General

  • Target

    0fad5f7db95d6c398539d7a70c54b5bf0df577cac11558d3a676bf18647925ad.zip

  • Size

    3.6MB

  • Sample

    250325-hjsrzswls4

  • MD5

    224d45421ded7d8efb373b31f3b4e89d

  • SHA1

    ac989fbe3cc3c8e81b7a6bb9a706345d739f793d

  • SHA256

    0fad5f7db95d6c398539d7a70c54b5bf0df577cac11558d3a676bf18647925ad

  • SHA512

    8a3fe7d01990778e222356de5344bf969d80681c3a0cb494ba61f1b08fd130626c48bfa7f138ed1823659776bfe708c17a768f4f7332c219932be114542210cd

  • SSDEEP

    98304:OiTdNyqi6s38AtAnmqaHN7TwPOLb4inOCChd544m9E:OiLyH6s38AtAnmqat7cP+b/XL+

Malware Config

Targets

    • Target

      308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d.jar

    • Size

      3.7MB

    • MD5

      90a2fd7bc45623939ac8e886cf37195a

    • SHA1

      07954951921de3848a0da02ea019b0b55a124845

    • SHA256

      308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d

    • SHA512

      567457082be6c24a1ae92418e18fb81d66936fdcc88ab6b9fe8d345fd47135c386374a0271f08914b7ad9b02a83c19f49099f1cfc481b94ac930b3d7b4296bcf

    • SSDEEP

      98304:cbnNIQ3gphBl7dCCiDtooMaVtQjqtj9T6:cz6QwpbhiiaV6jqB92

    • TeaBot

      TeaBot is an android banker first seen in January 2021.

    • TeaBot payload

    • Teabot family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Obtains sensitive information copied to the device clipboard

      Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.

    • Acquires the wake lock

    • Performs UI accessibility actions on behalf of the user

      Application may abuse the accessibility service to prevent their removal.

    • Queries the mobile country code (MCC)

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks