General

  • Target

    5b36bb475c08ed159c3c12821aeeedfa4939f00ee74cdc375d238fdcad9736ef

  • Size

    2.4MB

  • Sample

    240523-cl7e9saa5s

  • MD5

    2c82df9a565970b1b9b8344a0b9b2e64

  • SHA1

    0ec2572885a39693e60fc6d1f9de4885d39e5b6c

  • SHA256

    5b36bb475c08ed159c3c12821aeeedfa4939f00ee74cdc375d238fdcad9736ef

  • SHA512

    3eae95d5b3173a6f94564ed1da5b66af51ae508476d5233e22ae3b604400f1bd35fffe8b62c50dd7fb41a41d95cf9250c2844103a98c9f3be312e9d523594ae5

  • SSDEEP

    49152:nwt4s1tS3eIFS5m0qmvtMRaopu6S8BllTIvhCf3SDNxBe:nwtP+rFMimtMRa8u6znw0IRe

Malware Config

Targets

    • Target

      5b36bb475c08ed159c3c12821aeeedfa4939f00ee74cdc375d238fdcad9736ef

    • Size

      2.4MB

    • MD5

      2c82df9a565970b1b9b8344a0b9b2e64

    • SHA1

      0ec2572885a39693e60fc6d1f9de4885d39e5b6c

    • SHA256

      5b36bb475c08ed159c3c12821aeeedfa4939f00ee74cdc375d238fdcad9736ef

    • SHA512

      3eae95d5b3173a6f94564ed1da5b66af51ae508476d5233e22ae3b604400f1bd35fffe8b62c50dd7fb41a41d95cf9250c2844103a98c9f3be312e9d523594ae5

    • SSDEEP

      49152:nwt4s1tS3eIFS5m0qmvtMRaopu6S8BllTIvhCf3SDNxBe:nwtP+rFMimtMRa8u6znw0IRe

    • TiSpy

      TiSpy is an Android stalkerware.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Matrix

Tasks