General

  • Target

    2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader

  • Size

    1.1MB

  • Sample

    250412-fbet2sxns6

  • MD5

    14196d68dd0ba86c495e0ad66097ac3a

  • SHA1

    3c90704f1480a9ff18e09d69fedeed0a8f6b80d3

  • SHA256

    a222934b1c6c67ebf726df4f5840b3de00f0d6ddfe6cb9f6f6f11e0ae1ea2770

  • SHA512

    4ca1627d4a171ed5070019a96dc0fcf078a21309b7d1add1c61c7db95282df03bf1835f19513962565672d298dcd71bf602ed8735931bd154467d6c5eebb798b

  • SSDEEP

    24576:rSMR9ShOWpqJ5+CYhJyQt6gfP7ZD+wYUSSUPQ5bzqBDjNrRgjqMvShX:8qgl06yQ5bqjBCjPSZ

Malware Config

Extracted

Family

ffdroider

C2

http://101.36.107.74

Targets

    • Target

      2025-04-12_14196d68dd0ba86c495e0ad66097ac3a_amadey_black-basta_elex_luca-stealer_smoke-loader

    • Size

      1.1MB

    • MD5

      14196d68dd0ba86c495e0ad66097ac3a

    • SHA1

      3c90704f1480a9ff18e09d69fedeed0a8f6b80d3

    • SHA256

      a222934b1c6c67ebf726df4f5840b3de00f0d6ddfe6cb9f6f6f11e0ae1ea2770

    • SHA512

      4ca1627d4a171ed5070019a96dc0fcf078a21309b7d1add1c61c7db95282df03bf1835f19513962565672d298dcd71bf602ed8735931bd154467d6c5eebb798b

    • SSDEEP

      24576:rSMR9ShOWpqJ5+CYhJyQt6gfP7ZD+wYUSSUPQ5bzqBDjNrRgjqMvShX:8qgl06yQ5bqjBCjPSZ

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Ffdroider family

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v16

Tasks