General

  • Target

    6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c

  • Size

    4.1MB

  • Sample

    220616-vbmxzsgbbp

  • MD5

    dc1909fba897d2ee77b539b4e712ae13

  • SHA1

    731b7e51774c4fb7af090affa2f30e77768e653b

  • SHA256

    6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c

  • SHA512

    f268ead09d6058329c0319a1f0b3c16c86687ca0b0285bd89058b782f28d000b0f9edc3698cc761a48e13a37c1bfdb6b81e79a0bf4bc1c926be46166de8de210

Malware Config

Targets

    • Target

      6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c

    • Size

      4.1MB

    • MD5

      dc1909fba897d2ee77b539b4e712ae13

    • SHA1

      731b7e51774c4fb7af090affa2f30e77768e653b

    • SHA256

      6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c

    • SHA512

      f268ead09d6058329c0319a1f0b3c16c86687ca0b0285bd89058b782f28d000b0f9edc3698cc761a48e13a37c1bfdb6b81e79a0bf4bc1c926be46166de8de210

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot Payload

    • Makes use of the framework's Accessibility service.

    • Acquires the wake lock.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Removes a system notification.

MITRE ATT&CK Matrix

Tasks