Analysis
-
max time kernel
47s -
max time network
156s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
03-06-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
bruno-wi1.apk
Resource
android-x86-arm-20240514-en
General
-
Target
bruno-wi1.apk
-
Size
2.4MB
-
MD5
0df42942d4e4e04f378296c220a67709
-
SHA1
8993614d4c472d1d72544a5045c07e7dc1db9573
-
SHA256
038e9268e21f9933b0dd014c64afbd38da48ea3e388423f4d74fe5552dd7ccc7
-
SHA512
d5cc837f296f2b8ae6967f1726a1865bb52cb695fb9b001e676de55046fedceb094f81bb2b5f208ffb074649d612adabb458d4bf19ed7e88275e58ab0cc92310
-
SSDEEP
49152:VapUvBSbQfdXYec1ZiPmmDzWT7EjP7SPlWk28KP/tQSNaO+G:Va+obQRYtZWdTPuPlWNHfH
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.jjlswjei.clznoncj/files/dex/oat/x86/SANHKtbgYWqEDkTjH.odex --compiler-filter=quicken --class-loader-context=&com.jjlswjei.clznoncjioc pid process /data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zip 4357 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.jjlswjei.clznoncj/files/dex/oat/x86/SANHKtbgYWqEDkTjH.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zip 4326 com.jjlswjei.clznoncj -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.jjlswjei.clznoncj -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.jjlswjei.clznoncj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jjlswjei.clznoncj -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.jjlswjei.clznoncj -
Acquires the wake lock 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.jjlswjei.clznoncj -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.jjlswjei.clznoncj
Processes
-
com.jjlswjei.clznoncj1⤵
- Requests cell location
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.jjlswjei.clznoncj/files/dex/oat/x86/SANHKtbgYWqEDkTjH.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.db-journalFilesize
512B
MD59168b639d9a48f1f28785fa0d84783a4
SHA1171481d680436de220bfb1a8cacbaafbad731de8
SHA256b596613c2ae269987a32a9dc5ff478afb9a80e5f466c4f75a3426d3443533f28
SHA5123306ec9db0a9a7d596327f90ed952291a80d078b077ec68e57900f0fd04360630899dbacbce8a2eecbc16bbc384950ab7f42539c9112c17fb2aee152f41a952f
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.db-walFilesize
28KB
MD53e78a2e7bd6a22ea19761e4ae977bf68
SHA1d313529d72918d130e01abc853ce859b67a11c35
SHA256f728973bc47c1e3578186f0333c0251ebc430c46c1fb504234c0a2385316d8ed
SHA5124e986a4d17caace7095a5871b9a6f564c773eb25e1794a469e73aeae7ad5bb96fa874eaac7c59dc5deeb38e2135124bb05364d052f681f1864abce5fb37cfbbe
-
/data/data/com.jjlswjei.clznoncj/files/477047.soFilesize
145KB
MD5c8e69641505a0acefba545ba883b75e3
SHA1c1f856847221584df96b3be272f714118f400670
SHA2562e4d264662ebaf287d46121d39b67dc7fe225ed1925baa9dfee0fc3327d0d6b5
SHA512b0da7f702bdb14625f282baafc30938c1266aba8135734070d2481e43531d2d93f417c56828a695a32e3825e7989faed84fc6a08575b04d29d08bed8cbcc1d6d
-
/data/data/com.jjlswjei.clznoncj/files/Background/black-wallpapers-for-smartphone-102-700x990.jpgFilesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
/data/data/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zipFilesize
532KB
MD549692a62fd9ea28580b0979f0ba3eca2
SHA19f3a954a3f990df605f19662ac24b64af8affb07
SHA256eb6ccf2c072f5acd44207a048be5352f11d19b92f33a0cdd579c21cf6a5817a4
SHA512f84a76467036bf90f48f0d50584a222f8284a632bb32a2142e9244a720c2657276b998fc006f94021f419db8cb61639cb64cbcb8d85ee45f833746c574cba7d1
-
/data/data/com.jjlswjei.clznoncj/logs/Sistema1717381284737.logFilesize
17KB
MD5ba85f4695bf2e5b9c57604bfaa633e72
SHA17abd14dbf2a74d7432df91a6a2593d0c25e37290
SHA2568fecd6cd1d34c90f2d174ee9a96cd12552da4358de8dcaf9f9ee6237824226f6
SHA51219927b3956694fc57c07770b35b36bc3fe1f9c1451061f5e369f172abd7062219df95b2acaa66ae9baaadee9ab9fe87c97fd2d5ff3857f2e7e0d48ff6bbcab38
-
/data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zipFilesize
1.3MB
MD50badbcf75290d59fb7fdd5bc77c37691
SHA1d21a93a9c9719a5aa6f8e9cf45224a075ded4d28
SHA256f8fbe09ab4f6868fe1683104184a5230b0d19eacb4dab411f7b0cbe8d136fae1
SHA512614182ec63bb1c6f0c787dfb6a950e26604685831e8de295f457c520bfd4154f7ebd45bab243e9d1c4b1b87f514a9abfe1823b3426a2327ba89538854962c2ad
-
/data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zipFilesize
1.3MB
MD511563184a46f367e523498e543f2ea8b
SHA1a25c53b47d00012b768921fbb3749bd152e5b955
SHA2568752720816468a08050797a863f0a2679b0743e836a76ac56512211fa4c0ce87
SHA5128973210ed400830376921aa97da2895731cb46e8d799ab343a9b2c23e1c49eed579e9513bb30223c9b6099e518c2257628bb45831673601ac67584ce878a2ac4