General

  • Target

    gunzipped.exe

  • Size

    759KB

  • Sample

    210915-gwr6jsdacr

  • MD5

    edbdcd5ef1687e6653fc44880794c3f9

  • SHA1

    3c14f3c198c958a91c2affe0942e9182fdbb4553

  • SHA256

    811140c68e752bc03869f4ec33aacd3f50c92de61af0ab67d0a58457330cba3f

  • SHA512

    bac5c63a8479990e8c279768a0d2aacfa10eea47bb20235dd3180e720665307e10e256e74c1d33a51b1bcdb6f40b49c4a23751072b690e3e0548427683598149

Malware Config

Extracted

Family

azorult

C2

http://198.71.63.209/index.php

Targets

    • Target

      gunzipped.exe

    • Size

      759KB

    • MD5

      edbdcd5ef1687e6653fc44880794c3f9

    • SHA1

      3c14f3c198c958a91c2affe0942e9182fdbb4553

    • SHA256

      811140c68e752bc03869f4ec33aacd3f50c92de61af0ab67d0a58457330cba3f

    • SHA512

      bac5c63a8479990e8c279768a0d2aacfa10eea47bb20235dd3180e720665307e10e256e74c1d33a51b1bcdb6f40b49c4a23751072b690e3e0548427683598149

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M17

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M17

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks