Analysis
-
max time kernel
148s -
max time network
159s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
01/04/2025, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
7861f533612ed5bc7d098075ad1f2fef1648ff02ae12fd8b41fd49b6ac73c15b.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
7861f533612ed5bc7d098075ad1f2fef1648ff02ae12fd8b41fd49b6ac73c15b.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
7861f533612ed5bc7d098075ad1f2fef1648ff02ae12fd8b41fd49b6ac73c15b.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
7861f533612ed5bc7d098075ad1f2fef1648ff02ae12fd8b41fd49b6ac73c15b.apk
-
Size
4.0MB
-
MD5
76d27f47fb0131c470eb637c201db4ca
-
SHA1
1ef9d327534df860865273109070bd420780b739
-
SHA256
7861f533612ed5bc7d098075ad1f2fef1648ff02ae12fd8b41fd49b6ac73c15b
-
SHA512
845d2a2856c975adfd6c032e9738b87f11d5b75e3996fdcf3941b450e9b5811341e6506525e49c0efba6da6c60c8d279e0a343af8e582566ae76e4b73d61b798
-
SSDEEP
98304:arWdNHQOiAjPWpgl1oUVifo5b60jaMdZ6NqIfs5D:aSb3jepg3oUVao5bjlZ6N7fsN
Malware Config
Signatures
-
TeaBot
TeaBot is an android banker first seen in January 2021.
-
TeaBot payload 2 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_teabot behavioral1/memory/4222-1.dex family_teabot -
Teabot family
-
pid Process 4222 usage.just.shock -
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/usage.just.shock/app_DynamicOptDex/nQAqKMR.json 4222 usage.just.shock /data/user/0/usage.just.shock/app_DynamicOptDex/nQAqKMR.json 4250 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/usage.just.shock/app_DynamicOptDex/nQAqKMR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/usage.just.shock/app_DynamicOptDex/oat/x86/nQAqKMR.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/usage.just.shock/app_DynamicOptDex/nQAqKMR.json 4222 usage.just.shock -
Makes use of the framework's Accessibility service 4 TTPs 2 IoCs
Retrieves information displayed on the phone screen using AccessibilityService.
description ioc Process Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfoByAccessibilityId usage.just.shock Framework service call android.accessibilityservice.IAccessibilityServiceConnection.findAccessibilityNodeInfosByViewId usage.just.shock -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock usage.just.shock -
Performs UI accessibility actions on behalf of the user 1 TTPs 7 IoCs
Application may abuse the accessibility service to prevent their removal.
ioc Process android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock android.accessibilityservice.IAccessibilityServiceConnection.performGlobalAction usage.just.shock -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone usage.just.shock -
Requests disabling of battery optimizations (often used to enable hiding in the background). 1 TTPs 1 IoCs
description ioc Process Intent action android.settings.REQUEST_IGNORE_BATTERY_OPTIMIZATIONS usage.just.shock -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver usage.just.shock -
Checks CPU information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/cpuinfo usage.just.shock -
Checks memory information 2 TTPs 1 IoCs
description ioc Process File opened for read /proc/meminfo usage.just.shock
Processes
-
usage.just.shock1⤵
- Removes its main activity from the application launcher
- Loads dropped Dex/Jar
- Makes use of the framework's Accessibility service
- Acquires the wake lock
- Performs UI accessibility actions on behalf of the user
- Queries the mobile country code (MCC)
- Requests disabling of battery optimizations (often used to enable hiding in the background).
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
PID:4222 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/usage.just.shock/app_DynamicOptDex/nQAqKMR.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/usage.just.shock/app_DynamicOptDex/oat/x86/nQAqKMR.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4250
-
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Hide Artifacts
2Suppress Application Icon
1User Evasion
1Impair Defenses
1Prevent Application Removal
1Input Injection
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57b3f4df9f119dd6d984552b3ba3d734b
SHA1c191313833252cf3e472fffc8b54448e4f6a4192
SHA256f9fb1598df72c799c7539b94bd4d130c0428a597da6623743796d603e60a1ce8
SHA51234d3c5a01b8287bfd0c52b4320528f908629dace69387aee297b3b1b930ff1d5098db6c18a11ecabf73f2e0a5cda35a4a8738b5d3d81025b006642ca5ea49a1e
-
Filesize
1.2MB
MD54c3aa4a48283e0f0e8a9c15fa14bce41
SHA1f7c098941b001cca43fc25f1e8f3e0d9142cdd7f
SHA256624a0a7c78214065db178215ce8248cfd630648c0f036a018b083788393bbf1e
SHA512b7eb01f6925a33e168aaf10d9f9ad48543c2a2512fecad5672c428ad46cd994978029aa0b56a231515dcc7fb7c9b2cc905a4d6891e3a22cf00788f5d500a74ab
-
Filesize
1KB
MD51b4d5f86d2e665cef95e438ecfd6fff0
SHA160f22e10a87ee794661d3f47853d62669c0118e4
SHA25676c2f9e6617ba1432585617119a8cffa2315b2a1e2863bd7951579fcaf268359
SHA51229bfbe700dc2230f2711cec3447eefb89c5585eacf197e50aad6d958886c741a3ca6a95436280123f36a84a30083bf7d2ad685f389ac8cb96d26888f41c04b66
-
Filesize
1.2MB
MD59f62de780b56c07251e2cb264c02c34b
SHA10521e042a183b43ad8086feecfd556f39544b13e
SHA256e7ad7ee508ee0d5ed76ad5e7bcb11c63c7ea52abcca50815fdde8c41e66b5b28
SHA5122443234042003917c7408ef85e7af9144b5c08dc810647cca0fe7e00bc695c0144ac70d23c1ca8827daf3fb65cff1f35f92e78f7b2986baeed56d6b00fce962b