General
-
Target
40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe
-
Size
1.5MB
-
Sample
241123-rx9r4awpht
-
MD5
6ef10388f2ff5ff4542eded1be1fd7e6
-
SHA1
fffc820ccbcb04d3dbcdec6b3ce9a4b749999b63
-
SHA256
40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076
-
SHA512
213f50c833c008ee2994dd510021de445b812da59a61aecea2f13bca8ebda69966610bff2b3de86d5845edd4ef4e322baf8de2adad22feaec251d64b61f762d9
-
SSDEEP
24576:nxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX3tZ1n106GYS:xpy+VDa8rtPvX3tZd106pS
Behavioral task
behavioral1
Sample
40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe
Resource
win7-20241010-en
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.efxety.top/
Targets
-
-
Target
40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076.exe
-
Size
1.5MB
-
MD5
6ef10388f2ff5ff4542eded1be1fd7e6
-
SHA1
fffc820ccbcb04d3dbcdec6b3ce9a4b749999b63
-
SHA256
40c1600444053c239da106a872369e6cb1ee0f3a6dc7640a2d882bbe02b75076
-
SHA512
213f50c833c008ee2994dd510021de445b812da59a61aecea2f13bca8ebda69966610bff2b3de86d5845edd4ef4e322baf8de2adad22feaec251d64b61f762d9
-
SSDEEP
24576:nxpXPaR2J33o3S7P5zuHHOF2ahfehMHsGKzOYf8EEvX3tZ1n106GYS:xpy+VDa8rtPvX3tZd106pS
-
Socelars family
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1