Analysis
-
max time kernel
29s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
04-06-2022 16:46
Static task
static1
Behavioral task
behavioral1
Sample
0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe
Resource
win7-20220414-en
0 signatures
0 seconds
General
-
Target
0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe
-
Size
2.1MB
-
MD5
011eca360bcae358ca1ebf28d2cfb0cc
-
SHA1
95a9e2b240dfafc760b9c84e20c53d89632761c1
-
SHA256
0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad
-
SHA512
46d6aa457c9a328ce0206348d43244685be06da27ad58c36810417526308a8bb77f608f8c3781018dd8b43e944f65c625166f672e0d3c6a98b2c7356ca3acd80
Malware Config
Signatures
-
FFDroider Payload 2 IoCs
resource yara_rule behavioral1/memory/912-55-0x0000000000B40000-0x00000000010F0000-memory.dmp family_ffdroider behavioral1/memory/912-70-0x0000000000B40000-0x00000000010F0000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 912 0f1619d2878b47decac0eb4f25fae469623b3e41ae8564e7061ca464e95707ad.exe