General

  • Target

    ce2f6479f7f17d5b3029f155ddc8e6404c8c5b54c75aa4227b3f899d32abcf49.bin

  • Size

    3.5MB

  • Sample

    250313-1xb1hatxfy

  • MD5

    7ae5bd1d61e9ebcc162bcd69431365b3

  • SHA1

    3ac9cefd2e0ed6aff597080e601c1c317b41fbad

  • SHA256

    ce2f6479f7f17d5b3029f155ddc8e6404c8c5b54c75aa4227b3f899d32abcf49

  • SHA512

    e5b34193a613124eb4a04868792dde66f2278b8a8ead89ee3227cd4562029434ad0a0aa8ac3dabd8dc32d64af7e9160a772f86a0bee11c000fb9e9ef78165b2e

  • SSDEEP

    98304:Ao7EGuGi8jLOA2SE1celEmGavpQcei/oH4nzZ:R7uUOmE1cenGaeY/K2

Malware Config

Extracted

Family

teabot

C2

http://91.215.85.55:85/api/

http://185.215.113.108:85/api/

http://37.235.54.59:80/api/

Targets

    • Target

      ce2f6479f7f17d5b3029f155ddc8e6404c8c5b54c75aa4227b3f899d32abcf49.bin

    • Size

      3.5MB

    • MD5

      7ae5bd1d61e9ebcc162bcd69431365b3

    • SHA1

      3ac9cefd2e0ed6aff597080e601c1c317b41fbad

    • SHA256

      ce2f6479f7f17d5b3029f155ddc8e6404c8c5b54c75aa4227b3f899d32abcf49

    • SHA512

      e5b34193a613124eb4a04868792dde66f2278b8a8ead89ee3227cd4562029434ad0a0aa8ac3dabd8dc32d64af7e9160a772f86a0bee11c000fb9e9ef78165b2e

    • SSDEEP

      98304:Ao7EGuGi8jLOA2SE1celEmGavpQcei/oH4nzZ:R7uUOmE1cenGaeY/K2

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Teabot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks