General
-
Target
tmp
-
Size
6.2MB
-
Sample
230301-md8y8sfg63
-
MD5
9b34a1a535c29e31915e4b8993d9bb5e
-
SHA1
3801b45b01a1ddc836a10f9a4e28bb368bc958de
-
SHA256
51b8e08571ddd7d98f4da91561999fce1b454ea42b3b83655f207df77f02ae1d
-
SHA512
0701c9d84a14077fa5bb2a29abef21d1c67a36bedc6e4a9d0d50b6cb336d9c56ba0c0f823ecd6f31fd28847092bf3a2318f7dc3c1505ace26383523fb598dd09
-
SSDEEP
196608:ANOniBSEhRELqS/ohbK9iRs5Vb9sybbsx0rnsEniAd96:ANOniBSEhRELqS/ohW9iRs5Vb9sybbs9
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
Malware Config
Extracted
aurora
94.142.138.112:8081
Targets
-
-
Target
tmp
-
Size
6.2MB
-
MD5
9b34a1a535c29e31915e4b8993d9bb5e
-
SHA1
3801b45b01a1ddc836a10f9a4e28bb368bc958de
-
SHA256
51b8e08571ddd7d98f4da91561999fce1b454ea42b3b83655f207df77f02ae1d
-
SHA512
0701c9d84a14077fa5bb2a29abef21d1c67a36bedc6e4a9d0d50b6cb336d9c56ba0c0f823ecd6f31fd28847092bf3a2318f7dc3c1505ace26383523fb598dd09
-
SSDEEP
196608:ANOniBSEhRELqS/ohbK9iRs5Vb9sybbsx0rnsEniAd96:ANOniBSEhRELqS/ohW9iRs5Vb9sybbs9
Score10/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-