Analysis
-
max time kernel
45s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
16-06-2022 15:33
Static task
static1
Behavioral task
behavioral1
Sample
jg2_2qua.exe
Resource
win7-20220414-en
General
-
Target
jg2_2qua.exe
-
Size
3.8MB
-
MD5
da0fd627e5f973c05b64520a79ceb5c3
-
SHA1
c331add626fffa0751618a03632d187a12626b85
-
SHA256
cdff3d6732cbfee9eea53694ce2e72d165554a33c26b2acbc133b699bc0f1797
-
SHA512
1ffddd165ecc4a1db3b159a9822e01c6a266132b474b840cc1dfefa116b5bf8d01c59593862acc709facd9c40ff11e6350daeefbcea26eaf8e91f2cd83f8ad67
-
SSDEEP
49152:SvD9pgi6yJbrS7rpfylBJ9KjggRrxqA4D8dPRLVg56gWePmDUk/08CnMaPSC+Mkg:SvqcrS7rECjggRNLVuTW6usQPrFS5H
Malware Config
Extracted
ffdroider
http://103.136.40.167
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/1756-55-0x0000000000400000-0x0000000000997000-memory.dmp family_ffdroider behavioral1/memory/1756-56-0x0000000000400000-0x0000000000997000-memory.dmp family_ffdroider -
suricata: ET MALWARE Win32/FFDroider CnC Activity
suricata: ET MALWARE Win32/FFDroider CnC Activity
-
suricata: ET MALWARE Win32/FFDroider CnC Activity M2
suricata: ET MALWARE Win32/FFDroider CnC Activity M2
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 1756 jg2_2qua.exe