Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
29-01-2023 21:06
Behavioral task
behavioral1
Sample
2781b3209b36b385ac125836544fff3394376e5b17812bc0d7f9ea89c997e2c2.exe
Resource
win7-20220901-en
windows7-x64
3 signatures
150 seconds
General
-
Target
2781b3209b36b385ac125836544fff3394376e5b17812bc0d7f9ea89c997e2c2.exe
-
Size
1.3MB
-
MD5
8827cdc197863cfa6cbadc731540832b
-
SHA1
b96f9125b61a99afb83a6566f7feb11fd97ca305
-
SHA256
2781b3209b36b385ac125836544fff3394376e5b17812bc0d7f9ea89c997e2c2
-
SHA512
4f3cb6d7b5025463a1e8087c2e6ffe1e2186b7b18bea5b374894fabd69024cb03a1adb83aae498a826ce4160c226f23934e811f8ae8dc26e2c759ab62dbeb7f9
-
SSDEEP
24576:ccURbdngEBJKuumfsEOJrpDI6mUfdRiETmqWVS6ZShnakTufpPBnkqrXepgfVYyc:ccURpgmJBr+JVIsdRi/MYBBnky3VRc
Malware Config
Extracted
Family
ffdroider
C2
http://101.36.107.74
Signatures
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2024 2781b3209b36b385ac125836544fff3394376e5b17812bc0d7f9ea89c997e2c2.exe