General
-
Target
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07.apk
-
Size
15.7MB
-
Sample
230629-qmk6baea2s
-
MD5
a093a00891e314bace128c33ca0e02bc
-
SHA1
b75da8bd5d5d43808152283fc471433110026a4c
-
SHA256
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07
-
SHA512
4cee6a48584e5683b33431eae8c93e4e24b4de30700bb035bdffaba60a3c08b6f350827b8cdc08b6291017f57492424d08b9212ec26571561aec136df71b6cae
-
SSDEEP
196608:YifGIDHg2XcxBT0lArHvVvY6bMAs0EuXrNADgw4MTEZxjqnDIF0ovjHmH5eqBvXL:Yiz7g/ZtrPe6bMAshu7CF4MT4F08Ghpb
Static task
static1
Behavioral task
behavioral1
Sample
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07.apk
Resource
android-x86-arm-20230621-en
Behavioral task
behavioral2
Sample
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07.apk
Resource
android-x64-20230621-en
Behavioral task
behavioral3
Sample
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07.apk
Resource
android-x64-arm64-20230621-en
Malware Config
Extracted
teabot
Targets
-
-
Target
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07.apk
-
Size
15.7MB
-
MD5
a093a00891e314bace128c33ca0e02bc
-
SHA1
b75da8bd5d5d43808152283fc471433110026a4c
-
SHA256
ca4f0b0b06f5858ea61f86a9aff8a2876fb066af61700bd3a6e3800886c5fc07
-
SHA512
4cee6a48584e5683b33431eae8c93e4e24b4de30700bb035bdffaba60a3c08b6f350827b8cdc08b6291017f57492424d08b9212ec26571561aec136df71b6cae
-
SSDEEP
196608:YifGIDHg2XcxBT0lArHvVvY6bMAs0EuXrNADgw4MTEZxjqnDIF0ovjHmH5eqBvXL:Yiz7g/ZtrPe6bMAshu7CF4MT4F08Ghpb
Score10/10-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Legitimate hosting services abused for malware hosting/C2
-
Reads information about phone network operator.
-
Removes a system notification.
-