Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows10_x64 -
resource
win10-20220414-en -
submitted
12-05-2022 06:54
Static task
static1
General
-
Target
5b60d2cb0b63bcd9c7df5873496d119de3f5364ba6eeea8548f20b2940a73ffa.exe
-
Size
3.9MB
-
MD5
5c21cca8d79a5c46f7f1bd78b222c47a
-
SHA1
bd249dea8ceb0a4bde6ee336ed2063696b821767
-
SHA256
5b60d2cb0b63bcd9c7df5873496d119de3f5364ba6eeea8548f20b2940a73ffa
-
SHA512
1f63c24f59d5508a81e371e8c4ab8f11ce1c61a31fb78ecefdbe3d59d5e62eb281bda61e507642b92f3a897b11b0a3b0dcee3369cb78686097c91c91b08108d7
Malware Config
Signatures
-
FFDroider Payload 1 IoCs
resource yara_rule behavioral1/memory/2236-185-0x0000000000400000-0x00000000009BC000-memory.dmp family_ffdroider -
Downloads MZ/PE file
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2236 5b60d2cb0b63bcd9c7df5873496d119de3f5364ba6eeea8548f20b2940a73ffa.exe