General

  • Target

    AuroraExternal.exe

  • Size

    6.8MB

  • Sample

    240620-v46wkayhrg

  • MD5

    94c0f15d3cdaebce09aa1fe1d978e314

  • SHA1

    a98d95647f92b77358b971dec270585102c8788a

  • SHA256

    1d66db8c7e0d6935038f69961a2e75781585a1c20f5cc27c58679c62b0912eeb

  • SHA512

    c722af300f4cace33b85da4e209f9d02deaa341223c564b8d7391cee0f57a76a3df879fddf9581c500f60347bbcf941326ab0566b7f981537e79e60639dedeb1

  • SSDEEP

    196608:ViFCYMeN/FJMIDJf0gsAGKRX/O2/RWuAKs3PUo:Hg/Fqyf0gsENZRAK6

Malware Config

Targets

    • Target

      AuroraExternal.exe

    • Size

      6.8MB

    • MD5

      94c0f15d3cdaebce09aa1fe1d978e314

    • SHA1

      a98d95647f92b77358b971dec270585102c8788a

    • SHA256

      1d66db8c7e0d6935038f69961a2e75781585a1c20f5cc27c58679c62b0912eeb

    • SHA512

      c722af300f4cace33b85da4e209f9d02deaa341223c564b8d7391cee0f57a76a3df879fddf9581c500f60347bbcf941326ab0566b7f981537e79e60639dedeb1

    • SSDEEP

      196608:ViFCYMeN/FJMIDJf0gsAGKRX/O2/RWuAKs3PUo:Hg/Fqyf0gsENZRAK6

    • Command and Scripting Interpreter: PowerShell

      Using powershell.exe command.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

MITRE ATT&CK Enterprise v15

Tasks