General

  • Target

    malware.apk

  • Size

    3.2MB

  • Sample

    240621-l4vnvszaqj

  • MD5

    05f8b2a6020d53641e6be7cdb8be1629

  • SHA1

    53d976aa54d5174112eae645f82f69a97c6851c6

  • SHA256

    8fbaa2a402ad9a256fe27289c41d45836870fe804126679a076b0f6e0116808c

  • SHA512

    d488658ec40f8bf5018f502527ed197b613ad9b715f43df2c90d24b0a09c1d4db30a47637f764472a4f0c6715a7a5b01bb2d3929d644310dc315c3b3b7296674

  • SSDEEP

    49152:NIHhdnA7uJN/3Pmr3qmNLwcHnsTP2iR/LRDwiy4lpOD5QtUYrzEZmIkDwz+eTZg:NIH7nicPIUcHOPdf9t7Ul4wCeu

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_16Jun24&rtype=T

Targets

    • Target

      malware.apk

    • Size

      3.2MB

    • MD5

      05f8b2a6020d53641e6be7cdb8be1629

    • SHA1

      53d976aa54d5174112eae645f82f69a97c6851c6

    • SHA256

      8fbaa2a402ad9a256fe27289c41d45836870fe804126679a076b0f6e0116808c

    • SHA512

      d488658ec40f8bf5018f502527ed197b613ad9b715f43df2c90d24b0a09c1d4db30a47637f764472a4f0c6715a7a5b01bb2d3929d644310dc315c3b3b7296674

    • SSDEEP

      49152:NIHhdnA7uJN/3Pmr3qmNLwcHnsTP2iR/LRDwiy4lpOD5QtUYrzEZmIkDwz+eTZg:NIH7nicPIUcHOPdf9t7Ul4wCeu

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks