General
-
Target
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b.bin
-
Size
2.2MB
-
Sample
240728-1w1mgaxbrq
-
MD5
7a33c621d8316010100f1f415e5806e2
-
SHA1
f07735aa5c1185b14204d3ff93c40dc71c200c12
-
SHA256
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b
-
SHA512
c6f2872688f0a5af1f14eac2d4ab0dea065c5826a13486637122cc183b10886cd76b0655a7913488be1c6cff7942a243301bb67180d79705607719d36263eb6e
-
SSDEEP
49152:vuS+wu8apYaiI1g/0Y1trEpxCjfOdqcxOG+uR6TXY:6wudpNW/0Y1trEpxCjfOdFb6TXY
Static task
static1
Behavioral task
behavioral1
Sample
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral4
Sample
liveWallpaperPlugin.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral5
Sample
liveWallpaperPlugin.apk
Resource
android-x64-20240624-en
Malware Config
Extracted
teabot
http://91.215.85.55:85/api/
http://193.107.109.44:85/api/
Targets
-
-
Target
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b.bin
-
Size
2.2MB
-
MD5
7a33c621d8316010100f1f415e5806e2
-
SHA1
f07735aa5c1185b14204d3ff93c40dc71c200c12
-
SHA256
56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b
-
SHA512
c6f2872688f0a5af1f14eac2d4ab0dea065c5826a13486637122cc183b10886cd76b0655a7913488be1c6cff7942a243301bb67180d79705607719d36263eb6e
-
SSDEEP
49152:vuS+wu8apYaiI1g/0Y1trEpxCjfOdqcxOG+uR6TXY:6wudpNW/0Y1trEpxCjfOdFb6TXY
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
-
-
Target
liveWallpaperPlugin.apk
-
Size
162KB
-
MD5
91d33062e74043bb0bd9d5f66b343f3e
-
SHA1
aa3fab31cf6d5bc7fb1c012ada2b77ffe242a7c0
-
SHA256
4c3720917d9920cdec450cc85fe2fe3db39bc48cff4fea270914b475fc79f08a
-
SHA512
be5eb5cdab9e3348f3228fee40172b351a07d2d39ddd9d085593e3d78c13259be62425b4993a40696542902c452f7213a7b92410baf06192051640607389b80c
-
SSDEEP
3072:QV8ZyGg6GYtzqWn1Vmkv7YVQi5cRVl/51SGHHkmjVw:w8ZLGYtrv7O09bSGHHkYw
Score8/10-
Checks if the Android device is rooted.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Discovery
Software Discovery
1Security Software Discovery
1System Information Discovery
3System Network Configuration Discovery
2System Network Connections Discovery
2