General
-
Target
73d450f8787ffe308963460a92282a475003d4f4a55dcdded2de2d9c745bda65.zip
-
Size
3.8MB
-
Sample
250326-ltqbdswn15
-
MD5
06249fee0427281afd5dc13c6adf285f
-
SHA1
4a5ebc15cfed6a607e1a972164afd5f65be1bfc5
-
SHA256
73d450f8787ffe308963460a92282a475003d4f4a55dcdded2de2d9c745bda65
-
SHA512
7ce6a9d57c96ff17b991942806f757c975c5abfb22130dd33327887e856227580de0afe8f84e847cf4d70a7070e1255f37a9da1826efd2191f402d28d93d6440
-
SSDEEP
98304:R+uUZCayZa9rtIy2ysKh5555JUA9IHrQJzDgkSOcRK:czJrtIy5hT55JUBUflSOcRK
Static task
static1
Behavioral task
behavioral1
Sample
a34c1e334e9d76e97b8e8ac6b88bbc45cbed7ab7fc3a62e2f348c940136778af.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
a34c1e334e9d76e97b8e8ac6b88bbc45cbed7ab7fc3a62e2f348c940136778af.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
a34c1e334e9d76e97b8e8ac6b88bbc45cbed7ab7fc3a62e2f348c940136778af.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
a34c1e334e9d76e97b8e8ac6b88bbc45cbed7ab7fc3a62e2f348c940136778af.apk
-
Size
4.1MB
-
MD5
bd0ee78cded55ff30a37c670cfa66236
-
SHA1
70d690a40fb7307280d2bebf77615e757c7f6513
-
SHA256
a34c1e334e9d76e97b8e8ac6b88bbc45cbed7ab7fc3a62e2f348c940136778af
-
SHA512
f6e5dabbced24b03f44c40d189d27dee8e9a085cf4499d903289ee556b992557f6ffc33f13e58fbc3dfce3ad89a6834cad10a9c34764b6a372316bd7bab2fd53
-
SSDEEP
98304:k5GKk+jrrhCMTMI+On1L0Mcuw4P4dhdJAiA0vd3iYZQl:SGa7lYRQh0McufP0AiLsH
-
TeaBot payload
-
Teabot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1