General
-
Target
JaffaCakes118_8d19675c89beeaffd944395fc470f0281758c9fbda6dc37749f8cb3439037947
-
Size
8.3MB
-
Sample
241228-2lj3eatmew
-
MD5
9b6fe5b3eb2bb96159056ec0ebbd7608
-
SHA1
a4baae622033a7b6b0dc8cc84ddd5297f5808d59
-
SHA256
8d19675c89beeaffd944395fc470f0281758c9fbda6dc37749f8cb3439037947
-
SHA512
29aaea62f8f5e690663515029fd5deda3d3929dfc9631d8263fbb8574914e2f3dda8c71f154c4067b6501445ca1a25759178d18b37f6eab53c1b957ca05be4e8
-
SSDEEP
196608:+BUEONt6gJRCrg4AOPTt4y/bvB6HvzzD8U1oUpRuhK36et:LtxRCrkT71Yvk
Static task
static1
Behavioral task
behavioral1
Sample
cf32a7fab4126b3fa275f8b7e714dcdbe4ab261514d103b1bf8001aa6a065732.exe
Resource
win7-20240708-en
Malware Config
Extracted
socelars
https://sa-us-bucket.s3.us-east-2.amazonaws.com/ujfreids61/
Targets
-
-
Target
cf32a7fab4126b3fa275f8b7e714dcdbe4ab261514d103b1bf8001aa6a065732
-
Size
9.3MB
-
MD5
815823e16ee4a96284e4a57c7f8ee452
-
SHA1
7cfd6b8f86ad0b3c6856382ed193d9861851f73f
-
SHA256
cf32a7fab4126b3fa275f8b7e714dcdbe4ab261514d103b1bf8001aa6a065732
-
SHA512
31a406964d2128d6a9136551b5858fc132582c829128905f8fdaab2455cdf129f3e5f394a22450482e89475c3989ba6e6e95932079fef11aa150580a2bc0f63b
-
SSDEEP
196608:3BicJE0V9zGC1A0efyvd7v54Kc1yANL4oVEWkDlLxlJ:3HJE0eC1A0egQ4AV49DD97
-
Detect Fabookie payload
-
Fabookie family
-
Socelars family
-
Socelars payload
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1