General
-
Target
f21bfd850f3ee651f35a0a763bf7e39777a0cb456d46c7d1715f80551ae515fa.zip
-
Size
4.2MB
-
Sample
250327-wdwhksxqw8
-
MD5
c7d488cc8afcefefc13e82f04948fbb2
-
SHA1
c22a3eb202a4a05a2a80a5ed52068ffe05b84abb
-
SHA256
f21bfd850f3ee651f35a0a763bf7e39777a0cb456d46c7d1715f80551ae515fa
-
SHA512
77ede7c37304e857c367e1dc9bf31d9d889b8f6d3930fd31406fd2bef723733f7724272d728ec543ed13b313f3dc6f97290eff3a145d8a2b31b86528cbb5e5cc
-
SSDEEP
98304:+U/1hkJSyotSKA6i6Z/B/FWcLs+H+889BTytuN0WZKQX0pBt3jT0yYFm:+a1hkNo7zZ/B9WcHe889TN7ZK5X1Mm
Static task
static1
Behavioral task
behavioral1
Sample
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
Resource
android-x64-arm64-20240910-en
Malware Config
Targets
-
-
Target
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
-
Size
4.3MB
-
MD5
7823e56b4b1631ef52bbd5b95c186554
-
SHA1
f47ee24af407de1019e8605ad8f111732305fa5e
-
SHA256
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3
-
SHA512
ceac5d17b69d0297a7a83873705c46486894de70d45e33e64cf5971be05ac0dd07bda996fe9627bcc001aad9b954703de8028d296ed5113ff73ba02cce16a48e
-
SSDEEP
98304:7vNrfTch74luHqnwV6vNQV5EGArGY4fBl7ZbfUZIOp6Py5df:7vNrfghUluKnRvKV5bk0B1ZAPhf
-
TeaBot payload
-
Teabot family
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Obtains sensitive information copied to the device clipboard
Application may abuse the framework's APIs to obtain sensitive information copied to the device clipboard.
-
Acquires the wake lock
-
Performs UI accessibility actions on behalf of the user
Application may abuse the accessibility service to prevent their removal.
-
Queries the mobile country code (MCC)
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Credential Access
Clipboard Data
1Input Capture
2GUI Input Capture
1Keylogging
1