Analysis
-
max time kernel
3055829s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20231023-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20231023-enlocale:en-usos:android-9-x86system -
submitted
09/11/2023, 22:04
Static task
static1
Behavioral task
behavioral1
Sample
1b72da2cc6dfbd3360322fb265ea69b0716b679a13ef3d769b35a5dff628835d.apk
Resource
android-x86-arm-20231023-en
Behavioral task
behavioral2
Sample
1b72da2cc6dfbd3360322fb265ea69b0716b679a13ef3d769b35a5dff628835d.apk
Resource
android-x64-20231023.1-en
Behavioral task
behavioral3
Sample
1b72da2cc6dfbd3360322fb265ea69b0716b679a13ef3d769b35a5dff628835d.apk
Resource
android-x64-arm64-20231023-en
Behavioral task
behavioral4
Sample
HM_JsBridge.js
Resource
win7-20231025-en
Behavioral task
behavioral5
Sample
HM_JsBridge.js
Resource
win10v2004-20231023-en
Behavioral task
behavioral6
Sample
consentform.html
Resource
win7-20231025-en
Behavioral task
behavioral7
Sample
consentform.html
Resource
win10v2004-20231023-en
General
-
Target
1b72da2cc6dfbd3360322fb265ea69b0716b679a13ef3d769b35a5dff628835d.apk
-
Size
3.9MB
-
MD5
085e14bebb5cc8a11ea92c4ead4180f9
-
SHA1
d884ea202301c4816a60b50290ddb70d45739149
-
SHA256
1b72da2cc6dfbd3360322fb265ea69b0716b679a13ef3d769b35a5dff628835d
-
SHA512
c40a1aaf5170215056a5f4996bcb40e4a324672c03071af58acd5489a1a34a5f65b0b4400640d0571c2ef5f9e2894ee3f5ed430845bc99a763d231ee8bf6bd54
-
SSDEEP
98304:nyI2ZBRenSfQYwTe4N1/OPDZU4vcsVQF1ciM0HtkHq:RoeQQN95OLJks21qK
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon payload 2 IoCs
resource yara_rule behavioral1/memory/4328-0.dex family_chameleon behavioral1/memory/4276-0.dex family_chameleon -
Loads dropped Dex/Jar 2 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.roof.poverty/app_DynamicOptDex/bb.json 4328 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.roof.poverty/app_DynamicOptDex/bb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.roof.poverty/app_DynamicOptDex/oat/x86/bb.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.roof.poverty/app_DynamicOptDex/bb.json 4276 com.roof.poverty -
Uses Crypto APIs (Might try to encrypt user data). 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.roof.poverty
Processes
-
com.roof.poverty1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data).
PID:4276 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.roof.poverty/app_DynamicOptDex/bb.json --output-vdex-fd=41 --oat-fd=42 --oat-location=/data/user/0/com.roof.poverty/app_DynamicOptDex/oat/x86/bb.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4328
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
773KB
MD5e69a862b32549837acedd03dfb7eeeff
SHA1591a1e924c9f809184f1e7a1afdbbd3b3e620324
SHA256b35da60b6db0427a4dd60685b927fecefc684fcc46b065a83298b588cb8543e5
SHA5125f03d5cfa485890ebd94844a1e94084176848ecbbf7f3e81934f05327f8f72608a34992daff2de7e8191c8a37ab32b850848490e1fdf65daf4000ef1b5d5baa5
-
Filesize
773KB
MD554bddfd9c3a1d7121660bb1a52e3c963
SHA16131f4cf193ea15a1d74d2e3844e0cfbe20c0882
SHA256c55225d582f45d10121cc68fe4642c4e8480aa94062bc05a12eb2899a61018de
SHA512edc98efb0776239abaffe745b66cd8c88288a06d65f81e461c028e99970b17974fa56f321624bb443c79db4a89adb772b82ac38fcc9568ef0da4b2d6c2f85531
-
Filesize
4KB
MD5f2b4b0190b9f384ca885f0c8c9b14700
SHA1934ff2646757b5b6e7f20f6a0aa76c7f995d9361
SHA2560a8ffb6b327963558716e87db8946016d143e39f895fa1b43e95ba7032ce2514
SHA512ec12685fc0d60526eed4d38820aad95611f3e93ae372be5a57142d8e8a1ba17e6e5dfe381a4e1365dddc0b363c9c40daaffdc1245bd515fddac69bf1abacd7f1
-
Filesize
512B
MD575ee211428d7ccb7e0046a665ddbe0ad
SHA1099713cdd4cf0621dd54e322dc84f38557e246e0
SHA256bdc1ea6f659952b7e4daf9408474b7a3ca322ab0415ea07f92687df96c6960e6
SHA512216b4b90afc6073d03a4d4deb1a58bbf92be3bc0d9bc0f4dc93789365801aec40b446e482b0d928d2ca677581fc3623844f8983785cd35912913e535eeff8d89
-
Filesize
28KB
MD5cf845a781c107ec1346e849c9dd1b7e8
SHA1b44ccc7f7d519352422e59ee8b0bdbac881768a7
SHA25618619b678a5c207a971a0aa931604f48162e307c57ecdec450d5f095fe9f32c7
SHA5124802861ea06dc7fb85229a3c8f04e707a084f1ba516510c6f269821b33c8ee4ebf495258fe5bee4850668a5aac1a45f0edf51580da13b7ee160a29d067c67612
-
Filesize
72KB
MD53e43b77efb9364e2980c4668ffcf4401
SHA1ed7a6093dbbd4fe83b5c30e55746bc009a0c33ab
SHA256da1ec7eb6c08b0b8f9a5a3dea328b774f8a7a2216e3228b91a29324b6bc5e920
SHA5127d53a4f0cd8f4f6a6372ce85a73c8f7b44e1a305137c1350730200c2d4ddff902fc1cf3756855545b6cd2df2a1a00a29726c76e5ed90ac54c831910825393562
-
Filesize
2.0MB
MD57a51da6784a6390b8e9ef09e8d44eab4
SHA1812fb174c7e4f44971a2f8eacc2105bfe6dddc88
SHA256dfb792bec42c4e29dc2016ef1c635f87ddbe764c501b2551183ba71833714107
SHA51250da27d751f2a90d6d677fd035f934aa051ae2eab0514c6fbe3c9b604c530f6e2b5b3e504f336c704fccd4869d076563953e884b6669f78410d2445aa9638cbb
-
Filesize
2.0MB
MD58e67b4190ca20b20c83dea0966ffd42e
SHA16fa48806b4447ab3206756b52911d6004a82c602
SHA256b0959856ebc2c93888d1c712f32342ad1c6ffd7dd97597507a2ce9bdfd578ade
SHA512b94f318a697069864098f91f30af5b71057b0f383e5b49f25be3587334cb1f8309d05a471593887b728a9693ef3c4bbece7326ddff248e3f5f306f19e0451e1c