Analysis
-
max time kernel
48s -
max time network
169s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
15-05-2024 01:23
Static task
static1
Behavioral task
behavioral1
Sample
62ab73a2ed0d3b385dbc7421500f887920cde26d739379ff680e755d03c204da.apk
Resource
android-x86-arm-20240514-en
General
-
Target
62ab73a2ed0d3b385dbc7421500f887920cde26d739379ff680e755d03c204da.apk
-
Size
3.2MB
-
MD5
8ad693020b70c86b95c472f19e43e6b3
-
SHA1
7e9f2fc2f20b6d787a58e731bec8cc76fb814326
-
SHA256
62ab73a2ed0d3b385dbc7421500f887920cde26d739379ff680e755d03c204da
-
SHA512
6745562422d62cd72c88b7adbd82fb627adc6a1c8756701741659e0719a41bb908892a2c83e9baa14da6a00de3c7eb213afc99054795ef8ca054a4862a6d7893
-
SSDEEP
49152:+TSSh/nAlPhPniDj6PQERONo5+c5ez5pWalFpQU7c4ynuaiOBi4Hn:gSSNnAZPnySXO6terWa3ppQ4ybiOBi4H
Malware Config
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.otphmqly.jfbtnose/files/dex/lhuwsroHPioggMWLS.zip family_tispy -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.otphmqly.jfbtnoseioc pid process /data/data/com.otphmqly.jfbtnose/code_cache/1715736211850.dex 4231 com.otphmqly.jfbtnose /data/user/0/com.otphmqly.jfbtnose/files/dex/lhuwsroHPioggMWLS.zip 4231 com.otphmqly.jfbtnose /data/data/com.otphmqly.jfbtnose/code_cache/1715736215530.dex 4231 com.otphmqly.jfbtnose /data/user/0/com.otphmqly.jfbtnose/files/dex/lhuwsroHPioggMWLS.zip 4231 com.otphmqly.jfbtnose -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.otphmqly.jfbtnosedescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.otphmqly.jfbtnose -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.otphmqly.jfbtnosedescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.otphmqly.jfbtnose -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.otphmqly.jfbtnosedescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.otphmqly.jfbtnose -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.otphmqly.jfbtnosedescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.otphmqly.jfbtnose -
Acquires the wake lock 1 IoCs
Processes:
com.otphmqly.jfbtnosedescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.otphmqly.jfbtnose -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.otphmqly.jfbtnosedescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.otphmqly.jfbtnose -
Reads information about phone network operator. 1 TTPs
Processes
-
com.otphmqly.jfbtnose1⤵
- Requests cell location
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.otphmqly.jfbtnose/code_cache/1715736211850.dexFilesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
/data/data/com.otphmqly.jfbtnose/code_cache/1715736211850.dexFilesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
/data/data/com.otphmqly.jfbtnose/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.otphmqly.jfbtnose/databases/privatesms.db-journalFilesize
512B
MD5ef94c01d5a4bf7e2db3257427e7e74c9
SHA1bbc3f99b4f3ba5258ed0ca3bf45484ca8c5128ea
SHA256a58bad7d8ab30f15edcbcb57d7b118033e6cebd94aa70fe6249122a71d32a0d1
SHA512cc817f80ecb985d9a924e7a89d5dc73761fd0c6578fe4dc6a080b03d35281cacbd11490e44f4132912ac7a5b4c691effa32eea7397ed9e9c69464ec464b7a0ba
-
/data/data/com.otphmqly.jfbtnose/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.otphmqly.jfbtnose/databases/privatesms.db-walFilesize
28KB
MD5814314251ca6426f5a52ac62bfc72448
SHA126db7d6595da40389a668eb074989c3220fc8bbe
SHA256ff0cd8e1b4239fa048efc7df9371d1d7d3829d7afcd3d52edee17911ca2724ea
SHA5126badc9ac7586f10bdb45d803e865a026e6226f1883211e092eb7141ec8186bd64efa9a729cee6e6e65386649b6940a5f06fda1150b27b0dddcc26c0e020f64b6
-
/data/data/com.otphmqly.jfbtnose/files/476568.soFilesize
145KB
MD55d8e04c36799bc46d81d04f34b5563c6
SHA171bf6193ac644b30e806e760a4ac188c8bf8da07
SHA25636f2f247c0b524c6d5eb7d63762098c9ca2660f024126ceaa2da7dde6cbb4317
SHA5122e3d313c9cb4299d0b5576b614bedc8e1334c01bafaed394868dc74c2bac869e86bf3ef115b1e92fcfa0231c20d09fc5859ff386f4c492cdd103e322de87a421
-
/data/data/com.otphmqly.jfbtnose/files/dex/lhuwsroHPioggMWLS.zipFilesize
1.5MB
MD5d64ace15192caff7804c233faf29ca30
SHA1754ffa420acec61e7c02c3618bb98845ae8303f7
SHA25678bbdeb64d16deeccff1cac10d926604bde24bb7a843daaaedfe37ffc94598ea
SHA512268d6e0f278289dbf1c767e02d620e8b18f099ade9f918e438b6e58f5845799d8eaf1a0082a4269193c2b4272fbbbbb46c3c9b67266b0e7b92e61a7ee68cd0b0
-
/data/data/com.otphmqly.jfbtnose/logs/Sistema1715736218544.logFilesize
9KB
MD5c4a1c2a4dce667b3fdd6b68e5098568c
SHA1c0a27482a047e8c0e9e70ab00be8d1cd45a3d81e
SHA2563857d1cef9b60d2e782be9b3e6d34791674cff96a05225b7a1b0e5864ee02725
SHA512bf12769186375cd98df6c0c8f19cc1c6b3e1bab6ef471f378e6ee51a4767cc75dd647318bbfaea958daf519eed3a122aa175e03fa26cd6032d8bc9ca7faaa3f4
-
/data/user/0/com.otphmqly.jfbtnose/files/dex/lhuwsroHPioggMWLS.zipFilesize
3.7MB
MD51484a99bb26dd6ef0962a4b2eed754f7
SHA1f117ad07a0e4eb28e0fbec04f55e5135934687a8
SHA25600fd6c867bdd7ed036dad75a73ef6d459f32103ebc35f61637f495ec27199a0d
SHA51201d46ce0ce8607b501dd6df72654e50fa67e4be36764eeee1e964bf0b3aa667d8ab0322831288d24bc8b856472d75cdc6791d4acfa33b792339410ea90667d5e