General

  • Target

    f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe

  • Size

    300KB

  • Sample

    220514-q5p7zsaba8

  • MD5

    6bf580ccfa8cdef620ba37082e5f7d66

  • SHA1

    d0e590d8615e640cc563a5d6294df8278ae3f2e5

  • SHA256

    f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8

  • SHA512

    f6023345ca884ae4200748a17dc6f45e9001a2de5e09c278298968fd091c91f27c1ee6cfcc11b3934ed02b430a5e34d921aa4ff171db2e86656f0a0a2b49ca5e

Malware Config

Extracted

Family

azorult

C2

http://2.56.59.31/purelogs/index.php

Targets

    • Target

      f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8.exe

    • Size

      300KB

    • MD5

      6bf580ccfa8cdef620ba37082e5f7d66

    • SHA1

      d0e590d8615e640cc563a5d6294df8278ae3f2e5

    • SHA256

      f4f320fd3ca17e544dc33f90d02a769ecba5dec0f05cc08b9981dfc5a81900f8

    • SHA512

      f6023345ca884ae4200748a17dc6f45e9001a2de5e09c278298968fd091c91f27c1ee6cfcc11b3934ed02b430a5e34d921aa4ff171db2e86656f0a0a2b49ca5e

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M13

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M13

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M5

MITRE ATT&CK Matrix

Tasks