Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. SocGholish

SocGholish

SocGholish is a JavaScript-based loader malware that has been used since at least 2017. It has been observed in use against multiple sectors globally for initial access, primarily through drive-by-downloads masquerading as software updates. SocGholish is operated byMustard Tempest and its access has been sold to groups includingIndrik Spider for downloading secondary RAT and ransomware payloads.[1][2][3][4]

ID: S1124
Associated Software: FakeUpdates
Type: MALWARE
Platforms: Windows
Version: 1.0
Created: 22 March 2024
Last Modified: 06 April 2024

Associated Software Descriptions

NameDescription
FakeUpdates

[3]

Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.007Command and Scripting Interpreter:JavaScript

TheSocGholish payload is executed as JavaScript.[2][1][3][4]

EnterpriseT1074.001Data Staged:Local Data Staging

SocGholish can send output fromwhoami to a local temp file using the naming conventionrad<5-hex-chars>.tmp.[3]

EnterpriseT1482Domain Trust Discovery

SocGholish can profile compromised systems to identify domain trust relationships.[2][3]

EnterpriseT1189Drive-by Compromise

SocGholish has been distributed through compromised websites with malicious content often masquerading as browser updates.[2]

EnterpriseT1048.003Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol

SocGholish can exfiltrate data directly to its C2 domain via HTTP.[3]

EnterpriseT1105Ingress Tool Transfer

SocGholish can download additional malware to infected hosts.[3][4]

EnterpriseT1036.005Masquerading:Match Legitimate Resource Name or Location

SocGholish has been namedAutoUpdater.js to mimic legitimate update files.[2]

EnterpriseT1027.013Obfuscated Files or Information:Encrypted/Encoded File

SocGholish has single or double Base-64 encoded references to its second-stage server URLs.[1]

.015Obfuscated Files or Information:Compression

TheSocGholish JavaScript payload has been delivered within a compressed ZIP archive.[3][4]

EnterpriseT1566.002Phishing:Spearphishing Link

SocGholish has been spread via emails containing malicious links.[2]

EnterpriseT1057Process Discovery

SocGholish can list processes on targeted hosts.[4]

EnterpriseT1518Software Discovery

SocGholish can identify the victim's browser in order to serve the correct fake update page.[4]

EnterpriseT1082System Information Discovery

SocGholish has the ability to enumerate system information including the victim computer name.[2][3][4]

EnterpriseT1614System Location Discovery

SocGholish can use IP-based geolocation to limit infections to victims in North America, Europe, and a small number of Asian-Pacific nations.[4]

EnterpriseT1016System Network Configuration Discovery

SocGholish has the ability to enumerate the domain name of a victim, as well as if the host is a member of an Active Directory domain.[2][3][4]

EnterpriseT1033System Owner/User Discovery

SocGholish can usewhoami to obtain the username from a compromised host.[2][3][4]

EnterpriseT1204.001User Execution:Malicious Link

SocGholish has lured victims into interacting with malicious links on compromised websites for execution.[2]

EnterpriseT1102Web Service

SocGholish has used Amazon Web Services to host second-stage servers.[1]

EnterpriseT1047Windows Management Instrumentation

SocGholish has used WMI calls for script execution and system profiling.[2]

Groups That Use This Software

References

×

[8]ページ先頭

©2009-2026 Movatter.jp