Analysis
-
max time kernel
47s -
max time network
142s -
platform
android_x86 -
resource
android-x86-arm-20240624-en -
resource tags
androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system -
submitted
30/08/2024, 02:04
Static task
static1
Behavioral task
behavioral1
Sample
d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30.apk
Resource
android-x86-arm-20240624-en
General
-
Target
d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30.apk
-
Size
3.4MB
-
MD5
e6cca432b971d4954640a9dd2cf09e6f
-
SHA1
a5c22ee228ce02900cd076650033ee6fec010dee
-
SHA256
d17bfc41c6e53c7ccfda5321d545652b4f368d615301a3645420fd564c163b30
-
SHA512
ff2e9e4bbcfa6a1eb5521c3f698062123329c091d8909ca7c0bb6fbbb2a0078a3beeee983bc6642cf3d574bc36b5664360398833b9f7801f79bb346a2bfd96f5
-
SSDEEP
98304:/UpRwn71Pk97KsQo+dNzPzrEdU84PiTRM:so71c5KsQrz7Vdiq
Malware Config
Extracted
tispy
https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=28&deviceid=358240051014041&version=3.2.183_05Jul24&rtype=T
Signatures
-
TiSpy
TiSpy is an Android stalkerware.
-
TiSpy payload 2 IoCs
resource yara_rule behavioral1/memory/4313-0.dex family_tispy behavioral1/memory/4260-1.dex family_tispy -
Loads dropped Dex/Jar 1 TTPs 7 IoCs
Runs executable file dropped to the device during analysis.
ioc pid Process /data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983473151.dex 4287 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983473151.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rjldfyjr.xdapuvxn/code_cache/oat/x86/1724983473151.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983473151.dex 4260 com.rjldfyjr.xdapuvxn /data/user/0/com.rjldfyjr.xdapuvxn/files/dex/IDBjJNVYdqiRgUUzP.zip 4313 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rjldfyjr.xdapuvxn/files/dex/IDBjJNVYdqiRgUUzP.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.rjldfyjr.xdapuvxn/files/dex/oat/x86/IDBjJNVYdqiRgUUzP.odex --compiler-filter=quicken --class-loader-context=& /data/user/0/com.rjldfyjr.xdapuvxn/files/dex/IDBjJNVYdqiRgUUzP.zip 4260 com.rjldfyjr.xdapuvxn /data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983478852.dex 4337 /system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983478852.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rjldfyjr.xdapuvxn/code_cache/oat/x86/1724983478852.odex --compiler-filter=quicken --class-loader-context=& /data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983478852.dex 4260 com.rjldfyjr.xdapuvxn /data/user/0/com.rjldfyjr.xdapuvxn/files/dex/IDBjJNVYdqiRgUUzP.zip 4260 com.rjldfyjr.xdapuvxn -
Queries information about the current nearby Wi-Fi networks 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
description ioc Process Framework service call android.net.wifi.IWifiManager.getScanResults com.rjldfyjr.xdapuvxn -
Queries the phone number (MSISDN for GSM devices) 1 TTPs
-
Requests cell location 2 TTPs 1 IoCs
Uses Android APIs to to get current cell location.
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getCellLocation com.rjldfyjr.xdapuvxn -
Acquires the wake lock 1 IoCs
description ioc Process Framework service call android.os.IPowerManager.acquireWakeLock com.rjldfyjr.xdapuvxn -
Queries information about active data network 1 TTPs 1 IoCs
description ioc Process Framework service call android.net.IConnectivityManager.getActiveNetworkInfo com.rjldfyjr.xdapuvxn -
Queries information about the current Wi-Fi connection 1 TTPs 1 IoCs
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
description ioc Process Framework service call android.net.wifi.IWifiManager.getConnectionInfo com.rjldfyjr.xdapuvxn -
Queries the mobile country code (MCC) 1 TTPs 1 IoCs
description ioc Process Framework service call com.android.internal.telephony.ITelephony.getNetworkCountryIsoForPhone com.rjldfyjr.xdapuvxn -
Reads information about phone network operator. 1 TTPs
-
Registers a broadcast receiver at runtime (usually for listening for system events) 1 TTPs 1 IoCs
description ioc Process Framework service call android.app.IActivityManager.registerReceiver com.rjldfyjr.xdapuvxn
Processes
-
com.rjldfyjr.xdapuvxn1⤵
- Loads dropped Dex/Jar
- Queries information about the current nearby Wi-Fi networks
- Requests cell location
- Acquires the wake lock
- Queries information about active data network
- Queries information about the current Wi-Fi connection
- Queries the mobile country code (MCC)
- Registers a broadcast receiver at runtime (usually for listening for system events)
PID:4260 -
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983473151.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rjldfyjr.xdapuvxn/code_cache/oat/x86/1724983473151.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4287
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/user/0/com.rjldfyjr.xdapuvxn/files/dex/IDBjJNVYdqiRgUUzP.zip --output-vdex-fd=49 --oat-fd=50 --oat-location=/data/user/0/com.rjldfyjr.xdapuvxn/files/dex/oat/x86/IDBjJNVYdqiRgUUzP.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4313
-
-
/system/bin/dex2oat --instruction-set=x86 --instruction-set-features=ssse3,-sse4.1,-sse4.2,-avx,-avx2,-popcnt --runtime-arg -Xhidden-api-checks --runtime-arg -Xrelocate --boot-image=/system/framework/boot.art --runtime-arg -Xms64m --runtime-arg -Xmx512m --instruction-set-variant=x86 --instruction-set-features=default --inline-max-code-units=0 --compact-dex-level=none --dex-file=/data/data/com.rjldfyjr.xdapuvxn/code_cache/1724983478852.dex --output-vdex-fd=44 --oat-fd=45 --oat-location=/data/data/com.rjldfyjr.xdapuvxn/code_cache/oat/x86/1724983478852.odex --compiler-filter=quicken --class-loader-context=&2⤵
- Loads dropped Dex/Jar
PID:4337
-
Network
MITRE ATT&CK Mobile v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5d3364728f634bf71c4b16542c02c60cb
SHA1f23088362b69935f404f2b81eaa40ed3172efca5
SHA256401f68f4448fd6288b7619a7a2ae4646493cd7268f16aa6714802833fbc1197e
SHA5129378bbda71abcb437676a2d4095d7d3ab6a5a1c1682ec95f3f6d050b9226692cd1a29ba8e7a65dac441c29cfb7b1d5e69e34b5cc32989c90c025909567a662af
-
Filesize
8KB
MD5cf790c0dfb1361b86d4b8bfca1f8814c
SHA1d452d9d6504f6af0c9408d6fdb1ced0ff3c45dee
SHA2565dfcef0f59a512a9d88d21de81e5f9a20ff420d328736a1426b0a45f9459d832
SHA512e2194cf4ab22064206d9df3523afd3b247f4ce72b7fed17056029746d1f79c1a25d340f8f9c7ec77b9590d05dc7549a735d631a368f82c472cd54bb8a1396c47
-
Filesize
8KB
MD5a137b5568de65b8fef35329930d8617f
SHA149a2d6e95d447ba1d448c81691f6a609fb2859ed
SHA256bc5290425eaa32b00a84a94c58976321e7643bc5d668817524ad68a1c7d2082b
SHA5129dd6c25dea7b3424e8ca0150a9f1f6f85ed5fccef69e7fadfa05324014b74cc350365b788cee2a8ce25afccee084908e679eafa7f449e7791c6288485d2c5338
-
Filesize
16KB
MD53621ce0aa81e37bc5c80e2cf881f1dd0
SHA100365f82dcada94caea07443656848baf60b3bd9
SHA2568620d146b06037c9dc98b8788c3137344eb9d7e1f8b982ffec4c1d8549f24dd5
SHA51276bb7175359d61ce39e95008269752de25769c4e274b4bcf37b920bc2cbfb680b2a4a88de860ed069655d1f47604638b0301c2c6131107cd929348895d73d2bf
-
Filesize
512B
MD51496b2e2ee41cb119540c25d270ad9c3
SHA1edf6dacc58fb9ffd37419c3a6084c29ad2d990da
SHA256b33eda5203ae66c62411768753fd7783fdff9308cfdb089ea9704e2d9ac0ef38
SHA51258dbc5eda90653493acac72fc2b04a640b02e418dc4e99738ee7f5e7d0aa3ad7fa967807952d9d7846b6296aa6391bde8dfab7cff73e5db55d9fe866cfd10942
-
Filesize
32KB
MD5bb7df04e1b0a2570657527a7e108ae23
SHA15188431849b4613152fd7bdba6a3ff0a4fd6424b
SHA256c35020473aed1b4642cd726cad727b63fff2824ad68cedd7ffb73c7cbd890479
SHA512768007e06b0cd9e62d50f458b9435c6dda0a6d272f0b15550f97c478394b743331c3a9c9236e09ab5b9cb3b423b2320a5d66eb3c7068db9ea37891ca40e47012
-
Filesize
28KB
MD5cc7c3549d5e09bb31365d863a20f8c47
SHA1fcd7741c5d26cca759dfe245bdbfcd36c973966a
SHA256a5b8edde2be4bcd424fd4b01b1ee4fca155abd4af5ea351ba87cdf1a559f881a
SHA5123837fd842f128b3dbb46ce9f820499453c7614115e826cbc748261b33b664fd0c5cdfb534a9f0f77e65ab1ad62d8d4b535689faeede7225370911df6f921cfa7
-
Filesize
145KB
MD5451dfa9c52d3f5972d8e6f51234add58
SHA1b5100cd79dcaffaaf22e084ba5d3f2f87037cf9a
SHA256f37910cc62e7feab2e60b907954dedb0839d7d99d65e7b0cf304d9c780ad1304
SHA51248f262e98973a4aa76adfccc64b57e750fd62c2341396b0465d7f62aab637f418f5d9d8993faff92c2b6e4a36b5ac138423890712827c0f5c5e2080601927d21
-
Filesize
1.5MB
MD5d45f9246f7e97c6f3151762c4df23a8d
SHA1a046b407f3bd1f25749225ba71520440013becc3
SHA256a5fd32d37b823a5f6148cbac973343f0cc0d88c2599dd3b0ad573e923c10b742
SHA512939e49d7a9933ec1f2f6ccb5a2358179cdf3bed3c949f466dff566a3627223adf024ca0101137e00bf65c23ca6a62c5f2294bc3ef5d908d42b4e712491fdfb8b
-
Filesize
9KB
MD5900777f1b8d8fb659f19a56de5cc08af
SHA16c5670e3b4314046c10c9e212a3f9d0660b03a18
SHA256358f6c95d865a73ffb2fe5ecdc220d8521752a22371af8ea54b2d990b3976c8f
SHA5128d173eafd473be706aceefa43688bcde4b44bd56ea8433773d44a0db49bde0854333b29014b4813ad83710819fc9caaf17b3bb84222fae020848ce9ee26b5120
-
Filesize
3.7MB
MD59e169ad471a40ec81ab30d2744a9fe8e
SHA11f0bd40b11827dbc107bccdc819881d9db9aebc9
SHA25695927ab218714530b46e28a17b790935230a686fa6a718c75f8922c109af441e
SHA512530156a342a94b19ecae86e74587da86f075cb4443c93702dbd07c0d78633ffdd072bf525473c2cda4a7a5bd035a0da5c767a8b9c2461669208e4d142eb13805
-
Filesize
3.7MB
MD5cbc53b4cb775fffd2e78ea63369b9080
SHA16ea4e55494412909526431a8e274afd60d46966a
SHA256ef17c8acbb88b71672f42a1fc6edb6169bd23eed451ebab88d614924fc6f5941
SHA51286d34535af25d8638e2ca76327d50bfa771e545e30fe8edb18262bf633c0ecf71653438d2207428be5eaa36e8a6115b07363462e630ac5293214ad9e79689fc4