General

  • Target

    E7CD68405358898BAC66D7DF45E13B001B8C6A74F9D9D.exe

  • Size

    141KB

  • Sample

    211017-hzyceadbhr

  • MD5

    22acf9bafc82022ce44976b5d8c4d281

  • SHA1

    15cfe098297d9cc83c92485a872b39dfd301b57f

  • SHA256

    e7cd68405358898bac66d7df45e13b001b8c6a74f9d9d37578b0782380156541

  • SHA512

    a82c69850becb1072cbceb0d125baf68b4bfc816ca8941591d5cc718beb4372bbe39c2906204ef47981b26d6f7740dbaafbd6b8b07540b526448edeac3e568d0

Malware Config

Extracted

Family

azorult

C2

http://51.15.247.8/64803B71-DDC3-42B4-8230-0E3D067859EB/index.php

Targets

    • Target

      E7CD68405358898BAC66D7DF45E13B001B8C6A74F9D9D.exe

    • Size

      141KB

    • MD5

      22acf9bafc82022ce44976b5d8c4d281

    • SHA1

      15cfe098297d9cc83c92485a872b39dfd301b57f

    • SHA256

      e7cd68405358898bac66d7df45e13b001b8c6a74f9d9d37578b0782380156541

    • SHA512

      a82c69850becb1072cbceb0d125baf68b4bfc816ca8941591d5cc718beb4372bbe39c2906204ef47981b26d6f7740dbaafbd6b8b07540b526448edeac3e568d0

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M18

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M18

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Tasks