General

  • Target

    huzur seramik dekont.exe

  • Size

    332KB

  • Sample

    210624-5r7d4h2lae

  • MD5

    089710376ee97e0ab5156f9b5fa2c6b5

  • SHA1

    3f839a78f01fa4538c233a0cbc123b8e7b779767

  • SHA256

    06e10da08255822e522c881ef1cffe6a597811b0aa7188b8bcb04f549104d012

  • SHA512

    b58becc4aa21be3ed6a5297bad15b64f84b91c85cc14ff4c244d1a27ecfd3ba15706b3529005b56be5fa60914a976fcbd330109f384bda8ea27606d1183383c0

Malware Config

Extracted

Family

azorult

C2

http://smkn1cilegon.sch.id/huPI/index.php

Targets

    • Target

      huzur seramik dekont.exe

    • Size

      332KB

    • MD5

      089710376ee97e0ab5156f9b5fa2c6b5

    • SHA1

      3f839a78f01fa4538c233a0cbc123b8e7b779767

    • SHA256

      06e10da08255822e522c881ef1cffe6a597811b0aa7188b8bcb04f549104d012

    • SHA512

      b58becc4aa21be3ed6a5297bad15b64f84b91c85cc14ff4c244d1a27ecfd3ba15706b3529005b56be5fa60914a976fcbd330109f384bda8ea27606d1183383c0

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks