General

  • Target

    b45e9e6de21b7fff593975adc8550779_JaffaCakes118

  • Size

    5.7MB

  • Sample

    240404-k4pbeabf65

  • MD5

    b45e9e6de21b7fff593975adc8550779

  • SHA1

    e333c3797a402b7d4af72db730a85eae21af16a6

  • SHA256

    c167e698769aa0f9119ad3bfc1f463120be75cc35fe13522e24e49107bdc2594

  • SHA512

    652d6dda82f1467ca417e9ff0bc15b560f68e5a269da1e9ff6b217d266d64d949d191986c3106c2bf7ac991acd73e2b26eeb2e5a0d7b154b737238729ec7292d

  • SSDEEP

    98304:i5DUM8pGFeBSycG465AkIV/U0hfZ+wBW+irvQ/qpyr0k+tOYCvOkVCQuYYI+iZ7V:0qpCHDiAn63OYCvOkVCQuI+7NAjtVa/u

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Targets

    • Target

      b45e9e6de21b7fff593975adc8550779_JaffaCakes118

    • Size

      5.7MB

    • MD5

      b45e9e6de21b7fff593975adc8550779

    • SHA1

      e333c3797a402b7d4af72db730a85eae21af16a6

    • SHA256

      c167e698769aa0f9119ad3bfc1f463120be75cc35fe13522e24e49107bdc2594

    • SHA512

      652d6dda82f1467ca417e9ff0bc15b560f68e5a269da1e9ff6b217d266d64d949d191986c3106c2bf7ac991acd73e2b26eeb2e5a0d7b154b737238729ec7292d

    • SSDEEP

      98304:i5DUM8pGFeBSycG465AkIV/U0hfZ+wBW+irvQ/qpyr0k+tOYCvOkVCQuYYI+iZ7V:0qpCHDiAn63OYCvOkVCQuI+7NAjtVa/u

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Matrix ATT&CK v13

Credential Access

Unsecured Credentials

1
T1552

Credentials In Files

1
T1552.001

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

1
T1005

Tasks