Resubmissions

21-02-2025 21:12

250221-z2l6lazpav 10

21-02-2025 19:57

250221-yphrzayrbk 10

21-02-2025 19:34

250221-yag7wsyncm 7

21-02-2025 18:54

250221-xkezvaxmbw 10

21-02-2025 18:38

250221-xaa8xaxphn 10

21-02-2025 16:33

250221-t2tmsawjer 10

21-02-2025 16:20

250221-ttcdjavmfz 10

General

  • Target

    test.txt

  • Size

    18B

  • Sample

    250221-xaa8xaxphn

  • MD5

    5b3f97d48c8751bd031b7ea53545bdb6

  • SHA1

    88be3374c62f23406ec83bb11279f8423bd3f88d

  • SHA256

    d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

  • SHA512

    ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

Malware Config

Extracted

Language
ps1
Source
URLs
ps1.dropper

https://rentry.org/xau9i/raw

Targets

    • Target

      test.txt

    • Size

      18B

    • MD5

      5b3f97d48c8751bd031b7ea53545bdb6

    • SHA1

      88be3374c62f23406ec83bb11279f8423bd3f88d

    • SHA256

      d8fce9dd9c65ca143343f7711859a7cffc3c5e656a8b84108183fb769a12ed8b

    • SHA512

      ed2de1eec50310ced4bde8ef6ae4b7902920b007df7b6aeb200cfe9fcc0d36ef05af7526c4675be2feac52831668798d5fe3523175efad6f6549b30f30a0b5d6

    • Aurora

      Aurora is a crypto wallet stealer written in Golang.

    • Aurora family

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Drops startup file

    • Executes dropped EXE

    • Loads dropped DLL

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Obfuscated Files or Information: Command Obfuscation

      Adversaries may obfuscate content during command execution to impede detection.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks