Analysis
-
max time kernel
3055339s -
max time network
155s -
platform
android_x64 -
resource
android-x64-arm64-20231023-en -
resource tags
androidarch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20231023-enlocale:en-usos:android-11-x64system -
submitted
09/11/2023, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20231023-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20231020-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20231023-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20231023-en
General
-
Target
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424.apk
-
Size
3.5MB
-
MD5
9f771ac4f03f2673ae781a009b25ced9
-
SHA1
eadd3bb1b87aacf4d22163d559f586e7d51a6332
-
SHA256
b7567acfb4f845e12622f0c7979b6e7c7d7d77f340cfd46cdb75f57955ef7424
-
SHA512
1c3aaed643650da5faa845d6ff66f914c9eb6a93fd88d6d769e1a57424acfc1b74aab58b98a21e11720a806892ae10dc97ca9e25ba7c4c6f2ae393e7d9d1af25
-
SSDEEP
49152:7sgpbH6NuS7QKWPZXmpKyPa60eNfNXat9qWBY1nZQ4RMDRMqbwGXIgp4RRLjr:7sgpEuS7QK8WQwNXaRW1r6RMqbwmTanr
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon payload 1 IoCs
resource yara_rule behavioral3/memory/4543-0.dex family_chameleon -
Loads dropped Dex/Jar 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ball.glad/app_DynamicOptDex/oaH.json 4543 com.ball.glad -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ball.glad
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
731KB
MD5dfa885a97428812005f45046c7ef45b5
SHA1aa4df035597b7cd48117f0e1ad4e5327fdf495f9
SHA25625cb8293171f71f4047ae388465d3d31fd4c79e6724c689dbdb745de5210d3ad
SHA5122a6d5d85486a19343ca6a83aa2af982737d5d850a5f0bd77714209a01c240745a2e4eeb95b897d0d8ccb223dbceee301c9aa990b7a181037b4c7f531a2e5243e
-
Filesize
731KB
MD53cc0f87015d46cbec3ae567db08373a0
SHA1eef7ff8aaaf58c8933bdcded1af8d6003db2b208
SHA256b8cee7746c9a070c2a69283f6f94a854849b78856b2ffc6118e2e9bbe0bcd2b0
SHA51283511e78b24a91dc63b41f095bd89b5b34da151bfe6f766580f1f709f0a1fff928505a0da4d3a9c8054aeacfcdcaa807894417fef622dcec945d1370ba0472d2
-
Filesize
1.7MB
MD5f02d21ec44cb02989fc24a43a20a00dd
SHA19039fb7d52798d12f83eb25adcbb3ac9d3f46314
SHA2562b9b3d87b690ba78eb18715f79146d31f42cf1ca1641491485d2798e4c8cc49b
SHA5126bfacdcf8e7eb1879decc4af07c7c651167e93a876e56edce54480ecac2a803d2c0a6a7449a94c542e1246dc0f5ff337433067a348965907170427efc7059fe7