Analysis
-
max time kernel
73s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20220718-en -
submitted
30-07-2022 03:45
Behavioral task
behavioral1
Sample
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe
-
Size
1.9MB
-
MD5
6a235ccfd5dd5e47d299f664d03652b7
-
SHA1
75825ab1b4db3c5e41a17c98394c46d02f766b5a
-
SHA256
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786
-
SHA512
3abbfcbf43daf58c7a8b3a148f251fdf09acea63418481e6a6d7562a4d7bb2dace784aec5839f55737cff0ca83e6c457546a1d49ae361af8e20fea14391b79f8
-
SSDEEP
49152:woSsL+Ax4UH/9LEnzjMdtCd1U9zfb/niBBk+QqX0NmXqxRx:/Iu/mnzwA1U9X/niB3Xg
Malware Config
Extracted
Family
ffdroider
C2
http://152.32.228.19
Signatures
-
FFDroider payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1968-55-0x0000000000C60000-0x0000000001117000-memory.dmp family_ffdroider behavioral1/memory/1968-56-0x0000000000C60000-0x0000000001117000-memory.dmp family_ffdroider behavioral1/memory/1968-57-0x0000000000C60000-0x0000000001117000-memory.dmp family_ffdroider behavioral1/memory/1968-58-0x0000000000C60000-0x0000000001117000-memory.dmp family_ffdroider behavioral1/memory/1968-71-0x0000000000C60000-0x0000000001117000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exedescription pid process Token: SeManageVolumePrivilege 1968 3596982adf10806e7128f8f64621ec7546f4c56e445010523a1a5a584254f786.exe