Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

Socelars

87
Global rank
120 infographic chevron month
Month rank
87 infographic chevron week
Week rank
0
IOCs

Socelars is an information-stealing Trojan (often categorized as spyware/stealer) that focuses on collecting sensitive data from Windows systems, with standout reporting around Facebook Ads Manager and session cookie theft. Unlike “noisy” malware that immediately breaks something, Socelars quietly converts a single infected machine into access: logged-in sessions, business account data, and pathways to monetization.

Stealer
Type
Unknown
Origin
1 December, 2019
First seen
11 February, 2026
Last seen

How to analyze Socelars with ANY.RUN

Type
Unknown
Origin
1 December, 2019
First seen
11 February, 2026
Last seen

IOCs

Hashes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jjnices.top
novone.top
URLs
http://212.193.30.115/base/api/getData.php
http://212.193.30.115/base/api/statistics.php
http://49.12.226.201/service/communication.php
http://49.12.226.201/base/api/getData.php
http://49.12.226.201/base/api/statistics.php
http://167.235.29.244/base/api/getData.php
http://163.123.143.12/base/api/statistics.php
http://49.12.226.201/favicon.ico
http://49.12.226.201/
http://212.193.30.115/service/communication.php
http://116.203.105.117/base/api/getData.php
http://85.202.169.116/server.txt
http://163.123.143.12/base/api/getData.php
http://163.123.143.12/service/communication.php
http://212.192.242.47/base/api/getData.php
http://212.192.242.47/base/api/statistics.php
http://212.192.242.47/service/communication.php
http://85.202.169.116/base/api/statistics.php
http://85.202.169.116/base/api/getData.php
http://85.202.169.116/service/communication.php
Last Seen at

Recent blog posts

post image
Emerging Ransomware BQTLock & GREENBLOOD...
watchers 1651
comments 0
post image
How to Build Threat Hunting that Defends Your...
watchers 998
comments 0
post image
How Threat Intelligence Helps Protect Financi...
watchers 735
comments 0

Socelars: The Stealer That Turns Business Accounts into Cash

Key Takeaways

  • Built for ad account takeover: Socelars is explicitly associated with stealing data tied to Facebook Ads Manager operations, putting marketing budgets, brand pages, and business accounts at risk.

  • Cookie theft enables fast account abuse: Reported behavior includes stealing session cookies (Facebook and Amazon mentioned in public reporting), which can allow attackers to access accounts immediately without waiting for password resets.

  • Social-engineering friendly delivery: Campaigns have used a fake PDF reader lure to get users to install the malware, taking advantage of routine workplace behavior around “helper” tools.

  • Spyware/stealer family: Security vendors classify Socelars as a spyware/credential-stealing threat, built for quiet data theft rather than loud disruption.

  • ANY.RUN’s Threat Intelligence Lookup helps SOCs quickly understand Socelars activity at scale and uncover relationships between related samples and infrastructure.

threatName:"socelars".

Socelars overview in TI Lookup

Socelars overview in TI Lookup: targeted industries and countries, IOCs, samples

  • ANY.RUN’s Interactive Sandbox lets teams safely observe Socelars’ behavior and extract actionable indicators in real time.

View analysis

Socelars malware analysis in Interactive Sandbox Socelars stealer detected by ANY.RUN sandbox

What is Socelars Malware?

Socelars is an information-stealing malware family designed to harvest authenticated session data, system identifiers, and other artifacts that enable rapid account takeover and financial abuse.

Rather than disrupting systems immediately, it focuses on quietly collecting the access attackers need to operate inside trusted business services and logged-in environments.

Public reporting links Socelars activity to the theft of session cookies associated with platforms such as Facebook and Amazon, which can allow attackers to access accounts without waiting for password resets or triggering obvious security alerts.

This makes the threat especially dangerous for organizations that rely on advertising platforms, e-commerce accounts, or cloud-based business tools, where stolen sessions can be monetized quickly.

From a technical perspective, Socelars combines:

  • System reconnaissance to profile the infected environment
  • Privilege escalation techniques, including UAC bypass through COM auto-elevation
  • Stealthy data collection targeting browser-stored authentication artifacts
  • Minimal visible impact, allowing abuse to occur before detection

As the malware’s primary goal is immediate operational access rather than destruction, traditional defenses that focus on ransomware-style behavior may detect the incident too late.

In practice, Socelars turns a single unnoticed infection into a pathway for account compromise, financial loss, and compliance exposure, making early behavioral detection and threat-intelligence visibility critical for effective defense.

How Socelars Threatens Businesses and Organizations

Socelars is dangerous not because it disrupts systems immediately, but because it quietly targets the accounts and sessions that drive revenue and operations.

Instead of triggering visible alarms, the malware focuses on stealing authenticated browser data and business platform access, allowing attackers to act as legitimate users while remaining unnoticed.

Key business risks include:

  • Direct financial loss through ad account abuse: Access to Facebook Ads Manager sessions enables attackers to launch fraudulent campaigns, drain advertising budgets, or resell compromised accounts on underground markets.

  • Account takeover without traditional credential theft: By extracting active session cookies, attackers may bypass password resets and, in some cases, multi-factor authentication flows, gaining immediate control over business services.

  • Reputational and customer-trust damage: Compromised advertising or brand pages can be used to distribute scams, malicious links, or misleading promotions that impact customer confidence and brand integrity.

  • Compliance and data-protection exposure: Unauthorized access to business platforms and stored user data may trigger regulatory obligations, breach notifications, and potential financial penalties.

  • Hidden dwell time before discovery: Because Socelars operates quietly in the background, attackers may maintain access long enough to monetize accounts or expand compromise before defenders notice suspicious activity.

This means a single infected workstation can escalate into a multi-department business incident affecting marketing, finance, legal, and security teams simultaneously.

Victimology: Vulnerable Industries and Sectors

Socelars targets business accounts and browser sessions, not infrastructure, so risk is the highest where authenticated access maps directly to money.

Most exposed sectors include:

  • Marketing and advertising-driven companies: Heavy use of Facebook Ads Manager creates direct budget and account-takeover risk.

  • Agencies managing client ad accounts: One infected workstation can impact multiple customers at once.

  • E-commerce and consumer brands: Ad abuse can quickly translate into lost spend, fraud, and customer trust damage.

  • SMEs: More likely to fall for fake utility lures (such as PDF tools) due to lighter controls and training.

In practice, exposure depends less on industry and more on how much the organization relies on long-lived browser sessions for business-critical platforms.

How Can Businesses Proactively Protect Against Socelars

ANY.RUN’s Threat Intelligence Feeds deliver real-time, actionable indicators derived from sandbox detonations and global community submissions.

For Socelars, these feeds surface emerging distribution artifacts, related samples, and infrastructure linked to session-stealing activity, enabling automated detection and blocking across firewalls, EDR, and SIEM platforms.

This allows organizations to identify compromise before stolen sessions are abused, shorten attacker dwell time, and prevent follow-on fraud or account takeover, which is critical for threats designed to monetize access quickly rather than disrupt systems immediately.

Business Impact:

  • Reduced Mean Time to Detect (MTTD): Fresh indicators help teams identify Socelars activity within minutes, limiting the window for silent session theft.

  • Prevention of Account Abuse and Financial Loss: Blocking known artifacts and related infrastructure reduces the chance of fraudulent ad spending, unauthorized campaigns, and account resale.

  • Protection of Brand Trust and Compliance Posture: Early detection lowers the risk of customer-facing scams, data exposure, and regulatory consequences tied to compromised business accounts.

  • Stronger Security ROI Through Shared Intelligence: Leveraging threat intelligence contributed by 15,000+ organizations improves detection coverage without requiring proportional investment in new tooling or staffing.

TI Feeds: data & capabilities TI Feeds: data & capabilities

Infection Vectors and Propagation Methods

Socelars is primarily distributed through social-engineering techniques designed to appear routine and trustworthy rather than overtly malicious.

Public reporting links campaigns to fake software utilities, including installers presented as legitimate PDF readers or similar everyday tools, which encourages users to execute the malware without suspicion.

These delivery methods rely on common workplace behavior: downloading quick-fix utilities, opening attachments tied to business activity, or installing software outside approved channels.

Because the initial file often looks harmless, traditional security controls may not flag the threat before execution.

Propagation Mechanism

After execution on a victim system, Socelars focuses on local data collection and session extraction rather than noisy self-spreading behavior.

Typical post-infection activity includes:

  • Accessing browser storage and session cookies tied to business services;

  • Collecting authentication data that enables immediate account takeover or fraud;

  • Preparing stolen information for exfiltration and attacker monetization.

This approach allows attackers to move directly from a single user action to business-level impact, without requiring lateral movement or complex network propagation.

In practice, Socelars spreads less through automated worm-like behavior and more through repeatable social-engineering campaigns, making user interaction and early detection the critical defensive boundary.

How Socelars Functions

Socelars is designed to quietly extract high-value authentication data from an infected Windows system rather than cause immediate disruption. Its goal is to obtain information that allows attackers to access business-critical online services, especially advertising platforms and other authenticated web applications, without triggering obvious alerts.

Stage 1: Execution and Environment Preparation

After a victim runs the disguised installer or utility, Socelars begins operating in the background with minimal visible activity.

At this stage, the malware prepares the environment for data collection, ensuring it can access local browser storage, session artifacts, and user profile data without interrupting normal system use.

Stage 2: Session and Credential Data Collection

The core capability of Socelars is harvesting information that provides ready-to-use access rather than just raw credentials.

This includes:

  • Active browser session cookies that may allow attackers to bypass login prompts

  • Stored authentication data tied to business platforms such as advertising or e-commerce services

  • Additional local information useful for account takeover or monetization

As session data can remain valid even after passwords change, this stage enables immediate unauthorized access and rapid financial abuse.

Stage 3: Data Exfiltration and Monetization

Once sensitive data is collected, Socelars prepares it for exfiltration to attacker-controlled infrastructure.

The stolen access can then be used to:

  • Launch fraudulent advertising campaigns or drain marketing budgets

  • Resell compromised business accounts on underground markets

  • Expand compromise into related services or customer-facing assets

Unlike ransomware, which reveals itself through visible disruption, Socelars completes its objective silently, allowing attackers to profit before defenders detect the intrusion.

Sandbox Analysis of a Socelars Sample

To understand how Socelars behaves in a real environment, analysts can detonate a suspected sample inside ANY.RUN’s Interactive Sandbox, where execution unfolds safely and every action is recorded in real time.

View analysis session with Socelars

Socelars detected by ANY.RUN Sandbox Socelars stealer detected by ANY.RUN sandbox

Immediately after execution, the malware begins system reconnaissance on the infected host. It collects the computer name, extracts the Machine GUID from the registry, checks installed system languages, reads Internet Settings parameters, and inspects system certificate configuration.

System reconnaissance by Socelars stealer System reconnaissance by Socelars stealer

The next stage involves a User Account Control (UAC) bypass. Socelars launches dllhost.exe with the parameter /Processid:{CLSID}, where the CLSID corresponds to the ICMLuaUtil interface from cmlua.dll, a component that allows auto-elevated privilege execution.

Through this COM object, the malware invokes the **ShellExec method to run its payload with elevated rights.

Socelars bypassing user account control detected in ANY.RUN sandbox Socelars bypassing user account control, detected in ANY.RUN sandbox

After successful privilege escalation, the sample creates a mutex named “patatoes”, a distinctive artifact associated with this Socelars variant.

The interactive sandbox detected Socelar’s mutex The Interactive Sandbox detected Socelar’s mutex

The malware then contacts the iplogger[.]org service. In this context, the public IP-logging service acts as a proxy layer, recording the victim’s IP address, User-Agent, timestamp, and geographic location for the attacker before transparently redirecting the request further, potentially toward a command-and-control server or the next attack stage.

At this point, all analyzed samples were observed to terminate intentionally with a crash, preventing further visible execution while preserving the attacker’s collected reconnaissance and telemetry.

Intentional application crash to prevent visible execution Intentional application crash to prevent visible execution

Gathering Threat Intelligence on Socelars Stealer

ANY.RUN’s Threat Intelligence Lookup provides critical capabilities for detecting, investigating, and responding to Socelars activity across environments.

Rapid Indicator Validation and Context Enrichment

When security alerts surface potential Socelars-related artifacts, such as suspicious installers, file hashes, domains, or browser-data access behavior, SOC analysts can query TI Lookup to immediately determine whether those indicators are linked to known session-stealing campaigns.

TI Lookup enriches raw indicators with:

  • malware family classification,
  • related samples and execution history,
  • behavioral context tied to account-takeover activity

This turns isolated alerts into actionable intelligence within seconds, enabling faster containment of threats that monetize access quickly.

Direct Access to Confirmed Behavioral Analysis

TI Lookup connects indicators to interactive sandbox sessions where Socelars attack chains have already been executed and recorded.

Instead of re-analyzing suspicious files from scratch, teams can:

  • Observe how the malware accesses browser storage and session data;
  • Review outbound communication and potential exfiltration patterns;
  • Extract high-confidence indicators for environment-wide blocking.

Start exploring Socelar’s activity using a threat-name search:

threatName:"socelars".

Fresh Socelar’s sandbox analyses found via TI Lookup Fresh Socelar’s sandbox analyses found via TI Lookup

This immediate visibility shortens investigation time and accelerates response decisions.

Multi-Dimensional Event Correlation

With 40+ searchable parameters, including process activity, command lines, file paths, registry interaction, and network indicators, analysts can investigate Socelars infections from multiple angles.

For example, correlating browser-data access patterns or suspicious installer execution across submissions can reveal:

  • Repeated distribution techniques,
  • Shared infrastructure,
  • Evolving campaign behavior.

This allows defenders to move from single-incident response to campaign-level understanding.

Detection Engineering and Rule Validation

TI Lookup supports YARA-based searching and validation, allowing security teams to test custom detection logic against a large corpus of analyzed malware.

For Socelars, this helps teams:

  • Identify unique data-collection or execution traits;
  • Validate detection rules against real samples;
  • Reduce false positives before deployment in production controls.

Proactive Threat Hunting

Beyond reactive investigation, analysts can use TI Lookup to hunt for hidden Socelars activity that may have bypassed initial alerts, particularly important for malware focused on quiet session theft rather than visible disruption.

Operational Value for SOCs and MSSPs

Combining sandbox intelligence with large-scale threat correlation delivers measurable outcomes:

  • Reduced Mean Time to Respond (MTTR),
  • Lower false-positive investigation overhead,
  • Broader detection coverage across environments,
  • Improved analyst efficiency and workload balance,
  • Optimized security cost through shared intelligence.

Conclusion

Socelars is dangerous because it targets business access instead of systems, stealing sessions and account data that attackers can monetize quickly, often before teams realize anything is wrong. The fastest way to reduce impact is to confirm behavior early and widen visibility beyond a single alert with threat intelligence.

Try TI Lookup to find related Socelars activity, validate indicators in seconds, and understand campaign scope fast: just sign up to ANY.RUN.

HAVE A LOOK AT

DarkCloud screenshot
DarkCloud
darkcloud
DarkCloud is an infostealer that focuses on collecting and exfiltrating browser data from the infected device. The malware is also capable of keylogging and crypto address swapping. DarkCloud is typically delivered to victims’ computers via phishing emails.
Read More
Sliver screenshot
Sliver
sliver
Sliver is an open-source command-and-control (C2) framework that has been increasingly adopted by threat actors as an alternative to tools like Cobalt Strike. Developed by security firm Bishop Fox, Sliver was initially intended for legitimate security testing and red teaming exercises. However, its robust features and open-source nature have made it attractive to malicious actors seeking to control compromised systems.
Read More
DarkTortilla screenshot
DarkTortilla
darktortilla
DarkTortilla is a crypter used by attackers to spread harmful software. It can modify system files to stay hidden and active. DarkTortilla is a multi-stage crypter that relies on several components to operate. It is often distributed through phishing sites that look like real services.
Read More
Oyster screenshot
Oyster
oyster
Oyster (also seen in reporting as Broomstick or CleanUpLoader) is a Windows backdoor/loader actively used in multi-stage intrusion campaigns. Recent campaigns weaponize SEO-poisoning and malvertising to trick IT and dev users into downloading trojanized installers (PuTTY, WinSCP, Microsoft Teams, etc.), which then drop Oyster to establish a persistent foothold and load additional payloads (often leading to data theft or ransomware).
Read More
DEVMAN screenshot
DEVMAN
devman
DEVMAN is a fast-evolving malware family targeting Windows environments with a mix of credential theft, remote control capabilities, and persistence techniques typical of modern crimeware. Initially observed in early 2025, DEVMAN quickly became a favorite tool among cybercriminal groups thanks to its stealth, modular structure, and ability to bypass traditional AV solutions.
Read More
WannaCry screenshot
WannaCry
wannacry ransomware
WannaCry is a famous Ransomware that utilizes the EternalBlue exploit. This malware is known for infecting at least 200,000 computers worldwide and it continues to be an active and dangerous threat.
Read More