General
-
Target
551d61685f69372204f69da1394b4155a4f732d5a4ff5bdb67f11ae7a8e7ee50
-
Size
2.4MB
-
Sample
240524-ckhqhshe6t
-
MD5
638ce1f09e3c3a49f66967d0c12e319e
-
SHA1
3cac713c9f1075c842f029370462840f732693c2
-
SHA256
551d61685f69372204f69da1394b4155a4f732d5a4ff5bdb67f11ae7a8e7ee50
-
SHA512
29b13788e870f9e7656ff1bde4d5834d73fc8ac38ed532826b6d2226d8246d8d7c932202dde52994b9db219396bfbacdad22b5fa259d8319f9c70bd01168ac74
-
SSDEEP
49152:WxUrY5PySrSi2+hdPW5eMbC6KYEUMKVWgdCGq1+5/:KUUZLrSi2+7ieQR9E1ZgPq4x
Static task
static1
Behavioral task
behavioral1
Sample
551d61685f69372204f69da1394b4155a4f732d5a4ff5bdb67f11ae7a8e7ee50.apk
Resource
android-x86-arm-20240514-en
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Targets
-
-
Target
551d61685f69372204f69da1394b4155a4f732d5a4ff5bdb67f11ae7a8e7ee50
-
Size
2.4MB
-
MD5
638ce1f09e3c3a49f66967d0c12e319e
-
SHA1
3cac713c9f1075c842f029370462840f732693c2
-
SHA256
551d61685f69372204f69da1394b4155a4f732d5a4ff5bdb67f11ae7a8e7ee50
-
SHA512
29b13788e870f9e7656ff1bde4d5834d73fc8ac38ed532826b6d2226d8246d8d7c932202dde52994b9db219396bfbacdad22b5fa259d8319f9c70bd01168ac74
-
SSDEEP
49152:WxUrY5PySrSi2+hdPW5eMbC6KYEUMKVWgdCGq1+5/:KUUZLrSi2+7ieQR9E1ZgPq4x
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the mobile country code (MCC)
-
Queries the phone number (MSISDN for GSM devices)
-
Registers a broadcast receiver at runtime (usually for listening for system events)
-
Acquires the wake lock
-
Checks if the internet connection is available
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
2System Checks
2