Resubmissions

14-01-2025 05:44

250114-gfjt8szrbn 10

14-01-2025 05:43

250114-ge4g9aykgt 10

14-01-2025 05:39

250114-gctj9szqep 10

14-01-2025 05:35

250114-f993vazqak 10

14-01-2025 05:34

250114-f9l11szpgq 10

14-01-2025 05:31

250114-f76yeayjcw 10

14-01-2025 05:30

250114-f68evayjas 10

14-01-2025 05:29

250114-f6m4xazpcq 10

14-01-2025 05:27

250114-f5p7wazpbm 10

General

  • Target

    virusX.zip

  • Size

    32.5MB

  • Sample

    250114-ftstmaxpby

  • MD5

    a58b72237a14d709c6eea04b73049210

  • SHA1

    786a2d070ea75d7fd858ebd93869063fedd6d705

  • SHA256

    51baf4bc48db631e887ded88c0beb05b7a2f6f26ad2d122ee7c6cca6678752f5

  • SHA512

    978b868d4ce591570f722d167e14f2b6533d3b341bdaac1048fb3d1196ad26b2009269514d29b5aeb12aa75697ae556ebd3c88af1ed4ea00f8c83289fff7a9b9

  • SSDEEP

    786432:xDWCPFc6LHxrdAxglUJMtJg9GzAl8g5lf/F9M6GvHzn9:sUzjxrdAxxJM+l8g5lDM6Gj9

Malware Config

Extracted

Family

tispy

C2

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=IntroScreen&model=Pixel+2&osversion=33&deviceid=43d7b21d2c03444daac9236d60bb1356&version=3.2.183_22Jun24&rtype=T

https://auth.familysafty.com/TiSPY/printIPN.jsp?screen=Signin&model=Pixel+2&osversion=33&deviceid=43d7b21d2c03444daac9236d60bb1356&version=3.2.183_22Jun24&rtype=T

Targets

    • Target

      1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0.apk

    • Size

      3.2MB

    • MD5

      14623d7dc9a647db6984cc6dfdfa2f63

    • SHA1

      4784359d681992c1db6e4221a5e51f01c306c24d

    • SHA256

      1777a2ba85f831e41c6a60418f84205c9de9c66402f9b7e5be13d29c543a42b0

    • SHA512

      955dcf412c8f8dc62562465f0cf0a359fd11c31739e8dbb0d53b75fe5fc24376914f85517dc9ee88763072a5d855e2b9200e801ea906b58119f9736b6e41689f

    • SSDEEP

      49152:kkQ7hynArFFP/RI5cHF2+XwTn8JBvvrMNvrsdKcWVftaWcSFhidvbKCH9B8zTAI:kkQ7Qn+nPD2+AIfMtrs09A7dvb5dBA

    • TiSpy

      TiSpy is an Android stalkerware.

    • TiSpy payload

    • Tispy family

    • Loads dropped Dex/Jar

      Runs executable file dropped to the device during analysis.

    • Queries the phone number (MSISDN for GSM devices)

    • Reads the contacts stored on the device.

    • Requests cell location

      Uses Android APIs to to get current cell location.

    • Acquires the wake lock

    • Domain associated with commercial stalkerware software, includes indicators from echap.eu.org

    • Queries information about active data network

    • Queries the mobile country code (MCC)

    • Reads information about phone network operator.

MITRE ATT&CK Mobile v15

Tasks