General

  • Target

    bc134ee57553cda5893b69950d8616f4

  • Size

    1.7MB

  • Sample

    240309-r63edaba7s

  • MD5

    bc134ee57553cda5893b69950d8616f4

  • SHA1

    b0f814326fa736e8ad47d92a5a5d8d42eec2e037

  • SHA256

    dd2a5dcb0106f4c6e7b91ececccef95ff651daa95d78210d41287fe1de0cb639

  • SHA512

    c6a6ba670bba5c0c029e98feaa5123563080c05bca28cb96a4034a10f13eec5ca57db20d5d65ee584216f14468dbee30bd18b0c82145fff38a7593574fcab58d

  • SSDEEP

    49152:NunK8G2JQVT46bJQ+bfDTsrA0hleklFNARfYblgmZ:NKK8pu1hJQ+bfDTRRcFNpl5

Malware Config

Extracted

Family

ffdroider

C2

http://128.1.32.84

Targets

    • Target

      bc134ee57553cda5893b69950d8616f4

    • Size

      1.7MB

    • MD5

      bc134ee57553cda5893b69950d8616f4

    • SHA1

      b0f814326fa736e8ad47d92a5a5d8d42eec2e037

    • SHA256

      dd2a5dcb0106f4c6e7b91ececccef95ff651daa95d78210d41287fe1de0cb639

    • SHA512

      c6a6ba670bba5c0c029e98feaa5123563080c05bca28cb96a4034a10f13eec5ca57db20d5d65ee584216f14468dbee30bd18b0c82145fff38a7593574fcab58d

    • SSDEEP

      49152:NunK8G2JQVT46bJQ+bfDTsrA0hleklFNARfYblgmZ:NKK8pu1hJQ+bfDTRRcFNpl5

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

4
T1082

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks