Analysis
-
max time kernel
48s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
06-05-2024 14:18
Static task
static1
Behavioral task
behavioral1
Sample
e6e530f74ba97392f6540bfba7dff0d3ff0a5f4142ac6a674252cfbe47dde702.apk
Resource
android-x86-arm-20240506-en
General
-
Target
e6e530f74ba97392f6540bfba7dff0d3ff0a5f4142ac6a674252cfbe47dde702.apk
-
Size
3.2MB
-
MD5
7ac16e43df3730713442fbbb53627f05
-
SHA1
45417fbbd98e155b22ee04636f404dd0259dbc15
-
SHA256
e6e530f74ba97392f6540bfba7dff0d3ff0a5f4142ac6a674252cfbe47dde702
-
SHA512
5d2d816c04473981c253992dd260ad08afd5e1d3b6142d7e0cc39c10ad6ba7d453400fd4eb37db60bc92691b3c3585e087d3099b782b67232cd3300be33fa2c4
-
SSDEEP
49152:5OcohFnAsXPQn9xs5V1AWg1LVP0H4oByWInuAFgfS6pyoQi:5OcoHnlXPS4DAWgxRgwWIQSLoQi
Malware Config
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
Processes:
resource yara_rule /data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip family_tispy /data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip family_tispy -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.rtrdyebw.ckpelexv -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rtrdyebw.ckpelexv/code_cache/1715005102448.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rtrdyebw.ckpelexv/code_cache/oat/x86/1715005102448.odex --compiler-filter=quicken --class-loader-context=&com.rtrdyebw.ckpelexv/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.rtrdyebw.ckpelexv/files/dex/oat/x86/LvdPSYhIhugLjvBQF.odex --compiler-filter=quicken --class-loader-context=&/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rtrdyebw.ckpelexv/code_cache/1715005108427.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.rtrdyebw.ckpelexv/code_cache/oat/x86/1715005108427.odex --compiler-filter=quicken --class-loader-context=&ioc pid process /data/data/com.rtrdyebw.ckpelexv/code_cache/1715005102448.dex 4280 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rtrdyebw.ckpelexv/code_cache/1715005102448.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rtrdyebw.ckpelexv/code_cache/oat/x86/1715005102448.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.rtrdyebw.ckpelexv/code_cache/1715005102448.dex 4253 com.rtrdyebw.ckpelexv /data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip 4306 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.rtrdyebw.ckpelexv/files/dex/oat/x86/LvdPSYhIhugLjvBQF.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip 4253 com.rtrdyebw.ckpelexv /data/data/com.rtrdyebw.ckpelexv/code_cache/1715005108427.dex 4331 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rtrdyebw.ckpelexv/code_cache/1715005108427.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.rtrdyebw.ckpelexv/code_cache/oat/x86/1715005108427.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.rtrdyebw.ckpelexv/code_cache/1715005108427.dex 4253 com.rtrdyebw.ckpelexv /data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip 4253 com.rtrdyebw.ckpelexv -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.rtrdyebw.ckpelexv -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.rtrdyebw.ckpelexv -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.rtrdyebw.ckpelexv -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.rtrdyebw.ckpelexv -
Acquires the wake lock 1 IoCs
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.rtrdyebw.ckpelexv -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.rtrdyebw.ckpelexvdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.rtrdyebw.ckpelexv -
Reads information about phone network operator. 1 TTPs
Processes
-
com.rtrdyebw.ckpelexv1⤵
- Requests cell location
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:4253 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rtrdyebw.ckpelexv/code_cache/1715005102448.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rtrdyebw.ckpelexv/code_cache/oat/x86/1715005102448.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4280 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rtrdyebw.ckpelexv/files/dex/LvdPSYhIhugLjvBQF.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.rtrdyebw.ckpelexv/files/dex/oat/x86/LvdPSYhIhugLjvBQF.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4306 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rtrdyebw.ckpelexv/code_cache/1715005108427.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.rtrdyebw.ckpelexv/code_cache/oat/x86/1715005108427.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4331
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD536840fd3b1d093ec1ef4c74619613528
SHA104517ee8f7ea2d19548425e4a1fe6a795134408d
SHA25698dc4aca4982ee13515aae60da92ebb2e5c9530af0ffb83af4f392af85ac02ab
SHA512773d6f8dd68772eaa82324a6b33f1c4959978bfefc07f6a884c5efb04e7dd81aba7176dc55acf96fdcc802ae91fd25e92ccc3b958b1f8f3f84358fe8a861f2be
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5bb260e12a4fe7c90762138bc84071f98
SHA12d42d67a399d63df22f15fbee1757eaadf6d9507
SHA256904d55bf65535cd3c3911a2116cad2506b830450dc85f8212823fda04c80b0ed
SHA5122377b2c9fc3171dc59eed1f19cb4765bf0a57f03ae1f28e88bce79856a26b408470e8b060c6c25c6a2322c88757501672db783ccc9429e15ac6839c46412a4e6
-
Filesize
145KB
MD539c8eacacf5def214bfed0883f5d530a
SHA1caf2f7f5259fa270e126698599badd5d983ed428
SHA256b826e5802ba4a0dd09851cba34b25e52133dc90ad31139b33af627c30fe205bf
SHA51263c37174056b9f6217224d6c352a5324a1f37f5a88dcbc19fded083db9938fbed9a5bed086ad010571c262c7d3d70a6e889755347a11033e770435d9e796882e
-
Filesize
1.5MB
MD50320899fd9ec8626b27b1886fa00d0d6
SHA12cafe2dafe41db418ed3a78309a117f63967a1ae
SHA25699cfe5a445a44f2e54eb15a79153cd542df04380854a4256c4bbbb3275967702
SHA5121bf5836db9e053b6bec9967ff8bf05b0f8e9dd295893b00ebecb8c49bd8cdd9e9308490ef22e3b5b2a2df70a5d816509b82dc42be9f8ea33bf7be73d74114848
-
Filesize
9KB
MD52df1106744b8c4a91e8447b323b2f392
SHA14838364cfa2263a2cc62e729cb9b225da720c57a
SHA256db7d7ca341d0c710e1b9d0c54cc53084dba5f0d72e7b419564753f9eec5d7c5c
SHA512f4c7e13bcf4c082c645d646ea779af244df4f6969270e33a827790eb48777d89ee8163373532c5fdfb19fcd21deb8884f8ae1464289aeabd662fc0db7f834917
-
Filesize
3.7MB
MD5b869aef4d296c8a63aef47cc47456c2a
SHA1a4a73601a988420958087f3af103632c2686d2f8
SHA256fa0b68335742b540ac8962e383fed37ee81304cff80425a52f822e26261a0357
SHA51293b476f533a1c74509ad6b96bfe9bb5c9e4b879900c43aa5ff14ecabe78dd8f59e4c8b19ae23bcf2e0d9831980ca3f0496fd2391ae7c4536c996cfc751a10ce3
-
Filesize
3.7MB
MD5fd24bc50e0cd36f3f32752ca3421ed4b
SHA169e7ffcad26c61cc05716f57e791f80b50ef3b71
SHA256fdc7b7be727ccdd82b3bf14d38ba7a19c597f610f1a60c89bc8a49b1d5001213
SHA512b489b910bf522c8d6e49e9efca32eebb55f8ca1013daf307a1f4d8e01f2b0a590b97c0513320d5ae82876c2d3ea3fffff262fdf9bd1e13e650281afc0d8a3ff9