Malware Analysis Report

2024-07-28 11:09

Sample ID 240613-csmpfa1cqf
Target d5ba9b8102d25f4bd88560cbc244d68be012625c9578b02b4ab5012de2169e42
SHA256 d5ba9b8102d25f4bd88560cbc244d68be012625c9578b02b4ab5012de2169e42
Tags
tispy collection discovery evasion infostealer persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

d5ba9b8102d25f4bd88560cbc244d68be012625c9578b02b4ab5012de2169e42

Threat Level: Known bad

The file d5ba9b8102d25f4bd88560cbc244d68be012625c9578b02b4ab5012de2169e42 was found to be: Known bad.

Malicious Activity Summary

tispy collection discovery evasion infostealer persistence spyware trojan

TiSpy

Requests cell location

Queries information about the current nearby Wi-Fi networks

Queries the phone number (MSISDN for GSM devices)

Loads dropped Dex/Jar

Queries information about active data network

Declares broadcast receivers with permission to handle system events

Acquires the wake lock

Queries the mobile country code (MCC)

Requests dangerous framework permissions

Queries information about the current Wi-Fi connection

Declares services with permission to bind to the system

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks CPU information

Checks memory information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-13 02:20

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-13 02:20

Reported

2024-06-13 02:23

Platform

android-x86-arm-20240611.1-en

Max time kernel

103s

Max time network

186s

Command Line

com.yczbhnuw.cncvtegw

Signatures

TiSpy

trojan infostealer spyware tispy

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip N/A N/A
N/A /data/user/0/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip N/A N/A
N/A /data/user/0/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.yczbhnuw.cncvtegw

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.yczbhnuw.cncvtegw/files/dex/oat/x86/BSvmeQguRlxiopEyK.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
GB 172.217.169.74:443 tcp
N/A 224.0.0.251:5353 udp
US 1.1.1.1:53 brunoespiao.com.br udp
US 1.1.1.1:53 pc.brunoespiao.com.br udp
GB 142.250.187.238:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 142.250.179.238:443 android.apis.google.com tcp
US 1.1.1.1:53 brunoespiao.com.br udp
US 1.1.1.1:53 pc.brunoespiao.com.br udp
US 1.1.1.1:53 pc.brunoespiao.com.br udp
US 34.200.160.51:443 pc.brunoespiao.com.br tcp
GB 142.250.179.238:443 android.apis.google.com tcp

Files

/data/data/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip

MD5 52bd4fc9d68ff5b6a083e6106e89ec1f
SHA1 01f175f79fb02f9f7251f8a42f149d1fd4aba3bc
SHA256 bd2de865cfd0f0bfdb916e7124238075ac9856df1eb6998794f888b378b1027d
SHA512 f1f83ee369a316b8e94482fc2512c6cd55f1582aed4a99f56f8dbc2d7fd7a79008b3e9c5d5b9b7772540343f218cbcc31ef1a79190e8d7c12c0e896be5518702

/data/user/0/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip

MD5 51361f3fd126261af58408144c58932e
SHA1 901ec02e992f9ff61abe53ccd653a1211cba3db6
SHA256 011dbfd37ccbb1cf715c39d6461e5fbc6763a0346ec542d725ebbc8aa41001bc
SHA512 00a309be4284f5435ae96149681257a03fc816c39cdcb21709cf033a1833b2c4af66ccbe60a1e2504bdf77a3acf9cf0680efd3886689b9573f4927e1aa69c88a

/data/user/0/com.yczbhnuw.cncvtegw/files/dex/BSvmeQguRlxiopEyK.zip

MD5 b47296525f5ce1ce34d944841614dc87
SHA1 7e57f2670c5248499cf88a9b037a0a2720872f9d
SHA256 4f86fdfc343b6a33da1e678c1b4652d23d24ae05aa448a1dc708299a864288f4
SHA512 95097f8428fd3ea0a79d181cad61b73613d5389597ef69a6ddbe3d1d47cd63d8ba038f17458f21c8f7098af5f959811f3f0e69fadffec64bc099b41ac331ab1f

/data/data/com.yczbhnuw.cncvtegw/files/477287.so

MD5 660f5e86b08e3873b71bc76a4fc8022b
SHA1 da48ca1ee689acc26376f420af03d33d7f7c4bcb
SHA256 eb0f367ba17a08f3b7caee1aa2bc53fdafa2fa04273ca9e95254aedce1bc4970
SHA512 5f4720485c18df9037013ec0edf62be62977d8784da1045bfc5ca5c30963e8cb6ff8c4aafb5da366e187e343490567bc7bcee837acd85e298ebb13b7da3e0fad

/data/data/com.yczbhnuw.cncvtegw/logs/Sistema1718245241306.log

MD5 7b23b99b728de286ba40b62e73f4bc70
SHA1 35559d3cfa853fcd5cc21ecd2aad1cadf38b70b3
SHA256 d6791d200d4ad3f7851000608ecee6a78e0de12eda60bd65f3dec91fabe228f2
SHA512 75b191ed7ba19d6676037cadd3fea0bced61ace4a2182d84b91efe6be16c2c6cf17ed8f6593ab34fa2ac753139f5da9216c1c1f6384c8f76f4c1f1b64049a4d4

/data/data/com.yczbhnuw.cncvtegw/databases/privatesms.db-journal

MD5 67fbff17bed0d6941431005d5ba775e4
SHA1 e2e4e4c52ce9badd6c08b3c2df535f3d768113a3
SHA256 85e70ea3db6342707879213a5d4cd1ce85d61cf2c4ebc52bfb246e3ae53b2922
SHA512 bde275d47160318cb3b0d373e835a92617f6203968c49bb472294e7a0e5ccfe4242eb1b70f69267b2df79248c3807195406736978eabc2da474ca0697be202d3

/data/data/com.yczbhnuw.cncvtegw/databases/privatesms.db

MD5 3621ce0aa81e37bc5c80e2cf881f1dd0
SHA1 00365f82dcada94caea07443656848baf60b3bd9
SHA256 8620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA512 76bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf

/data/data/com.yczbhnuw.cncvtegw/databases/privatesms.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.yczbhnuw.cncvtegw/databases/privatesms.db-wal

MD5 228df0c0c2f7db75832dac9916e7ea38
SHA1 e6f46f6bce9bbd9bffdd3456da9a191731d89914
SHA256 3b71cb9411a59193d17ca211591f0638e6fd81a7030623d46b0bd01d1438679c
SHA512 40d3bd31d6abfa7aa560ad1b071fea516ee2e962ac3009ca9896695bdb48ee81778ab357975280842b9c309ba27ff43403cad23d4b97d0e064244a88888a31ec