General

  • Target

    AORadar.exe

  • Size

    81.0MB

  • Sample

    240608-v7hcdadh41

  • MD5

    f2f24a4d0270141b950e8c07f8c65b89

  • SHA1

    737f4525905a51d99f620978009c258830e6d351

  • SHA256

    cbe0b8ea135fc22db3de764888d49c3bbe5a03b853dad681abe855e0011db5e3

  • SHA512

    f0b945b3c1690f636ca5fc2ea17a01ae7a03139feab3bdd47ad1c55a1b802a485321b26be68ec41486c7382aa5a9452eacdb7e47d1d9496f5be21e296ec76743

  • SSDEEP

    1572864:G4gPXModwyVLeIGMv6HspkmjgW5VbpdcDjp3V2s0Q4EN65Xs4Tn9y7:G4AcYVKuv6HspkmjgW5VbALaZsmE7

Malware Config

Targets

    • Target

      AORadar.exe

    • Size

      81.0MB

    • MD5

      f2f24a4d0270141b950e8c07f8c65b89

    • SHA1

      737f4525905a51d99f620978009c258830e6d351

    • SHA256

      cbe0b8ea135fc22db3de764888d49c3bbe5a03b853dad681abe855e0011db5e3

    • SHA512

      f0b945b3c1690f636ca5fc2ea17a01ae7a03139feab3bdd47ad1c55a1b802a485321b26be68ec41486c7382aa5a9452eacdb7e47d1d9496f5be21e296ec76743

    • SSDEEP

      1572864:G4gPXModwyVLeIGMv6HspkmjgW5VbpdcDjp3V2s0Q4EN65Xs4Tn9y7:G4AcYVKuv6HspkmjgW5VbALaZsmE7

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks