General
-
Target
0e88d98843377bab91dd2e081786f9152615b9d45ef32debcbfc99f2c94ef04c.zip
-
Size
3.9MB
-
Sample
250325-hbc2kasthy
-
MD5
9ec59710d45591d2c548f281447cd40f
-
SHA1
347bb4e88804395689d5e64594d8c8f3af4c6aad
-
SHA256
0e88d98843377bab91dd2e081786f9152615b9d45ef32debcbfc99f2c94ef04c
-
SHA512
6715e3eaf4beca60784ac5e0aa02791a89b7ffbc4543f6a6ed78bcbea1b22eae600f600a04741957a1159deac2d4a9bcc2c1e768f0eab67b75f6a21d39968212
-
SSDEEP
98304:tGgzqhkjSjUYLInr1LsXvxabFwF8B9H8j3PHWql9v1OrmNDuaXYEB:IgtjSFLI9sfIKFio3fjZImNDzXhB
Static task
static1
Behavioral task
behavioral1
Sample
b74b65f68641feb46d22fddb595fff57cba53f5e3d4d780f4b1bf9b2682a9230.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b74b65f68641feb46d22fddb595fff57cba53f5e3d4d780f4b1bf9b2682a9230.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b74b65f68641feb46d22fddb595fff57cba53f5e3d4d780f4b1bf9b2682a9230.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
b74b65f68641feb46d22fddb595fff57cba53f5e3d4d780f4b1bf9b2682a9230.apk
-
Size
4.1MB
-
MD5
9b08148a0dcd6b574b36f7c2e888aa03
-
SHA1
ec32912daa82f71824a8e2697138af5b293c30fd
-
SHA256
b74b65f68641feb46d22fddb595fff57cba53f5e3d4d780f4b1bf9b2682a9230
-
SHA512
6ad17bd34c4ae6553a0e3ac322cfe69a939dcce0b8cd260a4aac511a5b656aca03fc5ac0b7bef44bdb0d6cde1ec08d0427c7f79f10f7f8a5325f99da988bb326
-
SSDEEP
98304:OYKVlkqj2J5HhgIvqklGQxNhBXKIPzSMd9sshhj:OYDnOI8QxsIPzSMh
-
TeaBot payload
-
Teabot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1