General
-
Target
7107AC3BCCD8DB274B21F0E494E3ECCC
-
Size
1.9MB
-
Sample
240517-w2zvxacf99
-
MD5
7107ac3bccd8db274b21f0e494e3eccc
-
SHA1
cae09a665075ce3f36347ffbb2ab3143d8183f67
-
SHA256
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5
-
SHA512
473fd5e2334d4433ac3a27d395b4952c576e140d956cf16d1ca49e712bd47fec908962179f8ec4cf3ebdeb4e8d3f0432e0a37101967e6601e6ea5b0565002b2e
-
SSDEEP
49152:T3O1oHbo+XLhW6Wk3/rhYIdh3GhUpeBVe:rBH9L0Dk3/3r3aVe
Static task
static1
Behavioral task
behavioral1
Sample
7107AC3BCCD8DB274B21F0E494E3ECCC.apk
Resource
android-x86-arm-20240514-en
Behavioral task
behavioral2
Sample
7107AC3BCCD8DB274B21F0E494E3ECCC.apk
Resource
android-x64-20240514-en
Behavioral task
behavioral3
Sample
7107AC3BCCD8DB274B21F0E494E3ECCC.apk
Resource
android-x64-arm64-20240514-en
Malware Config
Extracted
eventbot
http://ora.studiolegalebasili.com/gate_cb8a5aea1ab302f0_c
http://ora.carlaarrabitoarchitetto.com/gate_cb8a5aea1ab302f0_c
Targets
-
-
Target
7107AC3BCCD8DB274B21F0E494E3ECCC
-
Size
1.9MB
-
MD5
7107ac3bccd8db274b21f0e494e3eccc
-
SHA1
cae09a665075ce3f36347ffbb2ab3143d8183f67
-
SHA256
1a8c17ad1a790554278b055bdb946d4597ba9af6be3611ee6311b90c7f7848c5
-
SHA512
473fd5e2334d4433ac3a27d395b4952c576e140d956cf16d1ca49e712bd47fec908962179f8ec4cf3ebdeb4e8d3f0432e0a37101967e6601e6ea5b0565002b2e
-
SSDEEP
49152:T3O1oHbo+XLhW6Wk3/rhYIdh3GhUpeBVe:rBH9L0Dk3/3r3aVe
-
EventBot
A new Android banking trojan started to appear in March 2020.
-
Makes use of the framework's Accessibility service
Retrieves information displayed on the phone screen using AccessibilityService.
-
Acquires the wake lock
-
Requests disabling of battery optimizations (often used to enable hiding in the background).
-