General

  • Target

    275ed964b4feb7d2d12053dd8eeecb7a.zip

  • Size

    746KB

  • Sample

    240901-l5rzcsxfpm

  • MD5

    a5158e530df9b3a5d7ffd96d7bde373f

  • SHA1

    b6fc78de55a68325e4ec05b2c01622ef98c976ac

  • SHA256

    ca89728f96d72931d4c9e224f1fb79abb214f09b58f6e967a2105a51e62adb0a

  • SHA512

    462d5add1f0e986fdb02437fe0599b98be262bb6fa30bbf3581813b92bea751c6472ba159b9e1a99844380e12f76604f7756537775b1c71194ffea4e7a77b4c3

  • SSDEEP

    12288:w0r6FqK2UkWgeohXyrTl9Hcav9aVcEyXB4uS149wA5Tqly0t+tjz3hy4iXUBBiBw:nWX2UkoYsTgab5GrLcqo+2diX+B+Y58Q

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.efxety.top/

Targets

    • Target

      82d2e2a8529d4704d2eabfb845dc262234b73866819ef835e291c7f9818aa9b1

    • Size

      1.4MB

    • MD5

      275ed964b4feb7d2d12053dd8eeecb7a

    • SHA1

      8c33019c08529ce2868c7ed86a04a16c5046a718

    • SHA256

      82d2e2a8529d4704d2eabfb845dc262234b73866819ef835e291c7f9818aa9b1

    • SHA512

      8cc6c9912dbb6482b2481d8924d4dd17aa7765b40655f2cf946b930335ec0f62cab939158d13f89155ea3ce15d2e0eb3d712fb0fb74081be5756e3d893347246

    • SSDEEP

      24576:dxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX32Z1qsa:npy+VDa8rtPvX32Z8s

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks