General
-
Target
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c
-
Size
4.1MB
-
Sample
220616-vbmxzsgbbp
-
MD5
dc1909fba897d2ee77b539b4e712ae13
-
SHA1
731b7e51774c4fb7af090affa2f30e77768e653b
-
SHA256
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c
-
SHA512
f268ead09d6058329c0319a1f0b3c16c86687ca0b0285bd89058b782f28d000b0f9edc3698cc761a48e13a37c1bfdb6b81e79a0bf4bc1c926be46166de8de210
Static task
static1
Behavioral task
behavioral1
Sample
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Targets
-
-
Target
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c
-
Size
4.1MB
-
MD5
dc1909fba897d2ee77b539b4e712ae13
-
SHA1
731b7e51774c4fb7af090affa2f30e77768e653b
-
SHA256
6201d16acf909091c46221659d7f4328a221edb4eb7920e835a57c166a82851c
-
SHA512
f268ead09d6058329c0319a1f0b3c16c86687ca0b0285bd89058b782f28d000b0f9edc3698cc761a48e13a37c1bfdb6b81e79a0bf4bc1c926be46166de8de210
Score10/10-
TeaBot Payload
-
Makes use of the framework's Accessibility service.
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Removes a system notification.
-