MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 47bb7f855cdf116c62499240089fa1b7a69585e8b7f639e192b9d038da4094cd. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Teabot
Vendor detections: 6
| SHA256 hash: | 47bb7f855cdf116c62499240089fa1b7a69585e8b7f639e192b9d038da4094cd |
|---|---|
| SHA3-384 hash: | 99d81d90334dc114ad63b6b5c5fd5030dc7698638837294a5fdce44fb7229fb6b1c8060a44495c402a94a56ce832b812 |
| SHA1 hash: | 29c497dc416d903917e92ae347371b15009eaee1 |
| MD5 hash: | bf2ddaf430243461a8eab4aa1ed1e80d |
| humanhash: | wisconsin-leopard-sink-ack |
| File name: | base.apk |
| Download: | download sample |
| Signature | Teabot |
| File size: | 3'371'203 bytes |
| First seen: | 2022-03-16 12:36:45 UTC |
| Last seen: | 2022-04-20 10:20:36 UTC |
| File type: | apk |
| MIME type: | application/zip |
| ssdeep | 98304:ylxgweICNV+mN24ElmQjE9LBcGDIXAOthoV:ylxgBImV+mCmQjMLBarrc |
| TLSH | T127F53387E3B7F011EFBFE6B85914B17B564B07E002C4FA9E24469A9444F3CC96E89C58 |
| Reporter | |
| Tags: | android apk signed Teabot |
Code Signing Certificate
| Organisation: | np |
|---|---|
| Issuer: | np |
| Algorithm: | sha512WithRSAEncryption |
| Valid from: | 2021-04-25T09:03:56Z |
| Valid to: | 3020-08-26T09:03:56Z |
| Serial number: | 045ff9a3 |
| Intelligence: | 41 malware samples on MalwareBazaar are signed with this code signing certificate |
| Thumbprint Algorithm: | SHA256 |
| Thumbprint: | 492682f877607ee99df2ddd2bd5953fd727bdf6e19d397de9dbbafd582bcad75 |
| Source: | This information was brought to you by ReversingLabs A1000 Malware Analysis Platform |
Intelligence
File Origin
# of uploads :
4
# of downloads :
355
Origin country :
n/a
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
7.5/10
Confidence:
100%
Tags:
control.exe fingerprint replace.exe update.exe
Result
Verdict:
MALICIOUS
Link:
Result
Threat name:
Unknown
Detection:
malicious
Classification:
troj.spyw.evad
Score:
76 / 100
Signature
Antivirus / Scanner detection for submitted sample
Contains a screen recorder (to take screenshot)
Multi AV Scanner detection for submitted file
Protects itself from removal
Removes its application launcher (likely to stay hidden)
Uses accessibility services (likely to control other applications)
Uses known network protocols on non-standard ports
Behaviour
Behavior Graph:
n/a
Threat name:
Android.Infostealer.Generic
Status:
Suspicious
First seen:
2022-03-16 12:37:31 UTC
File Type:
Binary (Archive)
Extracted files:
89
AV detection:
8 of 33 (24.24%)
Threat level:
5/5
Result
Malware family:
teabot
Score:
10/10
Tags:
family:teabot android banker evasion infostealer trojan
Behaviour
Removes a system notification.
Acquires the wake lock.
Loads dropped Dex/Jar
Makes use of the framework's Accessibility service.
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
TeaBot
Malware Config
C2 Extraction:
http://195.201.70.80:8000/api/
http://92.63.97.204:8000/api/
http://92.63.97.204:8000/api/
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Legit
Score:
0.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.