General

  • Target

    5789fa7b6fc49958f384d57c784d1c132d8a927e749d8ca5c6b4f426293d48c7

  • Size

    3.1MB

  • Sample

    240814-c1fk4avepc

  • MD5

    dde0ec2b075c57d82d3daf799204b627

  • SHA1

    6d6bedeab773df33ee2c267b430b7376fca1d368

  • SHA256

    5789fa7b6fc49958f384d57c784d1c132d8a927e749d8ca5c6b4f426293d48c7

  • SHA512

    fcb27bf53e43c39b39faecdec08b7cdfaf44b520aa4c59a6634c67019a81ef29bdeb051a44569cba569a1d00f304d5c027bedeb7a77f1d305430a47764b2017a

  • SSDEEP

    49152:rDXhxnA96PaR3vBFwwBJghTISpi+Lqg1dM6jRk5Wm34gZZ8oggPiLI/:rDX/nY6Pay6K5ISMzEdM6j25L18of6w

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_14Aug24&rtype=T

Targets

    • Target

      5789fa7b6fc49958f384d57c784d1c132d8a927e749d8ca5c6b4f426293d48c7

    • Size

      3.1MB

    • MD5

      dde0ec2b075c57d82d3daf799204b627

    • SHA1

      6d6bedeab773df33ee2c267b430b7376fca1d368

    • SHA256

      5789fa7b6fc49958f384d57c784d1c132d8a927e749d8ca5c6b4f426293d48c7

    • SHA512

      fcb27bf53e43c39b39faecdec08b7cdfaf44b520aa4c59a6634c67019a81ef29bdeb051a44569cba569a1d00f304d5c027bedeb7a77f1d305430a47764b2017a

    • SSDEEP

      49152:rDXhxnA96PaR3vBFwwBJghTISpi+Lqg1dM6jRk5Wm34gZZ8oggPiLI/:rDX/nY6Pay6K5ISMzEdM6j25L18of6w

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks