General

  • Target

    216dbd5a3405e9e8a7250bb23723d642d4e4ce3ef176516bf74c43208814b942

  • Size

    675KB

  • Sample

    221120-qpx8naab71

  • MD5

    071f4d0b4d592816d88ad2e8732fa31c

  • SHA1

    77802214a65ad6d1729ca6ed1b55c73d11d599d0

  • SHA256

    216dbd5a3405e9e8a7250bb23723d642d4e4ce3ef176516bf74c43208814b942

  • SHA512

    1e0dafffb079b03a00ff480fa7d82ef692bec0f8cb6f5296271d6d660ad6286e93fc992e50975f01cb6cc6d171491b60ff37671fa2d301bd9a45a7c6863b62c1

  • SSDEEP

    12288:fYoJl8ls7sZbH1BePHRylykX9Ki5l8JiZ4oLAqPiZMDi4HCJTF6Aq5+7xnghh:f/Jl8O6+fR8ykL5l80Zd8mM4HkFf7xn

Malware Config

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/asdhfr1115/

Targets

    • Target

      216dbd5a3405e9e8a7250bb23723d642d4e4ce3ef176516bf74c43208814b942

    • Size

      675KB

    • MD5

      071f4d0b4d592816d88ad2e8732fa31c

    • SHA1

      77802214a65ad6d1729ca6ed1b55c73d11d599d0

    • SHA256

      216dbd5a3405e9e8a7250bb23723d642d4e4ce3ef176516bf74c43208814b942

    • SHA512

      1e0dafffb079b03a00ff480fa7d82ef692bec0f8cb6f5296271d6d660ad6286e93fc992e50975f01cb6cc6d171491b60ff37671fa2d301bd9a45a7c6863b62c1

    • SSDEEP

      12288:fYoJl8ls7sZbH1BePHRylykX9Ki5l8JiZ4oLAqPiZMDi4HCJTF6Aq5+7xnghh:f/Jl8O6+fR8ykL5l80Zd8mM4HkFf7xn

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks