422d646c28b4fda4b6291e868342895495b714cba7638.exe

General
Target

422d646c28b4fda4b6291e868342895495b714cba7638.exe

Size

2MB

Sample

210416-cazzjfljcj

Score
10 /10
MD5

d70236bdebcf174a288ce9fa5917867e

SHA1

b09a685f997845f12ad23143ca1117f355c71b42

SHA256

422d646c28b4fda4b6291e868342895495b714cba76384d01b769db14ead4c79

SHA512

14cea2afede81bb7dfbc9fc08ed49c511ecd1c4e2f69afb25d9563a271425a2935c5159d58fc2d022750131c47ac2fae1930f60a95d6e3a04a657bb75155985b

Malware Config

Extracted

Family azorult
C2

http://0x21.in:8000/_az/

Targets
Target

422d646c28b4fda4b6291e868342895495b714cba7638.exe

MD5

d70236bdebcf174a288ce9fa5917867e

Filesize

2MB

Score
10 /10
SHA1

b09a685f997845f12ad23143ca1117f355c71b42

SHA256

422d646c28b4fda4b6291e868342895495b714cba76384d01b769db14ead4c79

SHA512

14cea2afede81bb7dfbc9fc08ed49c511ecd1c4e2f69afb25d9563a271425a2935c5159d58fc2d022750131c47ac2fae1930f60a95d6e3a04a657bb75155985b

Tags

Signatures

  • Azorult

    Description

    An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    Tags

  • Executes dropped EXE

  • Loads dropped DLL

  • Enumerates connected drives

    Description

    Attempts to read the root path of hard drives other than the default C: drive.

    TTPs

    Query Registry Peripheral Device Discovery System Information Discovery
  • Looks up external IP address via web service

    Description

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry

    Description

    Disk information is often read in order to detect sandboxing environments.

    TTPs

    Query Registry Peripheral Device Discovery System Information Discovery
  • Suspicious use of SetThreadContext

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation
                      Tasks

                      static1

                      behavioral1

                      10/10

                      behavioral2

                      10/10