General

  • Target

    fb0c67170432a370e0c244a6dd21618a61c4d9a56bad0400cc7dca93063676cd.exe

  • Size

    547KB

  • Sample

    220521-yh2aqsdag4

  • MD5

    f451fcfbba3200d90bed8064ad56bcb0

  • SHA1

    a41804c64acc34fc16d66455fd06200d65364c60

  • SHA256

    fb0c67170432a370e0c244a6dd21618a61c4d9a56bad0400cc7dca93063676cd

  • SHA512

    2afa13194b65810455ff4525294cc78960bf8799b943201e653f5994ab5902b7bcdd4d2ce2694ab46eb0c787975e94dad718c8afe7f0323b1cfc88ee538e19e3

Malware Config

Extracted

Family

azorult

C2

http://212.192.241.190/index.php

Targets

    • Target

      fb0c67170432a370e0c244a6dd21618a61c4d9a56bad0400cc7dca93063676cd.exe

    • Size

      547KB

    • MD5

      f451fcfbba3200d90bed8064ad56bcb0

    • SHA1

      a41804c64acc34fc16d66455fd06200d65364c60

    • SHA256

      fb0c67170432a370e0c244a6dd21618a61c4d9a56bad0400cc7dca93063676cd

    • SHA512

      2afa13194b65810455ff4525294cc78960bf8799b943201e653f5994ab5902b7bcdd4d2ce2694ab46eb0c787975e94dad718c8afe7f0323b1cfc88ee538e19e3

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE AZORult Variant.4 Checkin M2

      suricata: ET MALWARE AZORult Variant.4 Checkin M2

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M14

    • suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M4

      suricata: ET MALWARE Win32/AZORult V3.2 Client Checkin M4

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks