General

  • Target

    9970aa4cf1c6a8708af3447e17defc23ee7cba951a802507563684aa81865fb0.zip

  • Size

    753KB

  • Sample

    230321-r453gsbe29

  • MD5

    81a6a61e67d152f2f4eed0d7d0ba721a

  • SHA1

    8074c42face9d4b400e098dc8bcefe9d6d6a9128

  • SHA256

    f2f475f0484fbb49bfe470ab660a5de761c8986ffe5b765af3e89b64fa899ca0

  • SHA512

    bc59a3b6028779e377f87612dfc5036a758856a97d2085a142a8619a35e48720ddcfba611cbf69de781599e396bb3b841b58151de32e7f608e7ee76194dea827

  • SSDEEP

    12288:peiUwDJaaJQtnULPpQYvYOrdXUrvhW1OKzTbtuOSl+0/JgCq3r2agW1iy:pHZJQtnULPeCrHPtuOwPmZ31xiy

Malware Config

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/sadef33/

Targets

    • Target

      9970aa4cf1c6a8708af3447e17defc23ee7cba951a802507563684aa81865fb0.exe

    • Size

      1.4MB

    • MD5

      ea1dffab7eaa37262aa2d5557d8915af

    • SHA1

      930924541704e8283ef0ae3ebc3dcaf3f407cef4

    • SHA256

      9970aa4cf1c6a8708af3447e17defc23ee7cba951a802507563684aa81865fb0

    • SHA512

      499b62c1cb105ed3f183a14d6c5420edfb016e49ed58e79f4098478a5bd631bcc4ba87681608a1c9f9dd8e9ba3b29356b481a0b124d453bc2c67f4e10674f5e9

    • SSDEEP

      24576:/GU0HpRGUYHKaPUM0Hqy69NgA+iVvRuPpND5TqJ6y5eXt7dR/F5htSt:epEUIvU0N9jkpjweXt77d5f8

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks