Analysis
-
max time kernel
6s -
max time network
83s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
29/11/2024, 07:37
Static task
static1
Behavioral task
behavioral1
Sample
e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral2
Sample
e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral3
Sample
e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73.apk
Resource
android-33-x64-arm64-20240624-en
General
-
Target
e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73.apk
-
Size
3.1MB
-
MD5
ac9bada8f5e415f7a42d3783d33fff78
-
SHA1
f5602c1c58e80adbc31b0b6cf2aaf08400fa2573
-
SHA256
e32218193a0649dcb9333187c2e9b1981b923e46be3c5d09bb4290e7c976db73
-
SHA512
1f9763cea1e72b7876babb37612b7c9be6a47962d88a24c7094f518e82f6206ff7bf1799bfb835f6181fadb53adb4e9317c7e2b2b5d5b4b3350d240766889dc2
-
SSDEEP
98304:BAZkFXAySCFNSXNEk/mWmEFqSgEWkM/W+DL8CWVQzNepQc7e:BFZuC3S3iee
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon family
-
Chameleon payload 1 IoCs
resource yara_rule behavioral4/memory/4343-0.dex family_chameleon -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.hardware com.over.initial -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.over.initial/app_DynamicOptDex/gjlPlJ.json 4343 com.over.initial -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.over.initial
Processes
-
com.over.initial1⤵
- Checks Android system properties for emulator presence.
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4343 -
sh2⤵PID:4373
-
/system/bin/sh /system/bin/pm list package -33⤵PID:4391
-
cmd package list package -34⤵PID:4408
-
-
-
-
sh2⤵PID:4429
-
cat /proc/self/cgroup3⤵PID:4446
-
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
637KB
MD55c616c73cc3f9edbc067694fb261bd67
SHA1cb1fe688ec11d5fd0ecdddacf8ef1ceeace2770c
SHA256f7baa56acd5a75c4520ab481192de56c5e94d609901d893d041399996ee0b0ba
SHA51237fd85ee100208d1c5dc11d1001da50db612a04f23c1b91a4bc631115d31f410e46f44646728ee604a83b839bb4a0d424380061faf5046e74c98413395b09156
-
Filesize
637KB
MD52fa2787076c2f40a561a6c5e7d8a12c1
SHA15608e2fc8a55604db5602ca30a47516617d946e4
SHA256ed4b330c03319f9f977772cfd18b98229789055466534a3758d5b1136a9c9780
SHA51225db4664c28d1d4ab95b3f2a723e454ecc00d314663a37c4cc733bbe2830016cc26959c5665076e4d6da1058ddba16a0ae4eb21df44bc1dea1ca53ef37ffee49
-
Filesize
1.7MB
MD57243d74db304a83e2c2532346d58d0ab
SHA1c3c77c9a10a1ffde324bf0f23cf9a55fb79e0ae8
SHA256356f9bec49d590a3fbc4c6c513fe30e4c243495b5efbf871e11fc810ee62fe1a
SHA51239d5148ea76d9d41c15cd8620677605039ae45c66f34432bdea371b7cbf7247be72f6c0e266dacb90e1dcc281d15449309f1c6973e27331425451ab2d3953901