General

  • Target

    81b05c43c1d16f7af57ea6bc9ded5729.zip

  • Size

    740KB

  • Sample

    240901-adnl3starq

  • MD5

    ab05c3fc8357429c8a7573b00392e9cb

  • SHA1

    0c4646a0365d6dd561b48c3ec319a836474d9b71

  • SHA256

    75751e39c518f2cf4ce2986e7c2649e4b586738392f677a53bf652a7d4811cc1

  • SHA512

    28acae3612ac2b562de9b2e3fd9f6d691dd57c912e90961fea0725a6069f50cc63f0f391f6404e4d912720bd7e484e494bb004b18e4c5c3b7571931464d50a5e

  • SSDEEP

    12288:NyYo9ry78WVhCkxgGnG2z9CjJT55l5vHptbFW99xyDMPkf7XDG1Oy1/ez9nrOWhT:Nyf9XuSQ9uJT5tHrFZDMIXDG11eDhKFK

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.znsjis.top/

Targets

    • Target

      c3662f65c455c8e16f70e3443056b4f924278ba5c68c46bc38f8084ca3fb36a7

    • Size

      1.4MB

    • MD5

      81b05c43c1d16f7af57ea6bc9ded5729

    • SHA1

      50e54265eeb9b3c9350b6c6cb17c0fc24f5064e1

    • SHA256

      c3662f65c455c8e16f70e3443056b4f924278ba5c68c46bc38f8084ca3fb36a7

    • SHA512

      993a73a26086b37a2038520068b37e4ff9db6806c7489a389818ac1612ec0ae18629bb53d356e4774d25ec23b7ce0e5d15dda4be17e77d66447e6c12d4d7f136

    • SSDEEP

      24576:PxpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX43Z1oIe:5py+VDi8rgHfX43Z2Ie

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks