General

  • Target

    8cea0456940c4b136a8e58a4bb8b13c1353f87bccdcb7ee79c85676cfaa8dc85

  • Size

    938KB

  • Sample

    210515-4lez221caj

  • MD5

    69dcecb063d3078bc07d706c00798fd9

  • SHA1

    64b435fd7887973ab610556dc3f4871d26ff1755

  • SHA256

    8cea0456940c4b136a8e58a4bb8b13c1353f87bccdcb7ee79c85676cfaa8dc85

  • SHA512

    1aeaf31638e1b126cb24ebadd85c9182daf6ee83c7d5fe186592b3c227d628521cfa75846c673f1eae62f2f077713cfcdfdb3da755a9001d81131413051b1e87

Malware Config

Targets

    • Target

      8cea0456940c4b136a8e58a4bb8b13c1353f87bccdcb7ee79c85676cfaa8dc85

    • Size

      938KB

    • MD5

      69dcecb063d3078bc07d706c00798fd9

    • SHA1

      64b435fd7887973ab610556dc3f4871d26ff1755

    • SHA256

      8cea0456940c4b136a8e58a4bb8b13c1353f87bccdcb7ee79c85676cfaa8dc85

    • SHA512

      1aeaf31638e1b126cb24ebadd85c9182daf6ee83c7d5fe186592b3c227d628521cfa75846c673f1eae62f2f077713cfcdfdb3da755a9001d81131413051b1e87

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks