General

  • Target

    AuxinBeta.exe

  • Size

    63.2MB

  • Sample

    240323-bk433sea9s

  • MD5

    988dc288bfdaf84d7db6248e5f4c27ec

  • SHA1

    bd4b45a720b3ad1f511dd06e651befcb985775a6

  • SHA256

    7ed64090902509968bfab422c46bbe741c5f6354137a465bfc984e66e8b2ea98

  • SHA512

    e3cc661ec4a267183c062418b6043e2be8f56e649e3e1c36fc6e252c84d63e3f1280d93ea7e2c4a2836a67e6b608265183c8681ec848855d79c0a74fdb9cc363

  • SSDEEP

    1572864:FtD86+DMVzs/DjCdzilcy3vaCZkxU/XuQqDFcGitncH0kQFPKJQl8:o9//vlru7PFjiaHp4bl8

Malware Config

Targets

    • Target

      AuxinBeta.exe

    • Size

      63.2MB

    • MD5

      988dc288bfdaf84d7db6248e5f4c27ec

    • SHA1

      bd4b45a720b3ad1f511dd06e651befcb985775a6

    • SHA256

      7ed64090902509968bfab422c46bbe741c5f6354137a465bfc984e66e8b2ea98

    • SHA512

      e3cc661ec4a267183c062418b6043e2be8f56e649e3e1c36fc6e252c84d63e3f1280d93ea7e2c4a2836a67e6b608265183c8681ec848855d79c0a74fdb9cc363

    • SSDEEP

      1572864:FtD86+DMVzs/DjCdzilcy3vaCZkxU/XuQqDFcGitncH0kQFPKJQl8:o9//vlru7PFjiaHp4bl8

    • Epsilon Stealer

      Information stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks