General

  • Target

    00e01536463fbc44334db04dc1dbd365c9eb8f890ada18888c886b7a5e345e42

  • Size

    153KB

  • Sample

    220219-3rgpxafeek

  • MD5

    01a99b2e53b95593509d83f7675da499

  • SHA1

    620e5822aa0b3bb9c4c1cffcde387681fe1acc71

  • SHA256

    00e01536463fbc44334db04dc1dbd365c9eb8f890ada18888c886b7a5e345e42

  • SHA512

    339254b53af76bf33399abcf6181fd5fce0d1742eacd37e3138784871a19e6a7e236370f347f5c38c091aba305c1bfa81bec89f1b381daa1781786c074d13c16

Malware Config

Extracted

Family

azorult

C2

http://makethebestservice.com/vp/index.php

Targets

    • Target

      00e01536463fbc44334db04dc1dbd365c9eb8f890ada18888c886b7a5e345e42

    • Size

      153KB

    • MD5

      01a99b2e53b95593509d83f7675da499

    • SHA1

      620e5822aa0b3bb9c4c1cffcde387681fe1acc71

    • SHA256

      00e01536463fbc44334db04dc1dbd365c9eb8f890ada18888c886b7a5e345e42

    • SHA512

      339254b53af76bf33399abcf6181fd5fce0d1742eacd37e3138784871a19e6a7e236370f347f5c38c091aba305c1bfa81bec89f1b381daa1781786c074d13c16

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Modifies system executable filetype association

    • Neshta

      Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6

    • Executes dropped EXE

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

MITRE ATT&CK Enterprise v6

Tasks