General

  • Target

    b2719a913029914185c2de856c1a6770

  • Size

    186KB

  • Sample

    220722-n2al1sfaa8

  • MD5

    b2719a913029914185c2de856c1a6770

  • SHA1

    9c31a7426dc7c0e106bbb9fec5b62ff2bc702acf

  • SHA256

    c866cc0f79ccb6ba694ebf8ee3179871fbdcc20b5390df0650e4f8e570cd4c6e

  • SHA512

    39cfb6c52a8d630b8b4f2fcf6ce0461034a3614dc2c04ad0e233ce6d3bc7c59692f4ec9be27f973643565934fc4f27f48177a8eb117134edef5aa0c35631fe1e

Malware Config

Extracted

Family

socelars

C2

https://hueduy.s3.eu-west-1.amazonaws.com/sdaiufh711/

Extracted

Family

vidar

Version

53.3

Botnet

1415

C2

https://t.me/korstonsales

https://climatejustice.social/@ffoleg94

Attributes
  • profile_id

    1415

Targets

    • Target

      b2719a913029914185c2de856c1a6770

    • Size

      186KB

    • MD5

      b2719a913029914185c2de856c1a6770

    • SHA1

      9c31a7426dc7c0e106bbb9fec5b62ff2bc702acf

    • SHA256

      c866cc0f79ccb6ba694ebf8ee3179871fbdcc20b5390df0650e4f8e570cd4c6e

    • SHA512

      39cfb6c52a8d630b8b4f2fcf6ce0461034a3614dc2c04ad0e233ce6d3bc7c59692f4ec9be27f973643565934fc4f27f48177a8eb117134edef5aa0c35631fe1e

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Raccoon

      Raccoon is an infostealer written in C++ and first seen in 2019.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

      suricata: ET MALWARE W32/Agent.OGR!tr.pws Stealer

    • Downloads MZ/PE file

    • Executes dropped EXE

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses 2FA software files, possible credential harvesting

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

5
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks