General

  • Target

    Photoshop.Cs6.Version.1.0.serial.number.maker.by.TSRh.zip

  • Size

    5.2MB

  • Sample

    210413-2aqrqy8jf2

  • MD5

    cbce3f59525147bfc8655cb1e716e396

  • SHA1

    f95ad1cfc17fc8b2757f40c3a34cec05179201de

  • SHA256

    5f9ed71887c5271648aa9b74822e11de16f4995090eb73a7bb5080fec9f85452

  • SHA512

    db9f81675d9075f0880a6a0fcd9b6e5461ed27b98c6dde84a49f287dc8d80cddd5e360af22e06b5716e0ba1f6fa73746c159b934c00831756870cee85335ad1e

Malware Config

Extracted

Family

azorult

C2

http://kvaka.li/1210776429.php

Targets

    • Target

      Photoshop.Cs6.Version.1.0.serial.number.maker.by.TSRh.exe

    • Size

      5.3MB

    • MD5

      c14148358177e1ef6e608955bed67108

    • SHA1

      f27ab6d57e983a758aabc36ea394e3ab2c0054c6

    • SHA256

      5a27eada3b64322c0da5d53df1586e2592d5e9e8224d12933b6ff303f6164dd8

    • SHA512

      71f25ed5483b6c80a629e82bbdcfa05db40d53a170ffd86839cae54819d69062620571f537673dcc813279973994827f89e0853c3e8f92be54bd09f109a9131f

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Pony,Fareit

      Pony is a Remote Access Trojan application that steals information.

    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Checks whether UAC is enabled

    • Legitimate hosting services abused for malware hosting/C2

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Drops file in System32 directory

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Install Root Certificate

1
T1130

Credential Access

Credentials in Files

3
T1081

Discovery

Query Registry

3
T1012

System Information Discovery

4
T1082

Remote System Discovery

1
T1018

Collection

Data from Local System

3
T1005

Command and Control

Web Service

1
T1102

Tasks