Resubmissions

14/03/2025, 19:45

250314-ygl5es1mx9 10

18/04/2024, 12:40

240418-pwet8add72 10

18/04/2024, 12:31

240418-pqdd7sdc35 10

18/04/2024, 12:29

240418-pnyblaeb81 10

General

  • Target

    e1ac7ca1247773e5842197c2efd96af63178f58db759fe92bc96e6b02b60304b.apk

  • Size

    3.1MB

  • Sample

    250314-ygl5es1mx9

  • MD5

    04de85cf10a67e63c093c769906f6da3

  • SHA1

    488f651e367e7379adfd8a095b815ee12acd7c9e

  • SHA256

    e1ac7ca1247773e5842197c2efd96af63178f58db759fe92bc96e6b02b60304b

  • SHA512

    ae5079e3301c397000e9edc318e42f225ffcd052d741601df6129db06df31fc6dd6029d8e93f5fd214dee5c1918a3a1798c508f3c8e398f086158d41949ed133

  • SSDEEP

    49152:CD76+3SlF9iknNiFDFcU+UgErmLxC640cU86zb4FOREqjDE297OVbw+1TkHkhrg0:M76+i/d9UxgErcRSeweEqjDz7Obz1AW

Malware Config

Extracted

Family

teabot

C2

http://91.215.85.55:85/api/

http://185.215.113.108:85/api/

http://37.235.54.59:80/api/

Targets

    • Target

      e1ac7ca1247773e5842197c2efd96af63178f58db759fe92bc96e6b02b60304b.apk

    • Size

      3.1MB

    • MD5

      04de85cf10a67e63c093c769906f6da3

    • SHA1

      488f651e367e7379adfd8a095b815ee12acd7c9e

    • SHA256

      e1ac7ca1247773e5842197c2efd96af63178f58db759fe92bc96e6b02b60304b

    • SHA512

      ae5079e3301c397000e9edc318e42f225ffcd052d741601df6129db06df31fc6dd6029d8e93f5fd214dee5c1918a3a1798c508f3c8e398f086158d41949ed133

    • SSDEEP

      49152:CD76+3SlF9iknNiFDFcU+UgErmLxC640cU86zb4FOREqjDE297OVbw+1TkHkhrg0:M76+i/d9UxgErcRSeweEqjDz7Obz1AW

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • Teabot family

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Acquires the wake lock

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks