General

  • Target

    07d4233824e6ede37efc81c9acf66316f64d170802a47793de957acf9a664a41.exe

  • Size

    5.7MB

  • Sample

    241124-a8j75s1ram

  • MD5

    5f122b902a524ad2197a0074c29c9926

  • SHA1

    384d649692718712e83685b166161f930472488b

  • SHA256

    07d4233824e6ede37efc81c9acf66316f64d170802a47793de957acf9a664a41

  • SHA512

    2a91533024bea804f23da5dd50c481e422130d739c45eced2b4ffc9c79eb3f2bcaf6d7708db0ff796a5d4622714606c6670560fa4f55dfc3f4d548fdf3d9b49d

  • SSDEEP

    98304:Y2b4nu+hxLKOmKpGkn+e0WUqAaYeebUvQ/qpyr0k9b+iHuNeRQhMUI+iZ7q1zPP7:Jfzd6pnG+iHuNKQbI+7NAjtVa/uG

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.3

Targets

    • Target

      07d4233824e6ede37efc81c9acf66316f64d170802a47793de957acf9a664a41.exe

    • Size

      5.7MB

    • MD5

      5f122b902a524ad2197a0074c29c9926

    • SHA1

      384d649692718712e83685b166161f930472488b

    • SHA256

      07d4233824e6ede37efc81c9acf66316f64d170802a47793de957acf9a664a41

    • SHA512

      2a91533024bea804f23da5dd50c481e422130d739c45eced2b4ffc9c79eb3f2bcaf6d7708db0ff796a5d4622714606c6670560fa4f55dfc3f4d548fdf3d9b49d

    • SSDEEP

      98304:Y2b4nu+hxLKOmKpGkn+e0WUqAaYeebUvQ/qpyr0k9b+iHuNeRQhMUI+iZ7q1zPP7:Jfzd6pnG+iHuNKQbI+7NAjtVa/uG

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Ffdroider family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

MITRE ATT&CK Enterprise v15

Tasks