General

  • Target

    0df5a9fd889ebc4d1fbb4bd81256f6c0e4a7598345bd65ab5425cbd03d0349c7

  • Size

    3.5MB

  • Sample

    241105-d95f9avbml

  • MD5

    860a1c79f94136ea8af15739d2bfe620

  • SHA1

    ee2c2200f94543017660370a43ada2755141d8ee

  • SHA256

    0df5a9fd889ebc4d1fbb4bd81256f6c0e4a7598345bd65ab5425cbd03d0349c7

  • SHA512

    727aed677da2d5214de0b390787403ca43a2d1d4c26ff594b26df08cad7691dbb86c9507d36ae09fd698f7ebcf1220375674042e2680349194eb6fa843a698c2

  • SSDEEP

    98304:sB5lViZSnl3ir1LefLYsbPWdAIOlGB/s9t1g6IUU9ScoQWHWvXQ6t:GsSl3iwjYseOCsA6IUKVoQAW/P

Malware Config

Extracted

Family

socelars

C2

http://www.fddnice.pw/

http://www.sokoinfo.pw/

http://www.zzhlike.pw/

http://www.wygexde.xyz/

Extracted

Family

ffdroider

C2

http://101.36.107.74

Targets

    • Target

      e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5

    • Size

      3.6MB

    • MD5

      78260204ab2a8d1039ea744d228ced1f

    • SHA1

      a108fb238a98c5090e3824db51a8a92ce0eb6cb1

    • SHA256

      e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5

    • SHA512

      2895dc42aa22b201c1fb809ffd7c6be40870a75b953e66299fdf222c3b5d299ad85172aea3ccbebda4a5af3a34766005a4ec3b96114c7fb56784d49efaf84b39

    • SSDEEP

      98304:UbR1dh6claIxZJrXentG2P8aGsw2kvpDNsK:UN1dIcljZ9MJP8fP75F

    • Detect Fabookie payload

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Ffdroider family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks