General
-
Target
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f.bin
-
Size
1.4MB
-
Sample
240310-1yessada5z
-
MD5
4ccca48528ea0ac71efeef95391b52f3
-
SHA1
895726b8ac21bca5ad6b89167c1ef8c0722c1e3a
-
SHA256
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f
-
SHA512
3de956e48ae96131737724b5290470c81250a763b0182d9abb0538525388d32f0ebf66ae2c60f765d6392ad2188c29f882d906bc8fab3c4033203740fbd270dd
-
SSDEEP
24576:ATA/XMHBU+cPWcT2in3861wL/UPhw3/6bpQJLX/yM13NKe3Mxd8:Ak/MHBHcPI+86GT6G3/nXaM13NKec38
Static task
static1
Behavioral task
behavioral1
Sample
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f.apk
Resource
android-x86-arm-20240221-en
Behavioral task
behavioral2
Sample
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f.apk
Resource
android-x64-20240221-en
Behavioral task
behavioral3
Sample
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f.apk
Resource
android-x64-arm64-20240221-en
Malware Config
Extracted
eventbot
http://pub.welcometothepub.com/gate_cb8a5aea1ab302f0_c
http://marta.martatovaglieri.it/gate_cb8a5aea1ab302f0_c
Targets
-
-
Target
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f.bin
-
Size
1.4MB
-
MD5
4ccca48528ea0ac71efeef95391b52f3
-
SHA1
895726b8ac21bca5ad6b89167c1ef8c0722c1e3a
-
SHA256
8fcb9f0174535f8e8aba33560a2758f8d75b689a203aeb5948e7fbf588535e1f
-
SHA512
3de956e48ae96131737724b5290470c81250a763b0182d9abb0538525388d32f0ebf66ae2c60f765d6392ad2188c29f882d906bc8fab3c4033203740fbd270dd
-
SSDEEP
24576:ATA/XMHBU+cPWcT2in3861wL/UPhw3/6bpQJLX/yM13NKe3Mxd8:Ak/MHBHcPI+86GT6G3/nXaM13NKec38
-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-