General
-
Target
c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4.apk
-
Size
1.4MB
-
Sample
210702-p7jxm32whx
-
MD5
180c10cdcc909322766ea126e7cb15c5
-
SHA1
3490e515fafd3a22fc296fa888518715a8ac6cfc
-
SHA256
c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4
-
SHA512
4a57c2b6f2e3aa83d894edc3f35029bf70db63b429bdb88f3ab6005ce2fcda90c7757c79cf1dc7c8feb4bf37feb23ec36ddccbfa1626b6bd0dc7f85123aa3d6f
Static task
static1
Behavioral task
behavioral1
Sample
c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4.apk
Resource
android-x86-arm
Malware Config
Targets
-
-
Target
c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4.apk
-
Size
1.4MB
-
MD5
180c10cdcc909322766ea126e7cb15c5
-
SHA1
3490e515fafd3a22fc296fa888518715a8ac6cfc
-
SHA256
c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4
-
SHA512
4a57c2b6f2e3aa83d894edc3f35029bf70db63b429bdb88f3ab6005ce2fcda90c7757c79cf1dc7c8feb4bf37feb23ec36ddccbfa1626b6bd0dc7f85123aa3d6f
-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Requests enabling of the accessibility settings.
-
Uses Crypto APIs (Might try to encrypt user data).
-