Analysis
-
max time kernel
48s -
max time network
148s -
platform
android_x86 -
resource
android-x86-arm-20240514-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240514-enlocale:en-usos:android-9-x86system -
submitted
03-06-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
038e9268e21f9933b0dd014c64afbd38da48ea3e388423f4d74fe5552dd7ccc7.apk
Resource
android-x86-arm-20240514-en
General
-
Target
038e9268e21f9933b0dd014c64afbd38da48ea3e388423f4d74fe5552dd7ccc7.apk
-
Size
2.4MB
-
MD5
0df42942d4e4e04f378296c220a67709
-
SHA1
8993614d4c472d1d72544a5045c07e7dc1db9573
-
SHA256
038e9268e21f9933b0dd014c64afbd38da48ea3e388423f4d74fe5552dd7ccc7
-
SHA512
d5cc837f296f2b8ae6967f1726a1865bb52cb695fb9b001e676de55046fedceb094f81bb2b5f208ffb074649d612adabb458d4bf19ed7e88275e58ab0cc92310
-
SSDEEP
49152:VapUvBSbQfdXYec1ZiPmmDzWT7EjP7SPlWk28KP/tQSNaO+G:Va+obQRYtZWdTPuPlWNHfH
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Checks CPU information 2 TTPs 1 IoCs
Checks CPU information which indicate if the system is an emulator.
-
Checks memory information 2 TTPs 1 IoCs
Checks memory information which indicate if the system is an emulator.
-
Loads dropped Dex/Jar 1 TTPs 1 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.jjlswjei.clznoncjioc pid process /data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zip 4228 com.jjlswjei.clznoncj -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.jjlswjei.clznoncj -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.jjlswjei.clznoncj -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jjlswjei.clznoncj -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.jjlswjei.clznoncj -
Acquires the wake lock 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.jjlswjei.clznoncj -
Checks if the internet connection is available 1 TTPs 1 IoCs
Processes:
com.jjlswjei.clznoncjdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.jjlswjei.clznoncj -
Reads information about phone network operator. 1 TTPs
Processes
-
com.jjlswjei.clznoncj1⤵
- Requests cell location
- Checks CPU information
- Checks memory information
- Loads dropped Dex/Jar
- Queries information about the current Wi-Fi connection
- Queries information about the current nearby Wi-Fi networks
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Acquires the wake lock
- Checks if the internet connection is available
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.db-journalFilesize
512B
MD501fae889712ae41f4c2c4f5938504355
SHA15db871d8294c0f32376575e0417879582fd5708d
SHA2563c0435fa62b817dfce890132fa3284bc61318fb6183f59b0b3014915754a3829
SHA512dd445ac2022ffe68ef1f0e12a47515e527444b5097de601ccbc2a5bc344dcaaf6d2c204c2e301f21fc61c950f01d61e7d6f8ee710e132aaf8df6048b3a332328
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.jjlswjei.clznoncj/databases/privatesms.db-walFilesize
28KB
MD570dedc3571bea46df3d9bf81f1d9828f
SHA14a2e3a9350a9fc66f990f0fb612c18f48593f727
SHA256c666411bf56177cf17c0489a9acc2972d6a4e463733d008241519036eb29f15c
SHA51214da078ec64998266647fb1c7ad8abbd93a82d61b463b75eebbca12eed8c4260f332d2a939c77b55460eb7e83a21a6895da74086c56b07bbb2c2fa2f0d76b331
-
/data/data/com.jjlswjei.clznoncj/files/477047.soFilesize
145KB
MD5c8e69641505a0acefba545ba883b75e3
SHA1c1f856847221584df96b3be272f714118f400670
SHA2562e4d264662ebaf287d46121d39b67dc7fe225ed1925baa9dfee0fc3327d0d6b5
SHA512b0da7f702bdb14625f282baafc30938c1266aba8135734070d2481e43531d2d93f417c56828a695a32e3825e7989faed84fc6a08575b04d29d08bed8cbcc1d6d
-
/data/data/com.jjlswjei.clznoncj/files/Background/black-wallpapers-for-smartphone-102-700x990.jpgFilesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
/data/data/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zipFilesize
532KB
MD549692a62fd9ea28580b0979f0ba3eca2
SHA19f3a954a3f990df605f19662ac24b64af8affb07
SHA256eb6ccf2c072f5acd44207a048be5352f11d19b92f33a0cdd579c21cf6a5817a4
SHA512f84a76467036bf90f48f0d50584a222f8284a632bb32a2142e9244a720c2657276b998fc006f94021f419db8cb61639cb64cbcb8d85ee45f833746c574cba7d1
-
/data/data/com.jjlswjei.clznoncj/logs/Sistema1717381286901.logFilesize
17KB
MD58372e2ceff74c2bafdb7bd6e69532ef5
SHA16901c857b55c0fee1d9d49b67a634677a101f05a
SHA2564cfb00acfc8a16209a63a9e8577b2fd217fdd85820b145748e5ea6e1fe1b8d9a
SHA5127ad743ee5c4335848a442ad6c3e55a603af28c022efee205c71933bd00bb46830928214c6ae6cd2cf78b764529bca271c81a742591c3efe4c848bdb74e6bfe79
-
/data/user/0/com.jjlswjei.clznoncj/files/dex/SANHKtbgYWqEDkTjH.zipFilesize
1.3MB
MD511563184a46f367e523498e543f2ea8b
SHA1a25c53b47d00012b768921fbb3749bd152e5b955
SHA2568752720816468a08050797a863f0a2679b0743e836a76ac56512211fa4c0ce87
SHA5128973210ed400830376921aa97da2895731cb46e8d799ab343a9b2c23e1c49eed579e9513bb30223c9b6099e518c2257628bb45831673601ac67584ce878a2ac4