General

  • Target

    AuraCs2.exe

  • Size

    18.6MB

  • Sample

    240929-vjn51ssdlp

  • MD5

    1cbc4493d10bf50b71c5d24e53934423

  • SHA1

    092d235f58fc5027b00f016a9a7d79c7c551cbac

  • SHA256

    faa6dfa51020599a3031f21fccbf16bfb58a599f634a0bdc096fce1c8eafa701

  • SHA512

    b6df3d24e7f254d7a3a79792e527ed67ad38ac79aedca562b8a20c3109269df46509172d28db581f5dabb2282575d5c4732b949121e5c63b818814a60503e16f

  • SSDEEP

    393216:kuqPnLFXlrNQ+DOETgs77fGMFgd5MZvE7+eLnhfkq:kjPLFXNNQ/E7ZC5jtLnP

Malware Config

Targets

    • Target

      AuraCs2.exe

    • Size

      18.6MB

    • MD5

      1cbc4493d10bf50b71c5d24e53934423

    • SHA1

      092d235f58fc5027b00f016a9a7d79c7c551cbac

    • SHA256

      faa6dfa51020599a3031f21fccbf16bfb58a599f634a0bdc096fce1c8eafa701

    • SHA512

      b6df3d24e7f254d7a3a79792e527ed67ad38ac79aedca562b8a20c3109269df46509172d28db581f5dabb2282575d5c4732b949121e5c63b818814a60503e16f

    • SSDEEP

      393216:kuqPnLFXlrNQ+DOETgs77fGMFgd5MZvE7+eLnhfkq:kjPLFXNNQ/E7ZC5jtLnP

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

MITRE ATT&CK Enterprise v15

Tasks