Malware Analysis Report

2024-07-28 11:10

Sample ID 240617-cmt7bstfkq
Target bruno-sis2.apk
SHA256 f6a6fe13690fb23df4afe0060a4cdbe2bc1efb12e4f049a230598dded5c48c05
Tags
tispy collection discovery evasion infostealer persistence spyware trojan
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f6a6fe13690fb23df4afe0060a4cdbe2bc1efb12e4f049a230598dded5c48c05

Threat Level: Known bad

The file bruno-sis2.apk was found to be: Known bad.

Malicious Activity Summary

tispy collection discovery evasion infostealer persistence spyware trojan

TiSpy

Queries information about the current nearby Wi-Fi networks

Requests cell location

Loads dropped Dex/Jar

Queries the phone number (MSISDN for GSM devices)

Queries the mobile country code (MCC)

Declares services with permission to bind to the system

Declares broadcast receivers with permission to handle system events

Requests dangerous framework permissions

Acquires the wake lock

Queries information about active data network

Queries information about the current Wi-Fi connection

Registers a broadcast receiver at runtime (usually for listening for system events)

Checks memory information

Checks CPU information

MITRE ATT&CK Matrix

N/A

Analysis: static1

Detonation Overview

Reported

2024-06-17 02:12

Signatures

Declares broadcast receivers with permission to handle system events

Description Indicator Process Target
Required by device admin receivers to bind with the system. Allows apps to manage device administration features. android.permission.BIND_DEVICE_ADMIN N/A N/A

Declares services with permission to bind to the system

Description Indicator Process Target
Required by accessibility services to bind with the system. Allows apps to access accessibility features. android.permission.BIND_ACCESSIBILITY_SERVICE N/A N/A
Required by notification listener services to bind with the system. Allows apps to listen to and interact with notifications on the device. android.permission.BIND_NOTIFICATION_LISTENER_SERVICE N/A N/A

Requests dangerous framework permissions

Description Indicator Process Target
Allows an application to read the user's contacts data. android.permission.READ_CONTACTS N/A N/A
Allows an application to read SMS messages. android.permission.READ_SMS N/A N/A
Allows an application to initiate a phone call without going through the Dialer user interface for the user to confirm the call. android.permission.CALL_PHONE N/A N/A
Allows read only access to phone state, including the current cellular network information, the status of any ongoing calls, and a list of any PhoneAccounts registered on the device. android.permission.READ_PHONE_STATE N/A N/A
Allows the app to answer an incoming phone call. android.permission.ANSWER_PHONE_CALLS N/A N/A
Allows an application to see the number being dialed during an outgoing call with the option to redirect the call to a different number or abort the call altogether. android.permission.PROCESS_OUTGOING_CALLS N/A N/A
Allows an application to read the user's call log. android.permission.READ_CALL_LOG N/A N/A
Allows an application to write to external storage. android.permission.WRITE_EXTERNAL_STORAGE N/A N/A
Allows an app to access approximate location. android.permission.ACCESS_COARSE_LOCATION N/A N/A
Allows an app to access precise location. android.permission.ACCESS_FINE_LOCATION N/A N/A
Allows an application to read the user's calendar data. android.permission.READ_CALENDAR N/A N/A
Allows an application to record audio. android.permission.RECORD_AUDIO N/A N/A
Required to be able to access the camera device. android.permission.CAMERA N/A N/A
Allows an app to create windows using the type LayoutParams.TYPE_APPLICATION_OVERLAY, shown on top of all other apps. android.permission.SYSTEM_ALERT_WINDOW N/A N/A
Allows an application to collect component usage statistics. android.permission.PACKAGE_USAGE_STATS N/A N/A
Allows an application to read or write the system settings. android.permission.WRITE_SETTINGS N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-17 02:12

Reported

2024-06-17 02:15

Platform

android-x86-arm-20240611.1-en

Max time kernel

47s

Max time network

159s

Command Line

com.sswfgxuv.zziiefmo

Signatures

TiSpy

trojan infostealer spyware tispy

Loads dropped Dex/Jar

evasion
Description Indicator Process Target
N/A /data/user/0/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip N/A N/A
N/A /data/user/0/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip N/A N/A
N/A /data/user/0/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip N/A N/A

Queries information about the current nearby Wi-Fi networks

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getScanResults N/A N/A

Queries the phone number (MSISDN for GSM devices)

discovery

Requests cell location

collection discovery evasion
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getCellLocation N/A N/A

Acquires the wake lock

Description Indicator Process Target
Framework service call android.os.IPowerManager.acquireWakeLock N/A N/A

Queries information about active data network

discovery
Description Indicator Process Target
Framework service call android.net.IConnectivityManager.getActiveNetworkInfo N/A N/A

Queries information about the current Wi-Fi connection

discovery
Description Indicator Process Target
Framework service call android.net.wifi.IWifiManager.getConnectionInfo N/A N/A

Queries the mobile country code (MCC)

discovery
Description Indicator Process Target
Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone N/A N/A

Registers a broadcast receiver at runtime (usually for listening for system events)

persistence
Description Indicator Process Target
Framework service call android.app.IActivityManager.registerReceiver N/A N/A

Checks CPU information

Description Indicator Process Target
File opened for read /proc/cpuinfo N/A N/A

Checks memory information

Description Indicator Process Target
File opened for read /proc/meminfo N/A N/A

Processes

com.sswfgxuv.zziiefmo

/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/user/0/com.sswfgxuv.zziiefmo/files/dex/oat/x86/rCDSiPEQHdtkxvsQU.odex --compiler-filter=quicken --class-loader-context=&

Network

Country Destination Domain Proto
N/A 224.0.0.251:5353 udp
GB 216.58.204.74:443 tcp
US 1.1.1.1:53 semanticlocation-pa.googleapis.com udp
US 1.1.1.1:53 brunoespiao.com.br udp
US 172.67.189.189:443 brunoespiao.com.br tcp
US 1.1.1.1:53 thypix.com udp
US 104.21.19.250:443 thypix.com tcp
US 1.1.1.1:53 pc.brunoespiao.com.br udp
US 34.200.160.51:443 pc.brunoespiao.com.br tcp
GB 216.58.201.110:443 tcp
US 1.1.1.1:53 android.apis.google.com udp
GB 172.217.16.238:443 android.apis.google.com tcp

Files

/data/data/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip

MD5 5973d3e473e4f00e495515e671b27388
SHA1 f19c7c825f5b6ed3732d980f2fc4a90bd6b1f225
SHA256 6e0059d51d8bebb0915c52b57aa2f2f339754a7ea0963cd4cc5a735752f0733d
SHA512 127e326ab9a8a24be1beeb546187f56e8abf33fc02488c161b8f27f80cd1c1b578a6426472b1d1b3e7df4da7abce585d716a74caa51a20c2ea5af16961614227

/data/user/0/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip

MD5 cd79b67c61a1d657154b54ba773d648b
SHA1 5785a7996d0182bf82885372888f339f2aa0a8c2
SHA256 35ca113c3a79f4b7b786e310b87163d378d0ceda33ae4d1f254ce0d974d6e336
SHA512 6aed872617f3ed06458cf3b909c1d479ddebe5bdad3f7b7af7c532f27c0ce7f355202b7b26078131ba3bc5c53a54c85fe8b3e2913c8dbf1f95369e417f05a3cf

/data/user/0/com.sswfgxuv.zziiefmo/files/dex/rCDSiPEQHdtkxvsQU.zip

MD5 c5dc81b97f83eebad9bbf85ecb5e071c
SHA1 e5b691ae4b189e52a70bbcb5dbcbf900ebfe6d67
SHA256 ac83c01ddae008787a1a94e4b7f06dd9999da4eeead756984a9ffbf4360624e5
SHA512 f13c8660be7760729952c4241f23840c87ab62d3211dac6a41c1a8554f9bef5343a0c47eefaf995446d42e0bc1a1d13892387f2fe1a7c4be01b4b4dfc5e22c3d

/data/data/com.sswfgxuv.zziiefmo/files/477383.so

MD5 f274913439bbffdc771318f370e4c4f1
SHA1 18c0a156ed8af41198bdd8b1c0473cfe1d8dcfcf
SHA256 aa347b304b3b63c10d09b4736d6dc5ee44afe366596702d03bdda9f8ec6823f7
SHA512 a1a74ad442c85c8542a20d1e0ac1d87d4dc557dc26490d296c78cd6a111808316dcf1dea6d5c5d52e609ae2d96017daaa1cb0fcf949a66982e90c841e3e8a110

/data/data/com.sswfgxuv.zziiefmo/logs/Sistema1718590359917.log

MD5 a4bd4c2d1ebe08d9198b5a66a1178256
SHA1 75fc957662558c17b2c54a06af82051665ec16e0
SHA256 0bc4081a75e5ff38d7f2609e95d451eca727585e52360110ba64008a3da8e5f2
SHA512 2f8d5cd3a4309183c5b0977c510dae6455873a01eae253dd400ec39ebf11ab3d16f8e8ba4ec91b9ac747684f3513c1945269c6a0d14345b1cfae1dbdb591d621

/data/data/com.sswfgxuv.zziiefmo/files/Background/black-wallpapers-for-smartphone-102-700x990.jpg

MD5 4651e1fd4234ee465d6fe6349f2e178d
SHA1 1a86fbd1edd11fa983155172d484959760c1fc0e
SHA256 725ccd777793d5b05707aa28438b58a021c15b0f9cf47ace83aada6ea93a921b
SHA512 6962571dbc91930f4624e3c80e1ab7a5ac23f8f13ccb4587d1619c5d5f8e9731974ae954e8b9ba2e86084f8e797c6a9d49267667a98e47bd7af9e0af29686b0c

/data/data/com.sswfgxuv.zziiefmo/databases/privatesms.db-journal

MD5 7175abf308d67693a51ab7e9e6d1f1a4
SHA1 47409f43d2f2aa2cdcf0b6b0ed743da8c68c23b5
SHA256 76bf7bb3e2ff618c1efaa57c291fbc937181c54a644d0442d518eae02f950555
SHA512 da61c9aa9746bea9596f08f4b298cbe7352df689a4b9afa3e8b3255b503685d7cd79319e2750f65d12a3614e2df817972ae1b5f755d80fe9d8f5f65261ddba03

/data/data/com.sswfgxuv.zziiefmo/databases/privatesms.db

MD5 3621ce0aa81e37bc5c80e2cf881f1dd0
SHA1 00365f82dcada94caea07443656848baf60b3bd9
SHA256 8620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA512 76bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf

/data/data/com.sswfgxuv.zziiefmo/databases/privatesms.db-shm

MD5 bb7df04e1b0a2570657527a7e108ae23
SHA1 5188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256 c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512 768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

/data/data/com.sswfgxuv.zziiefmo/databases/privatesms.db-wal

MD5 0d4de549a575992763e464f56f833eea
SHA1 22c20a229e0171b47adb14594c12fb990a05eef2
SHA256 a7d84a4e30bf514a352670d124ca1f993c498137cb00fcd57853b012e86b5d8f
SHA512 f5f178e486e00f32eca8a8fd0e2ebd33989bbe223aec489dc3e5edb45b6ff6d9ea35bfca070bb52f20637779a4c68520755698aa504563bd42ee3bb521940d26