General

  • Target

    fca0a82674863619b79d6793e6164045d7f35482261c898dc903d07bd4ca9a54

  • Size

    1.4MB

  • Sample

    230518-efd8mshf48

  • MD5

    e5c68f7c04f147d6fb620a3ba2bf2c6c

  • SHA1

    2ccd6c85287a40efac5b9855c9cf432f652f03ff

  • SHA256

    fca0a82674863619b79d6793e6164045d7f35482261c898dc903d07bd4ca9a54

  • SHA512

    04c0c7f4b178bf055c205de05e470c5edff393ee30775600f43fe44fb8a247f6a1f34dde0c2098441f025fa2bc3b614e51628fee7b3983c191c2f9ea0a189404

  • SSDEEP

    24576:rGU0HpRGUYHKaPUM0Hqy69NgA+iVvRuPpND5TqJ6y5eXt7dRjL5hAST:apEUIvU0N9jkpjweXt77X5yK

Malware Config

Extracted

Family

socelars

C2

https://hdbywe.s3.us-west-2.amazonaws.com/uysf428/

Targets

    • Target

      fca0a82674863619b79d6793e6164045d7f35482261c898dc903d07bd4ca9a54

    • Size

      1.4MB

    • MD5

      e5c68f7c04f147d6fb620a3ba2bf2c6c

    • SHA1

      2ccd6c85287a40efac5b9855c9cf432f652f03ff

    • SHA256

      fca0a82674863619b79d6793e6164045d7f35482261c898dc903d07bd4ca9a54

    • SHA512

      04c0c7f4b178bf055c205de05e470c5edff393ee30775600f43fe44fb8a247f6a1f34dde0c2098441f025fa2bc3b614e51628fee7b3983c191c2f9ea0a189404

    • SSDEEP

      24576:rGU0HpRGUYHKaPUM0Hqy69NgA+iVvRuPpND5TqJ6y5eXt7dRjL5hAST:apEUIvU0N9jkpjweXt77X5yK

    Score
    7/10
    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

1
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks