General

  • Target

    A5CE2653F5F74C7BA7901F79CF9932A5.exe

  • Size

    4.7MB

  • Sample

    210719-gftaxa5mr2

  • MD5

    a5ce2653f5f74c7ba7901f79cf9932a5

  • SHA1

    a6e4e0070694b6779627643c18850b9a16d047ee

  • SHA256

    571de4698edff95c328d3521b11e800a3b9659ad55281dd7729b2ce2210ac931

  • SHA512

    4b7d5662483e78b98841f25b61e5019424cf99e24ca7b7c87c011a0ca406b9cb8d0360aa42a260e2bdb5d1f731faddb726c13de13d8c6f6ef830f93c0da081a3

Malware Config

Extracted

Family

azorult

C2

http://185.189.151.50/7yhnm434/index.php

Targets

    • Target

      A5CE2653F5F74C7BA7901F79CF9932A5.exe

    • Size

      4.7MB

    • MD5

      a5ce2653f5f74c7ba7901f79cf9932a5

    • SHA1

      a6e4e0070694b6779627643c18850b9a16d047ee

    • SHA256

      571de4698edff95c328d3521b11e800a3b9659ad55281dd7729b2ce2210ac931

    • SHA512

      4b7d5662483e78b98841f25b61e5019424cf99e24ca7b7c87c011a0ca406b9cb8d0360aa42a260e2bdb5d1f731faddb726c13de13d8c6f6ef830f93c0da081a3

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

MITRE ATT&CK Matrix

Tasks