Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 15:16
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
d5fdccf45022505df0065d9951b126a4.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
General
-
Target
d5fdccf45022505df0065d9951b126a4.exe
-
Size
953KB
-
MD5
d5fdccf45022505df0065d9951b126a4
-
SHA1
8180491d58548ba199408b47b5da1afab762757e
-
SHA256
35b7f5d4e57a8afad88d2616738f3638b82d689fa61f948b335f8a3526501a9e
-
SHA512
fca7d38771b0aaac3c4ab8e2d4750102e11b738c175bfdf88043d019501417c303b01e20d065f67bbb967a3a639604e10f768a8ba8251d60992d6bfe6a8df625
-
SSDEEP
12288:j9lBnqfZiMym1/4jGiO0J0wCzDvcBqKJZHDBCyMAFokoczTwphpa7coWQ12kfTwv:5lBapymaawC/xKHHdCDVkoIwxylvUv
Malware Config
Extracted
Family
ffdroider
C2
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/2208-13-0x0000000000400000-0x0000000000692000-memory.dmp family_ffdroider behavioral1/memory/2208-33-0x0000000000400000-0x0000000000692000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 2208 d5fdccf45022505df0065d9951b126a4.exe