Analysis
-
max time kernel
3s -
max time network
150s -
platform
android-9_x86 -
resource
android-x86-arm-20240910-en -
resource tags
arch:armarch:x86image:android-x86-arm-20240910-enlocale:en-usos:android-9-x86system -
submitted
29/12/2024, 22:06
Static task
static1
Behavioral task
behavioral1
Sample
d4d958c87e338fd81b710c9b495224ec1751c7e847034c7a24978483e4267fa0.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d4d958c87e338fd81b710c9b495224ec1751c7e847034c7a24978483e4267fa0.apk
Resource
android-x64-20240910-en
General
-
Target
d4d958c87e338fd81b710c9b495224ec1751c7e847034c7a24978483e4267fa0.apk
-
Size
3.2MB
-
MD5
5f8b7be295fcf4a727e0083a7e0a4712
-
SHA1
2653402b00c0f1d848634240388e0d7c3f91e1dc
-
SHA256
d4d958c87e338fd81b710c9b495224ec1751c7e847034c7a24978483e4267fa0
-
SHA512
a6c4a460dbab8bd8e190986023b2864ca2fd559d0bfc25db382c741200f480724e9f35c9f3e83bb6b79aa54adf78eb1b38c4c77edc1ad8e76a9128427b7a7220
-
SSDEEP
98304:FTbk/xl2nGHCSNi+hjEkQ3DHdXHcNcAFU12SbpsN8jt74FVV4U:BbyxonGiwbSt2mMV4U
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon family
-
Chameleon payload 1 IoCs
resource yara_rule behavioral1/memory/4245-0.dex family_chameleon -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.notable.hidden/app_DynamicOptDex/XqIxQeT.json 4245 com.notable.hidden -
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.notable.hidden
Processes
-
com.notable.hidden1⤵
- Loads dropped Dex/Jar
- Uses Crypto APIs (Might try to encrypt user data)
PID:4245 -
sh2⤵PID:4274
-
/system/bin/sh /system/bin/pm list package -33⤵PID:4291
-
cmd package list package -34⤵PID:4307
-
-
-
-
sh2⤵PID:4330
-
cat /proc/self/cgroup3⤵PID:4346
-
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
651KB
MD5f19c1252e1ddea093b75c681b77fb5b7
SHA1f9e9effd975effe9ccf2b9ac53cc2503084f0ace
SHA256e1a8e4e1267364ae0adae420d7554a1984d798cf3f2f829ba3e1febecba1674b
SHA5125b011dd86ee279d4d8292156ca2af946aa131c5b3b2a5d5d9019b237706e13bf8606fc3650b90db097e94e4ef43a78ca98d6d7d68a35b3fd29ece12ad08ca3bb
-
Filesize
651KB
MD577df7681c385455a9054ba7957578064
SHA1056450e3aad283f40af67277aa908bb0adf0d19b
SHA2561c02964cd2559ddc7201d8dfb042878360ceeb64f52bf028dfc0f59777995ed3
SHA5124bc11ca5a16e226372a7d3981dd8b399396c0f38fd5ce7a92e5b46839f7eec382aad500430043de64bb7b11e15f7a2bf1e585676642133a8bb8a5462b27f2ebf
-
Filesize
1.7MB
MD5bad310fbd59595407132c05df6f4a277
SHA18ff53a8b3e2d1016082ee1fff78df9a92d36b936
SHA2569a1ae1a9bdefb02b1f512a6382ac3bac0a50b3de9d158c2143e4ae5afa8a16a7
SHA512875eb2fe43d1f3a52bc1cf27d0003db7c0c26ba993cfb3833e8430813245bae8d8235de841a67d14e7cb08e9554755524d82421ed4315d66fb3f2a1bfb3899ec