General
-
Target
0df5a9fd889ebc4d1fbb4bd81256f6c0e4a7598345bd65ab5425cbd03d0349c7
-
Size
3.5MB
-
Sample
241105-d95f9avbml
-
MD5
860a1c79f94136ea8af15739d2bfe620
-
SHA1
ee2c2200f94543017660370a43ada2755141d8ee
-
SHA256
0df5a9fd889ebc4d1fbb4bd81256f6c0e4a7598345bd65ab5425cbd03d0349c7
-
SHA512
727aed677da2d5214de0b390787403ca43a2d1d4c26ff594b26df08cad7691dbb86c9507d36ae09fd698f7ebcf1220375674042e2680349194eb6fa843a698c2
-
SSDEEP
98304:sB5lViZSnl3ir1LefLYsbPWdAIOlGB/s9t1g6IUU9ScoQWHWvXQ6t:GsSl3iwjYseOCsA6IUKVoQAW/P
Static task
static1
Behavioral task
behavioral1
Sample
e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5.exe
Resource
win7-20241010-en
Malware Config
Extracted
socelars
http://www.fddnice.pw/
http://www.sokoinfo.pw/
http://www.zzhlike.pw/
http://www.wygexde.xyz/
Extracted
ffdroider
http://101.36.107.74
Targets
-
-
Target
e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5
-
Size
3.6MB
-
MD5
78260204ab2a8d1039ea744d228ced1f
-
SHA1
a108fb238a98c5090e3824db51a8a92ce0eb6cb1
-
SHA256
e99107f51a615207824a28411b0355fba67cbda8dbd24d450a84cbe40aa8faf5
-
SHA512
2895dc42aa22b201c1fb809ffd7c6be40870a75b953e66299fdf222c3b5d299ad85172aea3ccbebda4a5af3a34766005a4ec3b96114c7fb56784d49efaf84b39
-
SSDEEP
98304:UbR1dh6claIxZJrXentG2P8aGsw2kvpDNsK:UN1dIcljZ9MJP8fP75F
-
Detect Fabookie payload
-
Fabookie family
-
Ffdroider family
-
Socelars family
-
Socelars payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1