General
-
Target
0116-Setup-Files-PASWD--PCEN220.rar
-
Size
5.5MB
-
Sample
221109-v4cbyscder
-
MD5
2dbe3efe1e5b41dc130af442f56aa8b5
-
SHA1
ae64d23f26d854be5ba610546668dd60732061ea
-
SHA256
d7fd763e2110cce174fe13dbb09d6fead02007b7a06069b702c61f775f15686e
-
SHA512
25b6c76eb7422c8b5f88b11d3c8705dc5a88a6126ed090b688c9e86194d33e2161d877ada93fbd4f43a1353bd065c199c19b1bae572ef44db72d88e5bbdf0b95
-
SSDEEP
98304:gRm9OiYtzhsgKkKczhkKh2kQLiXhfvl979+TNo0POIwJ:H9OiSzhrecOi9QiXDxWo0POIwJ
Static task
static1
Behavioral task
behavioral1
Sample
Setup/install_setup.exe
Resource
win7-20220812-en
Malware Config
Extracted
https://www.conectiva.pe/doc/config_20.ps1
Extracted
https://efeedor.com/blog/assets/config_20.ps1
Extracted
https://www.imagn.world/storage/config_20.ps1
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/sadew1013/
Extracted
nymaim
45.139.105.171
85.31.46.167
Extracted
vidar
55.6
915
https://t.me/seclab_new
https://mas.to/@ofadex
-
profile_id
915
Targets
-
-
Target
Setup/install_setup.exe
-
Size
5.5MB
-
MD5
1d2c57ad5c8c1664ef18797cd47bdc02
-
SHA1
96deda31c5841893811e3cf1a3f18d850388b73c
-
SHA256
1c2f82ebb2afde92cf982ecbf13bb375222933e05055937e1d84950c117cf9f9
-
SHA512
baccf6a58b7ca55f95e7a175a5a6a232d7d67b5ba4c6c539252f4bf5d53de67d9d9c15fd372f544f5852bd6a02ea31e1b6f34cfe1ffff49a99221cf07661de28
-
SSDEEP
98304:JT+TqnZLtuyMUYFsHWENYvKSvmPAQXUW7Srw6kqzxFa2j7VNjCJfG7m:JnZJu5nsHWiYEPUWGw61lFFKJh
-
Detects Smokeloader packer
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Socelars payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-