General

  • Target

    26f35270f714065705474f3a330a9b7676c2d7e30b9cb9de57d726930768fe29.exe

  • Size

    100KB

  • Sample

    220521-yh2lhadah3

  • MD5

    683600b61a32d3eb2cd44cb34fdf7ab3

  • SHA1

    e8bdd864c2610495850bf525cd1529c66c0b0b53

  • SHA256

    26f35270f714065705474f3a330a9b7676c2d7e30b9cb9de57d726930768fe29

  • SHA512

    5e85802a49875fadfff9bd2d1e4f04bb3e391709813757e14364b99f674e3e7fea757f861c2d811e9882035737d122ebfd4aa17039fdc08dc16f73028159e389

Malware Config

Extracted

Family

azorult

C2

http://195.245.112.115/index.php

Targets

    • Target

      26f35270f714065705474f3a330a9b7676c2d7e30b9cb9de57d726930768fe29.exe

    • Size

      100KB

    • MD5

      683600b61a32d3eb2cd44cb34fdf7ab3

    • SHA1

      e8bdd864c2610495850bf525cd1529c66c0b0b53

    • SHA256

      26f35270f714065705474f3a330a9b7676c2d7e30b9cb9de57d726930768fe29

    • SHA512

      5e85802a49875fadfff9bd2d1e4f04bb3e391709813757e14364b99f674e3e7fea757f861c2d811e9882035737d122ebfd4aa17039fdc08dc16f73028159e389

    • Azorult

      An information stealer that was first discovered in 2016, targeting browsing history and passwords.

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M13

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M13

    • suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

      suricata: ET MALWARE Win32/AZORult V3.3 Client Checkin M6

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks