General
-
Target
0fad5f7db95d6c398539d7a70c54b5bf0df577cac11558d3a676bf18647925ad.zip
-
Size
3.6MB
-
Sample
250325-hjsrzswls4
-
MD5
224d45421ded7d8efb373b31f3b4e89d
-
SHA1
ac989fbe3cc3c8e81b7a6bb9a706345d739f793d
-
SHA256
0fad5f7db95d6c398539d7a70c54b5bf0df577cac11558d3a676bf18647925ad
-
SHA512
8a3fe7d01990778e222356de5344bf969d80681c3a0cb494ba61f1b08fd130626c48bfa7f138ed1823659776bfe708c17a768f4f7332c219932be114542210cd
-
SSDEEP
98304:OiTdNyqi6s38AtAnmqaHN7TwPOLb4inOCChd544m9E:OiLyH6s38AtAnmqat7cP+b/XL+
Static task
static1
Behavioral task
behavioral1
Sample
308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d.jar
-
Size
3.7MB
-
MD5
90a2fd7bc45623939ac8e886cf37195a
-
SHA1
07954951921de3848a0da02ea019b0b55a124845
-
SHA256
308854628ee791468c30ec49a0f48bf46a1ee9d615c3efa444506b43a0615e4d
-
SHA512
567457082be6c24a1ae92418e18fb81d66936fdcc88ab6b9fe8d345fd47135c386374a0271f08914b7ad9b02a83c19f49099f1cfc481b94ac930b3d7b4296bcf
-
SSDEEP
98304:cbnNIQ3gphBl7dCCiDtooMaVtQjqtj9T6:cz6QwpbhiiaV6jqB92
-
TeaBot payload
-
Teabot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1