General
-
Target
AuraFn.exe
-
Size
18.6MB
-
Sample
241001-hnlt8szfnc
-
MD5
afef47d0aec02ab20f1ecb4f351b8d6a
-
SHA1
04d09f4e2b25a938a466769e6e27aec3fd03e91e
-
SHA256
2a1b4b7ae63563fae211fd7413be33880230c73034f2c3aa9fd97ef85bd0f7c9
-
SHA512
5a2ccc9be4d36eb6ef14cdea33e04ba9936e5739aad2f1b8687cd239a854c4338c1e9e61840ae446b4f09114c28d5b4b2f2dcb55990b2cd223b3b561169e09b1
-
SSDEEP
393216:4qPnLFXlrNQ+DOETgs77fGMIgTEkvEXcaeWsKq:pPLFXNNQ/E7MUGveT
Behavioral task
behavioral1
Sample
AuraFn.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AuraFn.exe
Resource
win10v2004-20240802-en
Malware Config
Targets
-
-
Target
AuraFn.exe
-
Size
18.6MB
-
MD5
afef47d0aec02ab20f1ecb4f351b8d6a
-
SHA1
04d09f4e2b25a938a466769e6e27aec3fd03e91e
-
SHA256
2a1b4b7ae63563fae211fd7413be33880230c73034f2c3aa9fd97ef85bd0f7c9
-
SHA512
5a2ccc9be4d36eb6ef14cdea33e04ba9936e5739aad2f1b8687cd239a854c4338c1e9e61840ae446b4f09114c28d5b4b2f2dcb55990b2cd223b3b561169e09b1
-
SSDEEP
393216:4qPnLFXlrNQ+DOETgs77fGMIgTEkvEXcaeWsKq:pPLFXNNQ/E7MUGveT
-
Loads dropped DLL
-
Adds Run key to start application
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Netsh Helper DLL
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1