Final1stspy is a dropper family that has been used to deliver DOGCALL.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1071 | .001 | Application Layer Protocol: Web Protocols | Final1stspy uses HTTP for C2.[1] | 
| Enterprise | T1547 | .001 | Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder | Final1stspy creates a Registry Run key to establish persistence.[1] | 
| Enterprise | T1140 | Deobfuscate/Decode Files or Information | Final1stspy uses Python code to deobfuscate base64-encoded strings.[1] | |
| Enterprise | T1027 | Obfuscated Files or Information | Final1stspy obfuscates strings with base64 encoding.[1] | |
| Enterprise | T1057 | Process Discovery | Final1stspy obtains a list of running processes.[1] | |
| Enterprise | T1082 | System Information Discovery | Final1stspy obtains victim Microsoft Windows version information and CPU architecture.[1] | |