General

  • Target

    7330398e4bc7afd3740c804362ec8a99.zip

  • Size

    740KB

  • Sample

    240903-dhnz7avgnk

  • MD5

    cbf0d34edf1b32c30fb65cc7607f2162

  • SHA1

    289f9cb906ad559bd874c580807d848bb7d5c3be

  • SHA256

    74e0fb6835d90478acdb772f26fe1538f244ecffb49394234ffc8e44dba80cec

  • SHA512

    878d405c48e5101b4d7703ae7477aabb8cfa98fe96173c6ecba48954f3f5c97e92a3c4a2d66228bc6defc851ecd163d5a4b4fb4d71cae70d7e4523e09964565a

  • SSDEEP

    12288:5Z4YHVhwjEV+L3VDChm774PfgeZVGWaj/RoKlmI8Ovk+kR4j4xdgYcF0WzMf:5Z4IhwjEUV+t/GWajJoimXOvCPTgVF0J

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.znsjis.top/

Targets

    • Target

      17f36f9ac30e7ec160932fb3ef8efcc7ba779a63fe7e2510857a2e6d2909cb32

    • Size

      1.4MB

    • MD5

      7330398e4bc7afd3740c804362ec8a99

    • SHA1

      02fb96618ba3c6ce8d82b511883fa3d9b99ca935

    • SHA256

      17f36f9ac30e7ec160932fb3ef8efcc7ba779a63fe7e2510857a2e6d2909cb32

    • SHA512

      812fbf165de8c209b6eeb7e3aff11c1740f30d518329bcc78a472cebaee1e59c2b6c0ef3388aba53bb1901d3318ed9dc726c447a1009f74f98352ff4fedaf322

    • SSDEEP

      24576:3Rp2fYlh5hJYrsWSlTeTmvL2aIZX8W6jO2kkYOnbXgwpVg/:hp1v1jC5jNTOnjjp2/

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks