General

  • Target

    fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507

  • Size

    789KB

  • Sample

    230103-gfe62sdf3x

  • MD5

    b41472d8b0e9c50205e96d39e427de9e

  • SHA1

    c16a3a63fd20c22fc8da89ab2896d76ca0e724db

  • SHA256

    fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507

  • SHA512

    8161e820896be2d6b63291cc4ef74879d2b5cdf87c3a202664eecfd851f279efbe4b624461470672589d082809f00864c029a0a78f2c053ca83c6d1c5e0d3d95

  • SSDEEP

    24576:HH5+AShmB2TZ5jD382ae227uU2JNysPdV2PNa:n59amB2TXjz82aeTuDi

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Targets

    • Target

      fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507

    • Size

      789KB

    • MD5

      b41472d8b0e9c50205e96d39e427de9e

    • SHA1

      c16a3a63fd20c22fc8da89ab2896d76ca0e724db

    • SHA256

      fd0e9e093b695b66b71910bf84e1196b1123700185521e8b3f27ac98aa1dd507

    • SHA512

      8161e820896be2d6b63291cc4ef74879d2b5cdf87c3a202664eecfd851f279efbe4b624461470672589d082809f00864c029a0a78f2c053ca83c6d1c5e0d3d95

    • SSDEEP

      24576:HH5+AShmB2TZ5jD382ae227uU2JNysPdV2PNa:n59amB2TXjz82aeTuDi

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v6

Tasks