Malware Analysis Report

2024-07-28 11:09

Sample ID 240612-jy1xksvfrb
Target bruno-wi1.apk
SHA256 93a8f4468461c74f87061434e789234f579564ca605341782e3e3cf77af30e3f
Tags
tispy collection discovery evasion impact infostealer persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

93a8f4468461c74f87061434e789234f579564ca605341782e3e3cf77af30e3f

Threat Level: Known bad

The file bruno-wi1.apk was found to be: Known bad.

Malicious Activity Summary

tispy collection discovery evasion impact infostealer persistence spyware trojan

TiSpy

Checks if the Android device is rooted.

Loads dropped Dex/Jar

Queries information about the current nearby Wi-Fi networks

Requests cell location

Reads the contacts stored on the device.

Queries the phone number (MSISDN for GSM devices)

Acquires the wake lock

Requests dangerous framework permissions

Declares broadcast receivers with permission to handle system events

Declares services with permission to bind to the system

Queries information about active data network

Reads information about phone network operator.

Queries the mobile country code (MCC)

Queries information about the current Wi-Fi connection

Uses Crypto APIs (Might try to encrypt user data)

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-12 08:05

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-12 08:05

Reported

2024-06-12 08:08

Platform

android-x86-arm-20240611.1-en

Max time kernel

127s

Max time network

145s

Command Line

com.yyfyymmy.ytouakau

Signatures

TiSpy

trojan infostealer spyware tispy

Checks if the Android device is rooted.

evasion
Description Indicator Process Target
N/A /sbin/su N/A N/A

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.yyfyymmy.ytouakau/files/dex/HdjhcMuLzPsvoawjF.zip N/A N/A
N/A /data/user/0/com.yyfyymmy.ytouakau/files/dex/HdjhcMuLzPsvoawjF.zip N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Reads the contacts stored on the device.

collection
Description Indicator Process Target
URI accessed for read content://com.android.contacts/contacts N/A N/A

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Reads information about phone network operator.

discovery

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Uses Crypto APIs (Might try to encrypt user data)

impact
Description Indicator Process Target
Framework API call javax.crypto.Cipher.doFinal N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.yyfyymmy.ytouakau

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yyfyymmy.ytouakau/files/dex/HdjhcMuLzPsvoawjF.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.yyfyymmy.ytouakau/files/dex/oat/x86/HdjhcMuLzPsvoawjF.odex --compiler-filter=quicken --class-loader-context=&

su

su

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 brunoespiao.com.br udp
US 172.67.189.189:443 brunoespiao.com.br tcp
US 1.1.1.1:53 thypix.com udp
US 104.21.19.250:443 thypix.com tcp
US 1.1.1.1:53 pc.brunoespiao.com.br udp
US 34.200.160.51:443 pc.brunoespiao.com.br tcp
US 1.1.1.1:53 ur.brunoespiao.com.br udp
US 104.21.49.104:443 ur.brunoespiao.com.br tcp
GB 142.250.187.206:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 ua.brunoespiao.com.br udp
US 172.67.189.189:443 ua.brunoespiao.com.br tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
GB 216.58.213.10:443 semanticlocation-pa.googleapis.com tcp
GB 142.250.187.226:443 tcp
GB 172.217.16.238:443 tcp
GB 142.250.178.10:443 semanticlocation-pa.googleapis.com tcp
US 1.1.1.1:53 clients3.google.com udp
GB 142.250.180.14:443 clients3.google.com tcp
GB 142.250.180.14:443 clients3.google.com tcp
GB 142.250.180.14:443 clients3.google.com tcp
GB 142.250.180.14:443 clients3.google.com tcp

Files

/data/data/com.yyfyymmy.ytouakau/files/dex/HdjhcMuLzPsvoawjF.zip

MD5 2658f236a97e112b46d8e0cd25eb27b1
SHA1 7b30c33cd3b9365947db8a503064844c80e071aa
SHA256 541525cb5c88ed29a7e6c5df319955befe2883dfded2431165a4f973233417ba
SHA512 c289a3b1d1bd5f7de8faecf654ee618a389f9e92243116c0fd05d1f1da247cee7b3ba4b3a30cbc3a44c3e8652c3e14daf9401aafd69fb2981a09ece3988ed204

/data/user/0/com.yyfyymmy.ytouakau/files/dex/HdjhcMuLzPsvoawjF.zip

MD5 37f9195103f6f047ad41572689809f59
SHA1 7ceb645ef284ecd9982877fe6922e67381260d48
SHA256 2736c3001fe5e3903d0285bd7ed6b567f59072682ec24fcc6aec80f9ef34486f
SHA512 c39e29bd794dc2c6c338c4d21f7e84f93b05079cedca1fae141eca85271a2e7f45317baf73dcbf36305af8e2e5a6b554ca2d8066472a834cd628fbf190567c34

/data/user/0/com.yyfyymmy.ytouakau/files/dex/HdjhcMuLzPsvoawjF.zip

MD5 55bc222ae91d0f67b8c4f048653b6e4d
SHA1 7c7fe177c27c0f14652266730058b6b85bfd102f
SHA256 ceb689485edae202ec1a27407fe966dfb94870e25a8720ea821b5561f960ebed
SHA512 01e2044f73860bbeee1bee0375daa7f179b87d053751aef5176c3283f29c7ab33e93c3ce532db50ee678c696375ce0f7bd437fa85cd7790986920723d3aa6381

/data/data/com.yyfyymmy.ytouakau/files/477167.so

MD5 6981d39999bb88f8e2fe302c74e18e52
SHA1 9a73de05a5ff18aecbc8728bc6db2059bb8a85ff
SHA256 460d78c2c0621cee4d4314163abc642fb43fd586e3f124386d8058c6de45f7f1
SHA512 cfb5317e99f752d1ef08d1bb48114d8a1ce6a670ed6cfeb151b9af4cd077b818976315503eb01a30d724df2c68d7beb5d426cc8745b07c1bfef32ad069c06b9b

/data/data/com.yyfyymmy.ytouakau/logs/Sistema1718179539997.log

MD5 5614b99c2ea66f031616c9098c92461e
SHA1 fbd1d6acf179ce5ac7218582423e4eae42e713b9
SHA256 2b5f6e326606dac0934d94bb4df0694b8fe521fb58bd01737406b47588629201
SHA512 f5986dc1cff5196f01cd9fd9a92f9ab398dbda2b87b69cad6fa462f534d9ed1036d9be88586fd548cb528408a99b27f39a0efa6fe6f2541772afd8d772f2f0da

/data/data/com.yyfyymmy.ytouakau/files/Background/black-wallpapers-for-smartphone-102-700x990.jpg

MD5 4651e1fd4234ee465d6fe6349f2e178d
SHA1 1a86fbd1edd11fa983155172d484959760c1fc0e
SHA256 725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA512 6962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c

/storage/emulated/0/Android/.ANDROID.PROFILE.3kfxhqP6yLr4iygZxRaM

MD5 e6a87de106d03c376eb4b7f08df2f9df
SHA1 a518aab40f745a50faf957def93203a72bfd06ba
SHA256 3a069a1212548f2022fb81ea980e47a45f7a11f65d4c7f4a8987ec95a36d32eb
SHA512 022527cc6cbf7f4695ae5893a433e69ea93a78698a1f65cac4f0d5b585061773813a4f0c4eab11bbfc8d47bea4c9f16f2e480c47817f4004a7c1b02653620bc9

/data/data/com.yyfyymmy.ytouakau/files/477167

MD5 599751dc02101d5427ddeb333f7721d4
SHA1 1aabb52841365c1e009e5e99209cb44731752930
SHA256 cfe8f0eb678cd50ad252cf6ab05572a100a3460882c94c1f4099c54d6898a209
SHA512 16470d168f07755ffa40c4011a7c2b6fa59bc97e5854b6e9256454d950d2b46c03e76ca97b451d07c0d8188fd7d76cd68a09b4c2b5581ea0a011093c3502d4c4

/data/data/com.yyfyymmy.ytouakau/files/477168

MD5 03126c432a486ef2690be2e09f7fb2c2
SHA1 15746f6c47da658d69935bc08ebf8657f99e0b3e
SHA256 a557018e71fb5db0bc004ea3f786ca4554a35a385c34b72eed3911991e7cf27f
SHA512 3bc90daa5a7bbfb17c09a514a89964adc06932f88b136fed34ab1931159dbec4e8446dc65d4d5d833b9cd2ff1a055099f70c60005d79849aeccd79ff0e43cef4

/data/data/com.yyfyymmy.ytouakau/files/Eula.html

MD5 b212f0ab69e696ecdf50a43480b1b1d4
SHA1 709cc652dccc612e734cb98f1404f02ad51356d9
SHA256 2c679bfe7ce9b712ed8e468a41aded6bc65bf6858d3b76203de1dd1767965075
SHA512 6cb3ba814432decabc940c4a2aa25faf301574f76f35881e937dbac9f36fb20d3c44bab80d9fdf31c2ab8e2c7a455ffb807feb5cd787da099df5477634692db7

/data/data/com.yyfyymmy.ytouakau/files/HdjhcMuLzPsvoawjF

MD5 eee4490d9a96da1065e12fba6756bb03
SHA1 6b4fb8b8f064ded2a666496d153b838ccc320da8
SHA256 11611cc945fb36f803cd56fd4010c2038fbec6455f1ae745510ea40e5a6a6e41
SHA512 6282139316d45afeeebbab9d982461ef72bc3d3d56da1cc90dc56bf6a692de466fbd4a567c4bc2c3deaab47f277fc2362d5cc90321c5b4660a74b228c9cdae7d

/data/data/com.yyfyymmy.ytouakau/files/chrome_100_percent.pak

MD5 23244659b28557a3fe76890665083c0c
SHA1 e0e4c43f3b076748fef86be930e3bb40988272dd
SHA256 e300d9ecb2201487b8528992366b0696a6e03ea2890aac98f0913ab43634eaf2
SHA512 d30de02e025a7c9e998f79523eb408c1455515d88c3ebcb7443e6eb0cc6baa850f11c0b4865af9ba6e0e4a473085a090157095fc54cac42604e89040be3e47d9

/data/data/com.yyfyymmy.ytouakau/files/icudtl.dat

MD5 0c40c24bc04f4185d5798f9c3c646c83
SHA1 baa1c7fc5c5a45cd3d20bc15a19a9e499af66a09
SHA256 256c7a411b5ae905a6a52397757a773ef990f4430ea38f4aa9dc61cf3de4c007
SHA512 acc3d0bfb2c9bd94ef2630c43d6ed9889719e09c2b2f0aabf58c54a910098b199b73a31ce3fdc7a7ed9ff2e3e6bf14fae74ab453fdf944902982dc772ac2882b

/data/data/com.yyfyymmy.ytouakau/files/natives_blob.bin

MD5 99e9ed492dc4b9318704745f69e3ff43
SHA1 4276e245efeb0256bbbdefa77063d2585712198e
SHA256 ad6654fca057a8b8735c8b5cdba9d322396befe7e706429b8236c234a3941da1
SHA512 5163af106d268ff2a324519eac9a17572191add3a5283496170dcff10f52bd9854e47a00c4fe40d83c01b8cd21eaaa0665647044ddb038cf7191ff19c95af539

/data/data/com.yyfyymmy.ytouakau/files/resources.pak

MD5 35defe03d9b2553a2f61544f8a453346
SHA1 c8eb95c52bef64500ae78522a1303a5dd0500228
SHA256 6553965fc181d59a3e444de21dd1a3e6f35a52e934e95ab46b1fbc16df79fd7a
SHA512 c0bc71afa7703d76609893a1eeb8fb58372b19af87fe7b468da364f93d5e75d4f3d910b883d0354b97245035283ef254480fb0eac3b92d578c98939751317777

/data/data/com.yyfyymmy.ytouakau/files/snapshot_blob_32.bin

MD5 b18b3390cf2e789b49dc4811945e2274
SHA1 330f611e279f45aec81607f309c7c2b6b909bf3b
SHA256 bc51744e816289fe9adb3ac4cf92d16def08444d6a2b991caf422c0ba7e63a7c
SHA512 a20287a7ba508453537541f3e8c613c8130f7d518a867a04510422ec9a774ec4a4e998f5b4b896c009ea9693165e8731d5aea1d825195d183061b05527699d01

/data/data/com.yyfyymmy.ytouakau/files/webapk5.dex

MD5 2ecf96ee753e3dffa275a62766d238c9
SHA1 45c609a2fb98764a90d0d85f6ddd5e6112048afa
SHA256 2d4acf72327a6cc395793cd9468b979833620eced1daedaf6d52bdac704eab88
SHA512 11b0a4f741d3cd7cc5b49065bdfe954649ea8f105582e0269b57e8794e69736c401b241aed57b23b2d4a506ac71799912fc05f634c4219221f20cfef42bb2168

/data/data/com.yyfyymmy.ytouakau/files/webapk_dex_version.txt

MD5 e4da3b7fbbce2345d7772b0674a318d5
SHA1 ac3478d69a3c81fa62e60f5c3696165a4e5e6ac4
SHA256 ef2d127de37b942baad06145e54b0c619a1f22327b2ebbcfbec78f5564afe39d
SHA512 06df05371981a237d0ed11472fae7c94c9ac0eff1d05413516710d17b10a4fb6f4517bda4a695f02d0a73dd4db543b4653df28f5d09dab86f92ffb9b86d01e25

/data/data/com.yyfyymmy.ytouakau/databases/privatesms.db-journal

MD5 2c084466a5feca1bbb494c2c718dddbf
SHA1 6d2a935b72ba9f69b5d4a3442bc70ba85a70d65a
SHA256 35b0be6b15d4721bc1dce363404457f6ac6a9895a64159ed5f3572d9674590b3
SHA512 f9660fc5339752a42ac6ea2db7ddcd94ae2bb30f549202b5e3634f68d137c23ec708616758a30a6c9b1f75f48fc50141a47edc78e45693eda19f2809aae42617

/data/data/com.yyfyymmy.ytouakau/databases/privatesms.db

MD5 3621ce0aa81e37bc5c80e2cf881f1dd0
SHA1 00365f82dcada94caea07443656848baf60b3bd9
SHA256 8620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA512 76bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf

/data/data/com.yyfyymmy.ytouakau/databases/privatesms.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.yyfyymmy.ytouakau/databases/privatesms.db-wal

MD5 e2697a38ba39683b07634f6af61a1389
SHA1 16aff91249247923ccf868367757d0ee47f56bfe
SHA256 921e254389b81d266c0031916077948c387a15b6789a7006b38a04cff5bee7f4
SHA512 abadd85758434bca47e3342328fc36deb5a35fd4f67f84dab64b2aab05482ffbae654b62bd7fa1d6ff9d3ba6bf6c8218c350501905c5804abfed2ae0250478c2