Final1stspy

Final1stspy is a dropper family that has been used to deliver DOGCALL.[1]

ID: S0355
Type: MALWARE
Platforms: Windows
Version: 1.0

Techniques Used

Domain ID Name Use
Enterprise T1140 Deobfuscate/Decode Files or Information

Final1stspy uses Python code to deobfuscate base64-encoded strings.[1]

Enterprise T1027 Obfuscated Files or Information

Final1stspy obfuscates strings with base64 encoding.[1]

Enterprise T1057 Process Discovery

Final1stspy obtains a list of running processes.[1]

Enterprise T1060 Registry Run Keys / Startup Folder

Final1stspy creates a Registry Run key to establish persistence.[1]

Enterprise T1071 Standard Application Layer Protocol

Final1stspy uses HTTP for C2.[1]

Enterprise T1082 System Information Discovery

Final1stspy obtains victim Microsoft Windows version information and CPU architecture.[1]

Groups That Use This Software

ID Name References
G0067 APT37 [1]

References