FlowerPippi

Description

(Trend Micro) Some of FlowerPippi’s variants were packed by a custom packer —the same one that TA505 uses. The unpacked payload is written in C++ and works as backdoor or downloader malware. FlowerPippi doesn’t have an AutoRun function by itself; it is standalone and straightforwardly retrieves the payload.

FlowerPippi collects some of the user’s information, which it sends to the C&C server. When collecting information, FlowerPippi generates the victim ID from the system’s MAC address using the FNV-1a hash algorithm.

Names

Name
FlowerPippi

Category

Malware

Type

  • Reconnaissance
  • Backdoor
  • Downloader

Information

Other Information

Uuid

2c0f7f20-b2e6-44a6-8949-5fd6b08e3d92

Last Card Change

2020-04-20