General

  • Target

    WiFiService.apk

  • Size

    3.2MB

  • Sample

    240619-cracqawfmk

  • MD5

    5db37fe0033709c66c7f5933a2e12f9c

  • SHA1

    50ab6f72af8ea8bed2692cb856b939d839d86f99

  • SHA256

    d345cec215c2024f1c8b7a418c53e359fa51ac03769a69dbe1990b5bd75227ca

  • SHA512

    4324f100e7df79a8beafe72067ed7d68b6c8e9d5d55cbc4d47917a783fc10f736848582a37ded8789ba741f5f1d49cff6b1a686abe7f8b5e602d8da1cb8817d5

  • SSDEEP

    98304:q/o6nC+YPQL91VO2FsuF6qctqS04NtS5D2:qPC+YSm2FsW4vS92

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_19Jun24&rtype=T

Targets

    • Target

      WiFiService.apk

    • Size

      3.2MB

    • MD5

      5db37fe0033709c66c7f5933a2e12f9c

    • SHA1

      50ab6f72af8ea8bed2692cb856b939d839d86f99

    • SHA256

      d345cec215c2024f1c8b7a418c53e359fa51ac03769a69dbe1990b5bd75227ca

    • SHA512

      4324f100e7df79a8beafe72067ed7d68b6c8e9d5d55cbc4d47917a783fc10f736848582a37ded8789ba741f5f1d49cff6b1a686abe7f8b5e602d8da1cb8817d5

    • SSDEEP

      98304:q/o6nC+YPQL91VO2FsuF6qctqS04NtS5D2:qPC+YSm2FsW4vS92

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

MITRE ATT&CK Matrix

Tasks