General
-
Target
8b334bca600acc9630ad54bd3a942391
-
Size
6.1MB
-
Sample
240203-dafc3sfcb9
-
MD5
8b334bca600acc9630ad54bd3a942391
-
SHA1
04a52ad3b01f535f6d3df9151a415f1ed8afbc9e
-
SHA256
ed60315ceda29939209fca009b94888abaa3662c4473ae42c5a73b6a0e4bf620
-
SHA512
000c5a801c446b71dc8c54540064e48e2d682b873f984c4cef06a05e57a2d813fdb8c348c35c9794fe7fc1ab4ef651e7ec6df38e6dc9032682836e2a0e35ec95
-
SSDEEP
98304:pAI+u4UsuNxyflztzvp44Z+9uhJP1ZAxXNxAMg7HCM7wVhOAn0tq++13F+/GzUJg:ituJsuNxwlzFvtZ+Ybw2hOEPPeYJDGf
Static task
static1
Behavioral task
behavioral1
Sample
8b334bca600acc9630ad54bd3a942391.exe
Resource
win7-20231215-en
Malware Config
Extracted
ffdroider
http://186.2.171.3
Targets
-
-
Target
8b334bca600acc9630ad54bd3a942391
-
Size
6.1MB
-
MD5
8b334bca600acc9630ad54bd3a942391
-
SHA1
04a52ad3b01f535f6d3df9151a415f1ed8afbc9e
-
SHA256
ed60315ceda29939209fca009b94888abaa3662c4473ae42c5a73b6a0e4bf620
-
SHA512
000c5a801c446b71dc8c54540064e48e2d682b873f984c4cef06a05e57a2d813fdb8c348c35c9794fe7fc1ab4ef651e7ec6df38e6dc9032682836e2a0e35ec95
-
SSDEEP
98304:pAI+u4UsuNxyflztzvp44Z+9uhJP1ZAxXNxAMg7HCM7wVhOAn0tq++13F+/GzUJg:ituJsuNxwlzFvtZ+Ybw2hOEPPeYJDGf
-
FFDroider payload
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Raccoon Stealer V1 payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Blocklisted process makes network request
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1