General

  • Target

    2f81e8b71640e7b5770deccc56c23d75240c34a5914dcb138ec2972e624a0f03.exe

  • Size

    512KB

  • Sample

    220521-yh2aqsgcej

  • MD5

    4b204c35e5306c88090ca9f2b52ae930

  • SHA1

    f290117f9ad0e7f2507d94be22398b1019775a13

  • SHA256

    2f81e8b71640e7b5770deccc56c23d75240c34a5914dcb138ec2972e624a0f03

  • SHA512

    cd067bf766447a85b09d894f799996cc9541f41dba3ddee0b40b6af2f49f142600d39d25ead33e8370efd917bbe2bf16bc3a0eb1185e0ce27c34572fcd429a48

Malware Config

Extracted

Family

azorult

C2

http://e4v5sa.xyz/PL341/index.php

Targets

    • Target

      2f81e8b71640e7b5770deccc56c23d75240c34a5914dcb138ec2972e624a0f03.exe

    • Size

      512KB

    • MD5

      4b204c35e5306c88090ca9f2b52ae930

    • SHA1

      f290117f9ad0e7f2507d94be22398b1019775a13

    • SHA256

      2f81e8b71640e7b5770deccc56c23d75240c34a5914dcb138ec2972e624a0f03

    • SHA512

      cd067bf766447a85b09d894f799996cc9541f41dba3ddee0b40b6af2f49f142600d39d25ead33e8370efd917bbe2bf16bc3a0eb1185e0ce27c34572fcd429a48

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks