General

  • Target

    58adfa980900443c761687043461ab2cf4e92211e4faaf7124cc4be50b87143c.apk

  • Size

    3.1MB

  • Sample

    240816-bjp8ja1dkl

  • MD5

    6372870e1d454e520eaf4cbbaadc257b

  • SHA1

    f65245aa96249556fbd1be71782ad8ed716c1091

  • SHA256

    58adfa980900443c761687043461ab2cf4e92211e4faaf7124cc4be50b87143c

  • SHA512

    3ad0e3549079b68a002e7bbb33c9a3b013dcf0a04d12f60e6e437a9f379856424d5a9fac302e5530ab76f83cc21f83f472d012c40d22e03cb37450eeb2ca6572

  • SSDEEP

    49152:GM6hLnAsg+P5XeIwGilKkETZbg1hJi7ewD1g4VJOHDaoTlU/bBp:GM6hn9g+PXsKPgVgg4VJCUD3

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_15Aug24&rtype=T

Targets

    • Target

      58adfa980900443c761687043461ab2cf4e92211e4faaf7124cc4be50b87143c.apk

    • Size

      3.1MB

    • MD5

      6372870e1d454e520eaf4cbbaadc257b

    • SHA1

      f65245aa96249556fbd1be71782ad8ed716c1091

    • SHA256

      58adfa980900443c761687043461ab2cf4e92211e4faaf7124cc4be50b87143c

    • SHA512

      3ad0e3549079b68a002e7bbb33c9a3b013dcf0a04d12f60e6e437a9f379856424d5a9fac302e5530ab76f83cc21f83f472d012c40d22e03cb37450eeb2ca6572

    • SSDEEP

      49152:GM6hLnAsg+P5XeIwGilKkETZbg1hJi7ewD1g4VJOHDaoTlU/bBp:GM6hn9g+PXsKPgVgg4VJCUD3

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks