General

  • Target

    4bb178da0a560d36af39e243dda93fe45446907a00009210abd6ba1a036a600c

  • Size

    169KB

  • Sample

    220305-1re5zahda7

  • MD5

    eeb081699fcfdc3e9b531990a0826587

  • SHA1

    0d39ff8ebd0fae00206ca7168fa4c7960666b598

  • SHA256

    4bb178da0a560d36af39e243dda93fe45446907a00009210abd6ba1a036a600c

  • SHA512

    d0446a7b6ed2991613595fbbb96bd6be4912e3a7fbd30e4a68f54f8280e3a0cf6520d4c1a24e80329d0b84d6ca52f0d9c3f453fc300ce769447baabab5afeff3

Malware Config

Extracted

Family

azorult

C2

http://anastaf4.beget.tech

Targets

    • Target

      4bb178da0a560d36af39e243dda93fe45446907a00009210abd6ba1a036a600c

    • Size

      169KB

    • MD5

      eeb081699fcfdc3e9b531990a0826587

    • SHA1

      0d39ff8ebd0fae00206ca7168fa4c7960666b598

    • SHA256

      4bb178da0a560d36af39e243dda93fe45446907a00009210abd6ba1a036a600c

    • SHA512

      d0446a7b6ed2991613595fbbb96bd6be4912e3a7fbd30e4a68f54f8280e3a0cf6520d4c1a24e80329d0b84d6ca52f0d9c3f453fc300ce769447baabab5afeff3

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Ramnit

      Ramnit is a versatile family that holds viruses, worms, and Trojans.

    • Executes dropped EXE

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks