General

  • Target

    277796840eb5ece4a88eec570ffc0d114011e9ba2bcd7343ef27a39ef0389458

  • Size

    3.1MB

  • Sample

    240822-ctme3axekr

  • MD5

    b5d66128c12868d0c09754ad26d2f9a7

  • SHA1

    c47e1ac5f4c4de7328fa2da8a416753c1a482747

  • SHA256

    277796840eb5ece4a88eec570ffc0d114011e9ba2bcd7343ef27a39ef0389458

  • SHA512

    19fecd2fb974551b0b5d85264cf4f2f07aa3e694c249800853ec1c73ad3da2456c53e921876538d071768f5d3b6792b62ca2123d8ffe0b5c149541cce3f690e9

  • SSDEEP

    49152:IFPhfnAOHgPtsN3HlN2aJGjujajJQHqaS7XJqbH5hKAEBhACG:IFPBnVgPON3JJ410qaOCvKnzACG

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_22Aug24&rtype=T

Targets

    • Target

      277796840eb5ece4a88eec570ffc0d114011e9ba2bcd7343ef27a39ef0389458

    • Size

      3.1MB

    • MD5

      b5d66128c12868d0c09754ad26d2f9a7

    • SHA1

      c47e1ac5f4c4de7328fa2da8a416753c1a482747

    • SHA256

      277796840eb5ece4a88eec570ffc0d114011e9ba2bcd7343ef27a39ef0389458

    • SHA512

      19fecd2fb974551b0b5d85264cf4f2f07aa3e694c249800853ec1c73ad3da2456c53e921876538d071768f5d3b6792b62ca2123d8ffe0b5c149541cce3f690e9

    • SSDEEP

      49152:IFPhfnAOHgPtsN3HlN2aJGjujajJQHqaS7XJqbH5hKAEBhACG:IFPBnVgPON3JJ410qaOCvKnzACG

    • TiSpy

      TiSpy is an Android stalkerware.

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks