Analysis
-
max time kernel
106s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20220718-en -
submitted
01-08-2022 05:02
Behavioral task
behavioral1
Sample
5ce27f724cff5f6f4558ec61f2f328df7fbe8905ac032e461358b9a4a1acb34b.exe
Resource
win7-20220718-en
windows7-x64
4 signatures
150 seconds
General
-
Target
5ce27f724cff5f6f4558ec61f2f328df7fbe8905ac032e461358b9a4a1acb34b.exe
-
Size
1.8MB
-
MD5
e101086987595cde7a1439641814d5cf
-
SHA1
f7b1b3bd0a933be4adbca78d6938d6dfac90de77
-
SHA256
5ce27f724cff5f6f4558ec61f2f328df7fbe8905ac032e461358b9a4a1acb34b
-
SHA512
216b33d61872fe0ae7c93e1329fa55e369edcffc49be54b7e079edc09ccfd7d7c680c5a2bfdf81008bae666e44b62a3aeca5884ea4d4ea49afc470b8da5f71cd
-
SSDEEP
49152:oiVOqL26YVweCqo0oKPB803g0Bk+QqX0NmXqxq:ocfrqo5KPB203XgM
Malware Config
Extracted
Family
ffdroider
C2
http://152.32.228.19
Signatures
-
FFDroider payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/740-56-0x00000000002B0000-0x00000000006DB000-memory.dmp family_ffdroider behavioral1/memory/740-58-0x00000000002B0000-0x00000000006DB000-memory.dmp family_ffdroider behavioral1/memory/740-57-0x00000000002B0000-0x00000000006DB000-memory.dmp family_ffdroider behavioral1/memory/740-71-0x00000000002B0000-0x00000000006DB000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5ce27f724cff5f6f4558ec61f2f328df7fbe8905ac032e461358b9a4a1acb34b.exedescription pid process Token: SeManageVolumePrivilege 740 5ce27f724cff5f6f4558ec61f2f328df7fbe8905ac032e461358b9a4a1acb34b.exe