General
-
Target
7908fc00709580c4e12534bcd7ef8aae
-
Size
1.4MB
-
Sample
231219-w8w3lagfa2
-
MD5
7908fc00709580c4e12534bcd7ef8aae
-
SHA1
616616595f65c8fdaf1c5f24a4569e6af04e898f
-
SHA256
55fc7e624b75a66d04ed1dfc8d6957ceb013db94e9be29e779280378011d1399
-
SHA512
0d5a72410d628d3bf6ff9188a69f378e04184ed603a620659f4084bd8a5a392577849c5aa895706eec5213b0036d24faafb8e153b458b5f53d8da7ce636b7a00
-
SSDEEP
24576:CxpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX4QZ1XSlqOR:ipy+VDi8rgHfX4QZhSnR
Behavioral task
behavioral1
Sample
7908fc00709580c4e12534bcd7ef8aae.exe
Resource
win7-20231215-en
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Targets
-
-
Target
7908fc00709580c4e12534bcd7ef8aae
-
Size
1.4MB
-
MD5
7908fc00709580c4e12534bcd7ef8aae
-
SHA1
616616595f65c8fdaf1c5f24a4569e6af04e898f
-
SHA256
55fc7e624b75a66d04ed1dfc8d6957ceb013db94e9be29e779280378011d1399
-
SHA512
0d5a72410d628d3bf6ff9188a69f378e04184ed603a620659f4084bd8a5a392577849c5aa895706eec5213b0036d24faafb8e153b458b5f53d8da7ce636b7a00
-
SSDEEP
24576:CxpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX4QZ1XSlqOR:ipy+VDi8rgHfX4QZhSnR
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-