General

  • Target

    94ce2072f26b297010ef19f3213a3075.exe

  • Size

    262KB

  • Sample

    210507-vkv8p9zz7n

  • MD5

    94ce2072f26b297010ef19f3213a3075

  • SHA1

    0c86f893bf6517b41ba66dbb5c215cc9b747eba2

  • SHA256

    6679e9f9fb5b166c8480c9e741ec9f7b68ac782861c9bbba7685d11ca7328149

  • SHA512

    c0ec77f039a930261ce87d17bfb07da704750992a6acd272fbea58a4dc4207466458bf853020f7abee42ff1ffbd9e929f6f68c04260171cce6a43d503e94163c

Malware Config

Extracted

Family

azorult

C2

http://makethebestservice.com/vp/index.php

Targets

    • Target

      94ce2072f26b297010ef19f3213a3075.exe

    • Size

      262KB

    • MD5

      94ce2072f26b297010ef19f3213a3075

    • SHA1

      0c86f893bf6517b41ba66dbb5c215cc9b747eba2

    • SHA256

      6679e9f9fb5b166c8480c9e741ec9f7b68ac782861c9bbba7685d11ca7328149

    • SHA512

      c0ec77f039a930261ce87d17bfb07da704750992a6acd272fbea58a4dc4207466458bf853020f7abee42ff1ffbd9e929f6f68c04260171cce6a43d503e94163c

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Enterprise v6

Tasks