General
-
Target
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496
-
Size
4.1MB
-
Sample
231223-nxsa9sade6
-
MD5
ccf691dd649de01fdd0451bf2a8b6125
-
SHA1
a86a01dcc48b7f82e09c1ba1a897692996f92fa9
-
SHA256
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496
-
SHA512
d1f6fa97b4580d1524f3ec536c4675ec3bcfed1bd6867ad657ad532e62670c2da7a5238a8ce8529c303355c989a44954044790fcc48768ccab16da734ca055f5
-
SSDEEP
98304:hzXnkjBUiDC5McSHj4F42oY0LBCkFdRcv5:CjBUiWWcKcF2Y08IdRcB
Static task
static1
Behavioral task
behavioral1
Sample
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496.apk
Behavioral task
behavioral2
Sample
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496
-
Size
4.1MB
-
MD5
ccf691dd649de01fdd0451bf2a8b6125
-
SHA1
a86a01dcc48b7f82e09c1ba1a897692996f92fa9
-
SHA256
07daa50cc53222d995fdc500f2bb15ceb60eb6372a1e5c6498f4b40fe293b496
-
SHA512
d1f6fa97b4580d1524f3ec536c4675ec3bcfed1bd6867ad657ad532e62670c2da7a5238a8ce8529c303355c989a44954044790fcc48768ccab16da734ca055f5
-
SSDEEP
98304:hzXnkjBUiDC5McSHj4F42oY0LBCkFdRcv5:CjBUiWWcKcF2Y08IdRcB
Score10/10-
TeaBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-