Resubmissions

15-04-2023 16:41

230415-t7c7zsgd3x 10

15-04-2023 16:38

230415-t5e9kagd21 10

15-04-2023 16:36

230415-t4f5gagd2x 1

General

  • Target

    Minecraft.keygen.by.cat.bin.zip

  • Size

    14.1MB

  • Sample

    230415-t5e9kagd21

  • MD5

    ebff0a2737f2ad4b084934d265bf7818

  • SHA1

    5ba83e9347209caa5d7f0a602fefd79c24bd494c

  • SHA256

    22d2bc247b02a9ffc0f0b5843dad7ee88c2599ead0136bcd65f36df27e0fa8e4

  • SHA512

    4fb2625a9533b7dce65401896202566c6f5183b8db018f940823bfecdbf1e7496ad16505f41345b9497b72df2b05aa3e427e88d0c51a0e331c38f68bb9e017fc

  • SSDEEP

    393216:IKqqlxJEqShwWgb5uOczfXrqH1EXbmDCUkJa:1nJEqtZczfX+H14mOUkI

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Extracted

Family

socelars

C2

https://hueduy.s3.eu-west-1.amazonaws.com/dkfjrg725/

Targets

    • Target

      Minecraft.keygen.by.cat.bin

    • Size

      14.2MB

    • MD5

      53b6e86dceab78b1fd41076b86be6cc4

    • SHA1

      855524589dac86f1a6e9eff45f5b08f3e5195034

    • SHA256

      a6bb4031f4f28bafd8e88002bdd2d7690f92019a67e19ffb4348e1b055f1e835

    • SHA512

      dad4b782e840d93d90dc471e0317287ce2b619ca56396c95484ba7bb9b18e90117564e2b494db3fb9e980b09a83ed42d3f5b2f8487e2af9b07cb84f111d7c9b7

    • SSDEEP

      393216:p5sMl5v2VK5PDXARPwh9HBC6TsAL0KT+Dfy4bymG:p5sMl5uIPbARPwzHBpTsALjCJymG

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars payload

    • Executes dropped EXE

    • Loads dropped DLL

    • Themida packer

      Detects Themida, an advanced Windows software protection system.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Enterprise v6

Tasks