Analysis
-
max time kernel
87s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
20-05-2024 08:57
Static task
static1
Behavioral task
behavioral1
Sample
7af1f390b64437d0a16980897a480b906d2a9d94c394d86c0855aa1012ad3c9b.apk
Resource
android-x86-arm-20240514-en
General
-
Target
7af1f390b64437d0a16980897a480b906d2a9d94c394d86c0855aa1012ad3c9b.apk
-
Size
2.4MB
-
MD5
33eb52bbb721d4502ab114d4e4bac5c2
-
SHA1
9a34d8d8ef1cee54738773d7b6ffcb276997a8a2
-
SHA256
7af1f390b64437d0a16980897a480b906d2a9d94c394d86c0855aa1012ad3c9b
-
SHA512
d146f5046a9455e9b1b388b17bc7c7d8798dc82c98f2691bd3ac40dba4bbc610fc7a0650e08e2187ff85b3479180502fc6ef5c588b19faf42bad22d41d0a418f
-
SSDEEP
49152:Nec8pt3S9Knxo3MoZhOEyUvduVwuy716cfiZrS:NerLi9Knm3rKSwikc6tS
Malware Config
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.qfkcnrfe.miuiusel -
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
Processes:
com.qfkcnrfe.miuiuseldescription ioc process File opened for read /proc/cpuinfo com.qfkcnrfe.miuiusel -
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
Processes:
com.qfkcnrfe.miuiuseldescription ioc process File opened for read /proc/meminfo com.qfkcnrfe.miuiusel -
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.qfkcnrfe.miuiuselioc pid process /data/user/0/com.qfkcnrfe.miuiusel/files/dex/YjVHncYivnulnaEKk.zip 4257 com.qfkcnrfe.miuiusel -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.qfkcnrfe.miuiusel -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.qfkcnrfe.miuiusel -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.qfkcnrfe.miuiusel -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.qfkcnrfe.miuiusel -
Acquires the wake lock 1 IoCs
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.qfkcnrfe.miuiusel -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.qfkcnrfe.miuiuseldescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.qfkcnrfe.miuiusel -
Reads information about phone network operator. 1 TTPs
Processes
-
com.qfkcnrfe.miuiusel1⤵
- Requests cell location
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:4257
Network
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD5f2db5c3897e200ffa89c8b82868f9779
SHA1f0c70aca3af9e90bc428bd8b4ed643266942c17d
SHA256fa1c08d8cc5e819e6bac9158e32febb446f0ad7826456ebdd157b32875d9223c
SHA5121b52b08cc9b58a00d87f94db587bcd0bb6a8581f87a18e5b5b338c8148aa5b21d1f9d7e1a5e61e9856c733fd0a63b969a40e0bd3d91fc5420fc5dc969f7aed94
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5d9d5f36bc5dd23e0bddf26e482c0d136
SHA1c220ff7218cb6a9cd663d349e5877b8c3a36b0c7
SHA256e1e9997d5dacf0a63ffcbaae5577a4597e3573bf5194f6a8b73d6ec333bd9816
SHA512906824fb9abce49cd4810d96e6cb20f8779d013d70d298bd70d2f549cd4e2f08f54d4fa357868cd4e68f69c721073017f4d400ef598ec636d8184da81a60f564
-
Filesize
145KB
MD5f43a8016fa55227db92ed050a8ec8d5c
SHA190a66e2f3bb2703322af6591fe43ea9f8e616d43
SHA2564139b60343133a88d36afd27193ed6d62e22d6e1301f20f5b67ba4e31425cf3a
SHA5126ed28dc8a625d4ba8a345b42d8c6df9c27d10c9cbb9fed03c4f6c689759d6385ed014fc6b32117802bbb3421e616d4bd680241d75814305d26449545eaa7e3c6
-
Filesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
Filesize
535KB
MD56e29d718c803816e6796a1aacf869760
SHA10f0349027cde92e6d3c007a981af2fd9274c6120
SHA256f0749b0580883287686914a74efca03d906ab95dae281b2874282a1cb61c1659
SHA512f263aab4efa0624b2eb010ccfa25b635869bbcbd875d0205410d77922ee429c79b33c79acac4174846b2ad5cedcfba6980c2f3ad17f9b0eab175378d3f9269fd
-
Filesize
17KB
MD5fad4fa0703d7548948f4d3a987aabd98
SHA107f4ac67124fad470724db3cfdde851426cb5ec7
SHA256ab953519d0ae2bcbb6c6ea2b17df2b45eacd34a8d5b3bf672942bd9fa93de754
SHA512e1df2cd86da82c2ad8acce47e9f5a8c4f110741ca235132b104535342f08fd4d09ea1310e085aa3d315273dbe26291942169a671f6e539a8e65b87a13bafcd94
-
Filesize
1.3MB
MD5ba4b18c19c969f79acaa33d63aa06d40
SHA1fbe20ebae5f9c72045116e5987ccde1ab65fb101
SHA256de9b5a949efd5bfa9250c49dbc0ad87df63f0f084d1a56870064c8ab7a16e400
SHA512031c65b87b149ecba6f07412fac3784c1e727258581dae7427a42d13fd3c664a8f77656670ac6316b8090eb30ad20881be6f1964db9cf566795509bb585185ee