General

  • Target

    C4Client.rar

  • Size

    135KB

  • Sample

    230329-f3qevsge3w

  • MD5

    c11f9838306918f05712098355d046ec

  • SHA1

    4559df5c0087c506f41e090a9f6a8513be5fbd4c

  • SHA256

    57c6178936a9099249ebaf6d831a2d2e2b767c085850dba55f76689c2ef9490a

  • SHA512

    54c92a915fee855707d94b8a01a926b1cadc9b1fb059ae50f96d7752a247cf6c7f72c58693a2806dbfa3f02aeb6983bd722db16d8c2e81bda49da85c4392fb7f

  • SSDEEP

    3072:MSPR37h9APlpOZcpCw110ew0CpJwpjBAxc1Tn8SX1lFmPtEDuGdirunTZ/ur:M4R3n6pGcpCw1LH5AxG17qyuGdhJur

Malware Config

Extracted

Family

aurora

C2

107.182.129.73:8081

Targets

    • Target

      C4Client.exe

    • Size

      687.6MB

    • MD5

      6dc896f98f315d59f7ff0a23ec918e68

    • SHA1

      e52e78a5f7eb29cd4eca84e47943fce5028961dd

    • SHA256

      0ce0f0ddf91c200d8a9c91c3c47f807ecc26de890de8e4dc83ec4f5a08404a06

    • SHA512

      2ac4b6f3f9014f33bc6e1a0d8fc741fbba2e6918d35bdf572bf19a4ff3ee576671796a0f52398afd620c67963fe4b6700fe8faae19f47c8517b3658263a30dff

    • SSDEEP

      3072:0nTjRD5V730BSng7tJr8Khw6pItWgAEqjAxou3e7BNIdOAg0FujDvktlL0BjMwmk:G1V7h2r/hwNWgAEqjAKmkAOECjMwm

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Modifies security service

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops file in Drivers directory

    • Stops running service(s)

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks