General

  • Target

    82c683caa774ed179cee340007b4750f84e4cde6c2d825c72260aa18c1b8971c.apk

  • Size

    3.4MB

  • Sample

    211108-t65kvahgdq

  • MD5

    ffe5cb26952d97864dc643091450bd16

  • SHA1

    d3889c3b19caceef30151a6891a0a5b7d74d77ac

  • SHA256

    82c683caa774ed179cee340007b4750f84e4cde6c2d825c72260aa18c1b8971c

  • SHA512

    fd7e85f854bc4ea96d43f1a65461061affa26cc7592f76b69309f672f59b013b52da49b57670103895cea8d306de5c73b36d312d953bca020bf8174c152f3b7c

Malware Config

Targets

    • Target

      82c683caa774ed179cee340007b4750f84e4cde6c2d825c72260aa18c1b8971c.apk

    • Size

      3.4MB

    • MD5

      ffe5cb26952d97864dc643091450bd16

    • SHA1

      d3889c3b19caceef30151a6891a0a5b7d74d77ac

    • SHA256

      82c683caa774ed179cee340007b4750f84e4cde6c2d825c72260aa18c1b8971c

    • SHA512

      fd7e85f854bc4ea96d43f1a65461061affa26cc7592f76b69309f672f59b013b52da49b57670103895cea8d306de5c73b36d312d953bca020bf8174c152f3b7c

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks