Resubmissions

03/10/2024, 18:28

241003-w4p4gszepl 10

27/09/2024, 19:23

240927-x3snnavfmk 10

General

  • Target

    Employee CRM.apk

  • Size

    3.0MB

  • Sample

    241003-w4p4gszepl

  • MD5

    2c675f9f2b5176983f3f514ef599aca5

  • SHA1

    2f75fa94b89417f8f8b32de3f7e784b9465e3cc4

  • SHA256

    b8ea74902684dcced62a5ca2c1d6932659decfefcbdb2615bfe5899e05eb1451

  • SHA512

    9ec7fc6462332e439e1435542520aaebab3e786b6b2de8e0a98864c428a73cf0cb8c490ea0b1113c0493c8029f9fcfbd940f2f310bf107553f81732541086f81

  • SSDEEP

    98304:l8ACxpNV/QSf6o7pmQ5GLSGRR/NzSQBa2k+/+m:l8ACb/Iop5GRhra2fb

Malware Config

Targets

    • Target

      Employee CRM.apk

    • Size

      3.0MB

    • MD5

      2c675f9f2b5176983f3f514ef599aca5

    • SHA1

      2f75fa94b89417f8f8b32de3f7e784b9465e3cc4

    • SHA256

      b8ea74902684dcced62a5ca2c1d6932659decfefcbdb2615bfe5899e05eb1451

    • SHA512

      9ec7fc6462332e439e1435542520aaebab3e786b6b2de8e0a98864c428a73cf0cb8c490ea0b1113c0493c8029f9fcfbd940f2f310bf107553f81732541086f81

    • SSDEEP

      98304:l8ACxpNV/QSf6o7pmQ5GLSGRR/NzSQBa2k+/+m:l8ACb/Iop5GRhra2fb

    • Queries the mobile country code (MCC)

    • Target

      xecvbzvspk.apk

    • Size

      3.7MB

    • MD5

      36906c0fbc3a4b2044b1efc75071c567

    • SHA1

      78219736bf46b4fd3535b914f928e408b34c3911

    • SHA256

      ddd40c0a5813b8e9bb72e004bc10799ec10068e909713c6542e88ef95100ab9c

    • SHA512

      80fdb89d7a0aaeefc9ee4d615dd4263f7d830902296850ff5b12fb87e53d486a317634734023349da018e1b6f4b35bb35cc6306eeca333b5fe3d9dc01add6fa6

    • SSDEEP

      98304:kWy+uJvQHIhObEuo07R31xJ/nNw0rCg+EVINNM:k+bHIh0EQT1lCgn6NM

    • Chameleon

      Chameleon is an Android banking trojan first seen in 2023.

    • Chameleon payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

MITRE ATT&CK Mobile v15

Tasks