General
-
Target
JaffaCakes118_b931c903ff14d82dce6daf9934209b5c71f982359847ed3e342e25fa88c99f03
-
Size
3.4MB
-
Sample
241224-sfar4szqcp
-
MD5
194572ede01daaccc5f7a617b5c08468
-
SHA1
b069072234d68d8ef01c49237c392735d45c4901
-
SHA256
b931c903ff14d82dce6daf9934209b5c71f982359847ed3e342e25fa88c99f03
-
SHA512
caa033d5a30e1c340455faebaf417d2bca2b0c95a24063df2bee78de8955d6d337f82bc16627583672e42f15022073ddbaaedc6f5a6984fdb65efb9f6a57bbae
-
SSDEEP
98304:EY+TyVZ3iK1s61b7GmCTajwC+PuBCeRrsPQb:EYgyr3N+613Hma2PZWwm
Behavioral task
behavioral1
Sample
OkEgjVmQ0rPYTjBDwBy70NyH.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
OkEgjVmQ0rPYTjBDwBy70NyH.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Osz8mRDYP0laXozOTuxyUiiF.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Osz8mRDYP0laXozOTuxyUiiF.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
rUtfalBbvXy6eEmMrseqpFHx.exe
Resource
win7-20240903-en
Malware Config
Extracted
socelars
http://www.chosenncrowned.com/
Targets
-
-
Target
OkEgjVmQ0rPYTjBDwBy70NyH.exe
-
Size
1.8MB
-
MD5
53074ccaf36bc24fd4286062f0cdac98
-
SHA1
2ca97c4d5dfacfc29d8feee90cd7de2eff651225
-
SHA256
d654c6c1643997b6c6d8e8133e867e52c3176f3e6ed3827ea5f4e29023817115
-
SHA512
4a47f2fad7dcf2fefb8fd4ed2714b90f13b4cfec755521db27fb131fce068168f31e1edb0d2dc7f5eb867f992063a37ce5022e7a8a894f906fc91ed1c1be6ef5
-
SSDEEP
49152:78492ViONKb0EK/vxtzuViYcqePo2GJKFg8764CTaCowwvgv:7fDuZDHr6ctUKFj764CTa1wggv
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Osz8mRDYP0laXozOTuxyUiiF.exe
-
Size
1.4MB
-
MD5
0f01bbed1d28eba69835962f39d15261
-
SHA1
5538f0cc1959b565277060c53d2f5e4d633ed899
-
SHA256
3e34092ce27276c1b0cdeba1d3f8649258e55f23dfb92fcd9de6d52d5f559e91
-
SHA512
442a815bc696cdd57bd141565c0ccf983ff9d241129a4bd6ed19d629fd60a5207501abf3ef5c6f19e6e6eab79fc27059f04664809e7572173d3621a2bfb4436d
-
SSDEEP
24576:avp1T0ZhIjR+IXbtCOEqmb3tUJoEYdG/9QDMbh7zXIqnjvLZL:0pCuZ4OuD4+AhzXIqnjjZL
-
Socelars family
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
-
-
Target
rUtfalBbvXy6eEmMrseqpFHx.exe
-
Size
2.0MB
-
MD5
93156ea35c0014003d9e87bf82a79b33
-
SHA1
1eacd5ec484996a4dab233cd569c54d1594fb3a9
-
SHA256
c6ac7d4850131a5422da8170ed1a51f939c4b3b1f312478498e8aa7df374e840
-
SHA512
024611682daf2ca96112253d1b2cf8afed22639363c9684353a89e396a89e032a4f7ce8236557416e27dd635e3ee82b332aa3e0bfeba0affc439bdd28a3ea322
-
SSDEEP
49152:7rEOLD0xW+aJVXfxu3Eosp/qw7RV+uY/:023Jtosp/qw7yb
-
Detected Nirsoft tools
Free utilities often used by attackers which can steal passwords, product keys, etc.
-
NirSoft WebBrowserPassView
Password recovery tool for various web browsers
-
Executes dropped EXE
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1