Analysis
-
max time kernel
2s -
max time network
158s -
platform
android-11_x64 -
resource
android-x64-arm64-20240910-en -
resource tags
arch:armarch:arm64arch:x64arch:x86image:android-x64-arm64-20240910-enlocale:en-usos:android-11-x64system -
submitted
02/02/2025, 22:01
Static task
static1
Behavioral task
behavioral1
Sample
d52ee13dce622c4a50ec560f8076c06a617299d7d1200621c59c93c03573a0f7.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral2
Sample
d52ee13dce622c4a50ec560f8076c06a617299d7d1200621c59c93c03573a0f7.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral3
Sample
d52ee13dce622c4a50ec560f8076c06a617299d7d1200621c59c93c03573a0f7.apk
Resource
android-x64-arm64-20240910-en
General
-
Target
d52ee13dce622c4a50ec560f8076c06a617299d7d1200621c59c93c03573a0f7.apk
-
Size
3.1MB
-
MD5
6d9a4d968e9976511075bf85cf70a27e
-
SHA1
f5be6c82c2d2523dac22c8c9d7b9fc62b66b59f4
-
SHA256
d52ee13dce622c4a50ec560f8076c06a617299d7d1200621c59c93c03573a0f7
-
SHA512
04cd1e1fd839b85448555eefd1dcd30cb095daf70104571f780ce8bb7bed0e8754b3a82433230b8d2f8bd792a7f1f9e913a092c1b3c21595c84bd8ec5ca914f6
-
SSDEEP
98304:PJigB3CtahhaNmXZEzqrMoXNR45unnzHEFqSgHWkG/WObLXQWmpIc8x:8A34mIuwknhkx
Malware Config
Signatures
-
Chameleon
Chameleon is an Android banking trojan first seen in 2023.
-
Chameleon family
-
Chameleon payload 1 IoCs
resource yara_rule behavioral3/memory/4801-0.dex family_chameleon -
Checks if the Android device is rooted. 1 TTPs 2 IoCs
ioc Process /sbin/su com.fiscal.public /system/bin/su com.fiscal.public -
Checks Android system properties for emulator presence. 1 TTPs 1 IoCs
description ioc Process Accessed system property key: ro.hardware com.fiscal.public -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.fiscal.public/app_DynamicOptDex/Loo.json 4801 com.fiscal.public -
Checks the presence of a debugger
-
Uses Crypto APIs (Might try to encrypt user data) 1 TTPs 1 IoCs
description ioc Process Framework API call javax.crypto.Cipher.doFinal com.fiscal.public
Processes
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
671KB
MD59f247dfc3be50aa96549da83f15f9fd7
SHA1c175e8d37743fbbe59179ff12f838ebc8fd958bf
SHA2566b430fb69d6893f866d114be7c712c43956b082d859d28d65f95de21a58052a1
SHA5122a20a14c8479f1127c2c9a5d237d1849f09b5f53b7f0e1e47325b8149bb7627b4d2fcb9bf2eebee5c2951af99211e08e73519a68b4516db0c3cc3be4741bff7c
-
Filesize
671KB
MD55272719087ee224bdae26e97f2679c78
SHA12b3e4101b31deffd2f65b6f3378992333187a964
SHA2560b60e0a3b9f800094e2a91e6bc8045dc9a544b3049c82e01256ab811902c691e
SHA512947626eb9210f9c1b2113762341a80c3b053f33c6208244a8ca2b7374f780c5f1f5cdb54566018f0f75b58b8791ad53e5719459e5fb0cb09ea548bfcd2390ddd
-
Filesize
1.8MB
MD54e51fa465ffa326d5628336befa5d1a0
SHA1f4391dcc42cd5497d45f2d6be9b7899d5533a29b
SHA256633c16d3e53a8abe50bc1d6987a10786e10ff488761430018e8240f514aac120
SHA5125e2bf8d354296169a8ce6de51c56471e971949643de1789dcc4fee8e0de42e16947e6a58ee357506a1991348fbfe96899017c323cda003eb725ba8173c59198d