General
-
Target
4b6371acd673d8a5301fd25a904050ce9c31b923283cf2bdb5f854c3952a6c76
-
Size
7.8MB
-
Sample
241109-tyg5ksxhqp
-
MD5
d36e874429ff3662900764bfc6c9aeeb
-
SHA1
2966bb8dd6833c234f8fbb6c647d62b2ae817571
-
SHA256
4b6371acd673d8a5301fd25a904050ce9c31b923283cf2bdb5f854c3952a6c76
-
SHA512
a1e56425e3350ddc176b9e4e62b45662cb7d473446d720295092efa7e7f573bb39ded7625a90b18d39f95c12d82a9245a5755133a8782cf523046ea0581a9833
-
SSDEEP
196608:l1iCQNvlfFk2oronhaLM3z0v8Z3Lfc0y8r3lX5BIJn:lIxdFa22+v3LfJy8T/BIB
Static task
static1
Behavioral task
behavioral1
Sample
C0672CA6E505B76756AC421EF9D33409.exe
Resource
win7-20240903-en
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.xxhufdc.top/
http://www.uefhkice.xyz/
http://www.fcektsy.top/
Extracted
metasploit
windows/single_exec
Targets
-
-
Target
C0672CA6E505B76756AC421EF9D33409.bin
-
Size
7.9MB
-
MD5
c0672ca6e505b76756ac421ef9d33409
-
SHA1
a773fe4c53105ae987d6c4cebaf3095102a6f103
-
SHA256
b01b61c911a3b80d4f265e4915f9d62275efa34f84989f77be142f3f9e062f9b
-
SHA512
b928cf61eb3dfc1503692a1db54ede52bd2c29b836198ded91d94e414e8bb3012ef3bb2b2e145358951252778403665ea8e9b5eef34fe22f329fc6a5947a0e55
-
SSDEEP
196608:U+xH2WQ550oabSsdp9dQeCrENfZKSYE59:toK+udCENwvE59
-
Detect Fabookie payload
-
FFDroider payload
-
Fabookie family
-
Ffdroider family
-
Glupteba family
-
Glupteba payload
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Socelars family
-
Socelars payload
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
Modifies boot configuration data using bcdedit
-
Drops file in Drivers directory
-
Modifies Windows Firewall
-
Possible attempt to disable PatchGuard
Rootkits can use kernel patching to embed themselves in an operating system.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
AutoIT Executable
AutoIT scripts compiled to PE executables.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Scheduled Task/Job
1Scheduled Task
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
4Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1