General

  • Target

    98684a1da1c798016c849af4633de7e241193712d4dabf5456ad523c3510f37c.apk

  • Size

    3.1MB

  • Sample

    240824-brsnmayaqg

  • MD5

    50bb2abb1ea33311f1d4cd4d908050cf

  • SHA1

    1556abdf773dd5f08dd1f51355d3f8225ad71093

  • SHA256

    98684a1da1c798016c849af4633de7e241193712d4dabf5456ad523c3510f37c

  • SHA512

    1cdee03a1c417af039fba38f042c5489de2c2a77758a2e8d09cd22bbd6a915f6a84cc0d9fb242a21055efb6a46c13c08bbbaa1509ca993f27c35151998419e72

  • SSDEEP

    49152:2TkbhbnAK0nPEK6ciDuJCaKUPXqmyRf+zuGuX4aIyZWQW5AYXO8:2TkbJnr0nPq/0iUPXqm2RGbaI0WL59V

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_23Aug24&rtype=T

Targets

    • Target

      98684a1da1c798016c849af4633de7e241193712d4dabf5456ad523c3510f37c.apk

    • Size

      3.1MB

    • MD5

      50bb2abb1ea33311f1d4cd4d908050cf

    • SHA1

      1556abdf773dd5f08dd1f51355d3f8225ad71093

    • SHA256

      98684a1da1c798016c849af4633de7e241193712d4dabf5456ad523c3510f37c

    • SHA512

      1cdee03a1c417af039fba38f042c5489de2c2a77758a2e8d09cd22bbd6a915f6a84cc0d9fb242a21055efb6a46c13c08bbbaa1509ca993f27c35151998419e72

    • SSDEEP

      49152:2TkbhbnAK0nPEK6ciDuJCaKUPXqmyRf+zuGuX4aIyZWQW5AYXO8:2TkbJnr0nPq/0iUPXqm2RGbaI0WL59V

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks