General

  • Target

    201a92a72736083f40200ac417b05ce4f688ba82216eea888b59f02da2c2944c.apk

  • Size

    3.1MB

  • Sample

    240819-bk9cssygmp

  • MD5

    66f18bfaa520572e7c3c4b13c4fd70eb

  • SHA1

    d484ad1d0ab1acf7a34d2b5b0b5ef044e90fffe3

  • SHA256

    201a92a72736083f40200ac417b05ce4f688ba82216eea888b59f02da2c2944c

  • SHA512

    07350488b6f75ed936e897a2badb391b1603495cadb68beb6410c66900c1f2d651c4d2cd4c25fe4d54f82d5041229ef9529c8a500e35dc188d99e2a00cf7b956

  • SSDEEP

    49152:f78IhvnA0nP0Ehhur9BgIcsu2+3wy+QEgE29NZUCigkdxObPOTdTvoNOgwVQd2:f78IpnlnPlhOPuChrTybPOFvAOjP

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_18Aug24&rtype=T

Targets

    • Target

      201a92a72736083f40200ac417b05ce4f688ba82216eea888b59f02da2c2944c.apk

    • Size

      3.1MB

    • MD5

      66f18bfaa520572e7c3c4b13c4fd70eb

    • SHA1

      d484ad1d0ab1acf7a34d2b5b0b5ef044e90fffe3

    • SHA256

      201a92a72736083f40200ac417b05ce4f688ba82216eea888b59f02da2c2944c

    • SHA512

      07350488b6f75ed936e897a2badb391b1603495cadb68beb6410c66900c1f2d651c4d2cd4c25fe4d54f82d5041229ef9529c8a500e35dc188d99e2a00cf7b956

    • SSDEEP

      49152:f78IhvnA0nP0Ehhur9BgIcsu2+3wy+QEgE29NZUCigkdxObPOTdTvoNOgwVQd2:f78IpnlnPlhOPuChrTybPOFvAOjP

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks