General

  • Target

    564183c99a2558c526d05b3e018bde6002ec14ff17219a25ea15ca3cf9b0ae76.apk

  • Size

    3.5MB

  • Sample

    240731-bsmh1atdld

  • MD5

    b5488889df5cfdac71d99780097fcadb

  • SHA1

    ad9bbc1356c331c73ad9813f5860f072158be965

  • SHA256

    564183c99a2558c526d05b3e018bde6002ec14ff17219a25ea15ca3cf9b0ae76

  • SHA512

    1d9538f0660c934e05035f80e6cd1f2eba6f5fcb1d312a5f4c1604f755147f26b292d7ee090af7ca8de6489a8ec44e08d7610d3ce61f89d09cbacfc8c78bf182

  • SSDEEP

    49152:Xfxzh+nAg8Pfm7espvWoJLzFcav6vNSZUIUINZZ0R/2tPjeSCj3FNVEN:XfxzInl8P+epQ1cav6v11uZZ0RsPQ5EN

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_30Jul24&rtype=T

Targets

    • Target

      564183c99a2558c526d05b3e018bde6002ec14ff17219a25ea15ca3cf9b0ae76.apk

    • Size

      3.5MB

    • MD5

      b5488889df5cfdac71d99780097fcadb

    • SHA1

      ad9bbc1356c331c73ad9813f5860f072158be965

    • SHA256

      564183c99a2558c526d05b3e018bde6002ec14ff17219a25ea15ca3cf9b0ae76

    • SHA512

      1d9538f0660c934e05035f80e6cd1f2eba6f5fcb1d312a5f4c1604f755147f26b292d7ee090af7ca8de6489a8ec44e08d7610d3ce61f89d09cbacfc8c78bf182

    • SSDEEP

      49152:Xfxzh+nAg8Pfm7espvWoJLzFcav6vNSZUIUINZZ0R/2tPjeSCj3FNVEN:XfxzInl8P+epQ1cav6v11uZZ0RsPQ5EN

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks