General

  • Target

    12d4e0dc6a5f9ec4ba6f58b0c5a8335515f72fba3429cd27c9213d681afe1301

  • Size

    7.3MB

  • Sample

    220603-rll7nahaf4

  • MD5

    7e417916a06b96412460637eccb50d2e

  • SHA1

    7b42594fc7ee768ae54cb422d9d0dc8f04d51655

  • SHA256

    12d4e0dc6a5f9ec4ba6f58b0c5a8335515f72fba3429cd27c9213d681afe1301

  • SHA512

    ae66649e3c2084086c2587710e607715a37fc6f1eef08734b80a57671438464191e7338a90b6dfb9efbd5d14175161847db22384b7b5fe7a729bee30d7605301

Malware Config

Extracted

Family

socelars

C2

https://sa-us-bucket.s3.us-east-2.amazonaws.com/qwwgh/

Targets

    • Target

      12d4e0dc6a5f9ec4ba6f58b0c5a8335515f72fba3429cd27c9213d681afe1301

    • Size

      7.3MB

    • MD5

      7e417916a06b96412460637eccb50d2e

    • SHA1

      7b42594fc7ee768ae54cb422d9d0dc8f04d51655

    • SHA256

      12d4e0dc6a5f9ec4ba6f58b0c5a8335515f72fba3429cd27c9213d681afe1301

    • SHA512

      ae66649e3c2084086c2587710e607715a37fc6f1eef08734b80a57671438464191e7338a90b6dfb9efbd5d14175161847db22384b7b5fe7a729bee30d7605301

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • FFDroider Payload

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars Payload

    • suricata: ET MALWARE MSIL/TrojanDownloader.Agent.JVN CnC Checkin

      suricata: ET MALWARE MSIL/TrojanDownloader.Agent.JVN CnC Checkin

    • NirSoft WebBrowserPassView

      Password recovery tool for various web browsers

    • Nirsoft

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Downloads MZ/PE file

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v6

Tasks