General
-
Target
c244daa7bc6cde90a0580dc905273e04e25fb34a0d5828b6212d47ba60eefcaa
-
Size
5.6MB
-
Sample
230108-xfgb4sed68
-
MD5
390092727e31a3e32bc1a21d6bab5c91
-
SHA1
9f645ab6f392334bb246ecfe02fd0b1580392047
-
SHA256
c244daa7bc6cde90a0580dc905273e04e25fb34a0d5828b6212d47ba60eefcaa
-
SHA512
4066c5304e79133247a5254bdcd9e8f93ee13dd926157303e858bb00d5ce375d24a79e7d36a6a4c3f6117fb183b869077b449f504b585dfc643edc6fd59f4a15
-
SSDEEP
12288:cqcxdaubds9DyQCnxZtS5FnJizqLHzs0h+l71kMvBaOxkGkL:cqcza+oDyQC9Sz3kl3v1kG
Static task
static1
Malware Config
Extracted
amadey
3.65
77.73.134.27/8bmdh3Slb2/index.php
Extracted
vidar
1.8
494
https://t.me/year2023start
https://steamcommunity.com/profiles/76561199467421923
-
profile_id
494
Extracted
socelars
https://hdbywe.s3.us-west-2.amazonaws.com/sadffew26/
Targets
-
-
Target
c244daa7bc6cde90a0580dc905273e04e25fb34a0d5828b6212d47ba60eefcaa
-
Size
5.6MB
-
MD5
390092727e31a3e32bc1a21d6bab5c91
-
SHA1
9f645ab6f392334bb246ecfe02fd0b1580392047
-
SHA256
c244daa7bc6cde90a0580dc905273e04e25fb34a0d5828b6212d47ba60eefcaa
-
SHA512
4066c5304e79133247a5254bdcd9e8f93ee13dd926157303e858bb00d5ce375d24a79e7d36a6a4c3f6117fb183b869077b449f504b585dfc643edc6fd59f4a15
-
SSDEEP
12288:cqcxdaubds9DyQCnxZtS5FnJizqLHzs0h+l71kMvBaOxkGkL:cqcza+oDyQC9Sz3kl3v1kG
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Socelars payload
-
Downloads MZ/PE file
-
Executes dropped EXE
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-