Analysis
-
max time kernel
47s -
max time network
130s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
15-06-2024 02:09
Static task
static1
Behavioral task
behavioral1
Sample
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e.apk
-
Size
2.4MB
-
MD5
619fbaa821acdac5bab0cce023aebe84
-
SHA1
2ff11d75dc54dfd52962a11a3cc4649a7ccd7c52
-
SHA256
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e
-
SHA512
91f60800377163ebaaecc44c51e80a99ce870fef9f28299f9e9b8115da527ed8bfd70d20d41b8f544a13b1b4d6d0fe4a1133eeb1c9944ac543534db0a1f506d9
-
SSDEEP
49152:BeH0xIvSuxHdbZxe+kY2LALNgJQ5W08/u9pZYQjGS6CSvt9:BeUlOHdbZUY2kWWK/uJYQjGS6jvr
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 3 IoCs
Runs executable file dropped to the device during analysis.
Processes:
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/oat/x86/EqhFopUyvvzZupUZp.odex --compiler-filter=quicken --class-loader-context=&com.cwgjppld.ktrmtpyyioc pid process /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4261 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/oat/x86/EqhFopUyvvzZupUZp.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4235 com.cwgjppld.ktrmtpyy /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4235 com.cwgjppld.ktrmtpyy -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.cwgjppld.ktrmtpyy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Acquires the wake lock 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.cwgjppld.ktrmtpyy -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cwgjppld.ktrmtpyy -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cwgjppld.ktrmtpyy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cwgjppld.ktrmtpyy -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.cwgjppld.ktrmtpyy -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.cwgjppld.ktrmtpyy1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/oat/x86/EqhFopUyvvzZupUZp.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-journalFilesize
512B
MD5b5fc85a0c00dbac3df450248926d8b70
SHA15159d8aabaafcd28e6b48a341c6c10f21a1a8f40
SHA2564675bff2fc0698387f632c19dfedf047307be5a1ca44aa83e3aa7d827449a2e7
SHA512c18bf042834ad09a86a4af6cdb609cb66fdda0cb720be94767704d6e21579115255f5452e55b0cf252740522c462f8918d625daf7c7290ed7f3b6291b3b1736a
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-walFilesize
28KB
MD543d212ec92d2cdb151f28eef56978870
SHA18c4d2d87bd73b1809d2ef0565a16f962f91e56f5
SHA25683bae47df99a03d552c3b8b3e882ad8f4b25f497f904c52d13fa8dc64423cd36
SHA512c78daf1df7b23984b8e61d8a07f777f4134133322484b7bf676b84a3f3bc26943f3b3ad16be7e5d08eb5d512b90c314aef4aaf7294b0dc3d2b2c6c675afd28ad
-
/data/data/com.cwgjppld.ktrmtpyy/files/477335.soFilesize
145KB
MD5fee3c57be6abd07ed816f2b1b8560dc0
SHA1dbf09f2de28039f71014b0b6a1f1d220a1af2c1d
SHA256ad1eb9e75ddcae4fd3a58e4b263dbf21cb8ef62321648dff06e4f4c20a01b7c7
SHA512bb874e7fc723960aaf6dafca89306d82810bbf9c807ec1d93d9cecf402b823404a086aa31b971e6ff2e30bcf5a2296f72b5a4c4ed9f9c864994cedf4147a587f
-
/data/data/com.cwgjppld.ktrmtpyy/files/Background/black-wallpapers-for-smartphone-102-700x990.jpgFilesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
/data/data/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
530KB
MD54c1b5c99238dde4feada12e39639f235
SHA15246324b80d212b81a3f21b555e7d6bc36aaeb45
SHA2568fb22309962af45eea8f270aa75ca24aa2f6fc398d6060d8ed87a3dcdac55cb0
SHA5127162b606c10a72b06cd9f682f0c6c3a223628327de22101fd0da68784a323ccddb8b1df7fed84df3813c8f0517feb57ebf7018e7aaeb5621edb0f6e3e5008a34
-
/data/data/com.cwgjppld.ktrmtpyy/logs/Sistema1718417503747.logFilesize
17KB
MD589941700082ab62c96fdcb357539b451
SHA11cbb84dd6595ac3baae94acd6ce2d5e0a313c419
SHA256d087e92d32511a5f147ada8135f9e137da4cb67138ba07d6c23055c204316333
SHA51282802c7cf175a2b8ce83a709b4ff302c60fac3b21edfb8142485ddb518e61334881e75bca104ead863b281180786e1768b522eed8924dfff9085376562d6e04a
-
/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
1.3MB
MD57111876d43f1092ed01252caaf1778c1
SHA16e630082b03440e8241edcd602b408d8632b9afd
SHA25688eb3c657799aaf13cccaad767709c55e177523632f8e9beaadfd2024823e9e5
SHA512bba108e85fa33a8f4ede8b4985a38b6fda912a9ce64c078ad9b620744b11c62340c244862a37b897e92bb96a7e7996aad3983e74fe6a892f5a9b07c1040505b0
-
/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
1.3MB
MD5ac1b7ec3b7181d6cd01d588a2d4b2d79
SHA187d5f51355042408af658df77a87e6454e56911d
SHA256e8075fc66d28348f6127815f5da1bd2430863c30f3de79c4d6e5d6e4c7996ae5
SHA51299fab8c406cb838cd3e384a40bd9ef4a6afaa44d19b5962a5cb3e4a878dbde6e41ded7d10b988938c00469fcb83a8bb78193b5248c5f0aff2f390c266f82df69