General

  • Target

    36d24df14c30587bab4aec2992cd86d258d0245f01781abb57241005282a8f7e.exe

  • Size

    516KB

  • Sample

    220521-yh2aqsdag6

  • MD5

    50ef01a3ea956415109060b12df69af3

  • SHA1

    9017e97b4a34336392b7b98ad2aff8c4dad228d9

  • SHA256

    36d24df14c30587bab4aec2992cd86d258d0245f01781abb57241005282a8f7e

  • SHA512

    d518eb98744fb1b3dbf94dc07c58c22c216d120a537df4e2253f59db6b6b555de56a16e2fdcc71cc951b433533c94a06f8b60d9d9fadf2e7ea18c9ae03072c8d

Malware Config

Extracted

Family

azorult

C2

http://e4v5sa.xyz/PL341/index.php

Targets

    • Target

      36d24df14c30587bab4aec2992cd86d258d0245f01781abb57241005282a8f7e.exe

    • Size

      516KB

    • MD5

      50ef01a3ea956415109060b12df69af3

    • SHA1

      9017e97b4a34336392b7b98ad2aff8c4dad228d9

    • SHA256

      36d24df14c30587bab4aec2992cd86d258d0245f01781abb57241005282a8f7e

    • SHA512

      d518eb98744fb1b3dbf94dc07c58c22c216d120a537df4e2253f59db6b6b555de56a16e2fdcc71cc951b433533c94a06f8b60d9d9fadf2e7ea18c9ae03072c8d

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Tasks