General

  • Target

    b145b9f9a935bb4a5a5f54e63dc0abef050c8b3c7552a7cd870744b3fb873063

  • Size

    3.4MB

  • Sample

    241110-nzlw9syrej

  • MD5

    e83a75fd08033aecc0fe47f1e7932ea0

  • SHA1

    64387464fa9cddb470b76f36ecee677fc1f4c445

  • SHA256

    b145b9f9a935bb4a5a5f54e63dc0abef050c8b3c7552a7cd870744b3fb873063

  • SHA512

    e75056c17470343bfe75e6c43198d41e63afccd8e4f74ea2dd3bfbf29ed0e3e1eb5bb5f0da4155ad2a0da64f913995cd39670a299815bd94234c1eb4615ac354

  • SSDEEP

    98304:PB5lC3ZscAu5gqmuhxuXMG857OwE28v0jeex:xC3Zs0nfuX+VCv0jvx

Malware Config

Extracted

Family

socelars

C2

http://www.fddnice.pw/

http://www.sokoinfo.pw/

http://www.zzhlike.pw/

http://www.wygexde.xyz/

Extracted

Family

ffdroider

C2

http://101.36.107.74

Targets

    • Target

      7dc8ba99829b20160eeb99435c0896055e2e96690dd924d611d959be7868cdf2

    • Size

      3.5MB

    • MD5

      06ba4eb5e4c4b967d200f4a7bd62342e

    • SHA1

      490584d8559878bd1fe17a5f8a230ef58bef1f51

    • SHA256

      7dc8ba99829b20160eeb99435c0896055e2e96690dd924d611d959be7868cdf2

    • SHA512

      7403f615a1a0141c5d6570f41ae5a21640e2f53e706921057670fda6cb3f70cfab133003b4948370d56e35a4fc357a8651f5b49d525e0722ce7e92ffdca8a495

    • SSDEEP

      98304:Ub71d26claIxZ3reeloEZACVaWM601Tw2kvpDrs4:UX1dxcljZSidH9K1s75r

    • Detect Fabookie payload

    • FFDroider

      Stealer targeting social media platform users first seen in April 2022.

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Ffdroider family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Detected Nirsoft tools

      Free utilities often used by attackers which can steal passwords, product keys, etc.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of NtCreateThreadExHideFromDebugger

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks