Overview
overview
10Static
static
101777a2ba85...b0.apk
android-9-x86
105251a35642...3e.apk
android-9-x86
15251a35642...3e.apk
android-10-x64
15251a35642...3e.apk
android-11-x64
17c44519e51...57.apk
android-9-x86
10FE_Invisib...pt.apk
android-9-x86
7FE_Invisib...pt.apk
android-10-x64
7FE_Invisib...pt.apk
android-11-x64
7HellBoy.apk
android-9-x86
6HellBoy.apk
android-10-x64
1HellBoy.apk
android-11-x64
6Roblox Key...V3.apk
android-9-x86
7Roblox Key...V3.apk
android-10-x64
1Roblox Key...V3.apk
android-11-x64
7Stick War_ Legacy.apk
android-9-x86
1Stick War_ Legacy.apk
android-10-x64
7Stick War_ Legacy.apk
android-11-x64
7Undead_Def...pt.apk
android-9-x86
7Undead_Def...pt.apk
android-10-x64
7Undead_Def...pt.apk
android-11-x64
7antivirus.apk
android-9-x86
7antivirus.apk
android-10-x64
7antivirus.apk
android-11-x64
7b3f23bdd3d...c0.apk
android-9-x86
10e8947bc9fb...10.apk
android-9-x86
7insta_followers.apk
android-9-x86
7insta_followers.apk
android-10-x64
7insta_followers.apk
android-11-x64
7xxx.apk
android-9-x86
1Analysis
-
max time kernel
49s -
max time network
136s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
05-08-2024 01:22
Behavioral task
behavioral1
Sample
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
5251a356421340a45c8dc6d431ef8a8cbca4078a0305a87f4fbd552e9fc0793e.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral3
Sample
5251a356421340a45c8dc6d431ef8a8cbca4078a0305a87f4fbd552e9fc0793e.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral4
Sample
5251a356421340a45c8dc6d431ef8a8cbca4078a0305a87f4fbd552e9fc0793e.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral5
Sample
7c44519e51cc203cdd23f27cefe7cf99de34abddf947ba55951721725f15aa57.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral6
Sample
FE_Invisible_Troll_Script.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
FE_Invisible_Troll_Script.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral8
Sample
FE_Invisible_Troll_Script.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral9
Sample
HellBoy.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral10
Sample
HellBoy.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral11
Sample
HellBoy.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral12
Sample
Roblox Keyless Bloxfruits Script HoHo Hub V3.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral13
Sample
Roblox Keyless Bloxfruits Script HoHo Hub V3.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral14
Sample
Roblox Keyless Bloxfruits Script HoHo Hub V3.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral15
Sample
Stick War_ Legacy.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral16
Sample
Stick War_ Legacy.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral17
Sample
Stick War_ Legacy.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral18
Sample
Undead_Defense_Tycoon_Script.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral19
Sample
Undead_Defense_Tycoon_Script.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral20
Sample
Undead_Defense_Tycoon_Script.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral21
Sample
antivirus.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral22
Sample
antivirus.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral23
Sample
antivirus.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral24
Sample
b3f23bdd3dea208f05de7a5b9ea928758187b3f2b0f4f5733c8bdb3298818ec0.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral25
Sample
e8947bc9fb2bd597daba3064d5fab275d8df2beac92f301063f22fe276dcbc10.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral26
Sample
insta_followers.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral27
Sample
insta_followers.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral28
Sample
insta_followers.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral29
Sample
xxx.apk
Resource
android-x86-arm-20240624-en
General
-
Target
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0.apk
-
Size
3.2MB
-
MD5
14623d7dc9a647db6984cc6dfdfa2f63
-
SHA1
4784359d681992c1db6e4221a5e51f01c306c24d
-
SHA256
1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0
-
SHA512
955dcf412c8f8dc62562465f0cf0a359fd11c31739e8dbb0d53b75fe5fc24376914f85517dc9ee88763072a5d855e2b9200e801ea906b58119f9736b6e41689f
-
SSDEEP
49152:kkQ7hynArFFP/RI5cHF2+XwTn8JBvvrMNvrsdKcWVftaWcSFhidvbKCH9B8zTAI:kkQ7Qn+nPD2+AIfMtrs09A7dvb5dBA
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_22Jun24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
resource yara_rule behavioral1/memory/4397-0.dex family_tispy behavioral1/memory/4303-1.dex family_tispy -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.crbpphsj.wjphxfzk/code_cache/1722821015646.dex 4364 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.crbpphsj.wjphxfzk/code_cache/1722821015646.dex --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/data/com.crbpphsj.wjphxfzk/code_cache/oat/x86/1722821015646.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.crbpphsj.wjphxfzk/code_cache/1722821015646.dex 4303 com.crbpphsj.wjphxfzk /data/user/0/com.crbpphsj.wjphxfzk/files/dex/YWmycydWrtgRZdrZq.zip 4397 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.crbpphsj.wjphxfzk/files/dex/YWmycydWrtgRZdrZq.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.crbpphsj.wjphxfzk/files/dex/oat/x86/YWmycydWrtgRZdrZq.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.crbpphsj.wjphxfzk/files/dex/YWmycydWrtgRZdrZq.zip 4303 com.crbpphsj.wjphxfzk /data/data/com.crbpphsj.wjphxfzk/code_cache/1722821027442.dex 4439 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.crbpphsj.wjphxfzk/code_cache/1722821027442.dex --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/data/com.crbpphsj.wjphxfzk/code_cache/oat/x86/1722821027442.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.crbpphsj.wjphxfzk/code_cache/1722821027442.dex 4303 com.crbpphsj.wjphxfzk /data/user/0/com.crbpphsj.wjphxfzk/files/dex/YWmycydWrtgRZdrZq.zip 4303 com.crbpphsj.wjphxfzk -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.crbpphsj.wjphxfzk -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.crbpphsj.wjphxfzk -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.crbpphsj.wjphxfzk -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.crbpphsj.wjphxfzk -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.crbpphsj.wjphxfzk -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.crbpphsj.wjphxfzk -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.crbpphsj.wjphxfzk
Processes
-
com.crbpphsj.wjphxfzk1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4303 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.crbpphsj.wjphxfzk/code_cache/1722821015646.dex --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/data/com.crbpphsj.wjphxfzk/code_cache/oat/x86/1722821015646.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4364
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.crbpphsj.wjphxfzk/files/dex/YWmycydWrtgRZdrZq.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.crbpphsj.wjphxfzk/files/dex/oat/x86/YWmycydWrtgRZdrZq.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4397
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.crbpphsj.wjphxfzk/code_cache/1722821027442.dex --output-vdex-fd=45 --oat-fd=46 --oat-location=/data/data/com.crbpphsj.wjphxfzk/code_cache/oat/x86/1722821027442.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4439
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD5edbb27c9b1cc7cfc23160a02a1573a87
SHA19697e74fb4ef5c0bd69f61195368fd335899ade2
SHA2560a6a0fd42a08d8622fa151907100f8a209153dee9beffd4327ddbd3157a37267
SHA5123b6813d2296a5e16723c060baf54a10b1ade4e58a484831a5c36399ff04157098699b4f47923c33872e33ea3280fe8768dbfd33538bedee12c1170e62b3fded8
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD522e4b2e0afbd5e539f33c6e2359f1d79
SHA18f2e0f635ac8651d4173034b3e22bd4133148e32
SHA2567e8ac836651205b36ca78c8138449c21ca100a619222d3c0a11820b3fc8f8fd5
SHA512af1693e80a5db9a7891613547f7fdde19776a5af0afb2c56f8e73dd16e9b563c70f2b262665da18bb3dd6f1fd67cfa024876f5f0fa9986414328eb1cbd0aeeef
-
Filesize
145KB
MD51b82243685c1c0be15d83c8fc11153f9
SHA1e637f8b2d0c3c0dadd45dcd88be87f5e12f8624d
SHA256deb10f3c7b34c37e2dcb226c68ebaae067e61e05429b44273e9610e84b7223f7
SHA512cd7e82cfa509809d1a644a105e022759d74d00d1c13f90df389cfa88eb997aa3c371ebbc3d66397e1e72ecd9adb2f38029f619ad278b50a9907b68d7631b9c3a
-
Filesize
1.5MB
MD559393f43989813af3d160e210a5952c9
SHA19b6780014fb444ea42351e80a94c6d30fc40df25
SHA2566bcf568203c45b24659e5138f9149ddb0221eac842afc82339686d9ee7e8ec2d
SHA51210c18b2b0258d96155ccc5269565000d502a5e88d4117d838ff46036b0e8eee656515a50205d4e602148c3bc39083072fb08dee70223beaac0b4cd569a3c18f7
-
Filesize
9KB
MD546cf04caa3c8a81641c726438a3a207d
SHA1c7e048dbfb498b7d707590041767d5dba75f81a9
SHA2560cbccc92d18792a9ec5161f070518108a2a79e194c0f1bd4eaadebdf31c10517
SHA512c1152da72f3a1eab32227cc685538dde0394cef5c1efc34060b75c6f567e03cb5ebbbedbf96ce90b8a824683c58c0397402e5ed18626d8bb8e6530e07283c67b
-
Filesize
3.7MB
MD5f8ed1392b1899775322feb5072dc6a61
SHA111f6099c1289198fa6556febaf126ff5d365db79
SHA256986689df19eabd4f217fbdb7fd5562b2d7caa71daf7f5fa0cafab15aab0ac4a7
SHA512cf60269d11d6428e33550c07f3b79539d761a02f95fb3ce679900b441360d44142473f3c8098a7879cca8c786d2d3c14f008ff83bd978465ce7e503df47f2f37
-
Filesize
3.7MB
MD56b1a12f2792059773d78e52505ce2e7f
SHA1ef8254c4e28e718fc6c7c6e92920a07f06dae233
SHA256cb480143a043bb4fe9452618c2c4875263311389ee865ec165319c49c28283ca
SHA51226d2a36ca021f1d86f5a4d19502f757821f908e2d68a716e4f5d5deeec689a09c27a98796685cf244324f332eaf952f6e87772fe80552811eb2a3efeb3b396f5