General

  • Target

    1576b9d5ada4a9cd82931f3694bcfaa1fbca08230d0418dcbf3e3c2aed8e6bac.exe

  • Size

    715KB

  • Sample

    200710-psm4zf77p6

  • MD5

    9e04026c162819342364cfb1212e5820

  • SHA1

    42c518dbe05f754e84234fb8398cef19b6352908

  • SHA256

    1576b9d5ada4a9cd82931f3694bcfaa1fbca08230d0418dcbf3e3c2aed8e6bac

  • SHA512

    9388abcc4a58326b56d40ffdd6d0e5eea4cf6f00de9b1764f477215ddf4b635db0057d46c687debbca489fc22c35e9e483de3657e652cb926758e1be739271a0

Malware Config

Extracted

Family

azorult

C2

http://165.22.238.167/index.php

Targets

    • Target

      1576b9d5ada4a9cd82931f3694bcfaa1fbca08230d0418dcbf3e3c2aed8e6bac.exe

    • Size

      715KB

    • MD5

      9e04026c162819342364cfb1212e5820

    • SHA1

      42c518dbe05f754e84234fb8398cef19b6352908

    • SHA256

      1576b9d5ada4a9cd82931f3694bcfaa1fbca08230d0418dcbf3e3c2aed8e6bac

    • SHA512

      9388abcc4a58326b56d40ffdd6d0e5eea4cf6f00de9b1764f477215ddf4b635db0057d46c687debbca489fc22c35e9e483de3657e652cb926758e1be739271a0

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks for installed software on the system

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks