General

  • Target

    RFQ 11054.exe

  • Size

    656KB

  • Sample

    210506-gwk54fv9gs

  • MD5

    440d7a24c666b396e81ee2f4d0716214

  • SHA1

    1225211df85b157d262dc8596c145f8dfa3267c4

  • SHA256

    e72e42080f815a61e8e641bb3ebc9d2e0f0161604c55cbf76c5be1e16262b712

  • SHA512

    df00f1e5487b1e8084f61019ef411a70aaef869856821fe50e6e72079458c360f9ad9c973bbb9f07bf72b6c92567a52ee5d96f5c6c28a5229326844733a79743

Malware Config

Extracted

Family

azorult

C2

http://31.210.20.121/index.php

Targets

    • Target

      RFQ 11054.exe

    • Size

      656KB

    • MD5

      440d7a24c666b396e81ee2f4d0716214

    • SHA1

      1225211df85b157d262dc8596c145f8dfa3267c4

    • SHA256

      e72e42080f815a61e8e641bb3ebc9d2e0f0161604c55cbf76c5be1e16262b712

    • SHA512

      df00f1e5487b1e8084f61019ef411a70aaef869856821fe50e6e72079458c360f9ad9c973bbb9f07bf72b6c92567a52ee5d96f5c6c28a5229326844733a79743

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks