General

  • Target

    64d7e0b438049a21a6f6525f3c25d93edb0b5ed42df9d2a3e0135ec3f9a48878.exe

  • Size

    820KB

  • Sample

    210118-lafmcm7e8s

  • MD5

    0a025a8bac7f6b7a92a9d5ad94dfda9d

  • SHA1

    62d7c7d0cab8b4788c35a656dc238c6b282a76ab

  • SHA256

    64d7e0b438049a21a6f6525f3c25d93edb0b5ed42df9d2a3e0135ec3f9a48878

  • SHA512

    b80db1444891340e71437126f5ee12054556b55f81ed5f1c1a2af4acd51ce7240f3e5a4d533c811f646a7a9990be98c7c8f11d6afe532387f234ff2bcf5e76c1

Malware Config

Extracted

Family

azorult

C2

http://139.162.75.17/index.php

Targets

    • Target

      64d7e0b438049a21a6f6525f3c25d93edb0b5ed42df9d2a3e0135ec3f9a48878.exe

    • Size

      820KB

    • MD5

      0a025a8bac7f6b7a92a9d5ad94dfda9d

    • SHA1

      62d7c7d0cab8b4788c35a656dc238c6b282a76ab

    • SHA256

      64d7e0b438049a21a6f6525f3c25d93edb0b5ed42df9d2a3e0135ec3f9a48878

    • SHA512

      b80db1444891340e71437126f5ee12054556b55f81ed5f1c1a2af4acd51ce7240f3e5a4d533c811f646a7a9990be98c7c8f11d6afe532387f234ff2bcf5e76c1

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • JavaScript code in executable

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

3
T1005

Tasks