MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 9c1b26882bc98a363924db4e5b35b4b5253fc859dfcb4402ca3eaceec3f1a5b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



TiSpy


Vendor detections: 7


Intelligence 7 IOCs YARA 1 File information Comments

SHA256 hash: 9c1b26882bc98a363924db4e5b35b4b5253fc859dfcb4402ca3eaceec3f1a5b7
SHA3-384 hash: 11765716d397d5cab4c631c288df277cbd8cc7fbd38cc82392459ce3f2a2438a483b0212d8ff9026a838e30c62c970ba
SHA1 hash: ec7c90cbee8b675c8d4eac2e7e2037b6473acb49
MD5 hash: ddebce7ea1fd91f0e6063634e6ce6657
humanhash: lemon-uniform-tango-music
File name:WiFiService.apk
Download: download sample
Signature TiSpy
File size:3'259'319 bytes
First seen:2024-04-15 03:52:36 UTC
Last seen:Never
File type: apk
MIME type:application/zip
ssdeep 98304:JLD+vno2jPm6A5WxlrLrc2mJ8oy7UHFog:t0o2ju6IWxNZepHF/
TLSH T1A5E50203EA62956BE4FAD3721A71712920364D1447839B5A382C3BFF62BF5DD4F866C0
TrID 55.0% (.APK) Android Package (32500/1/6)
22.8% (.JAR) Java Archive (13500/1/2)
13.5% (.XPI) Mozilla Firefox browser extension (8000/1/1)
6.7% (.ZIP) ZIP compressed archive (4000/1)
1.6% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter tenacioustek
Tags:android apk signed stalkerware TiSpy

Code Signing Certificate

Organisation:thezjzmhqv@nxnwuiqiwv.com
Issuer:thezjzmhqv@nxnwuiqiwv.com
Algorithm:sha256WithRSAEncryption
Valid from:2024-01-07T00:30:04Z
Valid to:2051-05-25T00:30:04Z
Serial number: 7c23e475
Thumbprint Algorithm:SHA256
Thumbprint: fd8b7e9762fb1470b5f934419e923263c27c2f01b5411c4fec917bcde89a9682
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
362
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Tags:
fingerprint phishing
Result
Application Permissions
read contact data (READ_CONTACTS)
read SMS or MMS (READ_SMS)
directly call phone numbers (CALL_PHONE)
read phone state and identity (READ_PHONE_STATE)
intercept outgoing calls (PROCESS_OUTGOING_CALLS)
read sensitive log data (READ_LOGS)
read/modify/delete external storage contents (WRITE_EXTERNAL_STORAGE)
coarse (network-based) location (ACCESS_COARSE_LOCATION)
fine (GPS) location (ACCESS_FINE_LOCATION)
read calendar events (READ_CALENDAR)
record audio (RECORD_AUDIO)
take pictures and videos (CAMERA)
retrieve running applications (GET_TASKS)
display system-level alerts (SYSTEM_ALERT_WINDOW)
modify global system settings (WRITE_SETTINGS)
control vibrator (VIBRATE)
full Internet access (INTERNET)
view network status (ACCESS_NETWORK_STATE)
change your audio settings (MODIFY_AUDIO_SETTINGS)
prevent phone from sleeping (WAKE_LOCK)
view Wi-Fi status (ACCESS_WIFI_STATE)
change Wi-Fi status (CHANGE_WIFI_STATE)
automatically start at boot (RECEIVE_BOOT_COMPLETED)
change network connectivity (CHANGE_NETWORK_STATE)
create Bluetooth connections (BLUETOOTH)
bluetooth administration (BLUETOOTH_ADMIN)
send sticky broadcast (BROADCAST_STICKY)
measure application storage space (GET_PACKAGE_SIZE)
write sync settings (WRITE_SYNC_SETTINGS)
allow Wi-Fi Multicast reception (CHANGE_WIFI_MULTICAST_STATE)
Allows cloud to device messaging (C2D_MESSAGE)
C2DM permissions (RECEIVE)
interact with device admin (BIND_DEVICE_ADMIN)
update component usage statistics (PACKAGE_USAGE_STATS)
modify battery statistics (BATTERY_STATS)
modify secure system settings (WRITE_SECURE_SETTINGS)
change your UI settings (CHANGE_CONFIGURATION)
Threat name:
Android.PUA.Maltiverza
Status:
Malicious
First seen:
2024-04-15 03:53:06 UTC
File Type:
Binary (Archive)
Extracted files:
100
AV detection:
6 of 23 (26.09%)
Threat level:
  1/5
Result
Malware family:
Score:
  10/10
Tags:
family:tispy android collection discovery evasion infostealer spyware trojan
Behaviour
Acquires the wake lock
Reads information about phone network operator.
Loads dropped Dex/Jar
Queries information about the current Wi-Fi connection.
Queries information about the current nearby Wi-Fi networks.
Requests cell location
TiSpy
TiSpy payload
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BitcoinAddress
Author:Didier Stevens (@DidierStevens)
Description:Contains a valid Bitcoin address

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

TiSpy

apk 9c1b26882bc98a363924db4e5b35b4b5253fc859dfcb4402ca3eaceec3f1a5b7

(this sample)

  
Delivery method
Distributed via web download

Comments