General

  • Target

    PI_#06875654.exe

  • Size

    613KB

  • Sample

    200709-p2zkkvwfxx

  • MD5

    f39696f5a42d2d53c17050bbfcc5154e

  • SHA1

    8f5b5241ffbff92bc59d5801c064b881fbdd69dc

  • SHA256

    5dd9ce8ab0197fc220eaf0aa845f57454a2b88c95deb59acbae8e8945bb25b4f

  • SHA512

    2eee98e43403d6740501dfe479529eb429ec300845691f8c81b38940cfa65d689fba48267abd42ed7f3532646b4f714a0fbba230871cced7fc9b8d6bc67f3f28

Malware Config

Extracted

Family

azorult

C2

http://45.95.168.162/city/index.php

Targets

    • Target

      PI_#06875654.exe

    • Size

      613KB

    • MD5

      f39696f5a42d2d53c17050bbfcc5154e

    • SHA1

      8f5b5241ffbff92bc59d5801c064b881fbdd69dc

    • SHA256

      5dd9ce8ab0197fc220eaf0aa845f57454a2b88c95deb59acbae8e8945bb25b4f

    • SHA512

      2eee98e43403d6740501dfe479529eb429ec300845691f8c81b38940cfa65d689fba48267abd42ed7f3532646b4f714a0fbba230871cced7fc9b8d6bc67f3f28

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks