General
-
Target
AuroraExternal.exe
-
Size
6.8MB
-
Sample
240620-v46wkayhrg
-
MD5
94c0f15d3cdaebce09aa1fe1d978e314
-
SHA1
a98d95647f92b77358b971dec270585102c8788a
-
SHA256
1d66db8c7e0d6935038f69961a2e75781585a1c20f5cc27c58679c62b0912eeb
-
SHA512
c722af300f4cace33b85da4e209f9d02deaa341223c564b8d7391cee0f57a76a3df879fddf9581c500f60347bbcf941326ab0566b7f981537e79e60639dedeb1
-
SSDEEP
196608:ViFCYMeN/FJMIDJf0gsAGKRX/O2/RWuAKs3PUo:Hg/Fqyf0gsENZRAK6
Behavioral task
behavioral1
Sample
AuroraExternal.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
AuroraExternal.exe
Resource
win10v2004-20240508-en
Malware Config
Targets
-
-
Target
AuroraExternal.exe
-
Size
6.8MB
-
MD5
94c0f15d3cdaebce09aa1fe1d978e314
-
SHA1
a98d95647f92b77358b971dec270585102c8788a
-
SHA256
1d66db8c7e0d6935038f69961a2e75781585a1c20f5cc27c58679c62b0912eeb
-
SHA512
c722af300f4cace33b85da4e209f9d02deaa341223c564b8d7391cee0f57a76a3df879fddf9581c500f60347bbcf941326ab0566b7f981537e79e60639dedeb1
-
SSDEEP
196608:ViFCYMeN/FJMIDJf0gsAGKRX/O2/RWuAKs3PUo:Hg/Fqyf0gsENZRAK6
-
Loads dropped DLL
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-