General

  • Target

    1b3b96f5df6130cfcce5b33646e344a55ba42390bd382eff6e2c9c0e87c61e47.exe

  • Size

    882KB

  • Sample

    210119-ggcbewxbha

  • MD5

    88853b41686e45d969166f18a2298f5f

  • SHA1

    97e49856b1037fb516cbcaac9404753a277c87ba

  • SHA256

    1b3b96f5df6130cfcce5b33646e344a55ba42390bd382eff6e2c9c0e87c61e47

  • SHA512

    c1194f2f70f0f5a100a2abf36a4b538fa3eda8f508d68c92489d2e2fa9d971bc84086a9949099dd2af40db637a85c09781f49d2cd88af2b37e1f9a4c2d0efee7

Malware Config

Extracted

Family

azorult

C2

https://mymedpasstraining.com/wp/a/index.php

Targets

    • Target

      1b3b96f5df6130cfcce5b33646e344a55ba42390bd382eff6e2c9c0e87c61e47.exe

    • Size

      882KB

    • MD5

      88853b41686e45d969166f18a2298f5f

    • SHA1

      97e49856b1037fb516cbcaac9404753a277c87ba

    • SHA256

      1b3b96f5df6130cfcce5b33646e344a55ba42390bd382eff6e2c9c0e87c61e47

    • SHA512

      c1194f2f70f0f5a100a2abf36a4b538fa3eda8f508d68c92489d2e2fa9d971bc84086a9949099dd2af40db637a85c09781f49d2cd88af2b37e1f9a4c2d0efee7

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Tasks