Analysis
-
max time kernel
45s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 17:45
Behavioral task
behavioral1
Sample
977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420.exe
Resource
win7-20220901-en
windows7-x64
4 signatures
150 seconds
General
-
Target
977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420.exe
-
Size
474KB
-
MD5
45e846f0e68049eb670db320a5e96910
-
SHA1
64baf2ae3e6abe1163335f6c7496c57f04968a78
-
SHA256
977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420
-
SHA512
03aee1b7ca61395c9761f1a51d85fcae1e03f5129bdf8e1217b482c04049b9201e7da1d9aaf4d5ca27d5678eb7e78b74ec8ca42a35b14101b49640ecb3f7d201
-
SSDEEP
12288:vvv0rmiMQTll4pWWUgyOHaW8xAyBhhUKaOWZxHPBvtTkoS:3d2ll4XZGxAyBbU9ZlBvl
Malware Config
Extracted
Family
ffdroider
C2
http://101.36.107.74
Signatures
-
resource yara_rule behavioral1/memory/1816-55-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/1816-68-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 1816 977a3d2c10a9750bda5d527ac5113a81b36e3462a194eccfc28697b0f5cda420.exe