General

  • Target

    9acc4271ea46ea65d54b15ae81b2a450eaa0c67f82540353c7a34e073bf488d4.exe

  • Size

    284KB

  • Sample

    200529-vh3zj5q2me

  • MD5

    57af4df43ba0ced61730a48c3bcd4023

  • SHA1

    41a88d6dce0f1984c2c3a4997a09d3db548d8786

  • SHA256

    9acc4271ea46ea65d54b15ae81b2a450eaa0c67f82540353c7a34e073bf488d4

  • SHA512

    dd1efe85afc7721956374a7ccf9d8859bea0cb427f3cd5c45ab25a8e7fbb13425e974bce742357c460b5ff403775391dfe2f1f7684dd00aaf934fb5712685a39

Malware Config

Extracted

Family

azorult

C2

http://209.58.149.116/index.php

Targets

    • Target

      9acc4271ea46ea65d54b15ae81b2a450eaa0c67f82540353c7a34e073bf488d4.exe

    • Size

      284KB

    • MD5

      57af4df43ba0ced61730a48c3bcd4023

    • SHA1

      41a88d6dce0f1984c2c3a4997a09d3db548d8786

    • SHA256

      9acc4271ea46ea65d54b15ae81b2a450eaa0c67f82540353c7a34e073bf488d4

    • SHA512

      dd1efe85afc7721956374a7ccf9d8859bea0cb427f3cd5c45ab25a8e7fbb13425e974bce742357c460b5ff403775391dfe2f1f7684dd00aaf934fb5712685a39

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks