Description
A new Android banking trojan started to appear in March 2020.
8ee97d5fd2aab608e056a5b3ce9a6a4ab006a7e1b8ace404078d9672a9046443
1MB
220521-xc25eaegdm
8a996f4b434a6e7218c3ce2ae71dfd89
33e411b8695874a91d6aa73f3b529542ea867cf6
8ee97d5fd2aab608e056a5b3ce9a6a4ab006a7e1b8ace404078d9672a9046443
764c12d32e39ec82199da0d8c8819e0fb8ca40049d31b28432c7c1ca2f20d859801979ebb5b484ce5e1d7db1399d23003a29c99cc7eec48b1dba4cd436e4a14e
Family | eventbot |
C2 |
http://sigasrl.fun/index http://sigasrl.online/index |
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
RC4_key |
|
8ee97d5fd2aab608e056a5b3ce9a6a4ab006a7e1b8ace404078d9672a9046443
8a996f4b434a6e7218c3ce2ae71dfd89
1MB
33e411b8695874a91d6aa73f3b529542ea867cf6
8ee97d5fd2aab608e056a5b3ce9a6a4ab006a7e1b8ace404078d9672a9046443
764c12d32e39ec82199da0d8c8819e0fb8ca40049d31b28432c7c1ca2f20d859801979ebb5b484ce5e1d7db1399d23003a29c99cc7eec48b1dba4cd436e4a14e
A new Android banking trojan started to appear in March 2020.
Runs executable file dropped to the device during analysis.