General

  • Target

    0116-Setup-Files-PASWD--PCEN220.rar

  • Size

    5.5MB

  • Sample

    221109-v4cbyscder

  • MD5

    2dbe3efe1e5b41dc130af442f56aa8b5

  • SHA1

    ae64d23f26d854be5ba610546668dd60732061ea

  • SHA256

    d7fd763e2110cce174fe13dbb09d6fead02007b7a06069b702c61f775f15686e

  • SHA512

    25b6c76eb7422c8b5f88b11d3c8705dc5a88a6126ed090b688c9e86194d33e2161d877ada93fbd4f43a1353bd065c199c19b1bae572ef44db72d88e5bbdf0b95

  • SSDEEP

    98304:gRm9OiYtzhsgKkKczhkKh2kQLiXhfvl979+TNo0POIwJ:H9OiSzhrecOi9QiXDxWo0POIwJ

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.conectiva.pe/doc/config_20.ps1

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://efeedor.com/blog/assets/config_20.ps1

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.imagn.world/storage/config_20.ps1

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/sadew1013/

Extracted

Family

nymaim

C2

45.139.105.171

85.31.46.167

Extracted

Family

vidar

Version

55.6

Botnet

915

C2

https://t.me/seclab_new

https://mas.to/@ofadex

Attributes
  • profile_id

    915

Targets

    • Target

      Setup/install_setup.exe

    • Size

      5.5MB

    • MD5

      1d2c57ad5c8c1664ef18797cd47bdc02

    • SHA1

      96deda31c5841893811e3cf1a3f18d850388b73c

    • SHA256

      1c2f82ebb2afde92cf982ecbf13bb375222933e05055937e1d84950c117cf9f9

    • SHA512

      baccf6a58b7ca55f95e7a175a5a6a232d7d67b5ba4c6c539252f4bf5d53de67d9d9c15fd372f544f5852bd6a02ea31e1b6f34cfe1ffff49a99221cf07661de28

    • SSDEEP

      98304:JT+TqnZLtuyMUYFsHWENYvKSvmPAQXUW7Srw6kqzxFa2j7VNjCJfG7m:JnZJu5nsHWiYEPUWGw61lFFKJh

    • Detects Smokeloader packer

    • NyMaim

      NyMaim is a malware with various capabilities written in C++ and first seen in 2013.

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Command and Control

Web Service

1
T1102

Tasks