General

  • Target

    96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4.bin

  • Size

    2.4MB

  • Sample

    240920-15dt3a1enj

  • MD5

    23ee0c3df1279fccd33bb0aa54f546bd

  • SHA1

    693783b6217ead1f8cc53020bed03a52cdee5f5f

  • SHA256

    96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4

  • SHA512

    9a958f05fa18e638a3c5e7e0c00b71631e3fae353fe1bfefd89c3f36b7ca5a4cf5effdb832aaacdd803e7d96c7e5245d81bdec91038de1b47908ae90737c3ebe

  • SSDEEP

    49152:3/yR071gsdHCansabGHGLSSw56SsF+8z4/qtK2NZjo2/Lj6XTfv:6R8iBwGHGO6SsFhz4yvA2aXTH

Malware Config

Targets

    • Target

      96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4.bin

    • Size

      2.4MB

    • MD5

      23ee0c3df1279fccd33bb0aa54f546bd

    • SHA1

      693783b6217ead1f8cc53020bed03a52cdee5f5f

    • SHA256

      96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4

    • SHA512

      9a958f05fa18e638a3c5e7e0c00b71631e3fae353fe1bfefd89c3f36b7ca5a4cf5effdb832aaacdd803e7d96c7e5245d81bdec91038de1b47908ae90737c3ebe

    • SSDEEP

      49152:3/yR071gsdHCansabGHGLSSw56SsF+8z4/qtK2NZjo2/Lj6XTfv:6R8iBwGHGO6SsFhz4yvA2aXTH

    • Chameleon

      Chameleon is an Android banking trojan first seen in 2023.

    • Chameleon payload

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.