Analysis
-
max time kernel
47s -
max time network
138s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
20-05-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
4662dc833e5c91cd7b7c5f6a59f0ef742148653469374d5521e003f3511e278a.apk
Resource
android-x86-arm-20240514-en
General
-
Target
4662dc833e5c91cd7b7c5f6a59f0ef742148653469374d5521e003f3511e278a.apk
-
Size
3.2MB
-
MD5
d738b65dc7cc9a097ef2f3ad279cb26f
-
SHA1
ed7151ee446e84d36b06a8c91e38875256a43132
-
SHA256
4662dc833e5c91cd7b7c5f6a59f0ef742148653469374d5521e003f3511e278a
-
SHA512
156175261bc088a1ba2d7ab4397a8a1fc8507ea72b21dcf100001bfa4baa1d09402d78ecc97e323f150305e4802287785f0c6ec9040f9d81d8c860fdc84a63f8
-
SSDEEP
98304:5O2dPlnnCPpTYyi4ghq1rK2MKPHxjPuTXJwp:5/HnCBTYBhq19MK1uTOp
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_19May24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 1 IoCs
Processes:
resource yara_rule /data/user/0/com.ugmxyeqh.slbzpiek/files/dex/bzmFvRSEmKgiSVDlH.zip family_tispy -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.ugmxyeqh.slbzpiek -
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.ugmxyeqh.slbzpiekioc pid process /data/data/com.ugmxyeqh.slbzpiek/code_cache/1716206479828.dex 4224 com.ugmxyeqh.slbzpiek /data/user/0/com.ugmxyeqh.slbzpiek/files/dex/bzmFvRSEmKgiSVDlH.zip 4224 com.ugmxyeqh.slbzpiek /data/data/com.ugmxyeqh.slbzpiek/code_cache/1716206483545.dex 4224 com.ugmxyeqh.slbzpiek /data/user/0/com.ugmxyeqh.slbzpiek/files/dex/bzmFvRSEmKgiSVDlH.zip 4224 com.ugmxyeqh.slbzpiek -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ugmxyeqh.slbzpiek -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.ugmxyeqh.slbzpiek -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ugmxyeqh.slbzpiek -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.ugmxyeqh.slbzpiek -
Acquires the wake lock 1 IoCs
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.ugmxyeqh.slbzpiek -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.ugmxyeqh.slbzpiekdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ugmxyeqh.slbzpiek -
Reads information about phone network operator. 1 TTPs
Processes
-
com.ugmxyeqh.slbzpiek1⤵
- Requests cell location
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:4224
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD5b92f869c6c944dad86d42d85041d2cc3
SHA16055e8e25f2d1bf71eef2adc30cc77ff1d09a147
SHA256ca371c93cbe6ae0b6a46a0c1306fbd4d2c3437255ecba46e91143b6ab0b81db2
SHA5124c381eca21e8b8878f9ea1c817084a9dd3f9207cda655a518863ff5ff9c11a58de1ba2b2f8c3ecc646c0c6f9624029e7022b67a8a0077de3fc5d029ac76029a0
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD54926d257ba46016f02ccc36b3b8df485
SHA174a35a47192c334310e11174889a65dc2ff46d46
SHA2561fa5278229e8459a74acd168f13857180d26c41fe7846938588de98e2d19c518
SHA512584addefb77df5ba5b1dd411b4d5564629ed4da96defff5f86a7f61732f6097232b20f3ed9135113cd6b28fd45019d27a857a7d072a42b95f60d2d14aef62e22
-
Filesize
145KB
MD5d6e41297dff37082bd617ad024268bef
SHA1ae79ec5f01bfc18c9a969827a45987b1821ac3b1
SHA256b5018dfd20f841773bf05f19f8e66baf198d4f04252c92e1d7d04a441456c784
SHA51285de7b366f09e553224e32f5cdc4b5b86e677f289babd0e2b46e7906124eb401102eede0477f79236aae965f9910247327ea629fa251fbce3e7b731d740a147c
-
Filesize
1.5MB
MD5cd4e187efc9e82d310f43bad945eba88
SHA19eb1d5e00dc7311efe969b100c287f8ee6ee6e96
SHA256228dcf9a9c503ec9c54f852840021df65cbe514db1d5f2ce60dfc4fbb3a69d43
SHA512191de75a5d82271fbd7bff7869150790e994b871c7819cad37f713ec750cc8f39de26e4a480a0696b6472491e06f163c656f27655c55aac4c626acd7f997ca5e
-
Filesize
9KB
MD56ca838c1c4412941a4e3195c8984814e
SHA19cbf79a40840db85b0cb24120f3b6c0aa2dac187
SHA2566bd9b4db91c142759fe034686ed37986a1bbcc4f2f15655d65c09d2f5328bd78
SHA512021edfbecc84fe463d38fb4d048b3f4ba96912966179860c1876b2a71e5f86737337fccdba45a5c2af7905994ef8626eb9250089573043559667c1f44027ecf1
-
Filesize
3.7MB
MD590f3286c56d60adcafbdc086b78e64d1
SHA121b010fe628a2da701d11558786161b7fa7b104a
SHA2562158f790ccebb5e33186e8c1c5163f6aef94cf8665d98f455a67a0ac6b5a9000
SHA512d10baa9a64040bcbee6ec30dd7143cf209605648d742ef2eb256e11711010efe72c838c4bbeb7418ba8fbcae44b788a9d3179bc9b966f8d58017719394b1f490