General

  • Target

    75a756056a88c30795e3105218058faec4a3f015272fd2868df66e2dabf6e731.bin

  • Size

    2.0MB

  • Sample

    240310-1xz3bsda4z

  • MD5

    9e17282e29746194ad32680528fb22b3

  • SHA1

    5fe5af02b1cb63bdfc72cbb5c7bcedccbf946f99

  • SHA256

    75a756056a88c30795e3105218058faec4a3f015272fd2868df66e2dabf6e731

  • SHA512

    401a1a9d4d14a650a32adefef78e1f5fde3048d763363cc38e7f8905c5c85b4fa41a2c30f1c91c5795bb6d0fb72fb2527fcb2eca73032c4ed678cb69182bed8a

  • SSDEEP

    49152:Z1kMwb9WM6gGl3SfYec9GFwRWGL8172jYesNKepSLTy/1K:U9WowhLLkoYe2Og1K

Malware Config

Extracted

Family

eventbot

C2

http://ora.blindsidefantasy.com/gate_cb8a5aea1ab302f0_c

http://rxc.rxcoordinator.com/gate_cb8a5aea1ab302f0_c

AES_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key
RC4_key

Targets

    • Target

      75a756056a88c30795e3105218058faec4a3f015272fd2868df66e2dabf6e731.bin

    • Size

      2.0MB

    • MD5

      9e17282e29746194ad32680528fb22b3

    • SHA1

      5fe5af02b1cb63bdfc72cbb5c7bcedccbf946f99

    • SHA256

      75a756056a88c30795e3105218058faec4a3f015272fd2868df66e2dabf6e731

    • SHA512

      401a1a9d4d14a650a32adefef78e1f5fde3048d763363cc38e7f8905c5c85b4fa41a2c30f1c91c5795bb6d0fb72fb2527fcb2eca73032c4ed678cb69182bed8a

    • SSDEEP

      49152:Z1kMwb9WM6gGl3SfYec9GFwRWGL8172jYesNKepSLTy/1K:U9WowhLLkoYe2Og1K

    • EventBot

      A new Android banking trojan started to appear in March 2020.

    • Makes use of the framework's Accessibility service

      Retrieves information displayed on the phone screen using AccessibilityService.

    • Queries a list of all the installed applications on the device (Might be used in an attempt to overlay legitimate apps)

    • Removes its main activity from the application launcher

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Acquires the wake lock

    • Requests disabling of battery optimizations (often used to enable hiding in the background).

MITRE ATT&CK Mobile v15

Tasks