General

  • Target

    PO 329.gz

  • Size

    352KB

  • Sample

    210924-gkm3fsfhg3

  • MD5

    2ffb5be4a9185932f9987a3b2e118df7

  • SHA1

    e19c944c9eca6fe78ee882d140dcf379cc6db3a2

  • SHA256

    966ebd34704de02f70460bf2d4619b05deeb8c8ece5998242b5509b0e6ba80f2

  • SHA512

    86f786baf201f28dcde541406ec41087fa14f6b63cb0153b46f50553a1ce3406a1448131202da12fbe0b68b8d5dc2f851a13e300e20d7adf5d3e0c52f56c4fa8

Malware Config

Extracted

Family

azorult

C2

http://159.65.165.243/index.php

Targets

    • Target

      PO 329.exe

    • Size

      796KB

    • MD5

      6d27409795df8926a371b89c2becf85b

    • SHA1

      8d0f35cca132ed6f9cb05b530ccd5063017adac5

    • SHA256

      bfefbcaec340cf37802b09ece6b6f48906575f5ad21c1fd447103bf0c7b86e25

    • SHA512

      77ee565a335efe59d1f5ec7ee389d773adfb1a2bb748183f9b42e50ca8b9608333a8d9e7284f9b1ed1c8e9bc5d7b7fb392b9de384cd312e679fd8f3350368aaa

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Loads dropped DLL

    • Reads data files stored by FTP clients

      Tries to access configuration files associated with programs like FileZilla.

    • Reads local data of messenger clients

      Infostealers often target stored data of messaging applications, which can include saved credentials and account information.

    • Reads user/profile data of local email clients

      Email clients store some user data on disk where infostealers will often target it.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

4
T1081

Discovery

Query Registry

2
T1012

System Information Discovery

1
T1082

Collection

Data from Local System

4
T1005

Tasks