General

  • Target

    PO#491269.exe

  • Size

    824KB

  • Sample

    210923-tx3pwseffn

  • MD5

    cd658aacd965a7c7c2ada9e6b96a664c

  • SHA1

    1a5d139c35228e3218f46079fffb10cce302c1c7

  • SHA256

    8da26e23a7696170e23582c4692ea8d9e29a5efe97c21666eb7a687a0f523f69

  • SHA512

    f152222f48a98c5a9f5b118bc028f53ea6783ff179ee4bee876fb680bc658a149e24a5af7eacf2858a9b086027a1e3a6c4b19426e529d7afb1382813a6152639

Malware Config

Extracted

Family

azorult

C2

http://165.227.220.7/index.php

Targets

    • Target

      PO#491269.exe

    • Size

      824KB

    • MD5

      cd658aacd965a7c7c2ada9e6b96a664c

    • SHA1

      1a5d139c35228e3218f46079fffb10cce302c1c7

    • SHA256

      8da26e23a7696170e23582c4692ea8d9e29a5efe97c21666eb7a687a0f523f69

    • SHA512

      f152222f48a98c5a9f5b118bc028f53ea6783ff179ee4bee876fb680bc658a149e24a5af7eacf2858a9b086027a1e3a6c4b19426e529d7afb1382813a6152639

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE AZORult Variant.4 Checkin M2

      suricata: ET MALWARE AZORult Variant.4 Checkin M2

    • suricata: ET MALWARE AZORult v3.2 Server Response M3

      suricata: ET MALWARE AZORult v3.2 Server Response M3

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M16

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M16

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Tasks