Analysis
-
max time kernel
48s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
26/05/2024, 02:21
Static task
static1
Behavioral task
behavioral1
Sample
WiFiService.apk
Resource
android-x86-arm-20240514-en
General
-
Target
WiFiService.apk
-
Size
3.2MB
-
MD5
e6767452e9799e33d11256adc90f8c9d
-
SHA1
5e1cc83f982036474e473e16e269ef72aa8f34b6
-
SHA256
3ceb899292c1f38855d8f1c37139c07878ff796cb45877b51b2e5e78d523b80a
-
SHA512
38fc29bfb916deee3626fb7ffe1ec7d8dad508f7e60fe28e5357a1900d3aad2edcb043eee324f6650fe978eeb31d483fa2005489eb746ed9924ca0ea86bd23fc
-
SSDEEP
98304:oLXGnVr9PfhzhBorCuMvOTYlopwg77Aoar:oSVZ3hzHorpMvgYG3Y
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_26May24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
resource yara_rule behavioral1/memory/4318-0.dex family_tispy behavioral1/memory/4265-1.dex family_tispy -
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.guvvtukb.efhxhuod -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.guvvtukb.efhxhuod/code_cache/1716690073326.dex 4293 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.guvvtukb.efhxhuod/code_cache/1716690073326.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.guvvtukb.efhxhuod/code_cache/oat/x86/1716690073326.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.guvvtukb.efhxhuod/code_cache/1716690073326.dex 4265 com.guvvtukb.efhxhuod /data/user/0/com.guvvtukb.efhxhuod/files/dex/YdyKiDJpJJSfHLWuN.zip 4318 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.guvvtukb.efhxhuod/files/dex/YdyKiDJpJJSfHLWuN.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.guvvtukb.efhxhuod/files/dex/oat/x86/YdyKiDJpJJSfHLWuN.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.guvvtukb.efhxhuod/files/dex/YdyKiDJpJJSfHLWuN.zip 4265 com.guvvtukb.efhxhuod /data/data/com.guvvtukb.efhxhuod/code_cache/1716690079256.dex 4343 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.guvvtukb.efhxhuod/code_cache/1716690079256.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.guvvtukb.efhxhuod/code_cache/oat/x86/1716690079256.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.guvvtukb.efhxhuod/code_cache/1716690079256.dex 4265 com.guvvtukb.efhxhuod /data/user/0/com.guvvtukb.efhxhuod/files/dex/YdyKiDJpJJSfHLWuN.zip 4265 com.guvvtukb.efhxhuod -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.guvvtukb.efhxhuod -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.guvvtukb.efhxhuod -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.guvvtukb.efhxhuod -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.guvvtukb.efhxhuod -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.guvvtukb.efhxhuod -
Checks if the internet connection is available 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.guvvtukb.efhxhuod -
Reads information about phone network operator. 1 TTPs
Processes
-
com.guvvtukb.efhxhuod1⤵
- Requests cell location
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.guvvtukb.efhxhuod/code_cache/1716690073326.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.guvvtukb.efhxhuod/code_cache/oat/x86/1716690073326.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4293
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.guvvtukb.efhxhuod/files/dex/YdyKiDJpJJSfHLWuN.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.guvvtukb.efhxhuod/files/dex/oat/x86/YdyKiDJpJJSfHLWuN.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4318
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.guvvtukb.efhxhuod/code_cache/1716690079256.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.guvvtukb.efhxhuod/code_cache/oat/x86/1716690079256.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4343
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD5a9a13ac364196add24501e77e625feac
SHA13c388ed6d237d56f9d7914d1511761abf85e09e4
SHA256cebb0ff6e357cec4bbdb5d6b1054e6664a22497905609b754985e4f0b7563a08
SHA5127751906cd8157ab972ad3ec8e74d13772c3accfa6056b26721203243073f9c7f385af045f60dc871d6c0547c57d80c0062c6c81606870dc7f5117758b149a679
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5707b24dfbaa1e66ff4d9d1da5a0cbc3b
SHA1b2964d73c74085c6f370964ae0440a4f019b5a9b
SHA2566f4a4c5ac09753778dfaffb5382a142a651f83a2a5bbd0e18ab5af94b7c335f1
SHA512e53dfbc7ae9ed8eceade886203d2e0f9db446391ed21970d4c623c5ef99751e7b9c6c8402655a6fd03e662c46e67d4b0ece66a53f2401822a09fab5fccca3775
-
Filesize
145KB
MD5fa1e96b895476b610e904b306022e494
SHA19bb34c734019dfb360277d2c0d3d7e97ce1db9fc
SHA256d4f26bd9d37fc16751c192b3ac37f31e554068347994eb974dbedcb5203a1bcc
SHA51234a12504aeb3e0df7dfcf8063beb337db79cfb7de448f98e5ae75318b26a5e8f9695f0d9d7446e9809273dcfb4511ee904bf0244d8971c7dac1eb6c1f44c4701
-
Filesize
1.5MB
MD51409c7b2bc126befcbdd470075963c63
SHA116137109bd155afae61276fcce130408b6b83277
SHA256ac25eaaad02c4f2c547b0379a7e73962ccfdcca13c26bde63b2afd9a42ec4bff
SHA512bc299f815c9b4bedd7a6095436e8b2c05627d212759a38035902b68ca60d986845ee75bb34d428a756770a7d0604c15774f1c3db0efe6cd8dd4fe857ff5a6e20
-
Filesize
9KB
MD5927fb269901363ac4769f510ee50d0a6
SHA11002b27e0970a085b5ba20c2ccc5685e51b16d09
SHA256e8a0cbb303624606900c2cb25c1b8a80f80560c2bbd750ad2213dd0e0ec847ee
SHA5127037d904918580830328646dd777264ba1831a3111bc41b4fdc7bbd5e92d02b7dcdcbff02dc4ecf76f42f03a7a41ffce266eb7e88c2c1d25b93a31c75f1b2815
-
Filesize
3.7MB
MD5fe91fcce909963980af1ac11467c5ca4
SHA1e9787588f8c1450d7acf3529792d0e3973d93e4c
SHA256ea75cfdb4ebcb2e7bf7eae181ebe85f8a5a9df608733ebb087afca6dde1f7fc1
SHA512c761455dfd825268bc233cb607c7a5c027e3c942eb9b345437c1a89b2fe7cce0d67f9692bb4534c1e7af7f2faca954b02c318a07e3b983975ca360453ddce18a
-
Filesize
3.7MB
MD5fccbb1b221f3fea77f6bf4383e2dbdd0
SHA1449ed9a8a080a82c71b26c37c8ace3b5e04a44f5
SHA256915a83854ec392738cff97526d39d2e3d6db1df15b7b8ae6a545a7ad84b5b9e7
SHA51210b11176ebbbb307421b81e0f410bc2ea99fc6bce71c3c5d481f6ac348241c62dbf912ddad7f7eb2915a398dec1054c7c98eae42d1f2e93975eb21d64345cb8d