TeaBot Malware

A new trendy and massive android banking trojan was discovered and analyzed by Cleafy called TeaBot. This Teabot steals the victim’s credentials and SMS messages for enabling fraud scenarios against a predefined list of banks.

Features of TeaBot:

TeaBot is featured with the following potential:

  • Ability to perform Overlay Attacks against multiple banks applications to steal login credentials and credit card information
  • Ability to send / intercept / hide SMS messages
  • Enable keylogging functionalities
  • Ability to steal Google Authentication codes
  • Ability to obtain full remote control of an Android device (via Accessibility Services and real-time screen-sharing)

TeaBot – In-depth Analysis

TeaBot was initially named “TeaTV” but the app name was changed to “VLC MediaPlayer”, “Mobdro”, “DHL”, “UPS” and “bpost” recently.

The main permissions achieved by TeaBot allow to:

  • Send / Intercept SMS messages
  • Reading phone book and phone state
  • Use device supported biometric modalities
  • Modify audio settings (e.g. to mute the device)
  • Shows a popup on top of all other apps (used during the installation phase to force the user to accept the accessibility service permissions)
  • Deleting an installed application
  • Abusing Android Accessibility Services
List of permissions declared in the AndroidManifest.xml
Main icons app used by TeaBot

TeaBot main features

The main features observed during the analysis of the banker are the following.

Keylogging:

TeaBot sends the list of installed apps to verify if the infected devices had one or more targeted apps already installed. When TeaBot found one of them, it downloads the specific payload to perform overlay attacks and starts tracking all the activity performed by the user on the targeted app. That information is sent back to the assigned C2 every 10 seconds.

Screenshots:

One of the particularities of TeaBot is the capability of taking screenshots to constantly monitor the screen of the compromised device. When the C2 sends the “start_client” command with an IP address and PORT, it starts requesting the images and TeaBot starts a loop in which creates a “Virtual Screen” for taking screenshots.

Overlay attack:

A malicious application/user is somehow able to perform actions on behalf of the victim. This usually takes the form of an imitation app or a WebView launched “on-top” of a legitimate application (such as a banking app).”

Geographical distribution of banks currently targeted by TeaBot

Be aware of the situation and take the necessary steps to safeguard your environment!

Also Read

Top 12 Security Flaws Exploited by Russian Hackers to Target Organisations Globally

WeSteal: A Cryptocurrency-Stealing Malware that Sold in Dark Web Markets