General
-
Target
68e4638de82cb985a1e14018ad040f8d41a63f60e976f3dae1cd7f9bb0453ae6.apk
-
Size
4.4MB
-
Sample
211108-vl2twscgc6
-
MD5
263257219a34a1a556d4ac15e14ee0d2
-
SHA1
30d0715803abbf1d53b140f76ebdd3dc9fbf3f64
-
SHA256
68e4638de82cb985a1e14018ad040f8d41a63f60e976f3dae1cd7f9bb0453ae6
-
SHA512
a4c40f569a0ff22aaf0b1c4f82f0415c9fdfb01d021f2fd39ec6bbc04ac1ad734a03c9a7cf0d558e9de2599fcc57550d3dbb44701c0470c029177caeef56eb4a
Static task
static1
Behavioral task
behavioral1
Sample
68e4638de82cb985a1e14018ad040f8d41a63f60e976f3dae1cd7f9bb0453ae6.apk
Resource
android-x64
Malware Config
Extracted
teabot
http://138.201.211.36:84/api/
Targets
-
-
Target
68e4638de82cb985a1e14018ad040f8d41a63f60e976f3dae1cd7f9bb0453ae6.apk
-
Size
4.4MB
-
MD5
263257219a34a1a556d4ac15e14ee0d2
-
SHA1
30d0715803abbf1d53b140f76ebdd3dc9fbf3f64
-
SHA256
68e4638de82cb985a1e14018ad040f8d41a63f60e976f3dae1cd7f9bb0453ae6
-
SHA512
a4c40f569a0ff22aaf0b1c4f82f0415c9fdfb01d021f2fd39ec6bbc04ac1ad734a03c9a7cf0d558e9de2599fcc57550d3dbb44701c0470c029177caeef56eb4a
Score10/10-
TeaBot Payload
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-