General

  • Target

    e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73.apk

  • Size

    3.1MB

  • Sample

    241129-jf61watkcy

  • MD5

    ac9bada8f5e415f7a42d3783d33fff78

  • SHA1

    f5602c1c58e80adbc31b0b6cf2aaf08400fa2573

  • SHA256

    e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73

  • SHA512

    1f9763cea1e72b7876babb37612b7c9be6a47962d88a24c7094f518e82f6206ff7bf1799bfb835f6181fadb53adb4e9317c7e2b2b5d5b4b3350d240766889dc2

  • SSDEEP

    98304:BAZkFXAySCFNSXNEk/mWmEFqSgEWkM/W+DL8CWVQzNepQc7e:BFZuC3S3iee

Malware Config

Targets

    • Target

      e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73.apk

    • Size

      3.1MB

    • MD5

      ac9bada8f5e415f7a42d3783d33fff78

    • SHA1

      f5602c1c58e80adbc31b0b6cf2aaf08400fa2573

    • SHA256

      e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73

    • SHA512

      1f9763cea1e72b7876babb37612b7c9be6a47962d88a24c7094f518e82f6206ff7bf1799bfb835f6181fadb53adb4e9317c7e2b2b5d5b4b3350d240766889dc2

    • SSDEEP

      98304:BAZkFXAySCFNSXNEk/mWmEFqSgEWkM/W+DL8CWVQzNepQc7e:BFZuC3S3iee

    • Chameleon

      Chameleon is an Android banking trojan first seen in 2023.

    • Chameleon family

    • Chameleon payload

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks