Analysis
-
max time kernel
3055343s -
max time network
146s -
platform
android_x86 -
resource
android-x86-arm-20231023-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231023-enlocale:en-usos:android-9-x86system -
submitted
09/11/2023, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20231023-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20231023-en
General
-
Target
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
-
Size
3.5MB
-
MD5
9f771ac4f03f2673ae781a009b25ced9
-
SHA1
eadd3bb1b87aacf4d22163d559f586e7d51a6332
-
SHA256
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424
-
SHA512
1c3aaed643650da5faa845d6ff66f914c9eb6a93fd88d6d769e1a57424acfc1b74aab58b98a21e11720a806892ae10dc97ca9e25ba7c4c6f2ae393e7d9d1af25
-
SSDEEP
49152:7sgpbH6NuS7QKWPZXmpKyPa60eNfNXat9qWBY1nZQ4RMDRMqbwGXIgp4RRLjr:7sgpEuS7QK8WQwNXaRW1r6RMqbwmTanr
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon payload 2 IoCs
resource yara_rule behavioral1/memory/4357-0.dex family_chameleon behavioral1/memory/4298-0.dex family_chameleon -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ball.glad/app_DynamicOptDex/oaH.json 4357 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ball.glad/app_DynamicOptDex/oaH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ball.glad/app_DynamicOptDex/oat/x86/oaH.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ball.glad/app_DynamicOptDex/oaH.json 4298 com.ball.glad -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ball.glad
Processes
-
com.ball.glad1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data).
PID:4298 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ball.glad/app_DynamicOptDex/oaH.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.ball.glad/app_DynamicOptDex/oat/x86/oaH.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4357
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD5dfa885a97428812005f45046c7ef45b5
SHA1aa4df035597b7cd48117f0e1ad4e5327fdf495f9
SHA25625cb8293171f71f4047ae388465d3d31fd4c79e6724c689dbdb745de5210d3ad
SHA5122a6d5d85486a19343ca6a83aa2af982737d5d850a5f0bd77714209a01c240745a2e4eeb95b897d0d8ccb223dbceee301c9aa990b7a181037b4c7f531a2e5243e
-
Filesize
731KB
MD53cc0f87015d46cbec3ae567db08373a0
SHA1eef7ff8aaaf58c8933bdcded1af8d6003db2b208
SHA256b8cee7746c9a070c2a69283f6f94a854849b78856b2ffc6118e2e9bbe0bcd2b0
SHA51283511e78b24a91dc63b41f095bd89b5b34da151bfe6f766580f1f709f0a1fff928505a0da4d3a9c8054aeacfcdcaa807894417fef622dcec945d1370ba0472d2
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD5ba20e8d0589c6d2868a16fdd1357737d
SHA1c2ee3dd4ab4eecef3ba0828f37b720cd2dcf6085
SHA256b4afbda9fd62ec52efc583b8b3731d77b17595c2e91356557113d501d9cfc14b
SHA512d7b166fa898fb65527134d9be78197ddb63ab8aa6cbc1f7feff18c227d605a10740a0580e5ebd2bae3c02aefa3ab690620a87223b6c181ebab3729cde9ca69b5
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
72KB
MD55f7cc56ce074e80d6d858a965a29788f
SHA12adb6d0c8d49de5e406dba393ba098199b482016
SHA256de2036295beb9f7f3a20c6a9145bbb17a68b654f75d5651cefcecd1e5e2a8cd5
SHA5125e6145f5a2c56d638f371daace737bcb246646b491cf51c1ea2f7348454bdc6cb14418fad80e10e9e8e99dbbad0849a49d999425c80f1df306a47495c76ff2ba
-
Filesize
1.7MB
MD5e18c6385ed6b814137eb79b6e61b2213
SHA1028a3829b6ae49ca37cf3b1ef25f7da9c75b624b
SHA256dd9b7d785694cc5c2d134ebe308497f36b36c13aa812443ec4c8acc25a8b6731
SHA512f4e516ab2220a37721458a9005e338d49e7e912b96854445f13a23df5caa19534839d2285ddf4cfe177ca13907e8a33a96a48de61aab7671a49516e60e0877a8
-
Filesize
1.7MB
MD5f02d21ec44cb02989fc24a43a20a00dd
SHA19039fb7d52798d12f83eb25adcbb3ac9d3f46314
SHA2562b9b3d87b690ba78eb18715f79146d31f42cf1ca1641491485d2798e4c8cc49b
SHA5126bfacdcf8e7eb1879decc4af07c7c651167e93a876e56edce54480ecac2a803d2c0a6a7449a94c542e1246dc0f5ff337433067a348965907170427efc7059fe7