Analysis
-
max time kernel
6s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
20/09/2024, 22:13
Static task
static1
Behavioral task
behavioral1
Sample
96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4.apk
Resource
android-x64-20240624-en
General
-
Target
96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4.apk
-
Size
2.4MB
-
MD5
23ee0c3df1279fccd33bb0aa54f546bd
-
SHA1
693783b6217ead1f8cc53020bed03a52cdee5f5f
-
SHA256
96c45da94f02cf836bc854f83eae5f475c51e07b5885a493f7b7180540c2dcc4
-
SHA512
9a958f05fa18e638a3c5e7e0c00b71631e3fae353fe1bfefd89c3f36b7ca5a4cf5effdb832aaacdd803e7d96c7e5245d81bdec91038de1b47908ae90737c3ebe
-
SSDEEP
49152:3/yR071gsdHCansabGHGLSSw56SsF+8z4/qtK2NZjo2/Lj6XTfv:6R8iBwGHGO6SsFhz4yvA2aXTH
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon payload 1 IoCs
resource yara_rule behavioral1/memory/4270-0.dex family_chameleon -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.ugly.sudden/app_DynamicOptDex/PPUQXKm.json 4270 com.ugly.sudden -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.ugly.sudden
Processes
-
com.ugly.sudden1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4270 -
sh2⤵PID:4307
-
/system/bin/sh /system/bin/pm list package -33⤵PID:4325
-
cmd package list package -34⤵PID:4341
-
-
-
-
sh2⤵PID:4363
-
cat /proc/self/cgroup3⤵PID:4380
-
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
553KB
MD5d77cfa13128e6db209754ef229f9d1ec
SHA15069dbaf53c4735aa71c467f6ee7a69fb090022b
SHA256442707009695d035dbaee83ed665755e1b1e6bb86257db8d4f4c54a1ba42cab2
SHA5120ac6623fd752c28564a708f32d6834473d4cc7a05a7027a430ba3ff723a0feec89b31314885ffa3e2fe510dcef79a2794b6dd0fdb7645d8650a35d722347ea8d
-
Filesize
553KB
MD5ad1bac89f28ea1401a9917424deb67ff
SHA1763db30645ac9206847e86de24f0f0f95c1d497f
SHA256b2aaf11df0584fa769339bbf1aad3c10c81f2ff494fb518e83eb7803f124cd6f
SHA5123ecd785db40340f3fa80e7947e8b48323b906f4e7e18b89dbe136b826f4b5ee407b4c31605cbd2ed40be0d4f9d87d537a4991786b8b960d30283cebcafffcf34
-
Filesize
1.4MB
MD5a4961e016c6bf056fc154384eab38c7e
SHA18413a75f98963fa716de416c2b155c2f3e8705d6
SHA2564f4f4e4ab45e9151aa1a6d00b916e1dac792a1461fe5d483f24507d8a0ff1c70
SHA512fe87478d3e13c4f4aec14510cc638913ecd87bc6d80ce113e4a338f17a52288acafc49065efd31b04c056f9beda96f2a0bd751fdd19f57353daccedc82686e84