General

  • Target

    1ef555bdb2c274a6d0920d7fc6526b8e9fd733fb5942a624cf647b5f33283f17.exe

  • Size

    222KB

  • Sample

    210423-pj3c24571s

  • MD5

    c617d81115d52c52e58c8fb001fc1f56

  • SHA1

    dc5c219bc06fe61aeaec1b6c89e3a85273dd873a

  • SHA256

    1ef555bdb2c274a6d0920d7fc6526b8e9fd733fb5942a624cf647b5f33283f17

  • SHA512

    7477f24a9cf0ab066adf070f3931bc82cfe57b68e3e8a854949b07ee31f6beec9d96419ee37b782748fa4ed375ce617009d6cfacdc983899fcaa38054e6bbb66

Malware Config

Extracted

Family

azorult

C2

http://smkn1cilegon.sch.id/MnAew/index.php

Targets

    • Target

      1ef555bdb2c274a6d0920d7fc6526b8e9fd733fb5942a624cf647b5f33283f17.exe

    • Size

      222KB

    • MD5

      c617d81115d52c52e58c8fb001fc1f56

    • SHA1

      dc5c219bc06fe61aeaec1b6c89e3a85273dd873a

    • SHA256

      1ef555bdb2c274a6d0920d7fc6526b8e9fd733fb5942a624cf647b5f33283f17

    • SHA512

      7477f24a9cf0ab066adf070f3931bc82cfe57b68e3e8a854949b07ee31f6beec9d96419ee37b782748fa4ed375ce617009d6cfacdc983899fcaa38054e6bbb66

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks