General

  • Target

    fbc1e4ec22cd7339eb5fbc8d64320bb825f411e3c6ade350705586bfab4e1808.exe

  • Size

    681KB

  • Sample

    210120-2x586kyqhx

  • MD5

    66c203c22a6a3440e8a0e69b962b4b81

  • SHA1

    ab54eac8e534570778a11752446fa3ca4903f89e

  • SHA256

    fbc1e4ec22cd7339eb5fbc8d64320bb825f411e3c6ade350705586bfab4e1808

  • SHA512

    63faab000e739953254a46b783af6c564b2dbc06b6d3499c8c38554e1122f2fd10a180d98fa38c81e05b6a19f3c1441731fb6baa0a7e867f82018e2d1becc8bb

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      fbc1e4ec22cd7339eb5fbc8d64320bb825f411e3c6ade350705586bfab4e1808.exe

    • Size

      681KB

    • MD5

      66c203c22a6a3440e8a0e69b962b4b81

    • SHA1

      ab54eac8e534570778a11752446fa3ca4903f89e

    • SHA256

      fbc1e4ec22cd7339eb5fbc8d64320bb825f411e3c6ade350705586bfab4e1808

    • SHA512

      63faab000e739953254a46b783af6c564b2dbc06b6d3499c8c38554e1122f2fd10a180d98fa38c81e05b6a19f3c1441731fb6baa0a7e867f82018e2d1becc8bb

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks