Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 01:26
Behavioral task
behavioral1
Sample
JaffaCakes118_d75160a4e7d723d77caf035aec631b1e.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d75160a4e7d723d77caf035aec631b1e.exe
-
Size
5.7MB
-
MD5
d75160a4e7d723d77caf035aec631b1e
-
SHA1
afad2f13954beb9668752229c4f2d3ac361a8356
-
SHA256
1e24cf9272650fc8a205eb84823f4ca69ed1b6be158cd7df2fe7389dc7dd9bdb
-
SHA512
d5b7c576437e36496e0971ebeace37032a77e10ab2d6f1daf1b5c46001ffcdcc5a1d191fe862d4e88d98f9dfdf565d5a775a1901b911a24bc55248ab1bcfd159
-
SSDEEP
98304:Y2b4nu+hxLKOmKpGkn+e0WUqAaYeebUvQ/qpyr0k9b+iHuNeRQhMUI+iZ7q1zPPh:Jfzd6pnG+iHuNKQbI+7NAjtVa/u
Malware Config
Extracted
ffdroider
http://186.2.171.3
Signatures
-
FFDroider payload 2 IoCs
resource yara_rule behavioral1/memory/2276-0-0x0000000000400000-0x00000000009B3000-memory.dmp family_ffdroider behavioral1/memory/2276-2-0x0000000000400000-0x00000000009B3000-memory.dmp family_ffdroider -
Ffdroider family
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d75160a4e7d723d77caf035aec631b1e.exe