General
-
Target
fijewh.zip
-
Size
36.0MB
-
Sample
241109-zhtrbssbkl
-
MD5
7e6d7c0df23672babd30f9543916ca52
-
SHA1
0571efe4079a95cb118d79f8c87cdb8694193973
-
SHA256
ea5e0d5f12deeb25573cc7fcade7327945d5e4778c1569e189dc483e96583cbc
-
SHA512
010799374e9bb476c248ecd326ef67e076959b92da685c538b7f4bd4b94570a3e3cf43d64cd52b2a127dc15e2f11b41e1ea2d8c32fd9019f7272538311baf8c2
-
SSDEEP
393216:dGRv1cKZdpkm4SNOFXT+93GRv1cKZdpkm4SNOFXT+9ZEcnTXHfV18f49bWUccq:G/dkUsTD/dkUsTwECL/nXbW2q
Static task
static1
Behavioral task
behavioral1
Sample
fijewh.zip
Resource
win10v2004-20241007-en
Malware Config
Extracted
socelars
http://www.nicekkk.pw/
http://www.nextinfo.pw/
http://www.allinfo.pw/
Targets
-
-
Target
fijewh.zip
-
Size
36.0MB
-
MD5
7e6d7c0df23672babd30f9543916ca52
-
SHA1
0571efe4079a95cb118d79f8c87cdb8694193973
-
SHA256
ea5e0d5f12deeb25573cc7fcade7327945d5e4778c1569e189dc483e96583cbc
-
SHA512
010799374e9bb476c248ecd326ef67e076959b92da685c538b7f4bd4b94570a3e3cf43d64cd52b2a127dc15e2f11b41e1ea2d8c32fd9019f7272538311baf8c2
-
SSDEEP
393216:dGRv1cKZdpkm4SNOFXT+93GRv1cKZdpkm4SNOFXT+9ZEcnTXHfV18f49bWUccq:G/dkUsTD/dkUsTwECL/nXbW2q
-
Detect Fabookie payload
-
Fabookie family
-
Mimikatz family
-
Pony family
-
Socelars family
-
Socelars payload
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
mimikatz is an open source tool to dump credentials on Windows
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook accounts
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
4Credentials In Files
4