General

  • Target

    291505b584fdf540a1590ce7181d85cee7967f99cbf05aeb7b7031b6a9b4f2cd.zip

  • Size

    3.3MB

  • Sample

    250204-p9p74sykfq

  • MD5

    0a61902e06cd5296e3b589717bf340f3

  • SHA1

    bcd1ead086e39e1c21036b0ac5647618fd29a21d

  • SHA256

    af4880d77a7428ab982d24985d355c1f9e6c494876848dfb0ea3b620860e998e

  • SHA512

    45fd8d4b3e9221f36140ef15e026cdf961ab47cda1587527641a681bdf7cb0b9ba48e383d5098cfa61da1fabdfb31a80429211b38c4651675ac74a631039ac89

  • SSDEEP

    49152:Go8AcWR2v21/5b4cWRcSnnRb8qN8CACyzycB0mCxDT3QrdhX4qA2ocP1ZaL:MRrv21/5b4TRb8dCvyz3ADG5b3h7aL

Malware Config

Extracted

Family

socelars

C2

http://www.iyiqian.com/

http://www.xxhufdc.top/

http://www.uefhkice.xyz/

http://www.fcektsy.top/

Extracted

Family

nullmixer

C2

http://hsiens.xyz/

Targets

    • Target

      291505b584fdf540a1590ce7181d85cee7967f99cbf05aeb7b7031b6a9b4f2cd.zip

    • Size

      3.3MB

    • MD5

      0a61902e06cd5296e3b589717bf340f3

    • SHA1

      bcd1ead086e39e1c21036b0ac5647618fd29a21d

    • SHA256

      af4880d77a7428ab982d24985d355c1f9e6c494876848dfb0ea3b620860e998e

    • SHA512

      45fd8d4b3e9221f36140ef15e026cdf961ab47cda1587527641a681bdf7cb0b9ba48e383d5098cfa61da1fabdfb31a80429211b38c4651675ac74a631039ac89

    • SSDEEP

      49152:Go8AcWR2v21/5b4cWRcSnnRb8qN8CACyzycB0mCxDT3QrdhX4qA2ocP1ZaL:MRrv21/5b4TRb8dCvyz3ADG5b3h7aL

    • Detect Fabookie payload

    • Fabookie

      Fabookie is facebook account info stealer.

    • Fabookie family

    • NullMixer

      NullMixer is a malware dropper leading to an infection chain of a wide variety of malware families.

    • Nullmixer family

    • Socelars

      Socelars is an infostealer targeting browser cookies and credit card credentials.

    • Socelars family

    • Socelars payload

    • Command and Scripting Interpreter: PowerShell

      Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

    • ASPack v2.12-2.42

      Detects executables packed with ASPack v2.12-2.42

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Looks up geolocation information via web service

      Uses a legitimate geolocation service to find the infected system's geolocation info.

MITRE ATT&CK Enterprise v15

Tasks