General

  • Target

    JaffaCakes118_e83bc1de2907898b48b90bc84a692568cab2213a852453cca76bc40c7313b60e

  • Size

    4.2MB

  • Sample

    241225-cgyybstrbk

  • MD5

    e0c4ac891a6f9cb2f4b0d88a5686f52c

  • SHA1

    5f0250967ada63ac4ccf2daf35ae784647a34bad

  • SHA256

    e83bc1de2907898b48b90bc84a692568cab2213a852453cca76bc40c7313b60e

  • SHA512

    c2f4af77c1be580d0ed0d6a386313558a8baf28b053bf6a4834b0935b03596e67976e4ccef2cf4bc5716f0b13135fc0dc9d6bf11cf39335746101ded5f0cc151

  • SSDEEP

    98304:7wKUfHNuCQtTytf74FHZXpKDF/g/KYQIDWjicFvmyjPXrZO50PMp6IeeUxF:720RTytfAHtSI/KY1WVvZr7ZxEyeOF

Malware Config

Extracted

Family

ffdroider

C2

http://186.2.171.17

Targets

    • Target

      dcd0da0e2a4791de9578d997e9022710e9c88414c4421a95988897b61e4841ba

    • Size

      4.3MB

    • MD5

      3aa667aff44754cd87a6eb4cb347a91b

    • SHA1

      1013d521a4b5f6a5e1a39773c0cdb9364a0ae618

    • SHA256

      dcd0da0e2a4791de9578d997e9022710e9c88414c4421a95988897b61e4841ba

    • SHA512

      a392b44659e052edf0b027648eea2b69a6043c1eb4bdc4f38c1310dfb86c0f8e950329a7e89ace02f1c331189786c0adb0eec328dba4ac62aca595922c3e6238

    • SSDEEP

      98304:iL5LNYSnH/qy3N5MFRa1wR+ByBQJTWCsizJHaDi6FkEXV9D527BWG:iLxLHI21wR3BQTWdaJHPyfDVQBWG

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider payload

    • Ffdroider family

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks whether UAC is enabled

    • Drops file in System32 directory

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Enterprise v15

Tasks