General

  • Target

    2282058691f8597344411ed34d7c33a8d23ca40362d8ee9567f3e71ed22bedef.exe

  • Size

    678KB

  • Sample

    210122-etydfxmqcs

  • MD5

    af537052668ce64cf82ea34c1ffee849

  • SHA1

    3d646e42cca988a6b696f845fc9dedefc034e82b

  • SHA256

    2282058691f8597344411ed34d7c33a8d23ca40362d8ee9567f3e71ed22bedef

  • SHA512

    2a81f8c8a011d9ac153b7b24193d4b073535d33277a51ec67021092936dc07fc82b14e46f8de8c529dee25538da57d649865185744c2f4de9df31eceb80c150a

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      2282058691f8597344411ed34d7c33a8d23ca40362d8ee9567f3e71ed22bedef.exe

    • Size

      678KB

    • MD5

      af537052668ce64cf82ea34c1ffee849

    • SHA1

      3d646e42cca988a6b696f845fc9dedefc034e82b

    • SHA256

      2282058691f8597344411ed34d7c33a8d23ca40362d8ee9567f3e71ed22bedef

    • SHA512

      2a81f8c8a011d9ac153b7b24193d4b073535d33277a51ec67021092936dc07fc82b14e46f8de8c529dee25538da57d649865185744c2f4de9df31eceb80c150a

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks