General
-
Target
241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2
-
Size
3.1MB
-
Sample
240820-cmfnyasemm
-
MD5
38485a04699b06715d4be83fe23e15da
-
SHA1
88f5336d1ca81633f1141f6eea232d74f9a8cd39
-
SHA256
241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2
-
SHA512
3e2aa3881af41d930c6d9d3332ac88ad510050e32c6b821ce9345eef4d92f03e782a559a092ab1f9fdd9cb3a6ae35fca59f2b0b6dc39bc7927e36aa9e5934647
-
SSDEEP
49152:SLL/h7nAjr7P13pA8aOhfb9EIgTY7G/g1bh6DzFuaNyJWkt2fmkZo5W3gvrAL:SLL/VnSnPfAlOhfb9rgH/QwArG2k4e
Static task
static1
Behavioral task
behavioral1
Sample
241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2.apk
Resource
android-x86-arm-20240624-en
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_20Aug24&rtype=T
Targets
-
-
Target
241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2
-
Size
3.1MB
-
MD5
38485a04699b06715d4be83fe23e15da
-
SHA1
88f5336d1ca81633f1141f6eea232d74f9a8cd39
-
SHA256
241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2
-
SHA512
3e2aa3881af41d930c6d9d3332ac88ad510050e32c6b821ce9345eef4d92f03e782a559a092ab1f9fdd9cb3a6ae35fca59f2b0b6dc39bc7927e36aa9e5934647
-
SSDEEP
49152:SLL/h7nAjr7P13pA8aOhfb9EIgTY7G/g1bh6DzFuaNyJWkt2fmkZo5W3gvrAL:SLL/VnSnPfAlOhfb9rgH/QwArG2k4e
-
TiSpy payload
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries the phone number (MSISDN for GSM devices)
-
Acquires the wake lock
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the mobile country code (MCC)
-
Reads information about phone network operator.
-