Analysis

  • max time kernel
    141s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231023-en
  • resource tags

    arch:x64arch:x86image:win7-20231023-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2023 14:04

General

  • Target

    8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe

  • Size

    1.7MB

  • MD5

    7e2ccd4dc2823dd85c12a5f85724f2cd

  • SHA1

    c0be781d4f6b537ba955395bf2240d90ef9759a1

  • SHA256

    8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5

  • SHA512

    92ad3e178c3eef1772c5dc92a65908f6db2aaa602080153c0e5272391a5ebfbbe4608374c5196fa674fe1b60c287f2217a8907e9a23aa2629b26fc9963093851

  • SSDEEP

    24576:dYianUR2jR97bUyvK3H1S0vfs2tPwHtnKCKKITko7kGuap0D93MwjBiUNDI4rL:XaXR97bEVSsfsfHtnKCKJz7vRkXjBv

Malware Config

Extracted

Family

ffdroider

C2

http://45.43.62.216

Signatures

  • FFDroider

    Stealer targeting social media platform users first seen in April 2022.

  • FFDroider payload 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe
    "C:\Users\Admin\AppData\Local\Temp\8e3d48148237679d6cdce75b7956121029723aefd3474dea2dd85185fe46ade5.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    PID:304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/304-0-0x0000000000400000-0x000000000086D000-memory.dmp

    Filesize

    4.4MB

  • memory/304-1-0x0000000000020000-0x0000000000023000-memory.dmp

    Filesize

    12KB

  • memory/304-3-0x0000000000400000-0x000000000086D000-memory.dmp

    Filesize

    4.4MB

  • memory/304-8-0x0000000002820000-0x0000000002830000-memory.dmp

    Filesize

    64KB

  • memory/304-14-0x0000000003380000-0x0000000003390000-memory.dmp

    Filesize

    64KB

  • memory/304-23-0x0000000000400000-0x000000000086D000-memory.dmp

    Filesize

    4.4MB