Analysis
-
max time kernel
117s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-12-2023 22:41
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
18223614090e71027f3c60a6a4b491ec.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
18223614090e71027f3c60a6a4b491ec.exe
-
Size
953KB
-
MD5
18223614090e71027f3c60a6a4b491ec
-
SHA1
643270b3f8ab8299410f0c504caa5fa830d0a862
-
SHA256
f3d37397b2e2a9f7b4099be69b393fa099fcf7dbb6adc4922bc86795a6b83664
-
SHA512
34de120da1e760a62fbe8298dc71c5ef6552fbeb0179caa0da6d3c75d229841e5212be5a0e05fe66ca22e4f6cbd9f57d607ecb1e8ad01de836050967634f2eb9
-
SSDEEP
12288:j9lBnqfZiMym1/4jGiO0J0wCzDvcBqKJZHDBCyMAFokoczTwphpa7coWQ12kfTwC:5lBapymaawC/xKHHdCDVkoIwxylvUC
Malware Config
Extracted
Family
ffdroider
C2
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/2244-15-0x0000000000400000-0x0000000000692000-memory.dmp family_ffdroider behavioral1/memory/2244-35-0x0000000000400000-0x0000000000692000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2244 18223614090e71027f3c60a6a4b491ec.exe