General

  • Target

    60b7e5c59466cd3ba3bbbd8bfb1f20cc.exe

  • Size

    630KB

  • Sample

    221128-vtpjjafe6z

  • MD5

    60b7e5c59466cd3ba3bbbd8bfb1f20cc

  • SHA1

    c7f9875a5d2eadfa5512a6824e03214c9ddc2fc5

  • SHA256

    98a4fd090a69108383b56ecbc9f4e02096367da5d503acd692f3b32bf1bac5f5

  • SHA512

    1c08ea44bf66cabb082b06230f0e5d86ea7e1778d7c938d13069787663ee32eb387abca30d14da5908928d2b6fdea6837588206d024562f7f5d9624a432e385b

  • SSDEEP

    12288:jqlMhfymUyZzk8ri+hcGgn9cJBJYGahyHY2oSjUep66cbx:j5kxyZFe+hcGEXGwiY2jzp6F

Malware Config

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/sauydga27/

Targets

    • Target

      60b7e5c59466cd3ba3bbbd8bfb1f20cc.exe

    • Size

      630KB

    • MD5

      60b7e5c59466cd3ba3bbbd8bfb1f20cc

    • SHA1

      c7f9875a5d2eadfa5512a6824e03214c9ddc2fc5

    • SHA256

      98a4fd090a69108383b56ecbc9f4e02096367da5d503acd692f3b32bf1bac5f5

    • SHA512

      1c08ea44bf66cabb082b06230f0e5d86ea7e1778d7c938d13069787663ee32eb387abca30d14da5908928d2b6fdea6837588206d024562f7f5d9624a432e385b

    • SSDEEP

      12288:jqlMhfymUyZzk8ri+hcGgn9cJBJYGahyHY2oSjUep66cbx:j5kxyZFe+hcGEXGwiY2jzp6F

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks