Final1stspy

Final1stspy is a dropper family that has been used to deliver DOGCALL.[1]

ID: S0355
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 January 2019
Last Modified: 30 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1140 反混淆/解码文件或信息

Final1stspy uses Python code to deobfuscate base64-encoded strings.[1]

Enterprise T1547 .001 启动或登录自动启动执行: Registry Run Keys / Startup Folder

Final1stspy creates a Registry Run key to establish persistence.[1]

Enterprise T1071 .001 应用层协议: Web Protocols

Final1stspy uses HTTP for C2.[1]

Enterprise T1027 混淆文件或信息

Final1stspy obfuscates strings with base64 encoding.[1]

Enterprise T1082 系统信息发现

Final1stspy obtains victim Microsoft Windows version information and CPU architecture.[1]

Enterprise T1057 进程发现

Final1stspy obtains a list of running processes.[1]

Groups That Use This Software

ID Name References
G0067 APT37

[1]

References