Analysis
-
max time kernel
27s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 17:45
Behavioral task
behavioral1
Sample
2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe
Resource
win7-20221111-en
windows7-x64
4 signatures
150 seconds
General
-
Target
2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe
-
Size
474KB
-
MD5
95ce031c5273b6c1f2d813566a7ea9ea
-
SHA1
f47a1a1502de7a0b9cae47037e06f41753d94156
-
SHA256
2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419
-
SHA512
5a2fa3a7413c672714d38b6d60e5794481c871ba402f92bc97a6e37b7fed466212060a8d7a560a900c8637ab6b39d8c619fc528d5ec8e303fd98efd89db57cdc
-
SSDEEP
12288:pvv0rmiMQTll4pWWUgyOHaW8xAyBhh4YIRRioMZtKOIiVywxGkoS:Bd2ll4XZGxAyBbrCeVIkywx
Malware Config
Extracted
Family
ffdroider
C2
http://101.36.107.74
Signatures
-
resource yara_rule behavioral1/memory/2008-55-0x0000000000400000-0x000000000055C000-memory.dmp upx behavioral1/memory/2008-68-0x0000000000400000-0x000000000055C000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2008 2428300eaca9fcd5d2170b811a464b4591e9391ea57e95fa217b02d3328e7419.exe