Analysis
-
max time kernel
147s -
max time network
154s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
27/03/2025, 17:48
Static task
static1
Behavioral task
behavioral1
Sample
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3.apk
-
Size
4.3MB
-
MD5
7823e56b4b1631ef52bbd5b95c186554
-
SHA1
f47ee24af407de1019e8605ad8f111732305fa5e
-
SHA256
b88e7421bc61f4ce20c0694418fc97c1e77cfd3f2053857f87cc47512a55c3d3
-
SHA512
ceac5d17b69d0297a7a83873705c46486894de70d45e33e64cf5971be05ac0dd07bda996fe9627bcc001aad9b954703de8028d296ed5113ff73ba02cce16a48e
-
SSDEEP
98304:7vNrfTch74luHqnwV6vNQV5EGArGY4fBl7ZbfUZIOp6Py5df:7vNrfghUluKnRvKV5bk0B1ZAPhf
Malware Config
Signatures
-
TeaBot
TeaBot is an android banker first seen in January 2021.
-
TeaBot payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_teabot behavioral1/memory/4223-1.dex family_teabot -
Teabot family
-
pid Process 4223 angry.grant.doll -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json 4223 angry.grant.doll /data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json 4248 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/angry.grant.doll/app_DynamicOptDex/oat/x86/XPOZLH.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json 4223 angry.grant.doll -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId angry.grant.doll Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId angry.grant.doll -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock angry.grant.doll -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction angry.grant.doll -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone angry.grant.doll -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS angry.grant.doll -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver angry.grant.doll -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo angry.grant.doll -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo angry.grant.doll
Processes
-
angry.grant.doll1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4223 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/angry.grant.doll/app_DynamicOptDex/XPOZLH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/angry.grant.doll/app_DynamicOptDex/oat/x86/XPOZLH.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4248
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD59299a922d35a418fab1821203569c9b8
SHA115464cd438cf88b63a1fa244f2433c35578f02ff
SHA2562e87ff9e0d7e79efbeb27e5f1f0041a81f2b1ba8359c4cacfeaba341cefbf48f
SHA512ad942f3b3c3a287f87e79b193146ba5b8d8f036921906a536ab744933ae323a853870da55da6b4f0e0cf52bcce75da178455f50f624a38d5c8353c855cf62162
-
Filesize
1.2MB
MD5e568315f15f0f3af927ef6348c635820
SHA162a4a8fe65af1866b983c94bd57645880df2cd93
SHA256b2d15b080782f826b9d131a6188575bbbe9011d4c99dec87b73d7d34f1de96c9
SHA512d71afcae4cf2741cdb90b0ae04a034783db82e4052e0a84f6ed35efb340fc11c22186356ea13f3fc46c084e42f87bf348cb37644c0a00b4327ec52fd792deb0c
-
Filesize
1KB
MD5866cf9be370d35aa1cea018e9b11704a
SHA1645b01293140446b75ffdc49db0df7a6efb13a1a
SHA256dba9b531f6569309e666bf4d90915acb0508a291a995744822f2c6e5434d9fb4
SHA512a8a5ed1644b67f30e0e1e1b015f16e736b87e65f4e80a677656e7666bdbbc2209b853462e7bbfe23dea1f15d8ec23d65b5a87f7385df19973626943c0d121dee
-
Filesize
1.2MB
MD5f265547951bc636961eda1df41709303
SHA1cb5f9a922fdf9da72168166f9d257d851a3b3509
SHA2567d0f41d996f66fc225ab19914d5992ae3e5d675d9ab728acb1f55d56303b0959
SHA5120550597d17a3078ac0813fd22bb94b43118a3c7894e2e945e9a3797ef38da97e5be547db6ac475cbee453f577499663a24711b604e993bcb7a09f759199f0d44