General
-
Target
7107AC3BCCD8DB274B21F0E494E3ECCC
-
Size
1.9MB
-
Sample
220603-hkg2waccg5
-
MD5
7107ac3bccd8db274b21f0e494e3eccc
-
SHA1
cae09a665075ce3f36347ffbb2ab3143d8183f67
-
SHA256
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5
-
SHA512
473fd5e2334d4433ac3a27d395b4952c576e140d956cf16d1ca49e712bd47fec908962179f8ec4cf3ebdeb4e8d3f0432e0a37101967e6601e6ea5b0565002b2e
Static task
static1
Behavioral task
behavioral1
Sample
7107AC3BCCD8DB274B21F0E494E3ECCC.apk
Resource
android-x86-arm-20220310-en
Behavioral task
behavioral2
Sample
7107AC3BCCD8DB274B21F0E494E3ECCC.apk
Resource
android-x64-20220310-en
Behavioral task
behavioral3
Sample
7107AC3BCCD8DB274B21F0E494E3ECCC.apk
Resource
android-x64-arm64-20220310-en
Malware Config
Extracted
eventbot
http://ora.studiolegalebasili.com/gate_cb8a5aea1ab302f0_c
http://ora.carlaarrabitoarchitetto.com/gate_cb8a5aea1ab302f0_c
Targets
-
-
Target
7107AC3BCCD8DB274B21F0E494E3ECCC
-
Size
1.9MB
-
MD5
7107ac3bccd8db274b21f0e494e3eccc
-
SHA1
cae09a665075ce3f36347ffbb2ab3143d8183f67
-
SHA256
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5
-
SHA512
473fd5e2334d4433ac3a27d395b4952c576e140d956cf16d1ca49e712bd47fec908962179f8ec4cf3ebdeb4e8d3f0432e0a37101967e6601e6ea5b0565002b2e
Score10/10-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-