General
-
Target
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f.bin
-
Size
1.9MB
-
Sample
240310-1x2k6acf69
-
MD5
80d426880968cade90828ae497b4cdae
-
SHA1
bab63ad1ea54291271fa9a0282802835ba3de4c7
-
SHA256
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f
-
SHA512
77aaed3a111b362d78daabbd5a3ed91f170fac339f15e8051247cd0d2629445d325babff72a982311cb1c0156d4c93170368dea2d6a3f95c792ae87bfa13544c
-
SSDEEP
24576:edagJDHJS5jM/TDGDx5afGG4ILKLvbsfiHgc6QUxishoe8gHYNUNJPMwB9QkFy:ei5uDzh1LyvIfiHgc+ozgHYNUNJUsql
Static task
static1
Behavioral task
behavioral1
Sample
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
eventbot
http://ora.studiolegalebasili.com/gate_cb8a5aea1ab302f0_c
http://ora.carlaarrabitoarchitetto.com/gate_cb8a5aea1ab302f0_c
Targets
-
-
Target
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f.bin
-
Size
1.9MB
-
MD5
80d426880968cade90828ae497b4cdae
-
SHA1
bab63ad1ea54291271fa9a0282802835ba3de4c7
-
SHA256
8c1fdb973840991f060152044dce5de36e24b60637c4b632b10eab2a4c70ec8f
-
SHA512
77aaed3a111b362d78daabbd5a3ed91f170fac339f15e8051247cd0d2629445d325babff72a982311cb1c0156d4c93170368dea2d6a3f95c792ae87bfa13544c
-
SSDEEP
24576:edagJDHJS5jM/TDGDx5afGG4ILKLvbsfiHgc6QUxishoe8gHYNUNJPMwB9QkFy:ei5uDzh1LyvIfiHgc+ozgHYNUNJUsql
-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-