Overview
overview
10Static
static
101777a2ba85...b0.apk
android-9-x86
105251a35642...3e.apk
android-9-x86
15251a35642...3e.apk
android-10-x64
15251a35642...3e.apk
android-11-x64
17c44519e51...57.apk
android-9-x86
10FE_Invisib...pt.apk
android-9-x86
1FE_Invisib...pt.apk
android-10-x64
7FE_Invisib...pt.apk
android-11-x64
7HellBoy.apk
android-9-x86
6HellBoy.apk
android-10-x64
1HellBoy.apk
android-11-x64
6Roblox Key...V3.apk
android-9-x86
1Roblox Key...V3.apk
android-10-x64
7Roblox Key...V3.apk
android-11-x64
7Stick War_ Legacy.apk
android-9-x86
1Stick War_ Legacy.apk
android-10-x64
7Stick War_ Legacy.apk
android-11-x64
7Undead_Def...pt.apk
android-9-x86
7Undead_Def...pt.apk
android-10-x64
7Undead_Def...pt.apk
android-11-x64
7antivirus.apk
android-9-x86
7antivirus.apk
android-10-x64
7antivirus.apk
android-11-x64
7b3f23bdd3d...c0.apk
android-9-x86
10e8947bc9fb...10.apk
android-9-x86
7insta_followers.apk
android-9-x86
7insta_followers.apk
android-10-x64
7insta_followers.apk
android-11-x64
7xxx.apk
android-9-x86
1Resubmissions
04-08-2024 12:30
240804-ppf4psvfkq 10Analysis
-
max time kernel
50s -
max time network
136s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
04-08-2024 12:30
Behavioral task
behavioral1
Sample
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5251a356421340a45c8dc6d431ef8a8cbca4078a0305a87f4fbd552e9fc0793e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
5251a356421340a45c8dc6d431ef8a8cbca4078a0305a87f4fbd552e9fc0793e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
5251a356421340a45c8dc6d431ef8a8cbca4078a0305a87f4fbd552e9fc0793e.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
7c44519e51cc203cdd23f27cefe7cf99de34abddf947ba55951721725f15aa57.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
FE_Invisible_Troll_Script.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
FE_Invisible_Troll_Script.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
FE_Invisible_Troll_Script.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral9
Sample
HellBoy.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral10
Sample
HellBoy.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral11
Sample
HellBoy.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral12
Sample
Roblox Keyless Bloxfruits Script HoHo Hub V3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
Roblox Keyless Bloxfruits Script HoHo Hub V3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral14
Sample
Roblox Keyless Bloxfruits Script HoHo Hub V3.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral15
Sample
Stick War_ Legacy.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral16
Sample
Stick War_ Legacy.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral17
Sample
Stick War_ Legacy.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral18
Sample
Undead_Defense_Tycoon_Script.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral19
Sample
Undead_Defense_Tycoon_Script.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral20
Sample
Undead_Defense_Tycoon_Script.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral21
Sample
antivirus.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral22
Sample
antivirus.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral23
Sample
antivirus.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral24
Sample
b3f23bdd3dea208f05de7a5b9ea928758187b3f2b0f4f5733c8bdb3298818ec0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral25
Sample
e8947bc9fb2bd597daba3064d5fab275d8df2beac92f301063f22fe276dcbc10.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral26
Sample
insta_followers.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral27
Sample
insta_followers.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral28
Sample
insta_followers.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral29
Sample
xxx.apk
Resource
android-x86-arm-20240624-en
General
-
Target
7c44519e51cc203cdd23f27cefe7cf99de34abddf947ba55951721725f15aa57.apk
-
Size
3.2MB
-
MD5
2f73a6fe62a8ac27d658f15b1dc9a287
-
SHA1
a40118f9d9a54938e6e261ee242716ac3a761e89
-
SHA256
7c44519e51cc203cdd23f27cefe7cf99de34abddf947ba55951721725f15aa57
-
SHA512
480a6c820664ce78b6284678019671edacc4cf98865e335f9816ce84507c2fe42b765db5103e27dab52605f95c5302f58c6691a869e24876df1f396c4d966d89
-
SSDEEP
49152:pVPh+nACbPhX9CR3WHZn0/dwbDnog36hR4F41RemM3zfhVzsv5w:pVPcnzbPhoZW5nhnnHVyRtM3znzQw
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_21Jun24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
resource yara_rule behavioral5/memory/4354-0.dex family_tispy behavioral5/memory/4257-1.dex family_tispy -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.foqrpral.oxudfpdy/code_cache/1722774637385.dex 4320 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.foqrpral.oxudfpdy/code_cache/1722774637385.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.foqrpral.oxudfpdy/code_cache/oat/x86/1722774637385.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.foqrpral.oxudfpdy/code_cache/1722774637385.dex 4257 com.foqrpral.oxudfpdy /data/user/0/com.foqrpral.oxudfpdy/files/dex/rIiUhJCHARxzyIQxM.zip 4354 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.foqrpral.oxudfpdy/files/dex/rIiUhJCHARxzyIQxM.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.foqrpral.oxudfpdy/files/dex/oat/x86/rIiUhJCHARxzyIQxM.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.foqrpral.oxudfpdy/files/dex/rIiUhJCHARxzyIQxM.zip 4257 com.foqrpral.oxudfpdy /data/data/com.foqrpral.oxudfpdy/code_cache/1722774649380.dex 4397 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.foqrpral.oxudfpdy/code_cache/1722774649380.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.foqrpral.oxudfpdy/code_cache/oat/x86/1722774649380.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.foqrpral.oxudfpdy/code_cache/1722774649380.dex 4257 com.foqrpral.oxudfpdy /data/user/0/com.foqrpral.oxudfpdy/files/dex/rIiUhJCHARxzyIQxM.zip 4257 com.foqrpral.oxudfpdy -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.foqrpral.oxudfpdy -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.foqrpral.oxudfpdy -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.foqrpral.oxudfpdy -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.foqrpral.oxudfpdy -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.foqrpral.oxudfpdy -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.foqrpral.oxudfpdy -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.foqrpral.oxudfpdy
Processes
-
com.foqrpral.oxudfpdy1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4257 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.foqrpral.oxudfpdy/code_cache/1722774637385.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.foqrpral.oxudfpdy/code_cache/oat/x86/1722774637385.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4320
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.foqrpral.oxudfpdy/files/dex/rIiUhJCHARxzyIQxM.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.foqrpral.oxudfpdy/files/dex/oat/x86/rIiUhJCHARxzyIQxM.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4354
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.foqrpral.oxudfpdy/code_cache/1722774649380.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.foqrpral.oxudfpdy/code_cache/oat/x86/1722774649380.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4397
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD54c2e781253e4604dc044505ebe58affa
SHA12f578f19e4008533e2243fb511c751f03aab43d6
SHA2562aa169c46b2fa20771c82ebb3efdff88dccaeefe71b7bef978b38209253f51de
SHA512654f8a1c9763d1f5f96654639c01fa902333e71ee8bf10ac6d8d6e2cf643c5ddeb37f12dc64accd16eacbc83d7bc8d428584bb0c0948c6d29c862909a63f3bc0
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5f785020717efc804b4b3de2acdcfa5d5
SHA13a1e3786fa5412acdbf74b292998eefe0315ade4
SHA2560988ecf6206e111e2d990ec47f29e89147c1be0e25364d5a84e829a8c2f2c1dc
SHA512bb50be59d1da4c296fd9bc64fe0075bdad1a029725c6fa3f5843b73cb57d5227f1f18ea28a3a47102695be7679515df2ce9b1ae9c5f4450b6e32f1885ce2762f
-
Filesize
145KB
MD558c46208d95caaa3e72b9a812e2e4fa7
SHA1d4d4159adde5b34b31f06fdbf622577a7e5c49e2
SHA25661afb81a844465836f0f8665ec5cda08620362f1cfd3357b54c31e64747c7569
SHA51212a7b66191bdfb6012517acda5a2dfe4b3ed510fdac14673a859a50cf358365f58a9accd91126e1cb95f68bbcec9265a3cab9d46e481700b161f4578bec4a835
-
Filesize
1.5MB
MD5e10223a9dd1e0ddb8b1061d1f4437625
SHA17d1e8cc7b1409eb49f4fef532a4f3003f8785b4a
SHA256649d1bcd5b1a5f75260e284bb8e1bda2c4630dca5a7536d5e56c8b8dcd51b5d3
SHA512a0aac391a377c514598034929fb1d7fad129f32eb253c778de1724b7bebb84afe077ac2d0bea432b2bbd93cbe192d2452e85c9e3356d4ba8d321c349242aab8b
-
Filesize
9KB
MD512d3a8799bab5701d804a8f23c164900
SHA102f0c3618fac6154175d1dc64cf9ea6476d8fd6f
SHA2564fed2734027927347133ddc077da8f2d8597a4f8bea4dff6e55d8cef65892498
SHA5124dd8d97df32e99d3d41723d5d796505a6bbbad27cf5ef8186e15dc814e9328665ebb1a7b5af1149791eef8a5dbcc8a695e7bfb0a430bcbd9b4cfda681d7b429b
-
Filesize
3.7MB
MD54a3936648e0d6bb8de54977f7d2f2440
SHA1528efc4052546f80a371bfce96e7cb3813ee3ddc
SHA256bfea891d0ac92148bc35c91769f34c802c07b020b4330213650360f4ebb245d3
SHA512c72a85335ae061943f53be66472f2ca83d3ab780665cf2b919c838bfee265f202d02a7c1b1cbb038fb0f56c53f8ec1dbd390fe9ee1c69fdf81a0f652cc677e39
-
Filesize
3.7MB
MD55e55cdadb8774e38f6b17f3c8acfe6af
SHA196fa6e628d74782f6efe0f52c6113ed638d37845
SHA25605402c8959137f312278d1f2d5fe1cf7e0ff1c26fa09521c37fe700b0c82ca23
SHA512a76d1a43278eb938bc7a133a6235e3b465a1c8266b57e2d3d39dd5736178388df3873ac49ee5a8ca4564a984ddabd5d18b5aceb6af666d988bcc420ccc7d1685