Analysis
-
max time kernel
47s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
15-06-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
6a386248e8856ebd0841cb70e0433189b251c4dbe9bc2dce2096d6996266abbe.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
6a386248e8856ebd0841cb70e0433189b251c4dbe9bc2dce2096d6996266abbe.apk
-
Size
3.7MB
-
MD5
085e45a58084320319df1ef0fffbdac4
-
SHA1
9cb8d7e4d84c8abe52a99e373fbc91834c6aa854
-
SHA256
6a386248e8856ebd0841cb70e0433189b251c4dbe9bc2dce2096d6996266abbe
-
SHA512
c91b0627d0681346fc6ed00c5da21ad0537a1964061e70b5ea703e2e9c7ce682758b03fa212976b78561e9cc20036b6955f1175def6bdd5053ddc963c02791b3
-
SSDEEP
98304:9mL/mQjQ6PB/QxfassCyjslc1FTo7lNCQhXY:KOQjRJ/QVzojs+G7XVXY
Malware Config
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 6 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/user/0/com.suyriwhm.ouseqkgn/files/dex/1ff530525b482ffd.zip 4301 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/1ff530525b482ffd.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/oat/x86/1ff530525b482ffd.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.suyriwhm.ouseqkgn/files/dex/1ff530525b482ffd.zip 4271 com.suyriwhm.ouseqkgn /data/user/0/com.suyriwhm.ouseqkgn/files/dex/gSovILZiesBTWshqC.zip 4325 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/gSovILZiesBTWshqC.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/oat/x86/gSovILZiesBTWshqC.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.suyriwhm.ouseqkgn/files/dex/gSovILZiesBTWshqC.zip 4271 com.suyriwhm.ouseqkgn /data/user/0/com.suyriwhm.ouseqkgn/files/dex/1ff530525b482ffd.zip 4271 com.suyriwhm.ouseqkgn /data/user/0/com.suyriwhm.ouseqkgn/files/dex/gSovILZiesBTWshqC.zip 4271 com.suyriwhm.ouseqkgn -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.suyriwhm.ouseqkgn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.suyriwhm.ouseqkgn -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.suyriwhm.ouseqkgn -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.suyriwhm.ouseqkgn -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.suyriwhm.ouseqkgn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.suyriwhm.ouseqkgn -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.suyriwhm.ouseqkgn
Processes
-
com.suyriwhm.ouseqkgn1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4271 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/1ff530525b482ffd.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/oat/x86/1ff530525b482ffd.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4301
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/gSovILZiesBTWshqC.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.suyriwhm.ouseqkgn/files/dex/oat/x86/gSovILZiesBTWshqC.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4325
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD5a3029b1f6c9fa9f6d874d4688820abfc
SHA1a737568bc3791ce507417939fee500234e326c67
SHA2565dc43e7db61e00ea9355e4ef73eee635f370e96121665943f64694a1fdc15c22
SHA512aa6ba0178eae900d2c9ace1e0fd404c20914107181af9df13a83982c7095745eac7e66053ee933535aa52364188d4a54ca712ce8f9fdb432e55cbbd7df5963ef
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD561849a5ce371ff3965a6b2d535bf9ea0
SHA1cdc63dc6760ea6599a66a06404f59a7e479d0820
SHA2561777fa9f48652bf84ff84e039c7963c7934ba7ca31aa89bf5171e417ee317822
SHA512eebcb49611bb283649ce63230776fa9658720c1a791b815da8dfb0aaf459f0fdfbbe4c8ceb4372821583b93812ff14c06be7e89a29cd629313ff564ad43d89b0
-
Filesize
145KB
MD55331f946769d9a26661c461c59d031d9
SHA1008d623b0e0564a9a8a8cff8bd5bc327112697ed
SHA2560ef7ca92ae4850cd98d6fe6aaec41901cdbaf64f12a77e110ff632bb2eda6713
SHA512e041db2ece750293fb25da09570d89408325e26aa12e87bd8689bab63843edc8229b920aa8d5d6cc91bf0392ffebccb8491dde69a4495d326821b35146f93c30
-
Filesize
549KB
MD57b292558c6220d30f7ef769a79e05fe9
SHA19efe8e9ad9f51e446e34f8776ce0a6435111497c
SHA25616a649e6236b950157c3e97efe06ba152822d2631f64bc12e815825164c4d956
SHA5123e6033bb0069d451dc9c18f81cbb56bdb7074d6adae4df7c13e01e8847f13abc3284c4a0f6b0fb5f3c05f2233afd0b0bd8c20ee1f8d16783d75c3e9d6da6f26c
-
Filesize
649KB
MD52dfb3d2eee0ea31e4b8b25c9bd6b1315
SHA1f6cdd15c669ecb614fd51b5070bc96a63a4a5234
SHA256aaa1e60465c5197b87a9ac67b901a71678e23e61143627ff10ab2290d377bdc2
SHA512cf2ca635a8ef7c88860014b36e65124d84e986d3a85ea88a2db5534d5fbde6c8056ff8488fff32ab141e199d546416686f459aee468e9c648e88c93c0f07e2eb
-
Filesize
8KB
MD57c20a2b01bf3f9df1f0abb72ebbe82be
SHA1e601b2e41434623edbeece32867517a3cdec5449
SHA2561a10cc3cd2dc21a9be2d2eb758fd19288082619d331245b927d0a9299462ea2e
SHA5123faa6efbd3ebf6e1aff7ebe9958c5f94bbfe9c5ff9e11e9092b1b7301bbe6504c01b922d709303147e213b3cadce8e96462220a1d1bf4d6cdaec95b3f84bb1b4
-
Filesize
15KB
MD54f6c2aa0e34767a4a5fa6022a3a055a6
SHA145ac7ea4a4eebcc73495d454674e2f1e2c74c3c8
SHA2564e5c9efcb5d1b08a0882b3820f7491f299f75334ac56062a1872f8a995f470ff
SHA512a1153d65976141bda434242f7b7dd7ef2fdeb70c5f749aefbbeb19cea482f1f2c66d7656a20d664944147f683b1f5192060624ff188074b51f040380f686ba33
-
Filesize
1.3MB
MD5ecbf331b2f228fa46a091b23b5a1fdc8
SHA17ecdc443c515c0f315ed8b7ff48e09a2869b82f7
SHA256dcba48863964f874f10917608edf99628682b3f4aac60ffe67c38da674c7311f
SHA5128d032776f2e91978d3ccf1259cbcf0d8a0acc2e0d4701a0f40e2d038a13cd8c40d6e99f84ea7aa4c6882729de52bd82feb9b19c05949a6e2429a75a9d3f04e9f
-
Filesize
1.3MB
MD52591b06aa7a25be3da827dbf2364b67e
SHA14ac197bd24868b7596a1de1486fd694574bd14ba
SHA2562786c5c58a43043a7450d3dcd63a92ef95e8ed1edb850b8030379a179f86fe75
SHA512f78936fa3b5f67b935d9c45f67637c4026b8c814fc805747cfdc6e4e0bff743ec7beeda11c2a48b0efb11a5e5e4f7b3370111f0239fb443a3a180cb65c8866ef
-
Filesize
1.7MB
MD5969c5bb4705f4cef8da8829c583ea901
SHA1ec8ebfa963243092b19f09ff5a9afa7ea1091352
SHA256c37a1a0955e2cebee5515438b785a89fab33e42d3752c39c52867d4a7787239b
SHA5123a05a1d461cad47a75727ad4f68e11438859c0e0c45beb0482dd7273b93aafbd1e91eb18c4244912e4ee54c9a47c46338c3293f4acb3fdc739197f492741eab9
-
Filesize
1.7MB
MD5de52e6b4f3b809e01eddd925fb53aa3a
SHA1717c0abe1ce5c3aef541129a957bff94678aa98e
SHA2563724dba2cd6b5acba72b422085bcd9a9c0cdb440168e514f4f8e5d8e7a30a06d
SHA5123e89ddecb5941b8749561458634f151b3c7cc4cb8aafccc9e675e4017af0378a108f096ede750fded3b6326238a0abadf6706373d1b795ac5dae4bfadad2f652