Analysis
-
max time kernel
48s -
max time network
137s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
24-05-2024 01:13
Static task
static1
Behavioral task
behavioral1
Sample
3f51f79ff23d9fb9fe401fab525a418340da8a07a0c20937da619ec34bb6e56c.apk
Resource
android-x86-arm-20240514-en
General
-
Target
3f51f79ff23d9fb9fe401fab525a418340da8a07a0c20937da619ec34bb6e56c.apk
-
Size
3.2MB
-
MD5
4b2c76b9181f2bd8c47fd5e97a8f0154
-
SHA1
a6e25ab429f93e5e03bc546c111e653e6569d451
-
SHA256
3f51f79ff23d9fb9fe401fab525a418340da8a07a0c20937da619ec34bb6e56c
-
SHA512
acccb94a864ea19eab77a660ab36e9175b45b95089d5bba1ebe75031e31a2aa59c29d0755e4335ca59144046d89f8beaf607a7777d1b62212a30f836684f3f7b
-
SSDEEP
98304:kngWOn1DPEpN3dcw9l5ij2rUeMIwf/Zw0U:mo1DKT5isUFq0U
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_23May24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.pszmdedk.agggzgpfioc pid process /data/data/com.pszmdedk.agggzgpf/code_cache/1716513203465.dex 4227 com.pszmdedk.agggzgpf /data/user/0/com.pszmdedk.agggzgpf/files/dex/IgzpMQlsdEPmgxGOL.zip 4227 com.pszmdedk.agggzgpf /data/data/com.pszmdedk.agggzgpf/code_cache/1716513206836.dex 4227 com.pszmdedk.agggzgpf /data/user/0/com.pszmdedk.agggzgpf/files/dex/IgzpMQlsdEPmgxGOL.zip 4227 com.pszmdedk.agggzgpf -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.pszmdedk.agggzgpfdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.pszmdedk.agggzgpf -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.pszmdedk.agggzgpfdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.pszmdedk.agggzgpf -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.pszmdedk.agggzgpfdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.pszmdedk.agggzgpf -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.pszmdedk.agggzgpfdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.pszmdedk.agggzgpf -
Acquires the wake lock 1 IoCs
Processes:
com.pszmdedk.agggzgpfdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.pszmdedk.agggzgpf -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.pszmdedk.agggzgpfdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.pszmdedk.agggzgpf -
Reads information about phone network operator. 1 TTPs
Processes
-
com.pszmdedk.agggzgpf1⤵
- Requests cell location
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.pszmdedk.agggzgpf/code_cache/1716513203465.dexFilesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
/data/data/com.pszmdedk.agggzgpf/code_cache/1716513203465.dexFilesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
/data/data/com.pszmdedk.agggzgpf/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.pszmdedk.agggzgpf/databases/privatesms.db-journalFilesize
512B
MD530be7099878a87da004289c2846846a3
SHA19468d00276ee792f93d7d684385c599d25a8c4d5
SHA256177e6d986c9530f2b0637c601c2e8308fda97ecb16474a75d2f207b28aac072d
SHA512f80670ab02e149181444e33bd5b80b516edef9d56171b0ef42c9b106a3c86f26096afcf2cdbb6461ec731fe215a072b8756401f3d58232c3f19787597eeefaea
-
/data/data/com.pszmdedk.agggzgpf/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.pszmdedk.agggzgpf/databases/privatesms.db-walFilesize
28KB
MD577ddfa6e11990af3f2c9ac483e761a5f
SHA144fd1b335d8c773349ae573d6eadb6367a2f6ff7
SHA256b3b0cd2bd7f70608836034d780263af66a60fb74ae5b6fb0270f685b4fa8f24a
SHA51211fb16c6cc9a052c90a6507233b458f8fd3ba4bffcaaee45a1cc51bd5daf1a7aabd35422eb86e74fb327d1f4de7ce8b8ba3ce2509477df00d0b4271ea3bf72d1
-
/data/data/com.pszmdedk.agggzgpf/files/476784.soFilesize
145KB
MD5985f2e0a53badc5ecf29a9372d29c728
SHA17281136054fa64998a43660a7e6238b51e128d88
SHA25699ea1cc61ed9ad94109bba952bd06d6ba2897dc83a3721f6708e8015b50465af
SHA5129474e5b5da4a9af9e71acc3f8d9f2646f385c325ef650979a9f7d51485af274d068773770b661a0fc4981e223156ba4e697da35e569d5b422c120d9853d98908
-
/data/data/com.pszmdedk.agggzgpf/files/dex/IgzpMQlsdEPmgxGOL.zipFilesize
1.5MB
MD55e2354c897aa2e4e6e0826d4ec9aae2d
SHA18c8e96524a907c4a6100f3744d8bae4c72f91cd9
SHA256ef9a8f7e5e73a868b9b4b72d55cb130bd3fc1a191ecaf9b441c1270d22de7db8
SHA512c593d54835b7d4cadb2298081002d693b6f669324a70be7c9e1a4b65bd2f448cb41eb44788c476da8369b3b9c9af48c0ae6e87ce83e5b018222a48db0b8db90c
-
/data/data/com.pszmdedk.agggzgpf/logs/Sistema1716513209304.logFilesize
9KB
MD59db5a531f29d83b5c8bf6afd789bdcfa
SHA1e24514d69e97f4f1d1e2184266e145ee75f568e4
SHA2561a433477bf3b15c4a610c3797da3cdca1802122433a082befa6458f1b52745f7
SHA512004bf4164fdf7e26509dea605585c6ddaa7d2c969f6e5c25dd62d9028d51cf773aab619b3faa4045f3c435c7a925e4400ae0b16fdd24dd5400afe996da1da4f3
-
/data/user/0/com.pszmdedk.agggzgpf/files/dex/IgzpMQlsdEPmgxGOL.zipFilesize
3.7MB
MD5a199e83a08db5284b46a67117fb9484d
SHA150b2c26d0acac6e155f9b361cda6a9333b1f4a34
SHA25658ba7b23bed3308b2de9346a5ed0349dd9ac07f1f71a5b144a61d412d9fd5250
SHA512eae9eec5815430c3e78fbce6268665466e34814ab3e50c051ec4e03227b9388aa142520226b3b5520731ab96b568339216552e323420c718f9766c6aa38e3e20