General
-
Target
Aurora X [by GodsExploits].zip
-
Size
8.4MB
-
Sample
240225-xy148sac62
-
MD5
da2ab4a0dc2e9ee5fa66c61cfe7247b8
-
SHA1
aca1c1e7f7bd927107364f0ac7403bbfae79cc17
-
SHA256
90f000c4b42f98f45fb2f4b7a3e180a26d354abcd30fa48717930bf044af8e58
-
SHA512
cf31234eee0fc0f0eeba40c6e97b41fd064a3e986aa408e52a147fcfb34f3caf8c78ba189c2a6eacbf75e42a5aac00c9db8700ee0c8d4c2d9e88c268767e215c
-
SSDEEP
196608:R4r8un8Pomzo7p+GmcSLkyARVaj0nhMz+WtA7GJOhRWCE9B+ft76Q6ou6:3j3mTm1IyARhG+OJxCgBg2Q6o7
Behavioral task
behavioral1
Sample
Aurora V3.1.rar
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Aurora V3.1.rar
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Aurora/Aurora.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Aurora/Aurora.exe
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Aurora/scripts/scripts.dll
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
Aurora/scripts/scripts.dll
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
README.txt
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
README.txt
Resource
win10v2004-20240221-en
Malware Config
Targets
-
-
Target
Aurora V3.1.rar
-
Size
8.4MB
-
MD5
78c008deb73339bf6b6511dd4fbf887f
-
SHA1
1e51b31755a5eac9fd144b346ee2cc54873e4f71
-
SHA256
fd92e0029c3d4430b2d734f374d823c588bd1f3633e931944d3450d5263663dd
-
SHA512
1b322afb56ab9d55d4757d427bbcc40e4b50158263fd08585fd57a7c2d4d0575269e546f32414fd3525c251140e94625b3146f3392f24f676fb0405b6a754029
-
SSDEEP
196608:/4r8un8Pomzo7p+GmcSLkyARVaj0nhMz+WtA7GJOhRWCE9B+ft76Q6ouP:Rj3mTm1IyARhG+OJxCgBg2Q6oU
Score7/10-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
Aurora/Aurora.exe
-
Size
1.1MB
-
MD5
38d563d90178c931132a5bd2dc05b76f
-
SHA1
4511b5462cddaf7835d20375f8e13087aedd3e5d
-
SHA256
a4cf6887caa6ca97d42659f9ab424c60cdfb41798f10bb429cb94379cd29ec83
-
SHA512
19810c3642d9d909a3632456c24837d021ffce267243e2d183f3c1ae3e8edd937df3e50ee26f3beae53a65a291283de801ee5581d7ac4582669879d8e97d9cfe
-
SSDEEP
24576:OlEXbCnFzRa860/IN7yUZoY/A6m9xzyysV2:5G9c3N7yUZoY/ALxz3sY
-
Suspicious use of NtCreateUserProcessOtherParentProcess
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Drops startup file
-
Executes dropped EXE
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
-
-
Target
Aurora/scripts/scripts.dll
-
Size
18.7MB
-
MD5
88fd7dbf04bcf75123d02009aea3f7f7
-
SHA1
cecf16bdad71e54afc941179ea2b7438a04efa1d
-
SHA256
01481b9a862936fbc090bda4033f22d7ffa5a7bfe5dc32f47c7794332b34eec4
-
SHA512
2c6298b5adf91b51f0042d48e0846f5b196d52a588fd4fc577bf19ec26ad8e547382279a15f8bf131b08b0d7c140534aff25f82d5e8998818b812e72c9493917
-
SSDEEP
393216:hqA/D2IIyzg8DolBo6i0KoI6Di42sC1/syU3DXNs6hq8:hqcaZyV0fC1JOpjhq8
Score1/10 -
-
-
Target
README.txt
-
Size
26B
-
MD5
7ff5e4de2e2d15161cb97dcb8d764928
-
SHA1
40cfe038183f43ac5822957e606b40e845448cf3
-
SHA256
95f75442d82a6b66a53835acffdc3278eb2fc9c56fe13dfce3cb190f9154aa3d
-
SHA512
2808c1285562936f68174fe523b31b27a6b7a61df1e61fd5b9de57b5eeaa6aadddfdd062c31fada438436336aeaa0e90cdece4f42827d60dcb272c90988a2fbe
Score1/10 -