General

  • Target

    d6848b7bb725e3597cff6e9f56bebbf2f4822a7b9ed9a74d603f1a1c5b0bf617

  • Size

    739KB

  • Sample

    240903-x6rkrsvcrm

  • MD5

    fc45a26d62a2880f38bc5de30e825d05

  • SHA1

    fe9575abf003e5e2d1c9c91a14273d956ba3e8b9

  • SHA256

    d6848b7bb725e3597cff6e9f56bebbf2f4822a7b9ed9a74d603f1a1c5b0bf617

  • SHA512

    08b265111ea2bade9d1a0c351b1f313d52bf6e8a44dab1ee7b2a3aaa63e02d68086c5783d03eca9c61bd6e2a66d1d46e3834f75ad084e699447c5c7b6cc90be4

  • SSDEEP

    12288:/Tk31R8dA8BbzaNAx6wM52WmFoh0WQ6fcXdRxlB/c/1aMEfk1aL/WPrfsdmkyM99:a16dA8Bby/52Wv0WSBPvM8k8WPDMmkDV

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.hbgents.top/

http://www.rsnzhy.com/

http://www.znsjis.top/

Targets

    • Target

      6585676245e22cca9f08c5a2f4b7b3020dd02e544a9caa57b1df22687a43192f

    • Size

      1.5MB

    • MD5

      8b28b4cfd5fc4e1ef82f7a96f10bf89c

    • SHA1

      b3508ba8a9e143063f98fc2d0cdb4782fa838e22

    • SHA256

      6585676245e22cca9f08c5a2f4b7b3020dd02e544a9caa57b1df22687a43192f

    • SHA512

      603d2aea823ae99f9e437cad499d91f539c833123dc525e63262662455b1a826e6840d59f64cb006a8c8e7a228848692eda4c056aeb9b6c33ac4a0bda29ee23a

    • SSDEEP

      24576:VxpXPaR2J33o3S7P5zuHHOF2CxfehMHsGKzOYCMEMfX4RZ13:/py+VDi8rgHfX4RZJ

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Credentials from Password Stores: Credentials from Web Browsers

      Malicious Access or copy of Web Browser Credential store.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks