General
-
Target
main.apk
-
Size
1.2MB
-
Sample
220506-g67c8ahcf7
-
MD5
611d013f927d031e4fcfff163bf70124
-
SHA1
96bb1bb6b1e3770f14643c6c2ac51e99a5938d7b
-
SHA256
c3c7df127552aa2594ad335d7cc955cb1274cc322455a89b1856a2adf9f83ded
-
SHA512
efc42f24869575222d616f174f2cf00c1fd376d9d365cb38c3c61e6e871fb6b98be291792f3298be47490c6a174d94a4a57ded4b64f219eb90664209cc659a95
Static task
static1
Behavioral task
behavioral1
Sample
main.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
main.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
main.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Extracted
teabot
http://51.38.166.150:80/api/
http://62.182.81.71:80/api/
Targets
-
-
Target
main.apk
-
Size
1.2MB
-
MD5
611d013f927d031e4fcfff163bf70124
-
SHA1
96bb1bb6b1e3770f14643c6c2ac51e99a5938d7b
-
SHA256
c3c7df127552aa2594ad335d7cc955cb1274cc322455a89b1856a2adf9f83ded
-
SHA512
efc42f24869575222d616f174f2cf00c1fd376d9d365cb38c3c61e6e871fb6b98be291792f3298be47490c6a174d94a4a57ded4b64f219eb90664209cc659a95
Score10/10-
TeaBot Payload
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-