General

  • Target

    571f88c0577ba3727b1418b30c98cf812e5d5faafa98763bff087d1ea1988041.bin

  • Size

    2.0MB

  • Sample

    250111-13v1kasjdv

  • MD5

    f6c77f79ea1670bbc1e78091533012bd

  • SHA1

    1949efa2b21055e99c99111fa5f2abb1962caee9

  • SHA256

    571f88c0577ba3727b1418b30c98cf812e5d5faafa98763bff087d1ea1988041

  • SHA512

    24dec6b22f42a6781f88dcbb68f9bf33d144391ca45e1885b9a43a5150096a2f6d5f1d28103e8c25ffb01f8997186d6a2a7417b3e3d728195958298163fe4572

  • SSDEEP

    49152:2PJ8JKfNvtfUjTFk5bguN6PPNjwYegjUXexlV9o:oNvxWTS50nNUYfjUXyM

Malware Config

Targets

    • Target

      571f88c0577ba3727b1418b30c98cf812e5d5faafa98763bff087d1ea1988041.bin

    • Size

      2.0MB

    • MD5

      f6c77f79ea1670bbc1e78091533012bd

    • SHA1

      1949efa2b21055e99c99111fa5f2abb1962caee9

    • SHA256

      571f88c0577ba3727b1418b30c98cf812e5d5faafa98763bff087d1ea1988041

    • SHA512

      24dec6b22f42a6781f88dcbb68f9bf33d144391ca45e1885b9a43a5150096a2f6d5f1d28103e8c25ffb01f8997186d6a2a7417b3e3d728195958298163fe4572

    • SSDEEP

      49152:2PJ8JKfNvtfUjTFk5bguN6PPNjwYegjUXexlV9o:oNvxWTS50nNUYfjUXyM

    • Chameleon

      Chameleon is an Android banking trojan first seen in 2023.

    • Chameleon family

    • Chameleon payload

    • Checks if the Android device is rooted.

    • Checks Android system properties for emulator presence.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Checks the presence of a debugger

MITRE ATT&CK Mobile v15

Tasks