Analysis
-
max time kernel
48s -
max time network
131s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
26-08-2024 02:13
Static task
static1
Behavioral task
behavioral1
Sample
WiFiService.apk
Resource
android-x86-arm-20240624-en
General
-
Target
WiFiService.apk
-
Size
3.1MB
-
MD5
609385e1db0ffdb11a68796b4259d9b6
-
SHA1
258f2274cc7186e6f9b57d26e00e20f5fe091f3a
-
SHA256
183f47f2d56aa7214c54337f3657ab320604d29d0d92b34ee023d92fb2eb68c2
-
SHA512
8ea9399615c156847d085a2c0929cea1f5679fef496ab01bb05c576d51857be2729e9c7a32a05e9ff3f6cbf020dd59749a9cbffdbb74ab954d76eba3ffa32dd7
-
SSDEEP
49152:IfwthOnAJsPPzNwNwdIzfzaz7jLJEUxaamwXLx1OolheKACSegX2zbEHV:IfwtMnUsPbeNzsLJEBSLjOcAChgHV
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_24Aug24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
resource yara_rule behavioral1/memory/4317-0.dex family_tispy behavioral1/memory/4265-1.dex family_tispy -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638394114.dex 4292 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638394114.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.ixxezncq.vtrvfwyp/code_cache/oat/x86/1724638394114.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638394114.dex 4265 com.ixxezncq.vtrvfwyp /data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip 4317 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.ixxezncq.vtrvfwyp/files/dex/oat/x86/MyowzqkUboGBYYBZO.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip 4265 com.ixxezncq.vtrvfwyp /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638399988.dex 4343 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638399988.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.ixxezncq.vtrvfwyp/code_cache/oat/x86/1724638399988.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638399988.dex 4265 com.ixxezncq.vtrvfwyp /data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip 4265 com.ixxezncq.vtrvfwyp -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.ixxezncq.vtrvfwyp -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.ixxezncq.vtrvfwyp -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.ixxezncq.vtrvfwyp -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.ixxezncq.vtrvfwyp -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.ixxezncq.vtrvfwyp -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.ixxezncq.vtrvfwyp -
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.ixxezncq.vtrvfwyp
Processes
-
com.ixxezncq.vtrvfwyp1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4265 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638394114.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.ixxezncq.vtrvfwyp/code_cache/oat/x86/1724638394114.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4292
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.ixxezncq.vtrvfwyp/files/dex/oat/x86/MyowzqkUboGBYYBZO.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4317
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ixxezncq.vtrvfwyp/code_cache/1724638399988.dex --output-vdex-fd=44 --oat-fd=47 --oat-location=/data/data/com.ixxezncq.vtrvfwyp/code_cache/oat/x86/1724638399988.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4343
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD5d4a10aeae6dbcf28441926d719671364
SHA101a6242c87a986c86f46ff3830c47002baa6ce0b
SHA256f85777fc1728b9d0987d6b2e05231f43331c3a57cd220ed633e0642ddab14863
SHA512deec8d6312040f56d1485d3a86a607a4cbfb185c581e95ce0ee465f6eb820dcd8098b846377e5480c1aa3ac2b577a93b7b25a419eaeebb6df5dd4b33e26fc1f4
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD580f1e7dbf045102ba133b5add3a9fa3e
SHA166d27e909ea4aaae3bce64a40e402de9f575ca91
SHA25619337df922a9c30fab024ceb764a028402a750a0211700186b25382bbb2c2350
SHA512a10fff5a3a2e6fac76028d280af2812cbc1f42c8cf050676a9769c6d237caef8167a91be8dbed9ec6e6cbcf4c2e7d733fb474c5f43bc61693f89f3d9833df331
-
Filesize
145KB
MD5690aacb23c6a0d6d80991234949f1e81
SHA1595f99ba71e401fe214412133c9ffaebf34980fa
SHA256a05be12b9885a1f2f69b61deb0711e7563a31368b576715e253f0a67028e44fa
SHA512c5f25da8d68b793c887e1fac92418c17123cd4920a3ee23a091685187f23386f4628dfd01a138d90b6d0e5a746d96fc594924f18986d23f8d70bdf12dcbc3189
-
Filesize
1.5MB
MD59fdee5b6cc50b554a68375d0a4499212
SHA185576389e6dcc462bd2b2f16507d6467e5327b91
SHA256734908ae1db6dac67e928d93040b0bd8cebe912bcbc16320d844ee8b250f84c3
SHA5124aac1fa2a7cee2f080be6578d8a0ef4106f9f9c70745e5de1239a7360bf2e95de13a84c345e9e79d01061008877748bba35f9f0554acee1bc732963531932e38
-
Filesize
9KB
MD578eb49e78a89a1c40e51d4bc46268a9d
SHA167a3eb6469fff62ad23b402311b58d0370011d6f
SHA256ffe20ee29edd4ef35a84c6da825372e4cef9f5e2e784ba3a7d3726af850a5d81
SHA512a86119326cd6d6f071bcc0ff50cc781ebc90de2c0df09881de35d3db5a65e19a74cbb2673d22128a7e5cfd67133f9d30bcb1e5e2d1df9253d33427dfdf15c493
-
Filesize
3.7MB
MD5dcb17dcbf0ce74edb0dd8c9cfa860702
SHA1da32d0657c8e11e2b2e31b5973f883e8a67e9bb1
SHA2561aebd7921d532c20e1bb7847171b54a5bf9ce563a430dfbb4ccc90a04393f359
SHA512e844a5ec7ebd9078dcf299e45231c839b058a6d24bb2642e0ab7511c88d52babcd722d144044e4fc8157d52bfa914d9f8602e39653b64b5e7831f5842d6141a3
-
Filesize
3.7MB
MD5daf6d190fb60ec9babc9dc4e797f9b86
SHA1b1323231b8818dbf4aba2b34b961ec17359064a8
SHA2562733041cc8a0dd54f463f8beea67ada277d1d809036805e526671916b9acce0d
SHA51293b354052bd406b2383cf1fd8e218b94db2bc2005b62ae478e7a9b591057d7ef4fe4f529f69cb53e84363c58912c61c0e1334b41357efdc0ab2f038e5417c760