General

  • Target

    9f6a8cf503fa963fca29cabcadab8cd6fb9dd99387a0a67fb81f9b15fe4ffd94.exe

  • Size

    516KB

  • Sample

    220514-q5p7zscdhn

  • MD5

    a5669a3c8acad2ac38e73306066edecb

  • SHA1

    484046726d558f448051e5bb73e2b531c2c45246

  • SHA256

    9f6a8cf503fa963fca29cabcadab8cd6fb9dd99387a0a67fb81f9b15fe4ffd94

  • SHA512

    e85b2c1df0e8f2652388056b2f72742f073db3588c9167b0e865df43b2f898c615174df240cb4a923d13b6f050f69e33037329dfacb87ac062cc0148ba7313a9

Malware Config

Extracted

Family

azorult

C2

http://mideastclinicsea.us/micr05oft-0n1ine/0a8005f5594bd67041f88c6196192646/a5bfc9e07964f8dddeb95fc584cd965d/df877f3865752637daa540ea9cbc474f/webmai1pr0tected/8efd23a3fe0ec74453bdd0fadb91b0e3/PL341/index.php

Targets

    • Target

      9f6a8cf503fa963fca29cabcadab8cd6fb9dd99387a0a67fb81f9b15fe4ffd94.exe

    • Size

      516KB

    • MD5

      a5669a3c8acad2ac38e73306066edecb

    • SHA1

      484046726d558f448051e5bb73e2b531c2c45246

    • SHA256

      9f6a8cf503fa963fca29cabcadab8cd6fb9dd99387a0a67fb81f9b15fe4ffd94

    • SHA512

      e85b2c1df0e8f2652388056b2f72742f073db3588c9167b0e865df43b2f898c615174df240cb4a923d13b6f050f69e33037329dfacb87ac062cc0148ba7313a9

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Tasks