General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009

  • Size

    485KB

  • Sample

    201028-gzcj2gxh16

  • MD5

    cc219392a073e3c644174607af417b93

  • SHA1

    bc886a54b29a6176d88809a364c669d013403378

  • SHA256

    ea9930998c8123058a6d1768c857bf6504a933be30556afb4dad2e192e4e8c45

  • SHA512

    d72ce4cbd922007ac0e092826cfdc7a15071a4754404095aafba3a1fd9bcf86b24091ff9aed1f2f6b5535787253cf34707e08c036b0399acc42fa7fd4959659b

Malware Config

Extracted

Family

azorult

C2

http://workwithjoshuaking.com/ssq/cow/index.php

Targets

    • Target

      SecuriteInfo.com.Trojan.GenericKD.34955709.32167.29009

    • Size

      485KB

    • MD5

      cc219392a073e3c644174607af417b93

    • SHA1

      bc886a54b29a6176d88809a364c669d013403378

    • SHA256

      ea9930998c8123058a6d1768c857bf6504a933be30556afb4dad2e192e4e8c45

    • SHA512

      d72ce4cbd922007ac0e092826cfdc7a15071a4754404095aafba3a1fd9bcf86b24091ff9aed1f2f6b5535787253cf34707e08c036b0399acc42fa7fd4959659b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Tasks