Resubmissions
26/01/2024, 19:01
240126-xph73accg3 10Analysis
-
max time kernel
146s -
max time network
156s -
platform
android_x64 -
resource
android-x64-arm64-20231215-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231215-enlocale:en-usos:android-11-x64system -
submitted
26/01/2024, 19:01
Static task
static1
Behavioral task
behavioral1
Sample
7823e56b4b1631ef52bbd5b95c186554.apk
Resource
android-x86-arm-20231215-en
Behavioral task
behavioral2
Sample
7823e56b4b1631ef52bbd5b95c186554.apk
Resource
android-x64-20231215-en
Behavioral task
behavioral3
Sample
7823e56b4b1631ef52bbd5b95c186554.apk
Resource
android-x64-arm64-20231215-en
General
-
Target
7823e56b4b1631ef52bbd5b95c186554.apk
-
Size
4.3MB
-
MD5
7823e56b4b1631ef52bbd5b95c186554
-
SHA1
f47ee24af407de1019e8605ad8f111732305fa5e
-
SHA256
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3
-
SHA512
ceac5d17b69d0297a7a83873705c46486894de70d45e33e64cf5971be05ac0dd07bda996fe9627bcc001aad9b954703de8028d296ed5113ff73ba02cce16a48e
-
SSDEEP
98304:7vNrfTch74luHqnwV6vNQV5EGArGY4fBl7ZbfUZIOp6Py5df:7vNrfghUluKnRvKV5bk0B1ZAPhf
Malware Config
Signatures
-
TeaBot
TeaBot is an android banker first seen in January 2021.
-
TeaBot payload 1 IoCs
resource yara_rule behavioral3/files/fstream-2.dat family_teabot -
Makes use of the framework's Accessibility service 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId angry.grant.doll Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId angry.grant.doll -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json 4609 angry.grant.doll /data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json 4609 angry.grant.doll -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock angry.grant.doll -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS angry.grant.doll
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59299a922d35a418fab1821203569c9b8
SHA115464cd438cf88b63a1fa244f2433c35578f02ff
SHA2562e87ff9e0d7e79efbeb27e5f1f0041a81f2b1ba8359c4cacfeaba341cefbf48f
SHA512ad942f3b3c3a287f87e79b193146ba5b8d8f036921906a536ab744933ae323a853870da55da6b4f0e0cf52bcce75da178455f50f624a38d5c8353c855cf62162
-
Filesize
1.2MB
MD5e568315f15f0f3af927ef6348c635820
SHA162a4a8fe65af1866b983c94bd57645880df2cd93
SHA256b2d15b080782f826b9d131a6188575bbbe9011d4c99dec87b73d7d34f1de96c9
SHA512d71afcae4cf2741cdb90b0ae04a034783db82e4052e0a84f6ed35efb340fc11c22186356ea13f3fc46c084e42f87bf348cb37644c0a00b4327ec52fd792deb0c
-
Filesize
1KB
MD5a58b7a665bd9cfcd5b965c75d43580ec
SHA180924f18708a2ead8507b5fcb3fe3e68c3eb41a8
SHA2569d95f9fe5caa7aabf4c537ef6caf9e3124f2964951b1532e095f2240c1da7f8f
SHA5120480399e801876c4c18cc228ba2dd9c3b90da4d08cdefdeeaef03c82144d7cae2cf028c2f725b435f6c5c01ed0444c734515019eaa8be750c7b9c84318ccae9a