General
-
Target
setup_x86_x64_install.exe
-
Size
3.5MB
-
Sample
250516-z36avs1rx7
-
MD5
fa2441ccd5d677b471a8d0c0b0436770
-
SHA1
88409a1a9bef3d372289ed2b58187789aba58e0e
-
SHA256
bd3791c8832bbcf0d4a88cb45a45628b44f9de773243109bd7b3dd0b2d950832
-
SHA512
afea757b6965cbf533a6af965e388e38eb63a4d4a8eb4e1b80a8400e88746e690f0f9eb7b37ebdda1feadc11199aa75c47eb6310cbeedddc90b16c7368f7bb67
-
SSDEEP
98304:y28y/bgumqItruMIdiSJvDQ6xgdKjrAr/W9:y2Tgumqy1AikP13D
Static task
static1
Malware Config
Extracted
socelars
http://www.iyiqian.com/
http://www.hbgents.top/
http://www.rsnzhy.com/
http://www.znsjis.top/
Extracted
privateloader
http://45.133.1.182/proxies.txt
http://45.133.1.107/server.txt
pastebin.com/raw/A7dSG1te
http://wfsdragon.ru/api/setStats.php
51.178.186.149
Extracted
nullmixer
http://hsiens.xyz/
Targets
-
-
Target
setup_x86_x64_install.exe
-
Size
3.5MB
-
MD5
fa2441ccd5d677b471a8d0c0b0436770
-
SHA1
88409a1a9bef3d372289ed2b58187789aba58e0e
-
SHA256
bd3791c8832bbcf0d4a88cb45a45628b44f9de773243109bd7b3dd0b2d950832
-
SHA512
afea757b6965cbf533a6af965e388e38eb63a4d4a8eb4e1b80a8400e88746e690f0f9eb7b37ebdda1feadc11199aa75c47eb6310cbeedddc90b16c7368f7bb67
-
SSDEEP
98304:y28y/bgumqItruMIdiSJvDQ6xgdKjrAr/W9:y2Tgumqy1AikP13D
-
Detect Fabookie payload
-
Fabookie family
-
Nullmixer family
-
PrivateLoader
PrivateLoader is a downloader sold as a pay-per-install malware distribution service.
-
Privateloader family
-
Socelars family
-
Socelars payload
-
Command and Scripting Interpreter: PowerShell
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops Chrome extension
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Looks up geolocation information via web service
Uses a legitimate geolocation service to find the infected system's geolocation info.
-
MITRE ATT&CK Enterprise v16
Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1