General

  • Target

    AURORA_STEALER.zip.exe

  • Size

    1.6MB

  • Sample

    230413-zph86sfe8x

  • MD5

    a7a5c04005c17d1fa983f835cffbd183

  • SHA1

    c79fb9d8fdbead904459bd9d1ffadf6ce43c9374

  • SHA256

    3494f9352c5bd48f55caddbbb63515f8058763e28f8e5f8fa5411a5de835ca8e

  • SHA512

    9a7aa97489f376c2cb4864c2d4f6a41978a25a5f0171c30077ceb4302fd58e5823f199f0dcf89f57ec48d31ebfbb01a8d258a1e7d0b391b7ac613bba6f2a1cee

  • SSDEEP

    24576:84nXubIQGyxbPV0db26FYiC9ubtQo+8YzqNAh3XBQ0FPcQsY8Nl85Xab6s5va:8qe3f6KiC9ut9+QAPcTYy2Wi

Score
7/10

Malware Config

Targets

    • Target

      AURORA_STEALER.zip.exe

    • Size

      1.6MB

    • MD5

      a7a5c04005c17d1fa983f835cffbd183

    • SHA1

      c79fb9d8fdbead904459bd9d1ffadf6ce43c9374

    • SHA256

      3494f9352c5bd48f55caddbbb63515f8058763e28f8e5f8fa5411a5de835ca8e

    • SHA512

      9a7aa97489f376c2cb4864c2d4f6a41978a25a5f0171c30077ceb4302fd58e5823f199f0dcf89f57ec48d31ebfbb01a8d258a1e7d0b391b7ac613bba6f2a1cee

    • SSDEEP

      24576:84nXubIQGyxbPV0db26FYiC9ubtQo+8YzqNAh3XBQ0FPcQsY8Nl85Xab6s5va:8qe3f6KiC9ut9+QAPcTYy2Wi

    Score
    7/10
    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Drops Chrome extension

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v6

Tasks