General

  • Target

    d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30.apk

  • Size

    3.4MB

  • Sample

    240830-chewvasare

  • MD5

    e6cca432b971d4954640a9dd2cf09e6f

  • SHA1

    a5c22ee228ce02900cd076650033ee6fec010dee

  • SHA256

    d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30

  • SHA512

    ff2e9e4bbcfa6a1eb5521c3f698062123329c091d8909ca7c0bb6fbbb2a0078a3beeee983bc6642cf3d574bc36b5664360398833b9f7801f79bb346a2bfd96f5

  • SSDEEP

    98304:/UpRwn71Pk97KsQo+dNzPzrEdU84PiTRM:so71c5KsQrz7Vdiq

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_05Jul24&rtype=T

Targets

    • Target

      d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30.apk

    • Size

      3.4MB

    • MD5

      e6cca432b971d4954640a9dd2cf09e6f

    • SHA1

      a5c22ee228ce02900cd076650033ee6fec010dee

    • SHA256

      d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30

    • SHA512

      ff2e9e4bbcfa6a1eb5521c3f698062123329c091d8909ca7c0bb6fbbb2a0078a3beeee983bc6642cf3d574bc36b5664360398833b9f7801f79bb346a2bfd96f5

    • SSDEEP

      98304:/UpRwn71Pk97KsQo+dNzPzrEdU84PiTRM:so71c5KsQrz7Vdiq

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries information about the current nearby Wi-Fi networks

      Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.

    • Queries the phone number (MSISDN for GSM devices)

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Queries information about active data network

    • Queries information about the current Wi-Fi connection

      Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks