General
-
Target
32a1633fb47c1f1ca9a4f62bbc366a5bd23c7e96b5b24d564f5853fef62a375a
-
Size
3.1MB
-
Sample
240708-klb85atcka
-
MD5
b9a13b2c42b8f68f20d7a3f5eb31fce2
-
SHA1
72c2862a1ae55d242429bea7f8661b05aaada4ce
-
SHA256
32a1633fb47c1f1ca9a4f62bbc366a5bd23c7e96b5b24d564f5853fef62a375a
-
SHA512
39959117e8cd3c620a2dc6664194c726b973fe429a418c5eb0f90fa0d485e02352e52fde656d4722231a3bf64bb620c97aa8ce26b346f86785355f41d0b1479e
-
SSDEEP
98304:Ow6HuWi341eDHiS27BCkP4Mb0b/hPKPnlOYRRh2:OlHu/34Ujipt4w0tMnlOYXh2
Static task
static1
Behavioral task
behavioral1
Sample
527a0180760ee92751def15d3fa434fb6711b8122fb9ab4cf2d03d5908c7245b.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_06Jul24&rtype=T
Targets
-
-
Target
527a0180760ee92751def15d3fa434fb6711b8122fb9ab4cf2d03d5908c7245b.apk
-
Size
3.4MB
-
MD5
acc0d5c1460b87386e1e1789c9626aa3
-
SHA1
e00520a52d83d9e5f1ff2d90bf3f3f8b91e4bbc8
-
SHA256
527a0180760ee92751def15d3fa434fb6711b8122fb9ab4cf2d03d5908c7245b
-
SHA512
d25ad296ef20f09824e8f1981b06ed6aecf75bcf52fc926c0cb62f61dba40cadb4ac520c7652d457bf883b1a233bbda5e9da080a42c412d70ba011d57fd2e3c3
-
SSDEEP
49152:CaahbnA50c82PJm3kUI4Jo0FKRy/uVaBhHK2xDM9ombpP9FDg7PmwAtGt+un7xST:CaapnkJP644JoRI2VFpk7ewz3n7xSDv
-
TiSpy payload
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-