Final1stspy is a dropper family that has been used to deliver DOGCALL.[1]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols |
Final1stspy uses HTTP for C2.[1] |
Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
Final1stspy creates a Registry Run key to establish persistence.[1] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
Final1stspy uses Python code to deobfuscate base64-encoded strings.[1] |
|
Enterprise | T1027 | Obfuscated Files or Information |
Final1stspy obfuscates strings with base64 encoding.[1] |
|
Enterprise | T1057 | Process Discovery |
Final1stspy obtains a list of running processes.[1] |
|
Enterprise | T1082 | System Information Discovery |
Final1stspy obtains victim Microsoft Windows version information and CPU architecture.[1] |
ID | Name | References |
---|---|---|
G0067 | APT37 |