General
-
Target
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e.bin
-
Size
1.4MB
-
Sample
240310-1ydkqada5y
-
MD5
21f63238577555202aaad90647234a86
-
SHA1
e5c0ee15815aaa3f2dac7a1bfb6984aafd9b32a5
-
SHA256
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e
-
SHA512
231f8158b2bda73dad2a033e3f6529e9099236df112d910564430844f0aff3b18a57e6bbcc755aa26b3828dd5c4d798166d4be5af92a88b1c5cffd17668c0972
-
SSDEEP
24576:+a4M3ONYud7NBKuPh+d0g1H54uc8LWNKe3MxJWr:+43ONZdhBKuPh+V4r8LWNKec/Wr
Static task
static1
Behavioral task
behavioral1
Sample
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
eventbot
http://pub.welcometothepub.com/gate_cb8a5aea1ab302f0_c
http://marta.martatovaglieri.it/gate_cb8a5aea1ab302f0_c
Targets
-
-
Target
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e.bin
-
Size
1.4MB
-
MD5
21f63238577555202aaad90647234a86
-
SHA1
e5c0ee15815aaa3f2dac7a1bfb6984aafd9b32a5
-
SHA256
a9095464cc5d20fec37460dabfe2d2d0adad00d5314376b9192a6a6d295aed6e
-
SHA512
231f8158b2bda73dad2a033e3f6529e9099236df112d910564430844f0aff3b18a57e6bbcc755aa26b3828dd5c4d798166d4be5af92a88b1c5cffd17668c0972
-
SSDEEP
24576:+a4M3ONYud7NBKuPh+d0g1H54uc8LWNKe3MxJWr:+43ONZdhBKuPh+V4r8LWNKec/Wr
-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-