General

  • Target

    977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420

  • Size

    474KB

  • Sample

    230129-wbp8sahc7t

  • MD5

    45e846f0e68049eb670db320a5e96910

  • SHA1

    64baf2ae3e6abe1163335f6c7496c57f04968a78

  • SHA256

    977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420

  • SHA512

    03aee1b7ca61395c9761f1a51d85fcae1e03f5129bdf8e1217b482c04049b9201e7da1d9aaf4d5ca27d5678eb7e78b74ec8ca42a35b14101b49640ecb3f7d201

  • SSDEEP

    12288:vvv0rmiMQTll4pWWUgyOHaW8xAyBhhUKaOWZxHPBvtTkoS:3d2ll4XZGxAyBbU9ZlBvl

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Targets

    • Target

      977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420

    • Size

      474KB

    • MD5

      45e846f0e68049eb670db320a5e96910

    • SHA1

      64baf2ae3e6abe1163335f6c7496c57f04968a78

    • SHA256

      977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420

    • SHA512

      03aee1b7ca61395c9761f1a51d85fcae1e03f5129bdf8e1217b482c04049b9201e7da1d9aaf4d5ca27d5678eb7e78b74ec8ca42a35b14101b49640ecb3f7d201

    • SSDEEP

      12288:vvv0rmiMQTll4pWWUgyOHaW8xAyBhhUKaOWZxHPBvtTkoS:3d2ll4XZGxAyBbU9ZlBvl

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks