE ATT&CK Matrix

Tasks