General

  • Target

    AORadar (1).exe

  • Size

    70.8MB

  • Sample

    231116-a5ztesfh8w

  • MD5

    92ef5a05d82934f4efca8e53aeefe79e

  • SHA1

    8675e39b94a98f8b1ecd230656a85b0fd93cca80

  • SHA256

    8a2b50b93c69f21f82c26f74e18ecfb8f6322f2abcaab18d119a794b5f618c74

  • SHA512

    f7cc5797ebdbbd106bcfee81280eb184fd2c91c4dece3dd6386db208c636ab05f735efcdfa2c310ab6d6623cac88f3d8fbaa6f4ccc399ef65561e8d1b7f8fb2d

  • SSDEEP

    1572864:O4/4rzOchPqGatzHV1rQzqNEW/BNhJ4QVkh8w61pdvQNkNrJbm7:FkqcdYtBdw6n/kGwazzVm7

Malware Config

Targets

    • Target

      AORadar (1).exe

    • Size

      70.8MB

    • MD5

      92ef5a05d82934f4efca8e53aeefe79e

    • SHA1

      8675e39b94a98f8b1ecd230656a85b0fd93cca80

    • SHA256

      8a2b50b93c69f21f82c26f74e18ecfb8f6322f2abcaab18d119a794b5f618c74

    • SHA512

      f7cc5797ebdbbd106bcfee81280eb184fd2c91c4dece3dd6386db208c636ab05f735efcdfa2c310ab6d6623cac88f3d8fbaa6f4ccc399ef65561e8d1b7f8fb2d

    • SSDEEP

      1572864:O4/4rzOchPqGatzHV1rQzqNEW/BNhJ4QVkh8w61pdvQNkNrJbm7:FkqcdYtBdw6n/kGwazzVm7

    • Blocklisted process makes network request

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks