General

  • Target

    4c9a77046873161eab4c607c358540e11e56811b0b251849e6c0ac954da601a2

  • Size

    3.4MB

  • Sample

    240709-cltt6s1dkk

  • MD5

    1c4896424cc81ff567cf87461ac8feb1

  • SHA1

    11084d9bc03aae58f5bd41a13315d04f7aafcde1

  • SHA256

    4c9a77046873161eab4c607c358540e11e56811b0b251849e6c0ac954da601a2

  • SHA512

    5cba0fee60bb127cc61a1caa0df5cd87bb8dc897113d6eab9557c44e40eec8cd18519505a1bf43f242f462413cc00c528dddd13063ea39f733d241eb0f267a9e

  • SSDEEP

    98304:fPB3nIIqPq4x8wTcYSR041Rr7KqY9b8ipB60Aro:ftIIqFtoYMul1PAE

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_09Jul24&rtype=T

Targets

    • Target

      4c9a77046873161eab4c607c358540e11e56811b0b251849e6c0ac954da601a2

    • Size

      3.4MB

    • MD5

      1c4896424cc81ff567cf87461ac8feb1

    • SHA1

      11084d9bc03aae58f5bd41a13315d04f7aafcde1

    • SHA256

      4c9a77046873161eab4c607c358540e11e56811b0b251849e6c0ac954da601a2

    • SHA512

      5cba0fee60bb127cc61a1caa0df5cd87bb8dc897113d6eab9557c44e40eec8cd18519505a1bf43f242f462413cc00c528dddd13063ea39f733d241eb0f267a9e

    • SSDEEP

      98304:fPB3nIIqPq4x8wTcYSR041Rr7KqY9b8ipB60Aro:ftIIqFtoYMul1PAE

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Matrix

Tasks