General

  • Target

    d5fdccf45022505df0065d9951b126a4

  • Size

    953KB

  • Sample

    231222-snpagagbhp

  • MD5

    d5fdccf45022505df0065d9951b126a4

  • SHA1

    8180491d58548ba199408b47b5da1afab762757e

  • SHA256

    35b7f5d4e57a8afad88d2616738f3638b82d689fa61f948b335f8a3526501a9e

  • SHA512

    fca7d38771b0aaac3c4ab8e2d4750102e11b738c175bfdf88043d019501417c303b01e20d065f67bbb967a3a639604e10f768a8ba8251d60992d6bfe6a8df625

  • SSDEEP

    12288:j9lBnqfZiMym1/4jGiO0J0wCzDvcBqKJZHDBCyMAFokoczTwphpa7coWQ12kfTwv:5lBapymaawC/xKHHdCDVkoIwxylvUv

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Targets

    • Target

      d5fdccf45022505df0065d9951b126a4

    • Size

      953KB

    • MD5

      d5fdccf45022505df0065d9951b126a4

    • SHA1

      8180491d58548ba199408b47b5da1afab762757e

    • SHA256

      35b7f5d4e57a8afad88d2616738f3638b82d689fa61f948b335f8a3526501a9e

    • SHA512

      fca7d38771b0aaac3c4ab8e2d4750102e11b738c175bfdf88043d019501417c303b01e20d065f67bbb967a3a639604e10f768a8ba8251d60992d6bfe6a8df625

    • SSDEEP

      12288:j9lBnqfZiMym1/4jGiO0J0wCzDvcBqKJZHDBCyMAFokoczTwphpa7coWQ12kfTwv:5lBapymaawC/xKHHdCDVkoIwxylvUv

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v15

Tasks