General

  • Target

    cb34bcf1043d10a15d4a823fe188296e161b88b630f090c8dc644de84b6105ae.exe

  • Size

    467KB

  • Sample

    210114-5zps8z5r2x

  • MD5

    48ca734044cf115b599af5dc400c5fb1

  • SHA1

    1e38e234ff91a79733f960fba17972cc956d4074

  • SHA256

    cb34bcf1043d10a15d4a823fe188296e161b88b630f090c8dc644de84b6105ae

  • SHA512

    05d1d0862e0214ea2cdd1cf38352873463ce97bd28fb6187ffb03c07b369e6fa52fe23255d9c4fb759f2f6b3070049a261ca4a711e84503cb1f23d3622876f91

Malware Config

Targets

    • Target

      cb34bcf1043d10a15d4a823fe188296e161b88b630f090c8dc644de84b6105ae.exe

    • Size

      467KB

    • MD5

      48ca734044cf115b599af5dc400c5fb1

    • SHA1

      1e38e234ff91a79733f960fba17972cc956d4074

    • SHA256

      cb34bcf1043d10a15d4a823fe188296e161b88b630f090c8dc644de84b6105ae

    • SHA512

      05d1d0862e0214ea2cdd1cf38352873463ce97bd28fb6187ffb03c07b369e6fa52fe23255d9c4fb759f2f6b3070049a261ca4a711e84503cb1f23d3622876f91

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • JavaScript code in executable

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks