General

  • Target

    fe117521cd5f1653cebc4d6a3bfd85dfd273e4df7d8e0204205779a951e421bc.exe

  • Size

    410KB

  • Sample

    210108-7ky8fzzj2x

  • MD5

    0127bfef7d4408d3384e5792da7384d0

  • SHA1

    261532f47c7467e35b1b6d405c1a0748182f768f

  • SHA256

    fe117521cd5f1653cebc4d6a3bfd85dfd273e4df7d8e0204205779a951e421bc

  • SHA512

    74a09f8a1712ef8b04b2d0664152f163a1e1a819f7ba2670d61d21646ce17e3e297a5f54cc24f6a98d768f1a5ec526877264278e6356cde11fc324102a2d317d

Malware Config

Extracted

Family

azorult

C2

http://blkgrupdoom.info/scgn/index.php

Targets

    • Target

      fe117521cd5f1653cebc4d6a3bfd85dfd273e4df7d8e0204205779a951e421bc.exe

    • Size

      410KB

    • MD5

      0127bfef7d4408d3384e5792da7384d0

    • SHA1

      261532f47c7467e35b1b6d405c1a0748182f768f

    • SHA256

      fe117521cd5f1653cebc4d6a3bfd85dfd273e4df7d8e0204205779a951e421bc

    • SHA512

      74a09f8a1712ef8b04b2d0664152f163a1e1a819f7ba2670d61d21646ce17e3e297a5f54cc24f6a98d768f1a5ec526877264278e6356cde11fc324102a2d317d

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Modifies WinLogon for persistence

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Winlogon Helper DLL

1
T1004

Defense Evasion

Modify Registry

1
T1112

Tasks