Resubmissions

25-02-2024 16:44

240225-t8sztsgb52 10

General

  • Target

    Aurora X [by GodsExploits].zip

  • Size

    8.4MB

  • Sample

    240225-t8sztsgb52

  • MD5

    da2ab4a0dc2e9ee5fa66c61cfe7247b8

  • SHA1

    aca1c1e7f7bd927107364f0ac7403bbfae79cc17

  • SHA256

    90f000c4b42f98f45fb2f4b7a3e180a26d354abcd30fa48717930bf044af8e58

  • SHA512

    cf31234eee0fc0f0eeba40c6e97b41fd064a3e986aa408e52a147fcfb34f3caf8c78ba189c2a6eacbf75e42a5aac00c9db8700ee0c8d4c2d9e88c268767e215c

  • SSDEEP

    196608:R4r8un8Pomzo7p+GmcSLkyARVaj0nhMz+WtA7GJOhRWCE9B+ft76Q6ou6:3j3mTm1IyARhG+OJxCgBg2Q6o7

Malware Config

Targets

    • Target

      Aurora/Aurora.exe

    • Size

      1.1MB

    • MD5

      38d563d90178c931132a5bd2dc05b76f

    • SHA1

      4511b5462cddaf7835d20375f8e13087aedd3e5d

    • SHA256

      a4cf6887caa6ca97d42659f9ab424c60cdfb41798f10bb429cb94379cd29ec83

    • SHA512

      19810c3642d9d909a3632456c24837d021ffce267243e2d183f3c1ae3e8edd937df3e50ee26f3beae53a65a291283de801ee5581d7ac4582669879d8e97d9cfe

    • SSDEEP

      24576:OlEXbCnFzRa860/IN7yUZoY/A6m9xzyysV2:5G9c3N7yUZoY/ALxz3sY

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Target

      Aurora/scripts/scripts.dll

    • Size

      18.7MB

    • MD5

      88fd7dbf04bcf75123d02009aea3f7f7

    • SHA1

      cecf16bdad71e54afc941179ea2b7438a04efa1d

    • SHA256

      01481b9a862936fbc090bda4033f22d7ffa5a7bfe5dc32f47c7794332b34eec4

    • SHA512

      2c6298b5adf91b51f0042d48e0846f5b196d52a588fd4fc577bf19ec26ad8e547382279a15f8bf131b08b0d7c140534aff25f82d5e8998818b812e72c9493917

    • SSDEEP

      393216:hqA/D2IIyzg8DolBo6i0KoI6Di42sC1/syU3DXNs6hq8:hqcaZyV0fC1JOpjhq8

    Score
    1/10

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Credential Access

Unsecured Credentials

2
T1552

Credentials In Files

2
T1552.001

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Process Discovery

1
T1057

Remote System Discovery

1
T1018

Collection

Data from Local System

2
T1005

Tasks