General

  • Target

    f0d17149ee8e503132e523bce6af0adf27e76fceeed5e8062c786bc913a0874c

  • Size

    723KB

  • MD5

    e628e6fcb87bf5b45eb5b09be32be995

  • SHA1

    5ff3557e3ad381716b429974d5884348695b5be8

  • SHA256

    f0d17149ee8e503132e523bce6af0adf27e76fceeed5e8062c786bc913a0874c

  • SHA512

    f282cb8bd7f5b870203335090c4c17b8feeea02052b311b27c84ff661b0f629b5c83ff6f565d3a8e315713c9af05348c0354d38b220fd901bb93da5da8f4f554

  • SSDEEP

    12288:8yhveJM56XGvHq/xrJwUXD/vesjnOffb5jDTqPowO4BviNk:8EgXnreUT/veWOXRDGP5ck

Score
10/10

Malware Config

Extracted

Family

socelars

C2

https://dfgrthres.s3.eu-west-3.amazonaws.com/asdhs909/

Signatures

  • Socelars family
  • Socelars payload 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

Files

  • f0d17149ee8e503132e523bce6af0adf27e76fceeed5e8062c786bc913a0874c
    .exe windows x86


    Headers

    Sections

  • out.upx
    .exe windows x86


    Headers

    Sections