General

  • Target

    PO#491269.exe

  • Size

    824KB

  • Sample

    210923-vkmzcaehb9

  • MD5

    cd658aacd965a7c7c2ada9e6b96a664c

  • SHA1

    1a5d139c35228e3218f46079fffb10cce302c1c7

  • SHA256

    8da26e23a7696170e23582c4692ea8d9e29a5efe97c21666eb7a687a0f523f69

  • SHA512

    f152222f48a98c5a9f5b118bc028f53ea6783ff179ee4bee876fb680bc658a149e24a5af7eacf2858a9b086027a1e3a6c4b19426e529d7afb1382813a6152639

Malware Config

Extracted

Family

azorult

C2

http://165.227.220.7/index.php

Targets

    • Target

      PO#491269.exe

    • Size

      824KB

    • MD5

      cd658aacd965a7c7c2ada9e6b96a664c

    • SHA1

      1a5d139c35228e3218f46079fffb10cce302c1c7

    • SHA256

      8da26e23a7696170e23582c4692ea8d9e29a5efe97c21666eb7a687a0f523f69

    • SHA512

      f152222f48a98c5a9f5b118bc028f53ea6783ff179ee4bee876fb680bc658a149e24a5af7eacf2858a9b086027a1e3a6c4b19426e529d7afb1382813a6152639

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks