Hey Hey fella. I took a closer look at this and was hoping to be able to do SSL Decrypt against it. Based on observations I think its a GO binary that’s packing its own encryption libraries, meaning most SSL decrypt/MITM stuff isn’t going to work on it.
I’m pretty sure its a go-based binary based on the installer.exe executable looking for a GODEBUG system variable when its executed.
As far as host-based artifacts, if you have sysmon present, EventID 11 (FileCreate) should capture a file creation event for Ailurophile.zip in the user’s AppData\Local directory as a surefire host-based detection method.
Additionally you’ll see FileCreation events for AppData\Local\Ailurophile\info.txt. The info file has the following file format:
I’ll have TLS SNI and DNS rules for the C2 domain, but unfortunately beyond that, this is all the information I can provide for detection. Thanks as always for sharing with us, and I hope this helps others track down Ailurophile Stealer activity.