Resubmissions
26/01/2024, 19:01
240126-xph73accg3 10General
-
Target
7823e56b4b1631ef52bbd5b95c186554
-
Size
4.3MB
-
Sample
240126-xph73accg3
-
MD5
7823e56b4b1631ef52bbd5b95c186554
-
SHA1
f47ee24af407de1019e8605ad8f111732305fa5e
-
SHA256
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3
-
SHA512
ceac5d17b69d0297a7a83873705c46486894de70d45e33e64cf5971be05ac0dd07bda996fe9627bcc001aad9b954703de8028d296ed5113ff73ba02cce16a48e
-
SSDEEP
98304:7vNrfTch74luHqnwV6vNQV5EGArGY4fBl7ZbfUZIOp6Py5df:7vNrfghUluKnRvKV5bk0B1ZAPhf
Static task
static1
Behavioral task
behavioral1
Sample
7823e56b4b1631ef52bbd5b95c186554.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7823e56b4b1631ef52bbd5b95c186554.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
7823e56b4b1631ef52bbd5b95c186554.apk
Resource
android-x64-arm64-20231215-en
Malware Config
Targets
-
-
Target
7823e56b4b1631ef52bbd5b95c186554
-
Size
4.3MB
-
MD5
7823e56b4b1631ef52bbd5b95c186554
-
SHA1
f47ee24af407de1019e8605ad8f111732305fa5e
-
SHA256
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3
-
SHA512
ceac5d17b69d0297a7a83873705c46486894de70d45e33e64cf5971be05ac0dd07bda996fe9627bcc001aad9b954703de8028d296ed5113ff73ba02cce16a48e
-
SSDEEP
98304:7vNrfTch74luHqnwV6vNQV5EGArGY4fBl7ZbfUZIOp6Py5df:7vNrfghUluKnRvKV5bk0B1ZAPhf
-
TeaBot payload
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-