General

  • Target

    ed1b87ee67f17d07ffded59e2f27e583b23cae2b21a3ea47cff0bf277d743899.exe

  • Size

    405KB

  • Sample

    220521-yh1dfadaf2

  • MD5

    e7993154a6aaf11628634216d9228ab6

  • SHA1

    eaa844a817fd4dde1ba6c4138dfa4966f7937fd7

  • SHA256

    ed1b87ee67f17d07ffded59e2f27e583b23cae2b21a3ea47cff0bf277d743899

  • SHA512

    c1c9f91292996b997545c62083895e97693c6d46f32220c63e37984e2e725dc9cd276d0bff4a71b2a5b6adeb06520ac33e6c2d231c23a1573fd2e2931a88ef27

Malware Config

Extracted

Family

azorult

C2

http://46.183.223.118/chido/Panel/index.php

Targets

    • Target

      ed1b87ee67f17d07ffded59e2f27e583b23cae2b21a3ea47cff0bf277d743899.exe

    • Size

      405KB

    • MD5

      e7993154a6aaf11628634216d9228ab6

    • SHA1

      eaa844a817fd4dde1ba6c4138dfa4966f7937fd7

    • SHA256

      ed1b87ee67f17d07ffded59e2f27e583b23cae2b21a3ea47cff0bf277d743899

    • SHA512

      c1c9f91292996b997545c62083895e97693c6d46f32220c63e37984e2e725dc9cd276d0bff4a71b2a5b6adeb06520ac33e6c2d231c23a1573fd2e2931a88ef27

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Executes dropped EXE

    • Loads dropped DLL

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks