Analysis

  • max time kernel
    179s
  • max time network
    183s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    28-07-2024 22:00

General

  • Target

    56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b.apk

  • Size

    2.2MB

  • MD5

    7a33c621d8316010100f1f415e5806e2

  • SHA1

    f07735aa5c1185b14204d3ff93c40dc71c200c12

  • SHA256

    56232948a56bdf7c6a69b1bdb2b636317ff84a150f69a6f86fddb1a4e56c3b6b

  • SHA512

    c6f2872688f0a5af1f14eac2d4ab0dea065c5826a13486637122cc183b10886cd76b0655a7913488be1c6cff7942a243301bb67180d79705607719d36263eb6e

  • SSDEEP

    49152:vuS+wu8apYaiI1g/0Y1trEpxCjfOdqcxOG+uR6TXY:6wudpNW/0Y1trEpxCjfOdFb6TXY

Malware Config

Extracted

Family

teabot

C2

http://91.215.85.55:85/api/

http://193.107.109.44:85/api/

Signatures

  • TeaBot

    TeaBot is an android banker first seen in January 2021.

  • Removes its main activity from the application launcher 1 TTPs 1 IoCs
  • Loads dropped Dex/Jar 1 TTPs 2 IoCs

    Runs executable file dropped to the device during analysis.

  • Makes use of the framework's Accessibility service 4 TTPs 2 IoCs

    Retrieves information displayed on the phone screen using AccessibilityService.

  • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps) 1 TTPs
  • Acquires the wake lock 1 IoCs
  • Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs

    Application may abuse the accessibility service to prevent their removal.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
  • Checks CPU information 2 TTPs 1 IoCs
  • Checks memory information 2 TTPs 1 IoCs

Processes

  • com.mjpvpteu.emngawxh.pbnshqob.cejywlyf
    1⤵
    • Removes its main activity from the application launcher
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Checks CPU information
    • Checks memory information
    PID:4262
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.mjpvpteu.emngawxh.pbnshqob.cejywlyf/wwwfbfjgff/wkw6gkwrtbrte9P/base.apk.twurkwk1.7hf --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.mjpvpteu.emngawxh.pbnshqob.cejywlyf/wwwfbfjgff/wkw6gkwrtbrte9P/oat/x86/base.apk.twurkwk1.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4291

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.mjpvpteu.emngawxh.pbnshqob.cejywlyf/wwwfbfjgff/wkw6gkwrtbrte9P/tmp-base.apk.twurkwk7850765427982524554.7hf

    Filesize

    317KB

    MD5

    68b18a60c070f0724be233f1919811d8

    SHA1

    6d1a3e8545c7215b33208f8100ddb9eea3f88513

    SHA256

    3ba140f8763455654bcfc11ae568dcc9b48c3f9a4214b0898b1b6d103e111616

    SHA512

    2099a1be75a99eb94959f4e10a8c2da399ef361178b8373ae6f37595ce1b2d4110ba92a05e181ce310e79cf7ddb445fc574d122728100034dfca7e0999ba7e93

  • /data/user/0/com.mjpvpteu.emngawxh.pbnshqob.cejywlyf/wwwfbfjgff/wkw6gkwrtbrte9P/base.apk.twurkwk1.7hf

    Filesize

    751KB

    MD5

    f230d7776f46de795627a621c18f0141

    SHA1

    60fed25fa44c23428f224960a2e505ce6d0000ed

    SHA256

    1e8944d5eb82d891226c29eeb7df69b152b35b103ee2acd3edfeb67b26d43312

    SHA512

    9291aee13a2365b8f7525e898183dc1523e7cce1b787ae41c87469d20aba433ef50b65453bf6c0c308f4e01cb5a9766185ea1a97ff58bc1e557e63a9bf0d7c53

  • /data/user/0/com.mjpvpteu.emngawxh.pbnshqob.cejywlyf/wwwfbfjgff/wkw6gkwrtbrte9P/base.apk.twurkwk1.7hf

    Filesize

    751KB

    MD5

    9f2305a18dd1ae908de42f1ae25ea759

    SHA1

    29251a37fe5fda87fe147f3546a65a27dbc8a6e7

    SHA256

    077cb289f459687e1ba2598e121ade40a221be9f25168a3c22a5621eb2804fb0

    SHA512

    e397177c1f966e2e2c5152d405264c9c645061002115ec1a9c34e7b2cb604e1c91a113ab5bbf52c64d24a49ff1fac1c314e5356aca7cc7785927235f5ec2e1e7