General
-
Target
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096
-
Size
1.2MB
-
Sample
231220-a9skxadbgq
-
MD5
c8793b4d4b5bedec055b8226358ed00a
-
SHA1
945feae70d7f65d36b30f97fe3ad5c995bc37bfc
-
SHA256
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096
-
SHA512
ee9bff8b99de34ef8e283bca0ff3acf74a02abe9bc24bcb48396d96f21871bc366dbdcce0912b2477286146ad1ff3dfcca549a6e3dfabc00b2a78efd6a4bbcdc
-
SSDEEP
24576:N/bg0gs5w15vsuVe3DDFdeCpt8xCHuLTbFpOTg49FVXDTNMDCV:N/U0b02DDp2HFM3XGmV
Static task
static1
Behavioral task
behavioral1
Sample
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096
-
Size
1.2MB
-
MD5
c8793b4d4b5bedec055b8226358ed00a
-
SHA1
945feae70d7f65d36b30f97fe3ad5c995bc37bfc
-
SHA256
767c218be4e7d2c99ee9c8b36128ac932d2dac0e3792ce638b804083f75e1096
-
SHA512
ee9bff8b99de34ef8e283bca0ff3acf74a02abe9bc24bcb48396d96f21871bc366dbdcce0912b2477286146ad1ff3dfcca549a6e3dfabc00b2a78efd6a4bbcdc
-
SSDEEP
24576:N/bg0gs5w15vsuVe3DDFdeCpt8xCHuLTbFpOTg49FVXDTNMDCV:N/U0b02DDp2HFM3XGmV
-
TeaBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-