General

  • Target

    2461ACFA271F7D477CA53ABE428D6ADDE1F285E115F18.exe

  • Size

    4.3MB

  • Sample

    221023-wwfvvabfg3

  • MD5

    47a77e0680b5e159c610392034a8b905

  • SHA1

    ab53d53a1878d2e441671a50fe25c27c98c27745

  • SHA256

    2461acfa271f7d477ca53abe428d6adde1f285e115f188b2c82e321a94271a93

  • SHA512

    17fa2068607b8777707a3194a6103429b3281ee5582525f60b036d396b42405b8eaa360af0d8551e61962cf69bd0fe9d0c4785aef5b5053af5cb7d25e12ada3e

  • SSDEEP

    98304:GcPvZKq1eSV1mScVkFwPSfHbTLpSjLfiW+mp+pG2a0sJs0Uz9Fy:GcPRMQ8r6f7TLAjLaKApG2ab6Bz9U

Malware Config

Extracted

Family

ffdroider

C2

http://103.136.40.167

Targets

    • Target

      2461ACFA271F7D477CA53ABE428D6ADDE1F285E115F18.exe

    • Size

      4.3MB

    • MD5

      47a77e0680b5e159c610392034a8b905

    • SHA1

      ab53d53a1878d2e441671a50fe25c27c98c27745

    • SHA256

      2461acfa271f7d477ca53abe428d6adde1f285e115f188b2c82e321a94271a93

    • SHA512

      17fa2068607b8777707a3194a6103429b3281ee5582525f60b036d396b42405b8eaa360af0d8551e61962cf69bd0fe9d0c4785aef5b5053af5cb7d25e12ada3e

    • SSDEEP

      98304:GcPvZKq1eSV1mScVkFwPSfHbTLpSjLfiW+mp+pG2a0sJs0Uz9Fy:GcPRMQ8r6f7TLAjLaKApG2ab6Bz9U

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v6

Tasks