General

  • Target

    TRS-11-0221-020.exe

  • Size

    186KB

  • Sample

    210408-4kdbge4sxs

  • MD5

    a82f88615f13b54d9c6bacf14ea5d716

  • SHA1

    8213b8485c40ae76e896da600cbe26a827f4d46d

  • SHA256

    5e500591cc85d6182a86762c1961cc2fc54c5c9fa6fa05b212a4e85c574d86cd

  • SHA512

    9335cfe916960fd61a0b6ba377167479826eabc3c3d45e8d80c33514592053381abb1dc92d554aa3c1e4a2a473afd28f7965a2b17a1b0c2a5d8b5b0279dd39f6

Malware Config

Extracted

Family

azorult

C2

http://bengalcement.com.bd/AxPu/index.php

Targets

    • Target

      TRS-11-0221-020.exe

    • Size

      186KB

    • MD5

      a82f88615f13b54d9c6bacf14ea5d716

    • SHA1

      8213b8485c40ae76e896da600cbe26a827f4d46d

    • SHA256

      5e500591cc85d6182a86762c1961cc2fc54c5c9fa6fa05b212a4e85c574d86cd

    • SHA512

      9335cfe916960fd61a0b6ba377167479826eabc3c3d45e8d80c33514592053381abb1dc92d554aa3c1e4a2a473afd28f7965a2b17a1b0c2a5d8b5b0279dd39f6

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks