Analysis
-
max time kernel
47s -
max time network
140s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
15-06-2024 01:57
Static task
static1
Behavioral task
behavioral1
Sample
a68d68e210a3ee6e9d8ef30c63de4658ef1023fbf27ca7c8d7b79bc6351f5677.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
a68d68e210a3ee6e9d8ef30c63de4658ef1023fbf27ca7c8d7b79bc6351f5677.apk
-
Size
3.2MB
-
MD5
b8316305bcb65ba0fcb97f5cd9e61bee
-
SHA1
9f25c81331ddd574d6882beb67e3c20194bb8056
-
SHA256
a68d68e210a3ee6e9d8ef30c63de4658ef1023fbf27ca7c8d7b79bc6351f5677
-
SHA512
68d23f15b55815cde891bf81be6bf5df1256bbaaa55a1da04d3b4a69217ee98e133cf0e6600fa5ad6d667f0689229ff143e5e5fe9e9aade09836572d5cda5315
-
SSDEEP
49152:MjyFhDnA6ofoY/PH09ZxB+GrvqrCcfljByac1tvb7yUw2Gfk7QDiMrRb:qyFhn/2/PHYLFrymOlgaIRyt2SDiM1b
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_14Jun24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 4 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.tktaymsv.ywrlynunioc pid process /data/data/com.tktaymsv.ywrlynun/code_cache/1718416688186.dex 4170 com.tktaymsv.ywrlynun /data/user/0/com.tktaymsv.ywrlynun/files/dex/bsGGScoRTfDKSzfDu.zip 4170 com.tktaymsv.ywrlynun /data/data/com.tktaymsv.ywrlynun/code_cache/1718416691690.dex 4170 com.tktaymsv.ywrlynun /data/user/0/com.tktaymsv.ywrlynun/files/dex/bsGGScoRTfDKSzfDu.zip 4170 com.tktaymsv.ywrlynun -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.tktaymsv.ywrlynundescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.tktaymsv.ywrlynun -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Acquires the wake lock 1 IoCs
Processes:
com.tktaymsv.ywrlynundescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.tktaymsv.ywrlynun -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.tktaymsv.ywrlynundescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.tktaymsv.ywrlynun -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.tktaymsv.ywrlynundescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.tktaymsv.ywrlynun -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.tktaymsv.ywrlynundescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.tktaymsv.ywrlynun -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.tktaymsv.ywrlynundescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.tktaymsv.ywrlynun
Processes
-
com.tktaymsv.ywrlynun1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.tktaymsv.ywrlynun/code_cache/1718416688186.dexFilesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
/data/data/com.tktaymsv.ywrlynun/code_cache/1718416688186.dexFilesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
/data/data/com.tktaymsv.ywrlynun/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.tktaymsv.ywrlynun/databases/privatesms.db-journalFilesize
512B
MD5025264700fd254749fc958c6af65139e
SHA16256e87ae7bca2229ca9aee8282a4dcc1c677f4f
SHA256b5865e7e0af1ce911f84db35d356e8bc421bf990b64d973f89d4e270dfd753b8
SHA512ce988e376fcb06c955fca551947c0067033fea8bb5695064df07f268d389edef47157d525b903199858af0e20d17275e3231ee98304e1328edbb563946a5a0de
-
/data/data/com.tktaymsv.ywrlynun/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.tktaymsv.ywrlynun/databases/privatesms.db-walFilesize
28KB
MD51bd422889ed92f6039237ae79a3853de
SHA1f61c19cfe7e70bb9e677497187670b658dc05cad
SHA256068466014a461ebd7be444924aaa75ca9f5f73f9bf50ff691d4ed5f97036cb8c
SHA5124284554c41e8aacabc7ebada0cd5f405095e9af6565fdae24d2c91230c3d92c24225fa44ea2a2f4f8900b3a60039e175a7510455e04d7cbb35cb277fdd10184f
-
/data/data/com.tktaymsv.ywrlynun/files/477312.soFilesize
145KB
MD5978f89f823414f159c3bab3c24e24fca
SHA1341e1c584a3e1314cd4d5fc6717ee560fa61c0dc
SHA256f1f252689b59814f5fd42c5d34e5dd91659d5333915a0c5f5c3504d6eec792c4
SHA5121164ffc1babac2691a770c2b5bee170cf57d6b4fee86fc35c6fca2d61481bae7330721f728d535b88106bb40dab0cd2981f019afe5e01b85f5679b73c7aeec7d
-
/data/data/com.tktaymsv.ywrlynun/files/dex/bsGGScoRTfDKSzfDu.zipFilesize
1.5MB
MD5f3d0cd73b1928b51a4b9f79e7337e277
SHA1c3d5bd8a5478f3f3c016a0be204554b4399257ac
SHA25631ede6fa50f9b8811d4ae2b36930ba9cc3b48ab73fc4c886a82a99c2816824bd
SHA51286143aca1cc7146dc3c8d11da31d170a4241b626e97693f6bec95f7833c92f5bc7e6f023d517f8df64388f36cadb345dd924fdccd3833cd195834d81c66ab230
-
/data/data/com.tktaymsv.ywrlynun/logs/Sistema1718416694475.logFilesize
9KB
MD51683ba4234653a82f0d2239586191d8e
SHA1d543941c0e8f9c91a1347679c56770323adcb924
SHA256500f2d75ef52c2c5caca91bf9bdb055b531f3a83ba220ebb58dcb695cf43612e
SHA512ad22620be8d7ca4dabda7b6a3de2725828939c8da3243a9eb844ab5c5777ae999d5342d9c6f3bc0da3ad3fe5adaec3e7ec336eaafee81ca6107c71070292bf7f
-
/data/user/0/com.tktaymsv.ywrlynun/files/dex/bsGGScoRTfDKSzfDu.zipFilesize
3.7MB
MD5f92eb42a39c7c8b0f520a4295d98e7d4
SHA115d7e72423ec616fbe2b895360e53e9acee4539b
SHA256af7ba83757391d0b8d2d295416c9af6dd94fc052638ef8f51ba678aeee1ec7e9
SHA512633c43df3bf80cc8382510bac31167bcdb1a8912616366c1e274f5ced38b3f13b7afa04a299b78639fae0f5776373cc70c0b0ab3b999a8925649d6d4b2e140dc