Analysis
-
max time kernel
47s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240603-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240603-enlocale:en-usos:android-9-x86system -
submitted
09-06-2024 02:38
Static task
static1
Behavioral task
behavioral1
Sample
bruno-sis1.apk
Resource
android-x86-arm-20240603-en
General
-
Target
bruno-sis1.apk
-
Size
2.4MB
-
MD5
b4b02386646deb9cf7e9550dec0f9700
-
SHA1
10d031670eceddbd4498b2da75ad28b2a2a5ce77
-
SHA256
f1650d7488a50d35593c1abd1820a65c2369c8a46cbe5c283054d64cc5628a25
-
SHA512
e07f6ca9fea4141a3ef15746eb9cfbf9026a4b5598795c7151f71082535a895d84be753ffccf091ea48386476e58cebd7dd2b5d287665484927c1c9b825d8a2b
-
SSDEEP
49152:+oUQbLSzFXcKcTmvXG2WD09ec6keGp6O4hkna:+o/KzFg4XG2d9lTpx4hua
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tndmcphn.pbflhqvr/files/dex/oat/x86/mZvjrMfQEACRdAhUt.odex --compiler-filter=quicken --class-loader-context=&com.tndmcphn.pbflhqvrioc pid process /data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zip 4349 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tndmcphn.pbflhqvr/files/dex/oat/x86/mZvjrMfQEACRdAhUt.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zip 4320 com.tndmcphn.pbflhqvr -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.tndmcphn.pbflhqvrdescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.tndmcphn.pbflhqvr -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Acquires the wake lock 1 IoCs
Processes:
com.tndmcphn.pbflhqvrdescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.tndmcphn.pbflhqvr -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.tndmcphn.pbflhqvrdescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tndmcphn.pbflhqvr -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.tndmcphn.pbflhqvrdescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tndmcphn.pbflhqvr -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.tndmcphn.pbflhqvrdescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tndmcphn.pbflhqvr -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.tndmcphn.pbflhqvrdescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.tndmcphn.pbflhqvr -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.tndmcphn.pbflhqvr1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.tndmcphn.pbflhqvr/files/dex/oat/x86/mZvjrMfQEACRdAhUt.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.tndmcphn.pbflhqvr/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.tndmcphn.pbflhqvr/databases/privatesms.db-journalFilesize
512B
MD55dd9b7bf299b1fa685cd8d6a40c436af
SHA1bd64a68eec6a642190d3d6d190b2be36a3fb378f
SHA25640fe74c7c6cfa554a75a8c3737e0f18a460ee14200672d7bb8a25009226d9b54
SHA5124bb0ffcee6972713c85c01d4fb6542d242ab28a7cba0173d8d7cd4293b6ac81c28be0b038097cb9a72a1d3a0b314e8f3d6293da217e1ef70a0981080737439d0
-
/data/data/com.tndmcphn.pbflhqvr/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.tndmcphn.pbflhqvr/databases/privatesms.db-walFilesize
28KB
MD51daec08e274eabdfaea75d006054e5d7
SHA1d9da560842b212b325f72375d67d18f65b30f912
SHA25660c838394c875c754601d93ad600fdf6bf420dafdb096562b320e32853f635d6
SHA5128d723427291f8d665406cb69318af01204179e00bfb3fc16ec623adab0de27081fc48eb9743fedda17f7db4ba19f14d8af7d838506e5b4b3ee20afcbc9998d74
-
/data/data/com.tndmcphn.pbflhqvr/files/477191.soFilesize
145KB
MD5db19ee2f80237c276d3a65e038ff3fb1
SHA114c53162b67a5083fca05658fabc6e441dc49008
SHA256269409d57e6375570c700392230a7534bcba9fc62e7bc83bfe7f7ec7be8592a6
SHA5121318713c9a9f56de9bf08641f3c4177f3b8230ceb7abb7cc4db710363e8c6415dbb828834ad837f9d2e91ffe1546e8ba20c4b2e46957becac7ac08b25b2792c5
-
/data/data/com.tndmcphn.pbflhqvr/files/Background/black-wallpapers-for-smartphone-102-700x990.jpgFilesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
/data/data/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zipFilesize
531KB
MD550d78e1dbc1066e433cfbdb728e00dc4
SHA1f61fea7711c841c6064dd39a25deecda9da842de
SHA256721e09d908922941752b942669f1edbe3f5cd3221179ea6fd5ed6de24b87b088
SHA512b3050eedc5fadcc866d6c8cbbae3d915249c68ed07bb628af0dc887d0bf32fdd95dc8d3372e65f9738a0a1d4cb9265e481eca505b7a7572a7c05c39b9439794d
-
/data/data/com.tndmcphn.pbflhqvr/logs/Sistema1717900729453.logFilesize
17KB
MD5da84dc56a9d768ef7e6d4a69a69ba577
SHA1764c9bb079b27c975174a6d5d52795f6678e7cc6
SHA256100e2952abcabceb4f7497e6bdeb11baaf6ee6844704540371de0ffa68456491
SHA512b3054c1a4a7742a663c087e463e71a29966b636cc4d91989faa2a7ddc441c0143689ae2625d749d67fe3f5415d93a001bcdbaf90a63251c0e99d6d2d912f20e1
-
/data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zipFilesize
1.3MB
MD59939a81a288cf2ced10c58a7e3216693
SHA186af39bd7afbb6a0fc8b8f09f24e9607de906aad
SHA256177488b2ac624ad6625bc3282bada9d76b39471dc7a0399a6893dcc8077cf470
SHA5123485e2a2bd00fe598600ab160d9dec14ac4b2dcde3c1e8f0b4326390fe688f624b9713a916c6f5a98fa71867e8e92632f5dc6b989cb74d17fdedb28c92464779
-
/data/user/0/com.tndmcphn.pbflhqvr/files/dex/mZvjrMfQEACRdAhUt.zipFilesize
1.3MB
MD52605a6c20bab31f5a26fb2551c7f1ed3
SHA1f277f85d168e55c47f5fb45b05411b9ce4e25dc6
SHA256f4d0f6519ed32f434ec071a2c0e861f00deaefbe023b4e2ba5e208f953da5d2c
SHA512bcabbaf1111ac4d88bf3df0569d42f4fa91b491ec4fb4a914462f8c071acc8dd8b34a8fee2012a8d3e2e4f20910c8f08f320c012f1160f4d528b72120e2e146f