Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
138s -
platform
android_x86 -
resource
android-x86-arm-20240603-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240603-enlocale:en-usos:android-9-x86system -
submitted
10/06/2024, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
WiFiService.apk
Resource
android-x86-arm-20240603-en
General
-
Target
WiFiService.apk
-
Size
3.2MB
-
MD5
8673a91aea4bc6edb88adc91c229c7ab
-
SHA1
bee0dcf354ebc969885c9a74151942bf19ee3662
-
SHA256
f5d71119003dfb782f7fa69a07e1ac705edfa313b4f4fb5f9b3351585b5e3a17
-
SHA512
6f3e66b2e76b5071bd9f4ec192481160b7c20f0a828f2156f6dba31406eab09170efd08dd9c3d6311bb2b113a0254c1c57a1f07f5cee74853865f0cbe3abd0ac
-
SSDEEP
49152:UB2h2nARLKPGFgz4a5UZsZCKD6WjJp9pLwcqDjlaYXnt1n3i67er:UB2gnoLKPUgzH5Wa5D6Wjj9kd3j3L7er
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_10Jun24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.jrqfhnfi.liokflsd/code_cache/1717985299518.dex 4237 com.jrqfhnfi.liokflsd /data/user/0/com.jrqfhnfi.liokflsd/files/dex/oBwonyMvNRrEkeWLy.zip 4237 com.jrqfhnfi.liokflsd /data/data/com.jrqfhnfi.liokflsd/code_cache/1717985302380.dex 4237 com.jrqfhnfi.liokflsd /data/user/0/com.jrqfhnfi.liokflsd/files/dex/oBwonyMvNRrEkeWLy.zip 4237 com.jrqfhnfi.liokflsd -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.jrqfhnfi.liokflsd -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.jrqfhnfi.liokflsd -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.jrqfhnfi.liokflsd -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.jrqfhnfi.liokflsd -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.jrqfhnfi.liokflsd -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.jrqfhnfi.liokflsd -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.jrqfhnfi.liokflsd
Processes
-
com.jrqfhnfi.liokflsd1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4237
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD55735a76af83b42d5af8a7ec78f61973b
SHA161b16ec4230668ec40dec2f127f160c42feefc55
SHA2566fe5341f19129b9b890ce53cf515db8b03cbeb72f556ed27e081722b037f2ff2
SHA512b349f0920b4759e1dd3334a714e629e6eb3aed3c3ece5288395a793a7d2ae08bec64b792efb72add927644b355a8cc3232c6912d87e2705f3d1d0539d7949b2a
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD506b9048f649af91c3a08a3ce92759708
SHA1cc842b2f4e88c3c29ab94a1b906cc94c61b72ced
SHA2566f4a4c22c8635378dd943a8b92ff6a3d604ec0ebe0724fdf8eba34207eff1de6
SHA512b6b1abdb5a58c8dfd7e42ac8c6fc445e8ccd3975dd4f961782a6deec4b8d9645b82591321a0e0bd94bc7c2c371512c2b4f3757342db61c8df213d97939f864b6
-
Filesize
145KB
MD52b388525ada6f2bb082239bbec0d8314
SHA1cec3ac84001200800e8779a3af1f0734a3668609
SHA256c2cac6e403bce23d675a99fcd0f092419906c2f56cf63f2fe0961cf2cc4ff339
SHA5122d89895f875380257c1e3d04accefc79367641c31e8fe79d08f3f5460f3632548521bf3dab22fcf626afa49f0ce5dc5c80440430afb165dcc5b38631be67db30
-
Filesize
1.5MB
MD5c0dc6059d0b5d8b11d0c72348cdadf39
SHA14100496d0d8504b543bc3480091327ea04ea98a9
SHA256716052b16b5a807757199f46b40eff68fcb0210b8f768b3af37d5fa82a9a51a5
SHA512cba2fcb73117592165f3d08ad6b5d8a5807fa8d5196d0e1a2b9b98b85fddf38798de35f05fcabeecce63476fafb7f7ae70f05d4527e0f3f731c1a5be8187f1ff
-
Filesize
9KB
MD531806fb6ccd870ddad2713f2673b118e
SHA1f111e4618f0d6eb02727668a72666a58d0e28fe7
SHA256e5f540f30c49e30015f3f45df2dcf688281b58de6395fde5cc59a76abc733ccc
SHA512db45c074be62db9af907d9fde88d713b9ad69ac42a5b2e6f08626028be819d81df791e0b7a1d87f8e454279623f5a5bb490be1062927ba71ea744497a96657b2
-
Filesize
3.7MB
MD53b3e4964052efcd94afaa37d2c43ebf2
SHA17170051ccc401fa667e504f6f9e7da721a59eb4c
SHA256776df3e1bd440e22e9060f82173e6294864d263a4f83280a7cd6019998e5e739
SHA512cf2882776b66bfafe5ab4b8000ee29f8b4e6368b0aeec72092312e69ed8b07f9eef21ff535c1d218428480a8e468ec38be6849a8a897d28fff9ec9822fc2dc25