Malware Analysis Report

2024-10-19 11:47

Sample ID 240507-cnfqbsdg7y
Target WiFiService.apk
SHA256 779579bc088ff710a84bf67cc3ebc86804b1ef4c4dd2171dc2879890917f9238
Tags
tispy collection discovery evasion infostealer persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Mobile Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

779579bc088ff710a84bf67cc3ebc86804b1ef4c4dd2171dc2879890917f9238

Threat Level: Known bad

The file WiFiService.apk was found to be: Known bad.

Malicious Activity Summary

tispy collection discovery evasion infostealer persistence spyware trojan

TiSpy

TiSpy payload

Requests cell location

Registers a broadcast receiver at runtime (usually for listening for system events)

Queries the phone number (MSISDN for GSM devices)

Loads dropped Dex/Jar

Queries information about the current nearby Wi-Fi networks

Queries the mobile country code (MCC)

Queries information about the current Wi-Fi connection

Checks if the internet connection is available

Requests dangerous framework permissions

Declares services with permission to bind to the system

Declares broadcast receivers with permission to handle system events

Acquires the wake lock

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-05-07 02:13

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-05-07 02:13

Reported

2024-05-07 02:15

Platform

android-x86-arm-20240506-en

Max time kernel

47s

Max time network

130s

Command Line

com.czokesus.zzpsaixh

Signatures

TiSpy

trojan infostealer spyware tispy

TiSpy payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/data/com.czokesus.zzpsaixh/code_cache/1715048001618.dex N/A N/A
N/A /data/data/com.czokesus.zzpsaixh/code_cache/1715048001618.dex N/A N/A
N/A /data/user/0/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip N/A N/A
N/A /data/user/0/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip N/A N/A
N/A /data/data/com.czokesus.zzpsaixh/code_cache/1715048011637.dex N/A N/A
N/A /data/data/com.czokesus.zzpsaixh/code_cache/1715048011637.dex N/A N/A
N/A /data/user/0/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Checks if the internet connection is available

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Processes

com.czokesus.zzpsaixh

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.czokesus.zzpsaixh/code_cache/1715048001618.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.czokesus.zzpsaixh/code_cache/oat/x86/1715048001618.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.czokesus.zzpsaixh/files/dex/oat/x86/NvQhFilSgfBjQeFCU.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.czokesus.zzpsaixh/code_cache/1715048011637.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.czokesus.zzpsaixh/code_cache/oat/x86/1715048011637.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
GB 172.217.169.35:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 142.250.200.14:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.200.46:443 android.apis.google.com tcp
US 1.1.1.1:53 ua.tispy.me udp
US 172.67.74.236:443 ua.tispy.me tcp

Files

/data/data/com.czokesus.zzpsaixh/code_cache/1715048001618.dex

MD5 d3364728f634bf71c4b16542c02c60cb
SHA1 f23088362b69935f404f2b81eaa40ed3172efca5
SHA256 401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA512 9378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af

/data/data/com.czokesus.zzpsaixh/code_cache/1715048001618.dex

MD5 a137b5568de65b8fef35329930d8617f
SHA1 49a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256 bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA512 9dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338

/data/data/com.czokesus.zzpsaixh/code_cache/1715048001618.dex

MD5 cf790c0dfb1361b86d4b8bfca1f8814c
SHA1 d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA256 5dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512 e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47

/data/data/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip

MD5 8a6d7327aeaeb4521c36ec7fd9c50191
SHA1 5cba23d2f439190ed23bea6581c80591f0b7dca2
SHA256 6065abe19d95955d8ab83ba2a19937f65ad49ebc1265a6b846823e59529f11b3
SHA512 a9845749e3905e309ca1fa2c58e2402ce0ed62836743277a27529f91b6114412d91ef3a030b429d04391aaa3aa608823831a8c7db97dba7a81cef9d97d0231be

/data/user/0/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip

MD5 4cc9c406e18f3661e5a2baf40c067577
SHA1 4f42e1651f73c693a9ca90bd430e6ec40a21f283
SHA256 35209abe557c696032423c9c6379e470b1527b7755d837d8d23ee0093213a46a
SHA512 b7df73c5f0507d89c93b55161b4751c8b1ed3596eb43fe5427260fb80383cddd885113c7c1d4bcde452d3d277c6983661ae9ba03a8e1cf44d0b7121328e0a627

/data/user/0/com.czokesus.zzpsaixh/files/dex/NvQhFilSgfBjQeFCU.zip

MD5 f183c1f27b35dff16daea9b2adad80ce
SHA1 962eb09b3c4412fefa5db0ef80d57c2c2617a6de
SHA256 0815a93a26cd4c71cc65faa467a96161b7dd8714d0322f9b5c6e7734c0d8af0c
SHA512 76e78dc4129152a693a68c85778e5140b633227dcda5896cdfc20956674478581137a497d2cf0bf460031dfeb30c543645c7fbdc55fa78f17882739e711fb861

/data/data/com.czokesus.zzpsaixh/files/476400.so

MD5 ece353d9077c896ab4995d8efd679ef8
SHA1 604c5ba6e0a16c98b4e864510d96f2788d4133c0
SHA256 c164d6b8c0ed2fcef6307637169f9226659f019d4b417267098a0b43b1511d44
SHA512 c8005312782fcf671c86fdef07d397ee979eac99d44556b74a168a2171da7bde3a969088c4feb258eb856622bd2e696fdcd4e73f41aeb2593f1a72e5b9f8d31f

/data/data/com.czokesus.zzpsaixh/logs/Sistema1715048026631.log

MD5 a4bc78cf5628d77d0824da4500c05226
SHA1 e5e32113bbad7990bda4af57efef98c75c4213ba
SHA256 351ee8ebaf51825a93c1a0747dd42c1ea4e1d0eb8defb88ecd37dc341dc96eb9
SHA512 52c55224af5be6032011ca41fb0c34ccbe99beec923012ef741eee81db0fcf08cbf466df668ea9c0d7d6302b1d1a96dcf3c9d5efdfe9cfb9530cb5e10c50f5c7

/data/data/com.czokesus.zzpsaixh/databases/privatesms.db-journal

MD5 de17b953e4c5be394b7b1c08fc782739
SHA1 dfd67025db07866c0cc6657cc2b158359de5f30f
SHA256 f89470f8d98c10b93c99ff3631fb045fb974278520c2c924f15fb9fc70e4d20b
SHA512 872c98c98588bda8f0f0cafbb481bac1e4a0d5a0f46d829075a8e338d2f255723f23e37e95d0177d1ec41b6eadbe8b103ae6c1b1fc56bcefa4ccdff4c7f32fb5

/data/data/com.czokesus.zzpsaixh/databases/privatesms.db

MD5 3621ce0aa81e37bc5c80e2cf881f1dd0
SHA1 00365f82dcada94caea07443656848baf60b3bd9
SHA256 8620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA512 76bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf

/data/data/com.czokesus.zzpsaixh/databases/privatesms.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.czokesus.zzpsaixh/databases/privatesms.db-wal

MD5 d856f720e7b2d9954a5e624d2b97909d
SHA1 bc00ec81e3cf49842fff0559bd6c3d9f031387d7
SHA256 edd37393777d79ed7abbab3bcfb252496fa99a65b8fa607941e692287291e4a6
SHA512 f73a94fac62dc4a7b3a298d3f0e178d5c29d86a637a3f1b9e129e3b389ab4d847cd7ec204df3f9fd88e4dd60863915d687b8286fb53e83f2ada5a45427cba29b