General

  • Target

    1733625b4976afb39f3c68bbd4b9b51695aff9810db15394cbae873909067f23

  • Size

    3.7MB

  • Sample

    240806-cygqda1bkd

  • MD5

    7c4addaed9dad7985951d81d377b7343

  • SHA1

    5ed8bf700cb6bed532369122760c5a09514e5cb6

  • SHA256

    1733625b4976afb39f3c68bbd4b9b51695aff9810db15394cbae873909067f23

  • SHA512

    170f001fc9846f1dc00f301370139f6c958d566198238fc9ec047dfab7644d777ba0a0598cd9118dbd17c7746b84a85ce34c0d6b113fc482f5e1b7adea4b1dfc

  • SSDEEP

    98304:ylmK1/BjthXPCKwXaGZsOjFoMfGvzW8O4R25qGJ1:yTlBjTXqKaZshMfyW8Oc25qw1

Malware Config

Targets

    • Target

      1733625b4976afb39f3c68bbd4b9b51695aff9810db15394cbae873909067f23

    • Size

      3.7MB

    • MD5

      7c4addaed9dad7985951d81d377b7343

    • SHA1

      5ed8bf700cb6bed532369122760c5a09514e5cb6

    • SHA256

      1733625b4976afb39f3c68bbd4b9b51695aff9810db15394cbae873909067f23

    • SHA512

      170f001fc9846f1dc00f301370139f6c958d566198238fc9ec047dfab7644d777ba0a0598cd9118dbd17c7746b84a85ce34c0d6b113fc482f5e1b7adea4b1dfc

    • SSDEEP

      98304:ylmK1/BjthXPCKwXaGZsOjFoMfGvzW8O4R25qGJ1:yTlBjTXqKaZshMfyW8Oc25qw1

    • TiSpy

      TiSpy is an Android stalkerware.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks