General
-
Target
7F5D728119951839B46895808107B281
-
Size
1.9MB
-
Sample
220627-m88lysceg5
-
MD5
7f5d728119951839b46895808107b281
-
SHA1
137219a5de551d2594899c3d208cdf9d1dbc43ab
-
SHA256
7b1ac3a8caa556c9208d4db62395cca2f8a53420e5d51a1537bc45622e41b63f
-
SHA512
20eb55e3fa949ec483bc7159ae0cfc7b7a6386771191f75e928be95607ba02aca40c03f5174981ae8911e7ebc057a84c64abbad6cb1cbf8ffd8c9d178ea8e7c8
Static task
static1
Behavioral task
behavioral1
Sample
7F5D728119951839B46895808107B281.apk
Resource
android-x86-arm-20220621-en
Behavioral task
behavioral2
Sample
7F5D728119951839B46895808107B281.apk
Resource
android-x64-20220621-en
Behavioral task
behavioral3
Sample
7F5D728119951839B46895808107B281.apk
Resource
android-x64-arm64-20220621-en
Malware Config
Extracted
eventbot
http://ora.studiolegalebasili.com/gate_cb8a5aea1ab302f0_c
http://ora.carlaarrabitoarchitetto.com/gate_cb8a5aea1ab302f0_c
Targets
-
-
Target
7F5D728119951839B46895808107B281
-
Size
1.9MB
-
MD5
7f5d728119951839b46895808107b281
-
SHA1
137219a5de551d2594899c3d208cdf9d1dbc43ab
-
SHA256
7b1ac3a8caa556c9208d4db62395cca2f8a53420e5d51a1537bc45622e41b63f
-
SHA512
20eb55e3fa949ec483bc7159ae0cfc7b7a6386771191f75e928be95607ba02aca40c03f5174981ae8911e7ebc057a84c64abbad6cb1cbf8ffd8c9d178ea8e7c8
Score10/10-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Makes use of the framework's Accessibility service.
-
Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps).
-
Acquires the wake lock.
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-
Uses Crypto APIs (Might try to encrypt user data).
-