General

  • Target

    a3b251a139324a6df006eb9733c30199edf41dffe994ca0140296605613c2132

  • Size

    6.9MB

  • Sample

    241109-y7c97s1jds

  • MD5

    28823e5cf76c61084a0fc0f7602b3ef8

  • SHA1

    aaab9a7d36b2305565ad8c02046f4b8e6fb25a56

  • SHA256

    a3b251a139324a6df006eb9733c30199edf41dffe994ca0140296605613c2132

  • SHA512

    fd85cb7c7a22cad58d8c236cf6a0e8bbf1a80f79641089f42ea1226fa3bbe5cbe79b68dc40cba772b9f8888cef045a590876777b96db3971074f153f03738aa0

  • SSDEEP

    196608:RQlFsvl2/JuhKjNab8tXxWOBcpfTUcC0n+b2ACY8qd7:sFe2/ghKRg8FjBOfTXC3bd8qV

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Extracted

Family

redline

Botnet

JamesHook

C2

185.241.54.156:35200

Targets

    • Target

      66dc47363eed7c1f7528e1859a32037020450756eb0ce8950df397a64058481c

    • Size

      7.0MB

    • MD5

      a763081fbd0df59db9afcfdcd544c70c

    • SHA1

      76df12d98b8dadab8358394efd7a656cc07e48a1

    • SHA256

      66dc47363eed7c1f7528e1859a32037020450756eb0ce8950df397a64058481c

    • SHA512

      ed1982e8911445db959ff07f5c4d9b43ed997a2a7690fed88dc6bff23fe1fc2abf7bfea8f4ab94a70e9491681b74da1a458e63bd6cdb15ec7647b2612ce0d694

    • SSDEEP

      196608:4jLiXXL2mBhLXpB8xxYiUbSmk/qIhAsAl5rq:478LfiUbS7Z2rq

    • Detect Fabookie payload

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Ffdroider family

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks