MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 6ffd4fb10bc191d0a3b5b47bec951397628f2dad1f5defce506c753c90c0f296. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



AurotunStealer


Vendor detections: 14


Intelligence 14 IOCs 1 YARA 25 File information Comments

SHA256 hash: 6ffd4fb10bc191d0a3b5b47bec951397628f2dad1f5defce506c753c90c0f296
SHA3-384 hash: 73bf4d7cc8e4846aa9348fbbc15f296ec764f33e7a213869f79b65cb7535aedbb758c89019dacf79b343c5657c719571
SHA1 hash: 8eaf0dc3fc7d7a2e9c0a8c6d4461b7ea2eceb2bc
MD5 hash: 0f15fc44ca5bd21dc575d5149b6e6400
humanhash: uniform-ceiling-autumn-failed
File name:0F15FC44CA5BD21DC575D5149B6E6400.exe
Download: download sample
Signature AurotunStealer
File size:15'850'879 bytes
First seen:2025-07-07 16:01:19 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash efd455830ba918de67076b7c65d86586 (54 x Gh0stRAT, 19 x ValleyRAT, 6 x OffLoader)
ssdeep 393216:sYCbelFngWfF1j+DCsJBf1oRvwU9AmEeo:RFnDSCiiRvwU9Amno
TLSH T17FF62313B6CBA13FF0AA4A358977D265453B6E12A5168C67A3E43C2CCF360D42D3F646
TrID 62.3% (.EXE) Inno Setup installer (107240/4/30)
24.1% (.EXE) Win32 EXE PECompact compressed (generic) (41569/9/9)
6.1% (.EXE) Win64 Executable (generic) (10522/11/4)
2.6% (.EXE) Win32 Executable (generic) (4504/4/1)
1.2% (.EXE) Win16/32 Executable Delphi generic (2072/23)
Magika pebin
dhash icon 12265830e4c81020 (1 x AurotunStealer)
Reporter abuse_ch
Tags:AurotunStealer exe


Avatar
abuse_ch
AurotunStealer C2:
80.64.19.69:35672

Indicators Of Compromise (IOCs)


Below is a list of indicators of compromise (IOCs) associated with this malware samples.

IOCThreatFox Reference
80.64.19.69:35672 https://threatfox.abuse.ch/ioc/1554251/

Intelligence


File Origin
# of uploads :
1
# of downloads :
16
Origin country :
NL NL
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
0F15FC44CA5BD21DC575D5149B6E6400.exe
Verdict:
Malicious activity
Analysis date:
2025-07-07 16:05:26 UTC
Tags:
auto generic aurotun stealer

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Verdict:
Malicious
Score:
99.9%
Tags:
shellcode dropper virus
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the %temp% subdirectories
Creating a window
Creating a process from a recently created file
Сreating synchronization primitives
Searching for synchronization primitives
Creating a file
Running batch commands
Launching a service
Searching for the window
Sending a custom TCP request
Connection attempt
Using the Windows Management Instrumentation requests
DNS request
Sending an HTTP GET request
Reading critical registry keys
Unauthorized injection to a recently created process by context flags manipulation
Setting a global event handler for the keyboard
Stealing user critical data
Enabling autorun by creating a file
Verdict:
Suspicious
Threat level:
  5/10
Confidence:
100%
Tags:
adaptive-context alien anti-debug embarcadero_delphi expand fingerprint installer lolbin overlay overlay packed packed zero
Result
Threat name:
Aurotun Stealer, HijackLoader
Detection:
malicious
Classification:
troj.spyw.evad
Score:
100 / 100
Signature
Connects to many ports of the same IP (likely port scanning)
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Found malware configuration
Found many strings related to Crypto-Wallets (likely being stolen)
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes / dynamic malware analysis system (Installed program check)
Tries to harvest and steal Bitcoin Wallet information
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Yara detected Aurotun Stealer
Yara detected HijackLoader
Behaviour
Behavior Graph:
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1730236 Sample: jn5j6BfvUu.exe Startdate: 07/07/2025 Architecture: WINDOWS Score: 100 72 api.ipify.org 2->72 88 Suricata IDS alerts for network traffic 2->88 90 Found malware configuration 2->90 92 Multi AV Scanner detection for dropped file 2->92 94 5 other signatures 2->94 11 jn5j6BfvUu.exe 2 2->11         started        14 Son_Communicator39.exe 5 2->14         started        signatures3 process4 file5 68 C:\Users\user\AppData\...\jn5j6BfvUu.tmp, PE32 11->68 dropped 17 jn5j6BfvUu.tmp 3 12 11->17         started        70 C:\Users\user\AppData\Local\...\F085A1C.tmp, PE32+ 14->70 dropped 108 Modifies the context of a thread in another process (thread injection) 14->108 110 Maps a DLL or memory area into another process 14->110 20 cmd.exe 2 14->20         started        22 XPFix.exe 14->22         started        24 ZoneGe.exe 14->24         started        signatures6 process7 file8 52 C:\Users\user\AppData\Local\...\mfc140u.dll, PE32 17->52 dropped 54 C:\Users\user\AppData\...\libssl-1_1.dll, PE32 17->54 dropped 56 C:\Users\user\AppData\...\libcrypto-1_1.dll, PE32 17->56 dropped 58 5 other malicious files 17->58 dropped 26 Son_Communicator39.exe 10 17->26         started        30 conhost.exe 20->30         started        process9 file10 60 C:\ProgramData\...\Son_Communicator39.exe, PE32 26->60 dropped 62 C:\ProgramData\authDemo\mfc140u.dll, PE32 26->62 dropped 64 C:\ProgramData\authDemo\libssl-1_1.dll, PE32 26->64 dropped 66 4 other files (none is malicious) 26->66 dropped 106 Switches to a custom stack to bypass stack traces 26->106 32 Son_Communicator39.exe 9 26->32         started        signatures11 process12 file13 46 C:\Users\user\AppData\Local\Temp\ZoneGe.exe, PE32+ 32->46 dropped 48 C:\Users\user\AppData\Local\...\D9CC510.tmp, PE32+ 32->48 dropped 50 C:\ProgramData\authDemo\XPFix.exe, PE32 32->50 dropped 80 Modifies the context of a thread in another process (thread injection) 32->80 82 Found hidden mapped module (file has been removed from disk) 32->82 84 Maps a DLL or memory area into another process 32->84 86 2 other signatures 32->86 36 ZoneGe.exe 32->36         started        40 XPFix.exe 32->40         started        42 cmd.exe 2 32->42         started        signatures14 process15 dnsIp16 74 80.64.19.69, 35672, 49721 RU-TAGNET-ASRU Russian Federation 36->74 76 api.ipify.org 172.67.74.152, 443, 49724, 49727 CLOUDFLARENETUS United States 36->76 78 127.0.0.1 unknown unknown 36->78 96 Found many strings related to Crypto-Wallets (likely being stolen) 36->96 98 Tries to harvest and steal browser information (history, passwords, etc) 36->98 100 Tries to steal Crypto Currency Wallets 36->100 104 3 other signatures 36->104 102 Switches to a custom stack to bypass stack traces 40->102 44 conhost.exe 42->44         started        signatures17 process18
Verdict:
inconclusive
YARA:
4 match(es)
Tags:
Executable PE (Portable Executable) Win 32 Exe x86
Threat name:
Win32.Malware.Heuristic
Status:
Malicious
First seen:
2025-07-05 03:03:26 UTC
File Type:
PE (Exe)
AV detection:
13 of 24 (54.17%)
Threat level:
  2/5
Result
Malware family:
hijackloader
Score:
  10/10
Tags:
family:aurotun family:hijackloader discovery loader stealer
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
System Location Discovery: System Language Discovery
Suspicious use of SetThreadContext
Looks up external IP address via web service
Checks computer location settings
Executes dropped EXE
Loads dropped DLL
Aurotun
Aurotun family
Detects Aurotun stealer
Detects HijackLoader (aka IDAT Loader)
HijackLoader
Hijackloader family
Unpacked files
SH256 hash:
6ffd4fb10bc191d0a3b5b47bec951397628f2dad1f5defce506c753c90c0f296
MD5 hash:
0f15fc44ca5bd21dc575d5149b6e6400
SHA1 hash:
8eaf0dc3fc7d7a2e9c0a8c6d4461b7ea2eceb2bc
SH256 hash:
98d67659eebfce1d436e53f87abbe576d0f8a67b81c19cc369d4505110c32757
MD5 hash:
4ae017f4cffe7f5c91e5154ccb19c63b
SHA1 hash:
c70d4c5e157ab1c64e5e8a6a181525b2d186e68e
SH256 hash:
f9dda0d360bd0eadffdefb7120510f6eb646ef8884ef3425b6feb9ee6b05faa0
MD5 hash:
d9c4b47567a019f8f582aa66759b6bf8
SHA1 hash:
42f9f2f67afb208ee992f39b20401876ce1da992
SH256 hash:
05112096ec290b5a27164a55fd9f9b170960f2b023c481185888941be7e84634
MD5 hash:
45e20c37ce37f06059f8cd6d438030ff
SHA1 hash:
60e5a02ea2c8a7f996947be224a8e208c206acb4
SH256 hash:
c605330557af9b6ef6594890d290e37712f372e29f37ebb0d41a64362158e7e4
MD5 hash:
fe4ecb39ed4e87903f2c43dba3194b27
SHA1 hash:
6612f0236ec60192f4037bf53190e99341765381
SH256 hash:
9ce3f8bb22e7e26220a8fb1713db7f0f84d938f5c86017cc31e6d8cdd5f865e9
MD5 hash:
f29070e143174a88a783e1bee9863bbb
SHA1 hash:
6c0ee2442148a7f547b46b3a12dd07ece560f3f8
SH256 hash:
09220eb0bc0ecc30f3cb803ff8166a87676b4c21f8b6d82bdb5eced91f1a2a0e
MD5 hash:
008a0f2b2207049beb684709452143f0
SHA1 hash:
9184dc28a0ab369b3cb6f78ac5c97732610ee872
SH256 hash:
5bb572b8d4111249eaf5352f185f8a24470dadb4cdfcf694c9b865d996ebbb28
MD5 hash:
e9e61e14450bd2424690a1ba1b627464
SHA1 hash:
a89a506161d7dc833b07ae14ea2e1fd0d7c78e25
SH256 hash:
b5ce3e6951e142e50162fbcdb67d1874ff8299890234e6a75e03f5af87c4ac66
MD5 hash:
33eae9060ab90fe83fca24d26e717d80
SHA1 hash:
bf22848102ad7b7500e5cefa090a4df60362a59d
SH256 hash:
a6edb3fb6d21dd461da3767a7995034e208f7d6b08997f6cf7ee7b0ea833a8f0
MD5 hash:
cabb58bb5694f8b8269a73172c85b717
SHA1 hash:
9ed583c56385fed8e5e0757ddb2fdf025f96c807
SH256 hash:
68bee500e0080f21c003126e73b6d07804d23ac98b2376a8b76c26297d467abe
MD5 hash:
d4dae7149d6e4dab65ac554e55868e3b
SHA1 hash:
b3bea0a0a1f0a6f251bcf6a730a97acc933f269a
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:BLOWFISH_Constants
Author:phoul (@phoul)
Description:Look for Blowfish constants
Rule name:Borland
Author:malware-lu
Rule name:botnet_plaintext_c2
Author:cip
Description:Attempts to match at least some of the strings used in some botnet variants which use plaintext communication protocols.
Rule name:Check_OutputDebugStringA_iat
Rule name:DebuggerCheck__API
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DebuggerException__SetConsoleCtrl
Reference:https://github.com/naxonez/yaraRules/blob/master/AntiDebugging.yara
Rule name:DetectEncryptedVariants
Author:Zinyth
Description:Detects 'encrypted' in ASCII, Unicode, base64, or hex-encoded
Rule name:FreddyBearDropper
Author:Dwarozh Hoshiar
Description:Freddy Bear Dropper is dropping a malware through base63 encoded powershell scrip.
Rule name:golang_bin_JCorn_CSC846
Author:Justin Cornwell
Description:CSC-846 Golang detection ruleset
Rule name:ICMLuaUtil_UACMe_M41
Author:Marius 'f0wL' Genheimer <hello@dissectingmalwa.re>
Description:A Yara rule for UACMe Method 41 -> ICMLuaUtil Elevated COM interface
Reference:https://github.com/hfiref0x/UACME
Rule name:malware_shellcode_hash
Author:JPCERT/CC Incident Response Group
Description:detect shellcode api hash value
Rule name:MD5_Constants
Author:phoul (@phoul)
Description:Look for MD5 constants
Rule name:Mimikatz_Generic
Author:Still
Description:attempts to match all variants of Mimikatz
Rule name:pe_detect_tls_callbacks
Rule name:RANSOMWARE
Author:ToroGuitar
Rule name:RIPEMD160_Constants
Author:phoul (@phoul)
Description:Look for RIPEMD-160 constants
Rule name:SHA1_Constants
Author:phoul (@phoul)
Description:Look for SHA1 constants
Rule name:SHA512_Constants
Author:phoul (@phoul)
Description:Look for SHA384/SHA512 constants
Rule name:shellcode
Author:nex
Description:Matched shellcode byte patterns
Rule name:skip20_sqllang_hook
Author:Mathieu Tartare <mathieu.tartare@eset.com>
Description:YARA rule to detect if a sqllang.dll version is targeted by skip-2.0. Each byte pattern corresponds to a function hooked by skip-2.0. If $1_0 or $1_1 match, it is probably targeted as it corresponds to the hook responsible for bypassing the authentication.
Reference:https://www.welivesecurity.com/
Rule name:Sus_Obf_Enc_Spoof_Hide_PE
Author:XiAnzheng
Description:Check for Overlay, Obfuscating, Encrypting, Spoofing, Hiding, or Entropy Technique(can create FP)
Rule name:upxHook
Author:@r3dbU7z
Description:Detect artifacts from 'upxHook' - modification of UPX packer
Reference:https://bazaar.abuse.ch/sample/6352be8aa5d8063673aa428c3807228c40505004320232a23d99ebd9ef48478a/
Rule name:WHIRLPOOL_Constants
Author:phoul (@phoul)
Description:Look for WhirlPool constants
Rule name:Windows_Trojan_GhostPulse_caea316b
Author:Elastic Security

File information


The table below shows additional information about this malware sample such as delivery method and external references.

BLint


The following table provides more information about this file using BLint. BLint is a Binary Linter to check the security properties, and capabilities in executables.

Findings
IDTitleSeverity
CHECK_AUTHENTICODEMissing Authenticodehigh
CHECK_DLL_CHARACTERISTICSMissing dll Security Characteristics (HIGH_ENTROPY_VA)high
Reviews
IDCapabilitiesEvidence
AUTH_APIManipulates User Authorizationadvapi32.dll::AllocateAndInitializeSid
advapi32.dll::ConvertSidToStringSidW
advapi32.dll::ConvertStringSecurityDescriptorToSecurityDescriptorW
advapi32.dll::EqualSid
advapi32.dll::FreeSid
SECURITY_BASE_APIUses Security Base APIadvapi32.dll::AdjustTokenPrivileges
advapi32.dll::GetTokenInformation
WIN32_PROCESS_APICan Create Process and Threadskernel32.dll::CreateProcessW
advapi32.dll::OpenProcessToken
advapi32.dll::OpenThreadToken
kernel32.dll::CloseHandle
kernel32.dll::CreateThread
WIN_BASE_APIUses Win Base APIkernel32.dll::LoadLibraryA
kernel32.dll::LoadLibraryExW
kernel32.dll::LoadLibraryW
kernel32.dll::GetDriveTypeW
kernel32.dll::GetVolumeInformationW
kernel32.dll::GetSystemInfo
WIN_BASE_IO_APICan Create Fileskernel32.dll::CreateDirectoryW
kernel32.dll::CreateFileW
kernel32.dll::DeleteFileW
kernel32.dll::GetWindowsDirectoryW
kernel32.dll::GetSystemDirectoryW
kernel32.dll::GetFileAttributesW
WIN_BASE_USER_APIRetrieves Account Informationadvapi32.dll::LookupPrivilegeValueW
WIN_REG_APICan Manipulate Windows Registryadvapi32.dll::RegOpenKeyExW
advapi32.dll::RegQueryValueExW
WIN_USER_APIPerforms GUI Actionsuser32.dll::PeekMessageW
user32.dll::CreateWindowExW

Comments