Analysis
-
max time kernel
49s -
max time network
153s -
platform
android_x86 -
resource
android-x86-arm-20240611.1-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240611.1-enlocale:en-usos:android-9-x86system -
submitted
16-06-2024 13:04
Static task
static1
Behavioral task
behavioral1
Sample
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e.apk
Resource
android-x86-arm-20240611.1-en
General
-
Target
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e.apk
-
Size
2.4MB
-
MD5
619fbaa821acdac5bab0cce023aebe84
-
SHA1
2ff11d75dc54dfd52962a11a3cc4649a7ccd7c52
-
SHA256
aa2ed5d30a8cfbc39f9a129bc3ca6fd4d07863c0e72ea945af19d3cb674c479e
-
SHA512
91f60800377163ebaaecc44c51e80a99ce870fef9f28299f9e9b8115da527ed8bfd70d20d41b8f544a13b1b4d6d0fe4a1133eeb1c9944ac543534db0a1f506d9
-
SSDEEP
49152:BeH0xIvSuxHdbZxe+kY2LALNgJQ5W08/u9pZYQjGS6CSvt9:BeUlOHdbZUY2kWWK/uJYQjGS6jvr
Malware Config
Extracted
tispy
https://brunoespiao.com.br/esp/appprofile.jsp
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
Loads dropped Dex/Jar 1 TTPs 2 IoCs
Runs executable file dropped to the device during analysis.
Processes:
com.cwgjppld.ktrmtpyyioc pid process /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4197 com.cwgjppld.ktrmtpyy /data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zip 4197 com.cwgjppld.ktrmtpyy -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.wifi.IWifiManager.getScanResults com.cwgjppld.ktrmtpyy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
-
Acquires the wake lock 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.os.IPowerManager.acquireWakeLock com.cwgjppld.ktrmtpyy -
Queries information about active data network 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.cwgjppld.ktrmtpyy -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.cwgjppld.ktrmtpyy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.cwgjppld.ktrmtpyy -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
Processes:
com.cwgjppld.ktrmtpyydescription ioc process Framework service call android.app.IActivityManager.registerReceiver com.cwgjppld.ktrmtpyy -
Checks CPU information 2 TTPs 1 IoCs
-
Checks memory information 2 TTPs 1 IoCs
Processes
-
com.cwgjppld.ktrmtpyy1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
- Checks CPU information
- Checks memory information
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.dbFilesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-journalFilesize
512B
MD5fb6671e124e3b9870436150d64c95ace
SHA13ef93258961c518b570ca45ffc4f18fc02e451bb
SHA256aff2d7f5405b761fe6ae0bde11f8ebf86166d8218cb4ad6a13c9ec3d8073ecc1
SHA512b80f3603dbb3626ec88cc5c13279b718bd38ec4b16970fe51b35bcdde03697bd57158083f09f96a385c1e6f1c42271733c4f411960e537784776af43a17e7707
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-shmFilesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
/data/data/com.cwgjppld.ktrmtpyy/databases/privatesms.db-walFilesize
28KB
MD552ba166ff85e77f4c01e29056406244c
SHA1f40e0f214f440be9da55001d4415453c2ca43f77
SHA2569658895e19a2fdc2cab4a6600db2f7774d5a90c38e9f17cb10b17dde5e542b6b
SHA512ec920260218b7e5a33157a517c24e945f8152d97cf74345a4e24137d8705bbf5409477f37110b234341e1c5b709f0d3ddacd6f74f6d8ffd94797746c3e2baf3f
-
/data/data/com.cwgjppld.ktrmtpyy/files/477335.soFilesize
145KB
MD5fee3c57be6abd07ed816f2b1b8560dc0
SHA1dbf09f2de28039f71014b0b6a1f1d220a1af2c1d
SHA256ad1eb9e75ddcae4fd3a58e4b263dbf21cb8ef62321648dff06e4f4c20a01b7c7
SHA512bb874e7fc723960aaf6dafca89306d82810bbf9c807ec1d93d9cecf402b823404a086aa31b971e6ff2e30bcf5a2296f72b5a4c4ed9f9c864994cedf4147a587f
-
/data/data/com.cwgjppld.ktrmtpyy/files/Background/black-wallpapers-for-smartphone-102-700x990.jpgFilesize
3KB
MD54651e1fd4234ee465d6fe6349f2e178d
SHA11a86fbd1edd11fa983155172d484959760c1fc0e
SHA256725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA5126962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c
-
/data/data/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
530KB
MD54c1b5c99238dde4feada12e39639f235
SHA15246324b80d212b81a3f21b555e7d6bc36aaeb45
SHA2568fb22309962af45eea8f270aa75ca24aa2f6fc398d6060d8ed87a3dcdac55cb0
SHA5127162b606c10a72b06cd9f682f0c6c3a223628327de22101fd0da68784a323ccddb8b1df7fed84df3813c8f0517feb57ebf7018e7aaeb5621edb0f6e3e5008a34
-
/data/data/com.cwgjppld.ktrmtpyy/logs/Sistema1718543067136.logFilesize
17KB
MD50e1673ed71d17f8aebb3cfa57805cf48
SHA149a5a84b4869ca7d238c12576bbf5bf6ecb4f839
SHA2562bfc978d13d0a8063674ef410b9498888e44eb18f4f41039f804087201cbde44
SHA5129558d9b06ffc0367ed864c364f4b6e950cbcef4f512c48c34c68eaed73ebc0dca5864218bd823bfa018510637d7c8e95554f8320cabb31a1cbd82f51ace40a16
-
/data/user/0/com.cwgjppld.ktrmtpyy/files/dex/EqhFopUyvvzZupUZp.zipFilesize
1.3MB
MD5ac1b7ec3b7181d6cd01d588a2d4b2d79
SHA187d5f51355042408af658df77a87e6454e56911d
SHA256e8075fc66d28348f6127815f5da1bd2430863c30f3de79c4d6e5d6e4c7996ae5
SHA51299fab8c406cb838cd3e384a40bd9ef4a6afaa44d19b5962a5cb3e4a878dbde6e41ded7d10b988938c00469fcb83a8bb78193b5248c5f0aff2f390c266f82df69