General

  • Target

    JaffaCakes118_8d19675c89beeaffd944395fc470f0281758c9fbda6dc37749f8cb3439037947

  • Size

    8.3MB

  • Sample

    241228-2lj3eatmew

  • MD5

    9b6fe5b3eb2bb96159056ec0ebbd7608

  • SHA1

    a4baae622033a7b6b0dc8cc84ddd5297f5808d59

  • SHA256

    8d19675c89beeaffd944395fc470f0281758c9fbda6dc37749f8cb3439037947

  • SHA512

    29aaea62f8f5e690663515029fd5deda3d3929dfc9631d8263fbb8574914e2f3dda8c71f154c4067b6501445ca1a25759178d18b37f6eab53c1b957ca05be4e8

  • SSDEEP

    196608:+BUEONt6gJRCrg4AOPTt4y/bvB6HvzzD8U1oUpRuhK36et:LtxRCrkT71Yvk

Malware Config

Extracted

Family

socelars

C2

https://sa-us-bucket.s3.us-east-2.amazonaws.com/ujfreids61/

Targets

    • Target

      cf32a7fab4126b3fa275f8b7e714dcdbe4ab261514d103b1bf8001aa6a065732

    • Size

      9.3MB

    • MD5

      815823e16ee4a96284e4a57c7f8ee452

    • SHA1

      7cfd6b8f86ad0b3c6856382ed193d9861851f73f

    • SHA256

      cf32a7fab4126b3fa275f8b7e714dcdbe4ab261514d103b1bf8001aa6a065732

    • SHA512

      31a406964d2128d6a9136551b5858fc132582c829128905f8fdaab2455cdf129f3e5f394a22450482e89475c3989ba6e6e95932079fef11aa150580a2bc0f63b

    • SSDEEP

      196608:3BicJE0V9zGC1A0efyvd7v54Kc1yANL4oVEWkDlLxlJ:3HJE0eC1A0egQ4AV49DD97

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks