General

  • Target

    c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4.apk

  • Size

    1.4MB

  • Sample

    210702-p7jxm32whx

  • MD5

    180c10cdcc909322766ea126e7cb15c5

  • SHA1

    3490e515fafd3a22fc296fa888518715a8ac6cfc

  • SHA256

    c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4

  • SHA512

    4a57c2b6f2e3aa83d894edc3f35029bf70db63b429bdb88f3ab6005ce2fcda90c7757c79cf1dc7c8feb4bf37feb23ec36ddccbfa1626b6bd0dc7f85123aa3d6f

Malware Config

Targets

    • Target

      c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4.apk

    • Size

      1.4MB

    • MD5

      180c10cdcc909322766ea126e7cb15c5

    • SHA1

      3490e515fafd3a22fc296fa888518715a8ac6cfc

    • SHA256

      c777e9bfd72dc259c5dc3877acbcc5eba1d45f39c76c4175d4a62606f69f06f4

    • SHA512

      4a57c2b6f2e3aa83d894edc3f35029bf70db63b429bdb88f3ab6005ce2fcda90c7757c79cf1dc7c8feb4bf37feb23ec36ddccbfa1626b6bd0dc7f85123aa3d6f

    • EventBot

      A new Android banking trojan started to appear in March 2020.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Requests enabling of the accessibility settings.

    • Uses Crypto APIs (Might try to encrypt user data).

MITRE ATT&CK Matrix

Tasks