General

  • Target

    0577fa4481dced3714707a1af75103f94288d146088361f6ba52baa282b2e442

  • Size

    3.4MB

  • Sample

    241219-ybzhkaylgn

  • MD5

    99ca4fb276c60eb9c9a57c168d36d9fd

  • SHA1

    2f1451025754967e328337bd21498fc991bdeed7

  • SHA256

    0577fa4481dced3714707a1af75103f94288d146088361f6ba52baa282b2e442

  • SHA512

    1469cd4714ef8afa9293f77e61207f0ec0a65e947f1182fce6f7557529fe517de20fe7ff2ab049b74c56de2d82eb9edae5fece7a87a67e0ccfa86f86ef757aca

  • SSDEEP

    98304:qaKslt88xE2TXCzBA8intj5IVySsKmj+OO8u3:93t8+UFAvjCiMV

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Targets

    • Target

      0577fa4481dced3714707a1af75103f94288d146088361f6ba52baa282b2e442

    • Size

      3.4MB

    • MD5

      99ca4fb276c60eb9c9a57c168d36d9fd

    • SHA1

      2f1451025754967e328337bd21498fc991bdeed7

    • SHA256

      0577fa4481dced3714707a1af75103f94288d146088361f6ba52baa282b2e442

    • SHA512

      1469cd4714ef8afa9293f77e61207f0ec0a65e947f1182fce6f7557529fe517de20fe7ff2ab049b74c56de2d82eb9edae5fece7a87a67e0ccfa86f86ef757aca

    • SSDEEP

      98304:qaKslt88xE2TXCzBA8intj5IVySsKmj+OO8u3:93t8+UFAvjCiMV

    • Detect Fabookie payload

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Ffdroider family

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Raccoon Stealer V1 payload

    • Raccoon family

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.