Analysis
-
max time kernel
3s -
max time network
157s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
21/12/2024, 22:02
Static task
static1
Behavioral task
behavioral1
Sample
8a07533d8b06050c8f00a33dceec100ca47183d10f938ac8e0d3bf61ba41b825.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
8a07533d8b06050c8f00a33dceec100ca47183d10f938ac8e0d3bf61ba41b825.apk
Resource
android-x64-20240624-en
General
-
Target
8a07533d8b06050c8f00a33dceec100ca47183d10f938ac8e0d3bf61ba41b825.apk
-
Size
4.1MB
-
MD5
160a9678fe5f938beefbeef3b664c98e
-
SHA1
b93d5718a5232562fbe1d147c2b866732bdc16a6
-
SHA256
8a07533d8b06050c8f00a33dceec100ca47183d10f938ac8e0d3bf61ba41b825
-
SHA512
9ead6dd1949afd5c383a9578cb2dc5549f63bc5a0b0b98e9d274dda345e60a2cb96005d8a99c0171439a7754a47bb5d9718f4248a764856a1f4766059aca8c7c
-
SSDEEP
98304:Fu2zoPJIPtSfIbtlNvbxZPlm7VaJDa046:FuKNXvRwVODL5
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon family
-
Chameleon payload 1 IoCs
resource yara_rule behavioral3/memory/4624-0.dex family_chameleon -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.hardware com.copper.ordinary -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.copper.ordinary/app_DynamicOptDex/XErFFbn.json 4624 com.copper.ordinary -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.copper.ordinary
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5de589f821585f6e0393f24d1a5fe2a3e
SHA16861ffc941b563a9dfd5dba9b4d793c9a230f153
SHA2567ded1058294a329c1d41224ade264eccabfecfcbd8ae7bf44e3c456df3538a03
SHA512ed317f06d3042bd62087967b15ad3484e91917e535bd76ff6959719ce3dbd954479df13953cfd6f09955be49faab7bfa69350a2576215263490fad6ddd4b0f48
-
Filesize
826KB
MD5fb814480bb22fcee75bc87b072ad0bbf
SHA12dfee0b390dd1d007e17128373368afd6c8655b1
SHA256b1dd15f1705b2dbbeb8e944e7eb3e3b0f475670037020875fc2f72cb97fe1307
SHA512e3d451d4026d9d6d3f4e7c8fafcbb29264bae6cfa9888235b35750d64d5361381a8b0558ea360c6c5f78831ce58a462877cd0f152915f3c48955127b784089c2
-
Filesize
2.3MB
MD5305af700890e2536ae28a592bb16688c
SHA16a4cb797f9e0fa2ac00de58e7f2515b00d128d01
SHA25630475e3f8f957486419de5a4bd5f4ad9bb8b545fdb25804b2ad4e92464355cb9
SHA5128a75f8861620c956a79705ab20024e358d8390a7072e5ea4579cd4f9488014da46fd4388a158dba318ea548b0c095ffb21cb8dde3b5303b80caca7eeaa19cc8e