Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
16-03-2024 12:32
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ce11de1000560d312bf6ab0b5327e87b.exe
Resource
win7-20240221-en
windows7-x64
4 signatures
150 seconds
General
-
Target
ce11de1000560d312bf6ab0b5327e87b.exe
-
Size
829KB
-
MD5
ce11de1000560d312bf6ab0b5327e87b
-
SHA1
557f3f780cb0f694887ada330a87ba976cdb168f
-
SHA256
126daa976d1eaec1bd68eb53748caa325fc537f865051dd0d5f09d599175861a
-
SHA512
655b45bcf75a79c174caf6fae84560980511d068f67a89883f70b264e88983f729c604b3484fdcb8d8f8a83105e43d740fe70e7a006806136bc423453d769655
-
SSDEEP
24576:+Fm+gA9AW4k++iO31ad4uOcpg/SPvFLI6:3+gA9AW4bkTujZvF
Malware Config
Extracted
Family
ffdroider
C2
http://152.32.151.93
Signatures
-
FFDroider payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1800-20-0x0000000000400000-0x0000000000644000-memory.dmp family_ffdroider -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ce11de1000560d312bf6ab0b5327e87b.exedescription pid process Token: SeManageVolumePrivilege 1800 ce11de1000560d312bf6ab0b5327e87b.exe