Final1stspy

Final1stspy is a dropper family that has been used to deliver DOGCALL.[1]

ID: S0355
Type: MALWARE
Platforms: Windows
Version: 1.1
Created: 31 January 2019
Last Modified: 30 March 2020

Techniques Used

Domain ID Name Use
Enterprise T1071 .001 Application Layer Protocol: Web Protocols

Final1stspy uses HTTP for C2.[1]

Enterprise T1547 .001 Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Final1stspy creates a Registry Run key to establish persistence.[1]

Enterprise T1140 Deobfuscate/Decode Files or Information

Final1stspy uses Python code to deobfuscate base64-encoded strings.[1]

Enterprise T1027 Obfuscated Files or Information

Final1stspy obfuscates strings with base64 encoding.[1]

Enterprise T1057 Process Discovery

Final1stspy obtains a list of running processes.[1]

Enterprise T1082 System Information Discovery

Final1stspy obtains victim Microsoft Windows version information and CPU architecture.[1]

Groups That Use This Software

ID Name References
G0067 APT37

[1]

References