General

  • Target

    GTKSetup-de.exe

  • Size

    1.1MB

  • Sample

    241107-sa76esvanr

  • MD5

    fb18ddcf3a992f03699a35d3af145da5

  • SHA1

    f1ff113b4c9b7e12bd360038c57a33405df7c0cc

  • SHA256

    94a902e2cc63b32a80d7e822821775a7484e0dd518a3fcd3c1531346c723cf17

  • SHA512

    1e99547d1b0bed0a6c02268a34c8b6aa9210bb0c781ba6035a92fabe102948a7fb3f4b887ec2a4011aa81bea730a6425a8e5481391a998e7bf719be324884180

  • SSDEEP

    24576:31QxU8z+O5iktp/KgDPaPDQOKr1l29tmQNxHDNkggZAbj2Bi3R5Z2K0NI467SGWC:SxiT0KgjaLQOKr1l29tmUjaKb9UHC

Malware Config

Targets

    • Target

      GTKSetup-de.exe

    • Size

      1.1MB

    • MD5

      fb18ddcf3a992f03699a35d3af145da5

    • SHA1

      f1ff113b4c9b7e12bd360038c57a33405df7c0cc

    • SHA256

      94a902e2cc63b32a80d7e822821775a7484e0dd518a3fcd3c1531346c723cf17

    • SHA512

      1e99547d1b0bed0a6c02268a34c8b6aa9210bb0c781ba6035a92fabe102948a7fb3f4b887ec2a4011aa81bea730a6425a8e5481391a998e7bf719be324884180

    • SSDEEP

      24576:31QxU8z+O5iktp/KgDPaPDQOKr1l29tmQNxHDNkggZAbj2Bi3R5Z2K0NI467SGWC:SxiT0KgjaLQOKr1l29tmUjaKb9UHC

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Ffdroider family

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks