General

  • Target

    Adobe_Photoshop_Cs6_13_crack_by_ViKiNG.exe

  • Size

    5.3MB

  • Sample

    210411-eeq2rtm8k2

  • MD5

    b11115592cd94ecfaa46817cdd064e1b

  • SHA1

    25454a2d15b426e64e0ff38c58831463435ba635

  • SHA256

    512d0ec30953c107f35141055d82297312123dd3b165e47c3897b7caed255d9e

  • SHA512

    0f2be15760bb2bff2b826549af1edb8ddbb5270a5014d406d46ae5d08938739e2345545b6fe8f9fcaabc90f9acdecad3a166259359748a3431ac6cc2b4e8466b

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Targets

    • Target

      Adobe_Photoshop_Cs6_13_crack_by_ViKiNG.exe

    • Size

      5.3MB

    • MD5

      b11115592cd94ecfaa46817cdd064e1b

    • SHA1

      25454a2d15b426e64e0ff38c58831463435ba635

    • SHA256

      512d0ec30953c107f35141055d82297312123dd3b165e47c3897b7caed255d9e

    • SHA512

      0f2be15760bb2bff2b826549af1edb8ddbb5270a5014d406d46ae5d08938739e2345545b6fe8f9fcaabc90f9acdecad3a166259359748a3431ac6cc2b4e8466b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks for common network interception software

      Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Maps connected drives based on registry

      Disk information is often read in order to detect sandboxing environments.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Credential Access

Credentials in Files

1
T1081

Discovery

Software Discovery

1
T1518

Query Registry

5
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Collection

Data from Local System

1
T1005

Command and Control

Web Service

1
T1102

Tasks