General

  • Target

    tmp

  • Size

    6.2MB

  • Sample

    230301-md8y8sfg63

  • MD5

    9b34a1a535c29e31915e4b8993d9bb5e

  • SHA1

    3801b45b01a1ddc836a10f9a4e28bb368bc958de

  • SHA256

    51b8e08571ddd7d98f4da91561999fce1b454ea42b3b83655f207df77f02ae1d

  • SHA512

    0701c9d84a14077fa5bb2a29abef21d1c67a36bedc6e4a9d0d50b6cb336d9c56ba0c0f823ecd6f31fd28847092bf3a2318f7dc3c1505ace26383523fb598dd09

  • SSDEEP

    196608:ANOniBSEhRELqS/ohbK9iRs5Vb9sybbsx0rnsEniAd96:ANOniBSEhRELqS/ohW9iRs5Vb9sybbs9

Malware Config

Extracted

Family

aurora

C2

94.142.138.112:8081

Targets

    • Target

      tmp

    • Size

      6.2MB

    • MD5

      9b34a1a535c29e31915e4b8993d9bb5e

    • SHA1

      3801b45b01a1ddc836a10f9a4e28bb368bc958de

    • SHA256

      51b8e08571ddd7d98f4da91561999fce1b454ea42b3b83655f207df77f02ae1d

    • SHA512

      0701c9d84a14077fa5bb2a29abef21d1c67a36bedc6e4a9d0d50b6cb336d9c56ba0c0f823ecd6f31fd28847092bf3a2318f7dc3c1505ace26383523fb598dd09

    • SSDEEP

      196608:ANOniBSEhRELqS/ohbK9iRs5Vb9sybbsx0rnsEniAd96:ANOniBSEhRELqS/ohW9iRs5Vb9sybbs9

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks