General

  • Target

    file.exe

  • Size

    606KB

  • Sample

    201105-ay8pz8l23s

  • MD5

    2dd4ed969e9e36f8ab90eb52e248afdb

  • SHA1

    3dfb842f5d24059e3aad4724d6c07b9d4d675131

  • SHA256

    373ea9d6b1b0a80139154d2923416f3989c697ed248eee940331b88afacea073

  • SHA512

    a486728fd5a56ab8bc30baa8b756b5d9f799a9dcbd202c7ee3af15e81a08047404dba7f14e30484efc48ffbca30c2cce8db1b726b3f337cadf5ced589ebe5158

Malware Config

Extracted

Family

azorult

C2

http://ciuj.ir/masab/index.php

Targets

    • Target

      file.exe

    • Size

      606KB

    • MD5

      2dd4ed969e9e36f8ab90eb52e248afdb

    • SHA1

      3dfb842f5d24059e3aad4724d6c07b9d4d675131

    • SHA256

      373ea9d6b1b0a80139154d2923416f3989c697ed248eee940331b88afacea073

    • SHA512

      a486728fd5a56ab8bc30baa8b756b5d9f799a9dcbd202c7ee3af15e81a08047404dba7f14e30484efc48ffbca30c2cce8db1b726b3f337cadf5ced589ebe5158

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Tasks