At the beginning of January 2021, a new Android banker started appearing and it was discovered and analysed by our Threat Intelligence and Incident Response (TIR) team.
Since lack of information and the absence of a proper nomenclature of this Android banker family, we decide to dub it as TeaBot to better track this family inside our internal Threat Intelligence taxonomy.
TeaBot appears to have all the main features of nowadays Android bankers achieved by abusing Accessibility Services such as:
Thanks to an in-depth analysis of a new wave of samples detected at the end of March 2021, we found, for the first time, multiple payloads against Italian banks.
Also, TeaBot appears to be at its early stages of development according to some irregularities found during our analysis, but developers have already included multi-languages support according to some textual references found (e.g. Spanish, Italian, German, etc.).
We assume that TeaBot, similar to Oscorp, is trying to achieve a real-time interaction with the compromised device combined with the abuse of Android Accessibility Services bypassing the need of a “new device enrollment” to perform an Account Takeover scenario (ATO).
From the AndroidManifest file the following indicators were extracted:
TeaBot, like other bankers, uses multiple techniques to slow down analysts, such as:
Furthermore, both the partial network encryption and the presence of some not-working injections and commands (or in some cases a lack of injections for specific targeted banks) suggest to us that the TeaBot is still under development.
At the same time, a couple of interesting changes were detected:
The main features observed during the analysis of the banker are the following.
Keylogging: Through the abuse of the Android Accessibility Services, TeaBot is able to observe and track all the information performed by the user on the targeted applications. We observed similar behavior also in another banker called EventBot, but with the difference that EventBot tracks any apps while TeaBot tracks only targeted apps, therefore less traffic is generated between the banker and the C2. TeaBot, during its first communications with the C2, sends the list of installed apps to verify if the infected devices had one or more targeted apps already installed. When TeaBot found one of them, it downloads the specific payload to perform overlay attacks and starts tracking all the activity performed by the user on the targeted app. Those information are sent back to the assigned C2 every 10 seconds.
Screenshots: One of the particularities of TeaBot is the capability of taking screenshots to constantly monitor the screen of the compromised device. When the C2 sends the “start_client” command with an IP address and PORT, it starts requesting the images and TeaBot starts a loop in which creates a “VirtualScreen” for taking screenshots.
Overlay attack: “The Overlay attack is a well-known technique implemented on modern Android banking trojans (e.g. Anubis, Cerberus/Alien) which consist of a malicious application/user somehow able to perform actions on behalf of the victim. This usually takes the form of an imitation app or a WebView launched “on-top” of a legitimate application (such as a banking app).”
See Appendix 1 - Geographical distribution of banks currently targeted by TeaBot for an overview of targeted apps.
Other features: TeaBot has other features quite common to other known Android bankers such as:
When the malicious app has been downloaded on the device, it tries to be installed as an “Android Service”,which is an application component that can perform long-running operations in the background.
This feature is abused by TeaBot to silently hide itself from the user, once installed, preventing also detection and ensuring its persistence.
Furthermore, during the installation phases, TeaBot starts communicating with its C2 server in the background.
After the installation TeaBot will request the following Android permissions, which are mandatory to perform its malicious behavior:
Once the requested permissions have been accepted, the malicious application will remove its icon from the device.
During its first communications, TeaBot sends the list of installed apps to verify if the infected devices had one or more targeted apps already installed. When one or more targeted applications are found, the C2 sends the specific payloads to the device.
By analyzing TeaBot network communications, it was possible to group them into the following three main types:
The following table will summarize the list of all the commands found in TeaBot during the technical analysis: