General

  • Target

    183e3c1634f2d44f56ee42884530356ff8052c65cd44934e819a9decea2d071e.apk

  • Size

    2.4MB

  • Sample

    240602-kjcf4sgh89

  • MD5

    f522aaaf817d5e88ca8a57bf41e853a2

  • SHA1

    9e31ecd11243e99252668ba7eec842db312ba42a

  • SHA256

    183e3c1634f2d44f56ee42884530356ff8052c65cd44934e819a9decea2d071e

  • SHA512

    76e0e677bfbb6b8e5dffdbee543c4d4a38dee45add758f028e653c311ee8c3f3b7ad68f72f3bded2f1e6424535a931984bdaed1ccacb55f946ad9e2328cc1c7a

  • SSDEEP

    24576:fW1F9TtV5ooLRBbLmXrgtihxSM+RQ1iyWnzBWDYBoQfUmd6uD3i6BNw4uvuYxoVn:StrR0fxS9RQ1zWQEBkj6ilnv/RID4JSr

Malware Config

Extracted

Family

tispy

C2

https://brunoespiao.com.br/esp/appprofile.jsp

Targets

    • Target

      183e3c1634f2d44f56ee42884530356ff8052c65cd44934e819a9decea2d071e.apk

    • Size

      2.4MB

    • MD5

      f522aaaf817d5e88ca8a57bf41e853a2

    • SHA1

      9e31ecd11243e99252668ba7eec842db312ba42a

    • SHA256

      183e3c1634f2d44f56ee42884530356ff8052c65cd44934e819a9decea2d071e

    • SHA512

      76e0e677bfbb6b8e5dffdbee543c4d4a38dee45add758f028e653c311ee8c3f3b7ad68f72f3bded2f1e6424535a931984bdaed1ccacb55f946ad9e2328cc1c7a

    • SSDEEP

      24576:fW1F9TtV5ooLRBbLmXrgtihxSM+RQ1iyWnzBWDYBoQfUmd6uD3i6BNw4uvuYxoVn:StrR0fxS9RQ1zWQEBkj6ilnv/RID4JSr

    • TiSpy

      TiSpy is an Android stalkerware.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Checks CPU information

      Checks CPU information which indicate if the system is an emulator.

    • Checks memory information

      Checks memory information which indicate if the system is an emulator.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the mobile country code (MCC)

    • Queries the phone number (MSISDN for GSM devices)

    • Registers a broadcast receiver at runtime (usually for listening for system events)

    • Acquires the wake lock

    • Checks if the internet connection is available

MITRE ATT&CK Mobile v15

Tasks