Analysis
-
max time kernel
3616561s -
max time network
161s -
platform
android_x64 -
resource
android-x64 -
submitted
08-02-2022 00:49
Static task
static1
Behavioral task
behavioral1
Sample
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5.apk
Resource
android-x86-arm
Behavioral task
behavioral2
Sample
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5.apk
Resource
android-x64
Behavioral task
behavioral3
Sample
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5.apk
Resource
android-x64-arm64
General
-
Target
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5.apk
-
Size
1.9MB
-
MD5
7107ac3bccd8db274b21f0e494e3eccc
-
SHA1
cae09a665075ce3f36347ffbb2ab3143d8183f67
-
SHA256
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5
-
SHA512
473fd5e2334d4433ac3a27d395b4952c576e140d956cf16d1ca49e712bd47fec908962179f8ec4cf3ebdeb4e8d3f0432e0a37101967e6601e6ea5b0565002b2e
Malware Config
Extracted
eventbot
http://ora.studiolegalebasili.com/gate_cb8a5aea1ab302f0_c
http://ora.carlaarrabitoarchitetto.com/gate_cb8a5aea1ab302f0_c
Signatures
-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.example.eventbotioc pid process /data/user/0/com.example.eventbot/app_dex/b919a5be5ff073e0c77b1a5be1d964a9.jar 3802 com.example.eventbot -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
Processes:
com.example.eventbotdescription ioc process Framework API call javax.crypto.Cipher.doFinal com.example.eventbot
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4cfa48242962f332b1b3f94073210213
SHA1f8672c1e699b460bcaf1a7f7dc9165a8af92284d
SHA256e4f86dd8ce933d454d95b373fe0362b58704207517b1aa0663391819150de9d7
SHA512965e6ba1ba3d748fd4b1e635e25248c5fa2fb0261e50d6a7e9fc84da0f1286ae01bdf134c301f6be58459854d23f8cd77c115ea80c6280dc96f0d7d4e31452bd