General

  • Target

    e3fc91da29ea7d62aaba3b18c699c875804c1bf4b92ddef92a33d776db55b88b.bin

  • Size

    3.1MB

  • Sample

    250313-1w8cbatxfw

  • MD5

    02e0690aad110ad703bac4a401b909fb

  • SHA1

    cf1b4858af23fcc03e4fd9e30f17ca30c57a034c

  • SHA256

    e3fc91da29ea7d62aaba3b18c699c875804c1bf4b92ddef92a33d776db55b88b

  • SHA512

    cd6e417732abe27b4c15f424d5e358ab9ef0ff71c3344fd18b319e32ac03ca1c080c80a498f2906498e51cdc8797cb8c563e8513cb092db7cadc5f59b8c3750f

  • SSDEEP

    98304:DLx7aWuxA6G+WQ2fvyp73bO/nrfNBnGtllbc3:DL+xbxGHypzbOPrlBGtXbs

Malware Config

Extracted

Family

teabot

C2

http://91.215.85.55:85/api/

http://185.215.113.108:85/api/

http://37.235.54.59:80/api/

Targets

    • Target

      e3fc91da29ea7d62aaba3b18c699c875804c1bf4b92ddef92a33d776db55b88b.bin

    • Size

      3.1MB

    • MD5

      02e0690aad110ad703bac4a401b909fb

    • SHA1

      cf1b4858af23fcc03e4fd9e30f17ca30c57a034c

    • SHA256

      e3fc91da29ea7d62aaba3b18c699c875804c1bf4b92ddef92a33d776db55b88b

    • SHA512

      cd6e417732abe27b4c15f424d5e358ab9ef0ff71c3344fd18b319e32ac03ca1c080c80a498f2906498e51cdc8797cb8c563e8513cb092db7cadc5f59b8c3750f

    • SSDEEP

      98304:DLx7aWuxA6G+WQ2fvyp73bO/nrfNBnGtllbc3:DL+xbxGHypzbOPrlBGtXbs

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Teabot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks