Malware Analysis Report

2024-07-28 11:11

Sample ID 240610-dl46ksbh57
Target 8dfb6601ead99c13bc66de509762236c1960fa55dcd40a0862a1e789fdf17c65.apk
SHA256 8dfb6601ead99c13bc66de509762236c1960fa55dcd40a0862a1e789fdf17c65
Tags
tispy collection discovery evasion infostealer persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8dfb6601ead99c13bc66de509762236c1960fa55dcd40a0862a1e789fdf17c65

Threat Level: Known bad

The file 8dfb6601ead99c13bc66de509762236c1960fa55dcd40a0862a1e789fdf17c65.apk was found to be: Known bad.

Malicious Activity Summary

tispy collection discovery evasion infostealer persistence spyware trojan

TiSpy

Queries information about the current nearby Wi-Fi networks

Requests cell location

Queries the phone number (MSISDN for GSM devices)

Loads dropped Dex/Jar

Requests dangerous framework permissions

Declares broadcast receivers with permission to handle system events

Queries information about the current Wi-Fi connection

Declares services with permission to bind to the system

Queries the mobile country code (MCC)

Queries information about active data network

Reads information about phone network operator.

Acquires the wake lock

Registers a broadcast receiver at runtime (usually for listening for system events)

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-10 03:06

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-10 03:06

Reported

2024-06-10 03:21

Platform

android-x86-arm-20240603-en

Max time kernel

47s

Max time network

131s

Command Line

com.iqxpqygg.kczlvqli

Signatures

TiSpy

trojan infostealer spyware tispy

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip N/A N/A
N/A /data/user/0/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip N/A N/A
N/A /data/user/0/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip N/A N/A
N/A /data/user/0/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip N/A N/A
N/A /data/user/0/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip N/A N/A
N/A /data/user/0/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Processes

com.iqxpqygg.kczlvqli

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.iqxpqygg.kczlvqli/files/dex/oat/x86/20a56d66df1cc793.odex --compiler-filter=quicken --class-loader-context=&

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.iqxpqygg.kczlvqli/files/dex/oat/x86/ZeHWAvIvQGhZpikMk.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 142.250.179.234:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 172.217.16.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.187.238:443 android.apis.google.com tcp

Files

/data/data/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip

MD5 901c1337546498ed45196abc57f5f0e2
SHA1 6dc6e42f57eb022d481e4d61cd47e6aacffe2606
SHA256 9e904cdd57bde708961e1f344995b38703876703599852a141a140db4f7ef355
SHA512 ebd196dd283530d0c2269d79466293a9d9b8687caa21bbbe5547a65b7e4f7689165dfa417561a8cfbbdd8504333f69c79f35e754425792d18d8a632225622f04

/data/user/0/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip

MD5 d767d83c25d97d132415e2bcd4580059
SHA1 44849528aaf6a2b53042987010e802ea0227f0b8
SHA256 9325cae8d286344ae5092984ccbaaa0638d37dd0899a246c28bd0014e7c6ced3
SHA512 f0989a7cf81be3a666f17989c95121c2b641ec2e1b79011c7d4fa08e67a1011678a6f56987a99cbc4113ed17f4d821b2e30c4795175bb23aa2aae31af3110eec

/data/user/0/com.iqxpqygg.kczlvqli/files/dex/20a56d66df1cc793.zip

MD5 c9b7b3c1515ee639262e585752ca685c
SHA1 cbd5fd393554dc80e190b53d4a12f30858ac94b2
SHA256 89ebe9ce815eb01c34c1cd2c00d3b136f8d25d4a627cabae45bdaa165eee2c32
SHA512 583ae0f0ba69ab816217a2d6034a67af8595e79f52b6a6c32d9563b6d55275ddef42e1ae79af6405a2ee98761964b6e2671e0365dad075c77c8cb96fd0f7c08e

/data/data/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip

MD5 30d0c0544b01c53832c846595f6ca36f
SHA1 ef7e0689e57cd65842b55bc18148061e0fc23576
SHA256 a56a4e427d449054f1b09eedcc6b66727ede3bffb986c2190b6b6076ae8aeffe
SHA512 d627412b88dd075b65f738ee17c4673d361007b52f1712d4a6cdb5cd16194f0a141fc0d3880d916cce342b1936b5ccc27437e87f7d441762cb095f2630e8c56a

/data/user/0/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip

MD5 14f20fda78ed35c6a23b0d0e0ce4ff44
SHA1 e6f2a3e618414b137a8095fd798d5d7a16751a54
SHA256 737f15f362f81f7bb35e9a7f20efecb270c3c329480609d26bb20a654dc9da3f
SHA512 04891c5b833e54b8138f5ec9c6ced26e2a13d62696b0c6f5f856504ac37fa26de613dc45db846ed19ac226e2cfe9c0001f0f5f554b205436b8d302914d64e891

/data/user/0/com.iqxpqygg.kczlvqli/files/dex/ZeHWAvIvQGhZpikMk.zip

MD5 922dfc78d375e0d820ad57be7e3831b9
SHA1 7e7da656c9c487eaedbb12f09bfdc2b50f7c742f
SHA256 13190477ad18c7a32130aaad6925b427cd8f8d1cf1ad23e35634a754df809a85
SHA512 df88fc10f8b343e8c244c7ff3095eadc93eac280c64667626e33d6caabc6f617a05a927df5b5af332ec0c9050bcb3e4d6cdf5007889eabe14bbb0d58511254cf

/data/data/com.iqxpqygg.kczlvqli/files/dex/pro_btn_bg_animation_img_0.jpg.zip

MD5 7c20a2b01bf3f9df1f0abb72ebbe82be
SHA1 e601b2e41434623edbeece32867517a3cdec5449
SHA256 1a10cc3cd2dc21a9be2d2eb758fd19288082619d331245b927d0a9299462ea2e
SHA512 3faa6efbd3ebf6e1aff7ebe9958c5f94bbfe9c5ff9e11e9092b1b7301bbe6504c01b922d709303147e213b3cadce8e96462220a1d1bf4d6cdaec95b3f84bb1b4

/data/data/com.iqxpqygg.kczlvqli/files/477171.so

MD5 c24d9a40ec1aa0148e77e3199bfc5219
SHA1 081f7bb03e49dc73f70b4529abe726a60c25ad5d
SHA256 8cc1b45075203b089c1360a9a550480f4f7a961d9b64af45aee01c60bc9b3770
SHA512 b62f7eb20035e0b9781e43f0ea48f5f0fb8e6614d1db20f48e958913947cfba3737d321085be145882d4a5c02725b2a923dc59693e9b321533558d03a9383f0f

/data/data/com.iqxpqygg.kczlvqli/logs/Sistema1717989492501.log

MD5 14fa484049c6d9e9e3f329a395fca574
SHA1 88a6c4a83720c0a96547cbb0a8a023818596a6aa
SHA256 0acf3675fb9e01e70935f8680319043c240ebf1bf0eafe61561d69cdf28af09a
SHA512 4e7fca07aaf7acd2a565abe174b7bf204ad09b5f90c88a833fcbffa8c403c52dfa60cf7d24c81bc3b02c824a1b4c8e9d9acd9a1fbd082b640b4fa6deb85aa940

/data/data/com.iqxpqygg.kczlvqli/databases/privatesms.db-journal

MD5 7d595b003a05f3ebb74727653520a9e4
SHA1 90f9481f91aa94703deeec01f79349d7e98f68bf
SHA256 9e960e0c0267e2e3b8da19c9b3d6fad8a4ac3606303386a536b8147c2984fff4
SHA512 ebd958707399145a332c9c0d46122c2f4384376fa0bb4ba188c97ee6b4c4498f6c9c4b997b59132766742c7340604d1fa7e6f36de9e87cc9e4061ce188cc4132

/data/data/com.iqxpqygg.kczlvqli/databases/privatesms.db

MD5 3621ce0aa81e37bc5c80e2cf881f1dd0
SHA1 00365f82dcada94caea07443656848baf60b3bd9
SHA256 8620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA512 76bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf

/data/data/com.iqxpqygg.kczlvqli/databases/privatesms.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.iqxpqygg.kczlvqli/databases/privatesms.db-wal

MD5 2dc44ff04b6b106eaccb779997e1178f
SHA1 e9bab9d545ab96572a1dadfdf96940cda7fd3ae2
SHA256 d2b07bbdfd46c746247bbc270ae5b43cc56354041839ed320005b49c68238e90
SHA512 f8e7caa1048f359602ced315101bf35577257c609fb7f0ddcfab793ae8e6cba51e3c5f1e803d3d6dcf30ef93c3b300e0a9586e660b51131c6c2c3118d7830a45