General

  • Target

    67ea2153cfc1a94642fa7f08b5e8c40c2497106687b6d9d6fa938eec1d659126.exe

  • Size

    341KB

  • Sample

    220514-q5p7zscdhl

  • MD5

    a8c8c9f845755c28d970990ac073386d

  • SHA1

    ff23867b93b68d1feefcbea5fb5a96fc2b5870d1

  • SHA256

    67ea2153cfc1a94642fa7f08b5e8c40c2497106687b6d9d6fa938eec1d659126

  • SHA512

    80a358958a39fed9fcf79d3b885a446f727ee89aad5e236074909a5677464c5cdabc8c3129bfb8c228556b8012a5cc54db46c28faf89ed3dff3e900c17ed2d2b

Malware Config

Extracted

Family

azorult

C2

http://2.56.59.31/purelogs/index.php

Targets

    • Target

      67ea2153cfc1a94642fa7f08b5e8c40c2497106687b6d9d6fa938eec1d659126.exe

    • Size

      341KB

    • MD5

      a8c8c9f845755c28d970990ac073386d

    • SHA1

      ff23867b93b68d1feefcbea5fb5a96fc2b5870d1

    • SHA256

      67ea2153cfc1a94642fa7f08b5e8c40c2497106687b6d9d6fa938eec1d659126

    • SHA512

      80a358958a39fed9fcf79d3b885a446f727ee89aad5e236074909a5677464c5cdabc8c3129bfb8c228556b8012a5cc54db46c28faf89ed3dff3e900c17ed2d2b

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks