General

  • Target

    42d6ad70b55d487b04cb7681d6e1b6b7020a9ec18bd79fc02ee6844fb522f0d9.exe

  • Size

    551KB

  • Sample

    220521-yh1zzagcdm

  • MD5

    e92dfdc1e9f165803c56270f27328f5b

  • SHA1

    b148cc1aca9d48bff55daf27d4da3af27dae9187

  • SHA256

    42d6ad70b55d487b04cb7681d6e1b6b7020a9ec18bd79fc02ee6844fb522f0d9

  • SHA512

    b9bf42e79bcfad6cfd28980b361bccfdf4d750ff54cb59b1053ac44cb80276a455c31bee93c8508bb0c8ab5890d678b4af4402347fcda2195372ad1d8a678fe8

Malware Config

Extracted

Family

azorult

C2

http://5gw4d.xyz/PL341/index.php

Targets

    • Target

      42d6ad70b55d487b04cb7681d6e1b6b7020a9ec18bd79fc02ee6844fb522f0d9.exe

    • Size

      551KB

    • MD5

      e92dfdc1e9f165803c56270f27328f5b

    • SHA1

      b148cc1aca9d48bff55daf27d4da3af27dae9187

    • SHA256

      42d6ad70b55d487b04cb7681d6e1b6b7020a9ec18bd79fc02ee6844fb522f0d9

    • SHA512

      b9bf42e79bcfad6cfd28980b361bccfdf4d750ff54cb59b1053ac44cb80276a455c31bee93c8508bb0c8ab5890d678b4af4402347fcda2195372ad1d8a678fe8

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M15

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks