General

  • Target

    00a75d01fb8ae3a68beb03573b9c1c3d1debe255b07fba0b2b7500dae87c7bb5

  • Size

    1.2MB

  • Sample

    220521-d51mhaghd6

  • MD5

    454ca523a6f075dc421abee23a99af9e

  • SHA1

    f05a9161d4274fdbe1a38de13f6079ec0919d035

  • SHA256

    00a75d01fb8ae3a68beb03573b9c1c3d1debe255b07fba0b2b7500dae87c7bb5

  • SHA512

    8f7945f16efd9a47856efdcc34e933be0a6a293eb0646266cf20aadb963d546c12bf21d1e61c928b66f6d591795b37a92fafaf9864ec64c5165a39eae249dc3e

Malware Config

Extracted

Family

azorult

C2

http://ensaenerji.com/mep/index.php

Targets

    • Target

      MTIR2028.EXE

    • Size

      406KB

    • MD5

      6c378a9a4067f1affdb254dfa96943da

    • SHA1

      12911df0be6ae9f4292038e60c5aad41073c55fd

    • SHA256

      fd975fd3af1f754bf7b03eca4ae29e3054f34f7176b26c2578efddde76947f70

    • SHA512

      33dc7b3b743bc77efea699a3508b4fbe1f0707cd6ad38f9cba8a1257b4c881d5cf6212d3c3a8cf1e3efe46dadff55747b1dee0b6df8942e268891e2a3d8f3858

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • CoreEntity .NET Packer

      A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

    • suricata: ET MALWARE AZORult Variant.4 Checkin M2

      suricata: ET MALWARE AZORult Variant.4 Checkin M2

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M6

    • ReZer0 packer

      Detects ReZer0, a packer with multiple versions used in various campaigns.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Tasks