General

  • Target

    6b728c6e24b88da7f21475f946d22f9a1ee9fea052b701bcfe271ff360a4d809

  • Size

    168KB

  • Sample

    220219-2bqgfadhb9

  • MD5

    d35718366633129b42fc72d4c5fee301

  • SHA1

    d7136c35f32e0422df0adf5cc0717098c580aa68

  • SHA256

    6b728c6e24b88da7f21475f946d22f9a1ee9fea052b701bcfe271ff360a4d809

  • SHA512

    076859b0bf21ecab1164a0a724d9c9b505c4dc50a0f8d5a00ada408aa78a3c7c7dea210b665ed833befdcfd2ef65d70e110e0a1a4ca3e8f4257a256be209a4bf

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      6b728c6e24b88da7f21475f946d22f9a1ee9fea052b701bcfe271ff360a4d809

    • Size

      168KB

    • MD5

      d35718366633129b42fc72d4c5fee301

    • SHA1

      d7136c35f32e0422df0adf5cc0717098c580aa68

    • SHA256

      6b728c6e24b88da7f21475f946d22f9a1ee9fea052b701bcfe271ff360a4d809

    • SHA512

      076859b0bf21ecab1164a0a724d9c9b505c4dc50a0f8d5a00ada408aa78a3c7c7dea210b665ed833befdcfd2ef65d70e110e0a1a4ca3e8f4257a256be209a4bf

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks