Analysis
-
max time kernel
147s -
max time network
155s -
platform
android_x64 -
resource
android-x64-20240624-en -
resource tags
androidarch:x64arch:x86image:android-x64-20240624-enlocale:en-usos:android-10-x64system -
submitted
31/01/2025, 22:00
Static task
static1
Behavioral task
behavioral1
Sample
e4cfd6fc03feee2e8b6e687068cc8430f2c2d3f055f4e69a91c6f83605da128e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
e4cfd6fc03feee2e8b6e687068cc8430f2c2d3f055f4e69a91c6f83605da128e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
e4cfd6fc03feee2e8b6e687068cc8430f2c2d3f055f4e69a91c6f83605da128e.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
e4cfd6fc03feee2e8b6e687068cc8430f2c2d3f055f4e69a91c6f83605da128e.apk
-
Size
2.2MB
-
MD5
dcbb515f5cb46f88305c943bed265fba
-
SHA1
b65450ef390d23ca3796962da1e2f6c8441395d3
-
SHA256
e4cfd6fc03feee2e8b6e687068cc8430f2c2d3f055f4e69a91c6f83605da128e
-
SHA512
57560f2b96e706efc46ffbec4deb552cc8b5df6755de91d2d465196e18e16f6058603efaa8c563f7b64338b703ad1c272e5da73fcfc87afbaf47aac1d497e8d9
-
SSDEEP
49152:88SFlgBMebdvOy+CSlNaFloWNmY3NNKvGvb8A5R9:88SMBMI2yRSlIFloWN93fz8AF
Malware Config
Signatures
-
TeaBot
TeaBot is an android banker first seen in January 2021.
-
TeaBot payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_teabot -
Teabot family
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/purple.haze.outs/app_apkprotector_dex/classes-v1.bin 4968 purple.haze.outs /data/user/0/purple.haze.outs/app_apkprotector_dex/classes-v1.bin 4968 purple.haze.outs -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId purple.haze.outs Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId purple.haze.outs -
Obtains sensitive information copied to the device clipboard 2 TTPs 1 IoCs
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
description ioc Process Framework service call android.content.IClipboard.addPrimaryClipChangedListener purple.haze.outs -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock purple.haze.outs -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction purple.haze.outs -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone purple.haze.outs -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver purple.haze.outs -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo purple.haze.outs -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo purple.haze.outs
Processes
-
purple.haze.outs1⤵
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Obtains sensitive information copied to the device clipboard
- Acquires the wake lock
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4968
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716KB
MD520b48fc67169ed72dfb374a5362e98a8
SHA168a79ef09a19ce7814c0773ff0f987aeb435ab4b
SHA25615db7567c747708f3aec8bd08bfec5cda211fdc29c69650a542ee3d211395e5b
SHA512426dc5dc827931604573056bd6736dd06a3470aea96772a5a13e926168d80807e1fd16a67adb29c839a43e2dc5fd487b0f484c69c4dd9e48c0b05c084ee98d59