General

  • Target

    876973c9e0071601b89baa4073143da16f3e8bf55f46e0b6ca5a1ecfc5a97f54.exe

  • Size

    662KB

  • Sample

    210106-th2qbv1r3n

  • MD5

    11da5594989a03873f3ba617490b34df

  • SHA1

    179de3670ae8f354f375d15b7d3bf966b019320c

  • SHA256

    876973c9e0071601b89baa4073143da16f3e8bf55f46e0b6ca5a1ecfc5a97f54

  • SHA512

    d6e24f360616b44b6e1a14d043f11d0382fe1e53d5c3681f76c0d14b9886d08d1915da6568db8a9597b10bac06e2609caf166e4f2057d998a8801554f82ad171

Malware Config

Extracted

Family

azorult

C2

http://blkgrupdoom.info/scgn/index.php

Targets

    • Target

      876973c9e0071601b89baa4073143da16f3e8bf55f46e0b6ca5a1ecfc5a97f54.exe

    • Size

      662KB

    • MD5

      11da5594989a03873f3ba617490b34df

    • SHA1

      179de3670ae8f354f375d15b7d3bf966b019320c

    • SHA256

      876973c9e0071601b89baa4073143da16f3e8bf55f46e0b6ca5a1ecfc5a97f54

    • SHA512

      d6e24f360616b44b6e1a14d043f11d0382fe1e53d5c3681f76c0d14b9886d08d1915da6568db8a9597b10bac06e2609caf166e4f2057d998a8801554f82ad171

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks