General

  • Target

    WiFiService.apk

  • Size

    3.2MB

  • Sample

    240429-cgv7fafa84

  • MD5

    54b2d111433f86e95b955d3e26f65fed

  • SHA1

    4d194731f47fcacd72b977f6435d22832fb5b7ab

  • SHA256

    e5f9fa22ee584d6d5ba82a6a9a92faa0917122a34358f35a4abc80a06f96287b

  • SHA512

    444eb0508eebdc05e674bc1bb18e493d4c2737ce3b4598f9d8af773ede5225d55f021ee8e9fa35af57158ca3bd65be7d633342f6610bffef82b52487fa04c78a

  • SSDEEP

    98304:/KZnun+vgaPyq866RKpRou6uI9J01F656c4yd:io+oaaq86Zpquf9tyd

Malware Config

Targets

    • Target

      WiFiService.apk

    • Size

      3.2MB

    • MD5

      54b2d111433f86e95b955d3e26f65fed

    • SHA1

      4d194731f47fcacd72b977f6435d22832fb5b7ab

    • SHA256

      e5f9fa22ee584d6d5ba82a6a9a92faa0917122a34358f35a4abc80a06f96287b

    • SHA512

      444eb0508eebdc05e674bc1bb18e493d4c2737ce3b4598f9d8af773ede5225d55f021ee8e9fa35af57158ca3bd65be7d633342f6610bffef82b52487fa04c78a

    • SSDEEP

      98304:/KZnun+vgaPyq866RKpRou6uI9J01F656c4yd:io+oaaq86Zpquf9tyd

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks