General

  • Target

    241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2

  • Size

    3.1MB

  • Sample

    240820-cmfnyasemm

  • MD5

    38485a04699b06715d4be83fe23e15da

  • SHA1

    88f5336d1ca81633f1141f6eea232d74f9a8cd39

  • SHA256

    241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2

  • SHA512

    3e2aa3881af41d930c6d9d3332ac88ad510050e32c6b821ce9345eef4d92f03e782a559a092ab1f9fdd9cb3a6ae35fca59f2b0b6dc39bc7927e36aa9e5934647

  • SSDEEP

    49152:SLL/h7nAjr7P13pA8aOhfb9EIgTY7G/g1bh6DzFuaNyJWkt2fmkZo5W3gvrAL:SLL/VnSnPfAlOhfb9rgH/QwArG2k4e

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_20Aug24&rtype=T

Targets

    • Target

      241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2

    • Size

      3.1MB

    • MD5

      38485a04699b06715d4be83fe23e15da

    • SHA1

      88f5336d1ca81633f1141f6eea232d74f9a8cd39

    • SHA256

      241ba3b91953ab05ef87c821336f80aa43c2d5a401413aae10e87ba2ac942ea2

    • SHA512

      3e2aa3881af41d930c6d9d3332ac88ad510050e32c6b821ce9345eef4d92f03e782a559a092ab1f9fdd9cb3a6ae35fca59f2b0b6dc39bc7927e36aa9e5934647

    • SSDEEP

      49152:SLL/h7nAjr7P13pA8aOhfb9EIgTY7G/g1bh6DzFuaNyJWkt2fmkZo5W3gvrAL:SLL/VnSnPfAlOhfb9rgH/QwArG2k4e

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks