Analysis
-
max time kernel
48s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240506-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240506-enlocale:en-usos:android-9-x86system -
submitted
12/05/2024, 01:34
Static task
static1
Behavioral task
behavioral1
Sample
e7fd36d30ab9635ec2113d38b6fcfb53092c88fd350e69ee693393e8ead9cefb.apk
Resource
android-x86-arm-20240506-en
General
-
Target
e7fd36d30ab9635ec2113d38b6fcfb53092c88fd350e69ee693393e8ead9cefb.apk
-
Size
3.2MB
-
MD5
48aef3bdab4724f4bf116b321393e17e
-
SHA1
12ef88b9ec33e021f1fcdc12b9ab2ba7fdac98af
-
SHA256
e7fd36d30ab9635ec2113d38b6fcfb53092c88fd350e69ee693393e8ead9cefb
-
SHA512
69a020a60f5f7c97123ce4dbad0fc7be82bcc0f28eaa4473e693d93555eefab703e603f3b79666364fb75f68a2fbedca937eafe714b9c9764b388a534c04b198
-
SSDEEP
49152:8IuLdhwnA9QCwPtiaGyZmOzhQDC+HYla2PJzN6B8ul0xhuVP1aoNKEnHxUxiG:8IuLdan0kPttfmwXhPJx6yul0HS1NKEA
Malware Config
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
resource yara_rule behavioral1/memory/4325-0.dex family_tispy behavioral1/memory/4267-1.dex family_tispy -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.iwzaairh.ntsorkpy -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.iwzaairh.ntsorkpy/code_cache/1715477661158.dex 4300 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.iwzaairh.ntsorkpy/code_cache/1715477661158.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.iwzaairh.ntsorkpy/code_cache/oat/x86/1715477661158.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.iwzaairh.ntsorkpy/code_cache/1715477661158.dex 4267 com.iwzaairh.ntsorkpy /data/user/0/com.iwzaairh.ntsorkpy/files/dex/tLOhzWaIxAaYhqqtH.zip 4325 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.iwzaairh.ntsorkpy/files/dex/tLOhzWaIxAaYhqqtH.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.iwzaairh.ntsorkpy/files/dex/oat/x86/tLOhzWaIxAaYhqqtH.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.iwzaairh.ntsorkpy/files/dex/tLOhzWaIxAaYhqqtH.zip 4267 com.iwzaairh.ntsorkpy /data/data/com.iwzaairh.ntsorkpy/code_cache/1715477668635.dex 4351 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.iwzaairh.ntsorkpy/code_cache/1715477668635.dex --output-vdex-fd=45 --oat-fd=47 --oat-location=/data/data/com.iwzaairh.ntsorkpy/code_cache/oat/x86/1715477668635.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.iwzaairh.ntsorkpy/code_cache/1715477668635.dex 4267 com.iwzaairh.ntsorkpy /data/user/0/com.iwzaairh.ntsorkpy/files/dex/tLOhzWaIxAaYhqqtH.zip 4267 com.iwzaairh.ntsorkpy -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.iwzaairh.ntsorkpy -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.iwzaairh.ntsorkpy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.iwzaairh.ntsorkpy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.iwzaairh.ntsorkpy -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.iwzaairh.ntsorkpy -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.iwzaairh.ntsorkpy -
Reads information about phone network operator. 1 TTPs
Processes
-
com.iwzaairh.ntsorkpy1⤵
- Requests cell location
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:4267 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.iwzaairh.ntsorkpy/code_cache/1715477661158.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.iwzaairh.ntsorkpy/code_cache/oat/x86/1715477661158.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4300
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.iwzaairh.ntsorkpy/files/dex/tLOhzWaIxAaYhqqtH.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.iwzaairh.ntsorkpy/files/dex/oat/x86/tLOhzWaIxAaYhqqtH.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4325
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.iwzaairh.ntsorkpy/code_cache/1715477668635.dex --output-vdex-fd=45 --oat-fd=47 --oat-location=/data/data/com.iwzaairh.ntsorkpy/code_cache/oat/x86/1715477668635.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4351
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD51426132685f13d92976e0d19fc7ba6ff
SHA1dac699e536f2eb13b93d0c90ac7a8e11aef341f0
SHA256814e89e250aad716290731cf2a1fa6409b76cda531d23f8e939f99e8cb468e13
SHA512d23e0fd03916eae71cefb54a70dfcaaca25104556da0a57c4ba2e39efbc41e2d06a1e6b3e1be7cb9b0eb266df7dce4569a8314b3fda3bfc0abd4698cbee09cb1
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD587d04ef02cf12ff1d4abfe8c2b98ff2d
SHA152d28da58ba758534287f2c1324bb6a8f08acaa8
SHA256916ee995753e0e4f1ccffd71833cd7124e4a0adb600927f3315c3ebc1a574e97
SHA512414d6d1eaa476788ae4a6090f6b6ecd461d134e83dfe616a284d8b68ab6bc41abf99b5545add5a76a80b7d68f0913839bc8b2aad9d29a86170d36dff136a6622
-
Filesize
145KB
MD5d7af37050e7ce95e5aa2102311f95336
SHA1403a5c3414aea7a9a20e8c8c89f18c2ee4c5cfa9
SHA2565972c66f3509911910cc7050f3af11368b7d0600499c06c80bc935ea69d82afe
SHA51209cc7a5a83cb10a1458590c8e5629a46c43ac0ad93bd0ce09a127627a53c7a67d372b1ab0a5496ed6d715f9e4b48f2b33afee303b6f52008e42011ba5d8289c2
-
Filesize
1.5MB
MD59760c1e3b828f75ccd8356cba63564a8
SHA1c3292d24c4a9b93cd5efbbf85bad4f466e47d4a2
SHA256d9cfb838cd0df2042eb3efbed332d27cbf9403129c570a0471b3e15d7970bf80
SHA5124cd64a9c5c4e8b6fbd26fb522154a6414c885414f23d07683af0ada7c3bbbbe7fb5019202951f02df3eaf6fc5a5d7a3bfe774b050f290b4f8aabd4569991d5a7
-
Filesize
9KB
MD555ed74f33cf77f90d52bc6b1fe68ca0c
SHA169c62d46a836e1bfff0f25bbeb968cd9075a221b
SHA256f93f995b51f10e0bb5f964a2b281821a87062d4fb97a1da10f57316cebb304cc
SHA512145f57970380586e890940a7ecd25faa0969cef37e835261b3b18a23fa219792070948e6d6b5d5e1620215510b3fbb51105b0e5e6ea1d7b7cd38101b24f0e8d2
-
Filesize
3.7MB
MD5c8ccf48c35e85f62716355668c52b704
SHA1a9e80d41266b899f157bca05e2dbb1f3c5a492d0
SHA256e87d64bacce45a4332ff4e5d0203823d0529e66e4547b537982aa7162a4c20dd
SHA512dc7c224891383b8d3c3f742c576a6502f08f58a2dd19e1b5a36281b30dae79ae3e166b7f2c1614505461bb5888272ae8af22bdc05c698dbc60e3faa4a54f3e62
-
Filesize
3.7MB
MD518434c5cfeab708c161e96247a97c5bb
SHA1e27f9bd57a7fd5046e5da0cad11bddba64f86404
SHA2560274f094031d2e0e8b42a7cc940f41f0319e3fded8669ec4887f71e3f0b9e3c7
SHA512ff276b364c42a85b537ca6d4212457a7403d635fd6299858c5dcdea8c301606fa0edbcbd5c3db6a7e35b966660d000c4aff3364cb6ff2d8d95f75f670b9f8e5f