General
-
Target
14623d7dc9a647db6984cc6dfdfa2f63.bin
-
Size
2.9MB
-
Sample
240624-c12tbsyekk
-
MD5
578d37e98f83bfcdd5afecf9f2a2f27d
-
SHA1
4a61b0f19be608dba613c5a86b12ec5041817c2a
-
SHA256
f4b6821f5eacf7365d511d570ad905c5595b94001ce509abb5a58a8dbdd40212
-
SHA512
53cd61886635c408942f985d61ca8bffc2e64c248db0dee43d6cc7945dc4a8d203a9ddba9fa26ec2144295d05661ffb9a8b1548ab77fa0c0ec93f12a34aa8473
-
SSDEEP
49152:/Nd8IIwlW3J5ymV6In1sjCfiPdUorHnCBvejFGrU44KwC7l9Go2alreYGWxuUeML:/NTIwlW3CxI1MS2qorzjFAU44KwOf2Oh
Static task
static1
Behavioral task
behavioral1
Sample
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0.apk
Resource
android-x86-arm-20240611.1-en
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_22Jun24&rtype=T
Targets
-
-
Target
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0.apk
-
Size
3.2MB
-
MD5
14623d7dc9a647db6984cc6dfdfa2f63
-
SHA1
4784359d681992c1db6e4221a5e51f01c306c24d
-
SHA256
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0
-
SHA512
955dcf412c8f8dc62562465f0cf0a359fd11c31739e8dbb0d53b75fe5fc24376914f85517dc9ee88763072a5d855e2b9200e801ea906b58119f9736b6e41689f
-
SSDEEP
49152:kkQ7hynArFFP/RI5cHF2+XwTn8JBvvrMNvrsdKcWVftaWcSFhidvbKCH9B8zTAI:kkQ7Qn+nPD2+AIfMtrs09A7dvb5dBA
-
TiSpy payload
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-