General

  • Target

    azorult_cpp.bin

  • Size

    79KB

  • Sample

    211021-tew5dsaec7

  • MD5

    5b26880f80a00397bc379caf5cadc564

  • SHA1

    2de82ffa5833efbeb1c625f7be06a65c9814626d

  • SHA256

    9d6611c2779316f1ef4b4a6edcfdfb5e770fe32b31ec2200df268c3bd236ed75

  • SHA512

    ccb0e6e4a78277a620d91cfde608e48a91ca1eaf945071f5e1c8561a31abb7b85f2cc0acd4dee2002c21e173d25a2d4f4b47c25361c58adea06312bcf9132337

Malware Config

Targets

    • Target

      azorult_cpp.bin

    • Size

      79KB

    • MD5

      5b26880f80a00397bc379caf5cadc564

    • SHA1

      2de82ffa5833efbeb1c625f7be06a65c9814626d

    • SHA256

      9d6611c2779316f1ef4b4a6edcfdfb5e770fe32b31ec2200df268c3bd236ed75

    • SHA512

      ccb0e6e4a78277a620d91cfde608e48a91ca1eaf945071f5e1c8561a31abb7b85f2cc0acd4dee2002c21e173d25a2d4f4b47c25361c58adea06312bcf9132337

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Accesses cryptocurrency files/wallets, possible credential harvesting

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v6

Credential Access

Credentials in Files

2
T1081

Discovery

Query Registry

1
T1012

Collection

Data from Local System

2
T1005

Tasks