Analysis
-
max time kernel
48s -
max time network
170s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
16-06-2024 01:21
Static task
static1
Behavioral task
behavioral1
Sample
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e.apk
-
Size
2.4MB
-
MD5
619fbaa821acdac5bab0cce023aebe84
-
SHA1
2ff11d75dc54dfd52962a11a3cc4649a7ccd7c52
-
SHA256
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e
-
SHA512
91f60800377163ebaaecc44c51e80a99ce870fef9f28299f9e9b8115da527ed8bfd70d20d41b8f544a13b1b4d6d0fe4a1133eeb1c9944ac543534db0a1f506d9
-
SSDEEP
49152:BeH0xIvSuxHdbZxe+kY2LALNgJQ5W08/u9pZYQjGS6CSvt9:BeUlOHdbZUY2kWWK/uJYQjGS6jvr
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cwgjppld.ktrmtpyyioc pid process /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4200 com.cwgjppld.ktrmtpyy /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4200 com.cwgjppld.ktrmtpyy -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.cwgjppld.ktrmtpyy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Acquires the wake lock 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.cwgjppld.ktrmtpyy -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cwgjppld.ktrmtpyy -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cwgjppld.ktrmtpyy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cwgjppld.ktrmtpyy -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.cwgjppld.ktrmtpyy -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.cwgjppld.ktrmtpyy1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-journalFilesize
512B
MD5e6fcd375bdbe22fc2a56074df57755c3
SHA13866e2de96c573b409c45e3e1a10dae7e52079cc
SHA256295da3d4ec6df48c5a4bcba2866076566fe5b6f062c2ddc922e7f646ff4ad83d
SHA512b6f313b68fcdd00b621e580c17abbd60b675ebd1ac2d76151aa90eb46353b7c279223cf610923636a91ef8455e2a34e8de138109c73b752012889b52504e1789
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-walFilesize
28KB
MD51c1e02e9d0f29529282c846da531e420
SHA16920bee2a5f95a351a87ba8bca2b80b8f2480218
SHA25660f4751455ba00ee037b284f9c3a6308d155a2e18add037ab7f691386aa6f8a0
SHA512009946e47eea1b6d0c227040186dfdd1edd0f8a25ba2049969b0b21bb38a0fb6a064f6c527891e47804ccb560a36faa4219b700c1027266a09f2840ce4977883
-
/data/data/com.cwgjppld.ktrmtpyy/files/477335.soFilesize
145KB
MD5fee3c57be6abd07ed816f2b1b8560dc0
SHA1dbf09f2de28039f71014b0b6a1f1d220a1af2c1d
SHA256ad1eb9e75ddcae4fd3a58e4b263dbf21cb8ef62321648dff06e4f4c20a01b7c7
SHA512bb874e7fc723960aaf6dafca89306d82810bbf9c807ec1d93d9cecf402b823404a086aa31b971e6ff2e30bcf5a2296f72b5a4c4ed9f9c864994cedf4147a587f
-
/data/data/com.cwgjppld.ktrmtpyy/files/Background/black-wallpapers-for-smartphone-102-700x990.jpgFilesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
/data/data/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
530KB
MD54c1b5c99238dde4feada12e39639f235
SHA15246324b80d212b81a3f21b555e7d6bc36aaeb45
SHA2568fb22309962af45eea8f270aa75ca24aa2f6fc398d6060d8ed87a3dcdac55cb0
SHA5127162b606c10a72b06cd9f682f0c6c3a223628327de22101fd0da68784a323ccddb8b1df7fed84df3813c8f0517feb57ebf7018e7aaeb5621edb0f6e3e5008a34
-
/data/data/com.cwgjppld.ktrmtpyy/logs/Sistema1718500922590.logFilesize
17KB
MD518f0df28c71b3c71d6b29aaa1331a92f
SHA163bf098286a5f6d7338f8dca9540bf9a84432c8b
SHA25603a592ca460feaee31c6ffecb9543faf76fd067282c7f6b6b2feb3cd40608e32
SHA512ab8103d543b41840fc172dce7c6cec052c2cedf8bd35c360efe51a6085b72f900240a3cf05745d11a3d5a98e5e3c75760d659fee9c561c8f7f8acfc7eaaa2ee7
-
/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
1.3MB
MD5ac1b7ec3b7181d6cd01d588a2d4b2d79
SHA187d5f51355042408af658df77a87e6454e56911d
SHA256e8075fc66d28348f6127815f5da1bd2430863c30f3de79c4d6e5d6e4c7996ae5
SHA51299fab8c406cb838cd3e384a40bd9ef4a6afaa44d19b5962a5cb3e4a878dbde6e41ded7d10b988938c00469fcb83a8bb78193b5248c5f0aff2f390c266f82df69