General

  • Target

    0a6ffd4163cd96d7d262be5ae7fa5cfc3affbea822d122c0803379d78431e5f6

  • Size

    4.0MB

  • Sample

    231228-h6n3bafed3

  • MD5

    e51a38f4f028ec5fb2d6c73d5e2c65bd

  • SHA1

    a8a02aeff92389e57b6d6065e49350b405b62498

  • SHA256

    0a6ffd4163cd96d7d262be5ae7fa5cfc3affbea822d122c0803379d78431e5f6

  • SHA512

    49a16b180a9c78c677faee42a9ac7d854fa48303c7f19b99225b0f31ae58d7648366f61427d9b9c98394be430e6b95589b0edd51357c0f312b6d1af7aa517fc7

  • SSDEEP

    98304:6VOoTN2iE/INh5QPKrURLD9i5WuUkILmMoCIxQ:6Vd2qPQPKrUtZi5Wu3DQ

Malware Config

Targets

    • Target

      0a6ffd4163cd96d7d262be5ae7fa5cfc3affbea822d122c0803379d78431e5f6

    • Size

      4.0MB

    • MD5

      e51a38f4f028ec5fb2d6c73d5e2c65bd

    • SHA1

      a8a02aeff92389e57b6d6065e49350b405b62498

    • SHA256

      0a6ffd4163cd96d7d262be5ae7fa5cfc3affbea822d122c0803379d78431e5f6

    • SHA512

      49a16b180a9c78c677faee42a9ac7d854fa48303c7f19b99225b0f31ae58d7648366f61427d9b9c98394be430e6b95589b0edd51357c0f312b6d1af7aa517fc7

    • SSDEEP

      98304:6VOoTN2iE/INh5QPKrURLD9i5WuUkILmMoCIxQ:6Vd2qPQPKrUtZi5Wu3DQ

    • Chameleon

      Chameleon is an Android banking trojan first seen in 2023.

    • Chameleon payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Matrix

Tasks