General
-
Target
7c34cf01cf220a4caf2feaee9a187b77
-
Size
2.0MB
-
Sample
240128-fjnf6abgf5
-
MD5
7c34cf01cf220a4caf2feaee9a187b77
-
SHA1
700230ccddb77c860b718aee7765d25847c52cbf
-
SHA256
bbfe7a85b5e34c8b000529b0bac402a6d225ffd0eb2ffdad120326a34e4b7608
-
SHA512
b2c24c363ce8bdda92c4def2afa57995cf0ed7b0feda1082a979f14edc73b87ce171adcf337dd85a9b5b5daaa90471a65a3f7506a02da3af92e2e7b56451baa3
-
SSDEEP
49152:pAI+GLL2AQz69OdZfqfQufZWVhqBRtK0P9aUlcaS:pAI+rAQzmOdZfqf1wEjPI0w
Static task
static1
Behavioral task
behavioral1
Sample
7c34cf01cf220a4caf2feaee9a187b77.exe
Resource
win7-20231215-en
Malware Config
Extracted
ffdroider
http://186.2.171.3
Targets
-
-
Target
7c34cf01cf220a4caf2feaee9a187b77
-
Size
2.0MB
-
MD5
7c34cf01cf220a4caf2feaee9a187b77
-
SHA1
700230ccddb77c860b718aee7765d25847c52cbf
-
SHA256
bbfe7a85b5e34c8b000529b0bac402a6d225ffd0eb2ffdad120326a34e4b7608
-
SHA512
b2c24c363ce8bdda92c4def2afa57995cf0ed7b0feda1082a979f14edc73b87ce171adcf337dd85a9b5b5daaa90471a65a3f7506a02da3af92e2e7b56451baa3
-
SSDEEP
49152:pAI+GLL2AQz69OdZfqfQufZWVhqBRtK0P9aUlcaS:pAI+rAQzmOdZfqf1wEjPI0w
-
Detect Fabookie payload
-
FFDroider payload
-
Nirsoft
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-