Analysis
-
max time kernel
1s -
max time network
151s -
platform
android-10_x64 -
resource
android-x64-20240910-en -
resource tags
arch:x64arch:x86image:android-x64-20240910-enlocale:en-usos:android-10-x64system -
submitted
07/11/2024, 22:07
Static task
static1
Behavioral task
behavioral1
Sample
2c2a6717a0a5239c7d2dfe5854ba0b3622610cc1a99dd718363d10efaa6ada35.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
2c2a6717a0a5239c7d2dfe5854ba0b3622610cc1a99dd718363d10efaa6ada35.apk
Resource
android-x64-20240910-en
Behavioral task
behavioral3
Sample
2c2a6717a0a5239c7d2dfe5854ba0b3622610cc1a99dd718363d10efaa6ada35.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
2c2a6717a0a5239c7d2dfe5854ba0b3622610cc1a99dd718363d10efaa6ada35.apk
-
Size
3.6MB
-
MD5
b1d2bbc7ad3a97384bc054b782da711e
-
SHA1
fe9c448f9dcf320cd6a594ae14226e010082bf3c
-
SHA256
2c2a6717a0a5239c7d2dfe5854ba0b3622610cc1a99dd718363d10efaa6ada35
-
SHA512
e0289a396c00b774b0460bc74a9c1d01f64ffffe7beb66619732f488adbfc997bb2eb999efc8ce74e33a1bf28cd3a929b921f332fd9927c349b22c2e7ffafeb9
-
SSDEEP
98304:pwYQI3t8FxEqIjGHy2Nw8nJjEsQ7zHtXfIN8cZgNSiPpzItxhJaUrVKjA:pQW8FxELjGS0w6WNSfhJejA
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon family
-
Chameleon payload 1 IoCs
resource yara_rule behavioral2/memory/5133-0.dex family_chameleon -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.tray.nominee/app_DynamicOptDex/ufBip.json 5133 com.tray.nominee -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.tray.nominee
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
911KB
MD56cd2715362c1b92a02055eab0ee474c8
SHA19d744e8bd1a8c3a4c7b9bc99e9f151565257338b
SHA25665376bff9cb3107ac6f6f8b1a729a040143b3c9acad41367c80505582de60b99
SHA5129dea97b8b26cf8b54b126861c7d079e9e4ec9db0a2c4d728eb244a7d94fc32c77799c7166e8a1dc80b95ddf3093e316b82169ee040e40c94753763419496647b
-
Filesize
911KB
MD557b88f9814c39a76fa2e180889a1ec75
SHA13f07effa328f7e484b57973d43d5a269f9e9eaa9
SHA256baba0975731712ba96f92787ea7179eacac1ee9f3f2f8739b6cb558b4a4a7524
SHA5122c180742ce4a7c7081927d3e451da85407fd9616d7721105cd68711ad7d6f9758965ebfbcd968ba378ee57150b86dc04023ebbc222cddfb1592d2524ef34729c
-
Filesize
2.4MB
MD55606110b69b560b036588d5cb4df72aa
SHA1a4222a2ab14fa7afd3a194c5598ba65b377e1282
SHA2569a47e8d8320d78178f3ebf32ba9cce36fe08ba011ba099f5e4c7a158c402dde3
SHA512d12c3ad8e301bedcca5c93e3a58f4fca322956c39d0ec593a6d1373e08da0ef6b2d15c0e8bc66b73d565dafb12cef1ffaca3cd318627813387d2483188735e0e