Analysis

  • max time kernel
    48s
  • max time network
    127s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    27/08/2024, 16:53

General

  • Target

    183f47f2d56aa7214c54337f3657ab320604d29d0d92b34ee023d92fb2eb68c2.apk

  • Size

    3.1MB

  • MD5

    609385e1db0ffdb11a68796b4259d9b6

  • SHA1

    258f2274cc7186e6f9b57d26e00e20f5fe091f3a

  • SHA256

    183f47f2d56aa7214c54337f3657ab320604d29d0d92b34ee023d92fb2eb68c2

  • SHA512

    8ea9399615c156847d085a2c0929cea1f5679fef496ab01bb05c576d51857be2729e9c7a32a05e9ff3f6cbf020dd59749a9cbffdbb74ab954d76eba3ffa32dd7

  • SSDEEP

    49152:IfwthOnAJsPPzNwNwdIzfzaz7jLJEUxaamwXLx1OolheKACSegX2zbEHV:IfwtMnUsPbeNzsLJEBSLjOcAChgHV

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_24Aug24&rtype=T

Signatures

  • TiSpy

    TiSpy is an Android stalkerware.

  • TiSpy payload 2 IoCs
  • Loads dropped Dex/Jar 1 TTPs 7 IoCs

    Runs executable file dropped to the device during analysis.

  • Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

  • Queries the phone number (MSISDN for GSM devices) 1 TTPs
  • Requests cell location 2 TTPs 1 IoCs

    Uses Android APIs to to get current cell location.

  • Acquires the wake lock 1 IoCs
  • Queries information about active data network 1 TTPs 1 IoCs
  • Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs

    Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

  • Queries the mobile country code (MCC) 1 TTPs 1 IoCs
  • Reads information about phone network operator. 1 TTPs
  • Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs

Processes

  • com.ixxezncq.vtrvfwyp
    1⤵
    • Loads dropped Dex/Jar
    • Queries information about the current nearby Wi-Fi networks
    • Requests cell location
    • Acquires the wake lock
    • Queries information about active data network
    • Queries information about the current Wi-Fi connection
    • Queries the mobile country code (MCC)
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    PID:4251
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ixxezncq.vtrvfwyp/code_cache/1724777623866.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.ixxezncq.vtrvfwyp/code_cache/oat/x86/1724777623866.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4278
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.ixxezncq.vtrvfwyp/files/dex/oat/x86/MyowzqkUboGBYYBZO.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4303
    • /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.ixxezncq.vtrvfwyp/code_cache/1724777629692.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.ixxezncq.vtrvfwyp/code_cache/oat/x86/1724777629692.odex --compiler-filter=quicken --class-loader-context=&
      2⤵
      • Loads dropped Dex/Jar
      PID:4329

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724777623866.dex

    Filesize

    4KB

    MD5

    d3364728f634bf71c4b16542c02c60cb

    SHA1

    f23088362b69935f404f2b81eaa40ed3172efca5

    SHA256

    401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e

    SHA512

    9378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af

  • /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724777623866.dex

    Filesize

    8KB

    MD5

    cf790c0dfb1361b86d4b8bfca1f8814c

    SHA1

    d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee

    SHA256

    5dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832

    SHA512

    e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47

  • /data/data/com.ixxezncq.vtrvfwyp/code_cache/1724777623866.dex

    Filesize

    8KB

    MD5

    a137b5568de65b8fef35329930d8617f

    SHA1

    49a2d6e95d447ba1d448c81691f6a609fb2859ed

    SHA256

    bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b

    SHA512

    9dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338

  • /data/data/com.ixxezncq.vtrvfwyp/databases/privatesms.db

    Filesize

    16KB

    MD5

    3621ce0aa81e37bc5c80e2cf881f1dd0

    SHA1

    00365f82dcada94caea07443656848baf60b3bd9

    SHA256

    8620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5

    SHA512

    76bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf

  • /data/data/com.ixxezncq.vtrvfwyp/databases/privatesms.db-journal

    Filesize

    512B

    MD5

    c49c4ac52a03773515fc30d98f946155

    SHA1

    d4784f53b346b9e20b6a5a4d4325f7e10ab7d4cf

    SHA256

    5d19c53c2c072920118b23639db67ec60a4413e40c945025d87596310a3c32cb

    SHA512

    f89b1155957b42df4e490f611c4fc40d766c9d5ef195c16a5af3876a9ffaf2951336a3d939ae756590f611e2642df215e3756c2a1f041e46680b6d38bbda66b4

  • /data/data/com.ixxezncq.vtrvfwyp/databases/privatesms.db-shm

    Filesize

    32KB

    MD5

    bb7df04e1b0a2570657527a7e108ae23

    SHA1

    5188431849b4613152fd7bdba6a3ff0a4fd6424b

    SHA256

    c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479

    SHA512

    768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012

  • /data/data/com.ixxezncq.vtrvfwyp/databases/privatesms.db-wal

    Filesize

    28KB

    MD5

    d276794af65fe62b3586d1bb89abb0b7

    SHA1

    f7880b7e05079da34b543459a9df1f6c06dadf43

    SHA256

    035330956a78f8427344037e9acec699292f42c7579452bc7ddcf78b9a3715d4

    SHA512

    c53bc2d04c1b7de764af924e779c499d09d0fce1356e5d150c2d4fb7e4d3c9cca7a1aab6be04005d7c8eb3ebecf7cbf1b62d685795e01dbda818f424768d1f1e

  • /data/data/com.ixxezncq.vtrvfwyp/files/479028.so

    Filesize

    145KB

    MD5

    690aacb23c6a0d6d80991234949f1e81

    SHA1

    595f99ba71e401fe214412133c9ffaebf34980fa

    SHA256

    a05be12b9885a1f2f69b61deb0711e7563a31368b576715e253f0a67028e44fa

    SHA512

    c5f25da8d68b793c887e1fac92418c17123cd4920a3ee23a091685187f23386f4628dfd01a138d90b6d0e5a746d96fc594924f18986d23f8d70bdf12dcbc3189

  • /data/data/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip

    Filesize

    1.5MB

    MD5

    9fdee5b6cc50b554a68375d0a4499212

    SHA1

    85576389e6dcc462bd2b2f16507d6467e5327b91

    SHA256

    734908ae1db6dac67e928d93040b0bd8cebe912bcbc16320d844ee8b250f84c3

    SHA512

    4aac1fa2a7cee2f080be6578d8a0ef4106f9f9c70745e5de1239a7360bf2e95de13a84c345e9e79d01061008877748bba35f9f0554acee1bc732963531932e38

  • /data/data/com.ixxezncq.vtrvfwyp/logs/Sistema1724777632681.log

    Filesize

    9KB

    MD5

    ca8f966d8f50a4be644a354632c99b97

    SHA1

    5d0c6a2607562462463222dc8c9e32d643b709fc

    SHA256

    8e73ada03da8a8686124b5ef4730bb52d85449ad1bc4712ec88720f8fdf977fc

    SHA512

    987a56d75985dc7ed19714f1bbfe720563702855d4b1bfcf304fca2fb41b368f3b66a8ed11cbfb6cbc57fccdcb9b09d8dbcc3b947ca25df1975a4791a095621f

  • /data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip

    Filesize

    3.7MB

    MD5

    dcb17dcbf0ce74edb0dd8c9cfa860702

    SHA1

    da32d0657c8e11e2b2e31b5973f883e8a67e9bb1

    SHA256

    1aebd7921d532c20e1bb7847171b54a5bf9ce563a430dfbb4ccc90a04393f359

    SHA512

    e844a5ec7ebd9078dcf299e45231c839b058a6d24bb2642e0ab7511c88d52babcd722d144044e4fc8157d52bfa914d9f8602e39653b64b5e7831f5842d6141a3

  • /data/user/0/com.ixxezncq.vtrvfwyp/files/dex/MyowzqkUboGBYYBZO.zip

    Filesize

    3.7MB

    MD5

    daf6d190fb60ec9babc9dc4e797f9b86

    SHA1

    b1323231b8818dbf4aba2b34b961ec17359064a8

    SHA256

    2733041cc8a0dd54f463f8beea67ada277d1d809036805e526671916b9acce0d

    SHA512

    93b354052bd406b2383cf1fd8e218b94db2bc2005b62ae478e7a9b591057d7ef4fe4f529f69cb53e84363c58912c61c0e1334b41357efdc0ab2f038e5417c760